Posts Tagged ‘Government spying’

Surveillance companies like Axon hope to turn every law enforcement officer into a data-gathering drone for a bodycam surveillance database they privately control. Now ShotSpotter, a listening technology that triangulates gunfire in “urban, high-crime areas,” announced a planned IPO.

Above: ShotSpotter mobile app integrated with Google data, showing Oakland California.
They are also expanding from “urban” neighborhoods to a college campus near you. From the submission:
Our solutions consist of our highly-specialized, cloud-based software integrated with our proprietary, internet-enabled sensors and communication networks. When a potential gunfire incident is detected by our sensors, our software analyzes and validates the data and precisely locates where the incident occurred. An alert containing a location on a map and critical information about the incident is transmitted directly to law enforcement or security personnel through any internet-connected computer and to iPhone® or Android mobile devices.

There is still a lot we don’t know regarding the WikiLeaks exposure of CIA cybersecurity documents this week. Many have suggested the documents may not be true or may have been tampered with before posting. And of course, everyone is wondering what the ramifications of such a revelation will be in terms of the CIA’s ability conduct its spycraft in the future. Some of the spying methods described in the documents may seem impossible, but I can attest that at least on that point, many of the tools described by the 8,000 documents do in fact exist.

According to what has been released so far, the CIA, through its Remote Devices Branch called UMBRAGE, maintains a library of hacking tools it has “stolen” from other groups. It goes on to explain the CIA can use the tools to compromise iOS and Android phones, and smart TVs, turning them into listening devices. It’s interesting to note the documents claim the CIA acquires these tools from others, instead of making them in-house.

That said, in my work as a reviewer of high-end security products, I have run across many of the hacking tools described in the leaked documents. In a few cases, companies have even provided them to me so I could challenge their defenses. I keep them in an air-gapped computer network along with my virus zoo, pulling them out whenever needed for a controlled test.

Full disclosure: I have no idea if I have the same tools the CIA is allegedly using, only that they seem to do many of the same things described by the WikiLeaks documents.

Hacking smart TVs seems to be getting the most attention, though it should come as the least surprising aspect of this. Smart TVs are basically all-in-one computers, only without any of the protections found on actual dedicated computers. That is why so many smart TVs ended up being part of the Mirai botnet.

In some cases, smart TVs seem to have been designed for spying. Vizio, which is one of the most popular manufacturers, recently agreed to pay $2.2 million in fines for secretly recording what people were watching and selling that data to advertisers.

The Vizio hacking tool, which was installed on new systems and allegedly also retrofitted to older TVs connected to the internet, was fairly ingenious. It would take snapshots of several pixels on the screen and then compare that to a database of what was playing. So, blue and blue and red might mean the user was watching the “Fresh off the Boat” sitcom, while black and white and green might line up with a feature movie. It required very little data to be sent from the TV back to the company, with all the high-end big data processing occurring after the data was captured.

Back to the alleged CIA tools. The CIA is supposed to be able to turn certain smart TVs into listening devices, while making it appear like the unit is turned off. I have recently tested a tool like that with a Samsung smart TV. I am not sure if it works with other types of TVs, but the tool I have uses a variant of the Samsung Screen Mirroring, modified to both record sound and keep its presence hidden from users.

As most TVs have no security, paring the hacking tool—which I was running off a Samsung tablet—with a TV is extremely easy. Simply select the TV in range you want to target. From there, I could share my screen with the TV, but the tool reverses this so users can instead see what is on the TV.

But then it gets interesting. By entering silent operation mode, the TV screen goes dark, as if whatever input is selected has no data. It also activates the internal microphone if the TV is equipped for videoconferencing, or uses the device’s speaker system if it’s not—though the sound quality is not nearly as good in the latter case.

From another room, I could clearly hear everything going on in the one with the TV. I even deployed this against a conference room setting, and the people talking in that room had no idea someone was listening in from a nearby office.

Read the rest here

By John W. Whitehead
January 17, 2017

“There are two ways by which the spirit of a culture may be shriveled. In the first—the Orwellian—culture becomes a prison. In the second—the Huxleyan—culture becomes a burlesque. No one needs to be reminded that our world is now marred by many prison-cultures…. it makes little difference if our wardens are inspired by right- or left-wing ideologies. The gates of the prison are equally impenetrable, surveillance equally rigorous, icon-worship pervasive…. Big Brother does not watch us, by his choice. We watch him, by ours…. When a population becomes distracted by trivia, when cultural life is redefined as a perpetual round of entertainments, when serious public conversation becomes a form of baby-talk, when, in short, a people become an audience, and their public business a vaudeville act, then a nation finds itself at risk; culture-death is a clear possibility.”— Professor Neil Postman

Donald Trump no longer needs to launch Trump TV.

He’s already the star of his own political reality show.

Americans have a voracious appetite for TV entertainment, and the Trump reality show—guest starring outraged Democrats with a newly awakened conscience for immigrants and the poor, power-hungry Republicans eager to take advantage of their return to power, and a hodgepodge of other special interest groups with dubious motives—feeds that appetite for titillating, soap opera drama.

After all, who needs the insults, narcissism and power plays that are hallmarks of reality shows such as Celebrity Apprentice or Keeping Up with the Kardashians when you can have all that and more delivered up by the likes of Donald Trump and his cohorts?

Yet as John Lennon reminds us, “nothing is real,” especially not in the world of politics.

Much like the fabricated universe in Peter Weir’s 1998 film The Truman Show, in which a man’s life is the basis for an elaborately staged television show aimed at selling products and procuring ratings, the political scene in the United States has devolved over the years into a carefully calibrated exercise in how to manipulate, polarize, propagandize and control a population.

Indeed, Donald Trump may be the smartest move yet by the powers-that-be to keep the citizenry divided and at each other’s throats, because as long as we’re busy fighting each other, we’ll never manage to present a unified front against tyranny in any form.

This is the magic of the reality TV programming that passes for politics today.

It allows us to be distracted, entertained, occasionally a little bit outraged but overall largely uninvolved, content to remain in the viewer’s seat.

The more that is beamed at us, the more inclined we are to settle back in our comfy recliners and become passive viewers rather than active participants as unsettling, frightening events unfold.

Reality and fiction merge as everything around us becomes entertainment fodder.

We don’t even have to change the channel when the subject matter becomes too monotonous. That’s taken care of for us by the programmers (the corporate media).

For instance, before we could get too worked up over government surveillance, the programmers changed the channels on us and switched us over to breaking news about militarized police. Before our outrage could be transformed into action over police misconduct, they changed the channel once again to reports of ISIS beheadings and terrorist shootings. Before we had a chance to challenge what was staged or real, the programming switched to the 2016 presidential election.

“Living is easy with eyes closed,” says Lennon, and that’s exactly what reality TV that masquerades as American politics programs the citizenry to do: navigate the world with their eyes shut.

As long as we’re viewers, we’ll never be doers.

Studies suggest that the more reality TV people watch—and I would posit that it’s all reality TV—the more difficult it becomes to distinguish between what is real and what is carefully crafted farce.

“We the people” are watching a lot of TV.

On average, Americans spend five hours a day watching television. By the time we reach age 65, we’re watching more than 50 hours of television a week, and that number increases as we get older. And reality TV programming consistently captures the largest percentage of TV watchers every season by an almost 2-1 ratio.

 

This doesn’t bode well for a citizenry able to sift through masterfully-produced propaganda in order to think critically about the issues of the day, whether it’s fake news peddled by government agencies or foreign entities.

Those who watch reality shows tend to view what they see as the “norm.” Thus, those who watch shows characterized by lying, aggression and meanness not only come to see such behavior as acceptable and entertaining but also mimic the medium.

This holds true whether the reality programming is about the antics of celebrities in the White House, in the board room, or in the bedroom.

It’s a phenomenon called “humilitainment.”

A term coined by media scholars Brad Waite and Sara Booker, “humilitainment” refers to the tendency for viewers to take pleasure in someone else’s humiliation, suffering and pain.

Humilitainment” largely explains not only why American TV watchers are so fixated on reality TV programming but how American citizens, largely insulated from what is really happening in the world around them by layers of technology, entertainment, and other distractions, are being programmed to accept the brutality, surveillance and dehumanizing treatment of the American police state as things happening to other people.

The ramifications for the future of civic engagement, political discourse and self-government are incredibly depressing and demoralizing.

This not only explains how a candidate like Donald Trump with a reputation for being rude, egotistical and narcissistic could get elected, but it also says a lot about how a politician like Barack Obama—whose tenure in the White House was characterized by drone killings, a weakening of the Constitution at the expense of Americans’ civil liberties, and an expansion of the police state—could be hailed as “one of the greatest presidents of all times.”

This is what happens when an entire nation—bombarded by reality TV programming, government propaganda and entertainment news—becomes systematically desensitized and acclimated to the trappings of a government that operates by fiat and speaks in a language of force.

Ultimately, as I make clear in my book Battlefield America: The War on the American People, the reality shows, the entertainment news, the surveillance society, the militarized police, and the political spectacles have one common objective: to keep us divided, distracted, imprisoned, and incapable of taking an active role in the business of self-government.

If “we the people” feel powerless and apathetic, it is only because we have allowed ourselves to be convinced that the duties of citizenship begin and end at the ballot box.

Marching and protests have certainly been used with great success by past movements to foment real change, but if those marches and protests are merely outpourings of discontent because a particular politician won or lost with no solid plan of action or follow-through, then what’s the point?

Martin Luther King Jr. understood that politics could never be the answer to what ailed the country. That’s why he spearheaded a movement of mass-action strategy that employed boycotts, sit-ins and marches. Yet King didn’t march against a particular politician or merely to express discontent. He marched against injustice, government corruption, war, and inequality, and he leveraged discontent with the status quo into an activist movement that transformed the face of America.

When all is said and done, it won’t matter who you voted for in the presidential election. What will matter is where you stand in the face of the injustices that continue to ravage our nation: the endless wars, the police shootings, the overcriminalization, the corruption, the graft, the roadside strip searches, the private prisons, the surveillance state, etc.

Will you tune out the reality TV show and join with your fellow citizens to push back against the real menace of the police state, or will you merely sit back and lose yourself in the political programming aimed at keeping you imprisoned in the police state?

REUTERS

Yahoo Inc last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter.

The company complied with a classified U.S. government demand, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said three former employees and a fourth person apprised of the events.

Some surveillance experts said this represents the first case to surface of a U.S. Internet company agreeing to an intelligence agency’s request by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time.

It is not known what information intelligence officials were looking for, only that they wanted Yahoo to search for a set of characters. That could mean a phrase in an email or an attachment, said the sources, who did not want to be identified

Reuters was unable to determine what data Yahoo may have handed over, if any, and if intelligence officials had approached other email providers besides Yahoo with this kind of request.

According to two of the former employees, Yahoo Chief Executive Marissa Mayer’s decision to obey the directive roiled some senior executives and led to the June 2015 departure of Chief Information Security Officer Alex Stamos, who now holds the top security job at Facebook Inc.

“Yahoo is a law abiding company, and complies with the laws of the United States,” the company said in a brief statement in response to Reuters questions about the demand. Yahoo declined any further comment.

Through a Facebook spokesman, Stamos declined a request for an interview.

The NSA referred questions to the Office of the Director of National Intelligence, which declined to comment.

The request to search Yahoo Mail accounts came in the form of a classified edict sent to the company’s legal team, according to the three people familiar with the matter.

U.S. phone and Internet companies are known to have handed over bulk customer data to intelligence agencies. But some former government officials and private surveillance experts said they had not previously seen either such a broad demand for real-time Web collection or one that required the creation of a new computer program.

“I’ve never seen that, a wiretap in real time on a ‘selector,'” said Albert Gidari, a lawyer who represented phone and Internet companies on surveillance issues for 20 years before moving to Stanford University this year. A selector refers to a type of search term used to zero in on specific information.

“It would be really difficult for a provider to do that,” he added.

Experts said it was likely that the NSA or FBI had approached other Internet companies with the same demand, since they evidently did not know what email accounts were being used by the target. The NSA usually makes requests for domestic surveillance through the FBI, so it is hard to know which agency is seeking the information.

Alphabet Inc’s Google and Microsoft Corp, two major U.S. email service providers, separately said on Tuesday that they had not conducted such email searches.

“We’ve never received such a request, but if we did, our response would be simple: ‘No way’,” a spokesman for Google said in a statement.

A Microsoft spokesperson said in a statement, “We have never engaged in the secret scanning of email traffic like what has been reported today about Yahoo.” The company declined to comment on whether it had received such a request.

CHALLENGING THE NSA

Under laws including the 2008 amendments to the Foreign Intelligence Surveillance Act, intelligence agencies can ask U.S. phone and Internet companies to provide customer data to aid foreign intelligence-gathering efforts for a variety of reasons, including prevention of terrorist attacks.

Disclosures by former NSA contractor Edward Snowden and others have exposed the extent of electronic surveillance and led U.S. authorities to modestly scale back some of the programs, in part to protect privacy rights.

Companies including Yahoo have challenged some classified surveillance before the Foreign Intelligence Surveillance Court, a secret tribunal.

Some FISA experts said Yahoo could have tried to fight last year’s demand on at least two grounds: the breadth of the directive and the necessity of writing a special program to search all customers’ emails in transit.

Apple Inc made a similar argument earlier this year when it refused to create a special program to break into an encrypted iPhone used in the 2015 San Bernardino massacre. The FBI dropped the case after it unlocked the phone with the help of a third party, so no precedent was set.

“It is deeply disappointing that Yahoo declined to challenge this sweeping surveillance order, because customers are counting on technology companies to stand up to novel spying demands in court,” Patrick Toomey, an attorney with the American Civil Liberties Union, said in a statement.

Some FISA experts defended Yahoo’s decision to comply, saying nothing prohibited the surveillance court from ordering a search for a specific term instead of a specific account. So-called “upstream” bulk collection from phone carriers based on content was found to be legal, they said, and the same logic could apply to Web companies’ mail.

As tech companies become better at encrypting data, they are likely to face more such requests from spy agencies.

Former NSA General Counsel Stewart Baker said email providers “have the power to encrypt it all, and with that comes added responsibility to do some of the work that had been done by the intelligence agencies.”

SECRET SIPHONING PROGRAM

Mayer and other executives ultimately decided to comply with the directive last year rather than fight it, in part because they thought they would lose, said the people familiar with the matter.

Yahoo in 2007 had fought a FISA demand that it conduct searches on specific email accounts without a court-approved warrant. Details of the case remain sealed, but a partially redacted published opinion showed Yahoo’s challenge was unsuccessful.

Some Yahoo employees were upset about the decision not to contest the more recent edict and thought the company could have prevailed, the sources said.

They were also upset that Mayer and Yahoo General Counsel Ron Bell did not involve the company’s security team in the process, instead asking Yahoo’s email engineers to write a program to siphon off messages containing the character string the spies sought and store them for remote retrieval, according to the sources.

The sources said the program was discovered by Yahoo’s security team in May 2015, within weeks of its installation. The security team initially thought hackers had broken in.

When Stamos found out that Mayer had authorized the program, he resigned as chief information security officer and told his subordinates that he had been left out of a decision that hurt users’ security, the sources said. Due to a programming flaw, he told them hackers could have accessed the stored emails.

Stamos’s announcement in June 2015 that he had joined Facebook did not mention any problems with Yahoo. (bit.ly/2dL003k)

In a separate incident, Yahoo last month said “state-sponsored” hackers had gained access to 500 million customer accounts in 2014. The revelations have brought new scrutiny to Yahoo’s security practices as the company tries to complete a deal to sell its core business to Verizon Communications Inc for $4.8 billion.

(Reporting by Joseph Menn; Editing by Jonathan Weber and Tiffany Wu)

source

 

 

By John W. Whitehead
June 28, 2016

“Our carceral state banishes American citizens to a gray wasteland far beyond the promises and protections the government grants its other citizens… When the doors finally close and one finds oneself facing banishment to the carceral state—the years, the walls, the rules, the guards, the inmates—reactions vary. Some experience an intense sickening feeling. Others, a strong desire to sleep. Visions of suicide. A deep shame. A rage directed toward guards and other inmates. Utter disbelief. The incarcerated attempt to hold on to family and old social ties through phone calls and visitations. At first, friends and family do their best to keep up. But phone calls to prison are expensive, and many prisons are located far from one’s hometown… As the visits and phone calls diminish, the incarcerated begins to adjust to the fact that he or she is, indeed, a prisoner. New social ties are cultivated. New rules must be understood.”—Ta-Nehisi Coates, The Atlantic

In a carceral state—a.k.a. a prison state or a police state—there is no Fourth Amendment to protect you from the overreaches, abuses, searches and probing eyes of government overlords.

In a carceral state, there is no difference between the treatment meted out to a law-abiding citizen and a convicted felon: both are equally suspect and treated as criminals, without any of the special rights and privileges reserved for the governing elite.

In a carceral state, there are only two kinds of people: the prisoners and the prison guards.

With every new law enacted by federal and state legislatures, every new ruling handed down by government courts, and every new military weapon, invasive tactic and egregious protocol employed by government agents, “we the people”—the prisoners of the American police state—are being pushed that much further into a corner, our backs against the prison wall.

This concept of a carceral state in which we possess no rights except for that which the government grants on an as-needed basis is the only way I can begin to comprehend, let alone articulate, the irrational, surreal, topsy-turvy, through-the-looking-glass state of affairs that is being imposed upon us in America today.

As I point out in my book Battlefield America: The War on the American People, we who pretend we are free are no different from those who spend their lives behind bars.

Indeed, we are experiencing much the same phenomenon that journalist Ta-Nehisi Coates ascribes to those who are banished to a “gray wasteland far beyond the promises and protections the government grants its other citizens” : a sickening feeling, a desire to sleep, hopelessness, shame, rage, disbelief, clinginess to the past and that which is familiar, and then eventually resignation and acceptance of our new “normal.”

All that we are experiencing—the sense of dread at what is coming down the pike, the desperation, the apathy about government corruption, the deeply divided partisanship, the carnivalesque political spectacles, the public displays of violence, the nostalgia for the past—are part of the dying refrain of an America that is fading fast.

No longer must the government obey the law.

Likewise, “we the people” are no longer shielded by the rule of law.

While the First Amendment—which gives us a voice—is being muzzled, the Fourth Amendment—which protects us from being bullied, badgered, beaten, broken and spied on by government agents—is being disemboweled.

For instance, in a recent 5-3 ruling in Utah v. Strieff, the U.S. Supreme Court opened the door for police to stop, arrest and search citizens without reasonable suspicion or probable cause, effectively giving police a green light to embark on a fishing expedition of one’s person and property, rendering Americans completely vulnerable to the whims of any cop on the beat.

In a blistering dissent, Justice Sonia Sotomayor blasted the court for holding “that the discovery of a warrant for an unpaid parking ticket will forgive a police officer’s violation of your Fourth Amendment rights.” Sotomayor continued:

This Court has allowed an officer to stop you for whatever reason he wants—so long as he can point to a pretextual justification after the fact. That justification must provide specific reasons why the officer suspected you were breaking the law, but it may factor in your ethnicity, where you live, what you were wearing, and how you behaved. The officer does not even need to know which law you might have broken so long as he can later point to any possible infraction—even one that is minor, unrelated, or ambiguous.

The indignity of the stop is not limited to an officer telling you that you look like a criminal. The officer may next ask for your “consent” to inspect your bag or purse without telling you that you can decline. Regardless of your answer, he may order you to stand “helpless, perhaps facing a wall with [your] hands raised.” If the officer thinks you might be dangerous, he may then “frisk” you for weapons. This involves more than just a pat down. As onlookers pass by, the officer may “‘feel with sensitive fingers every portion of [your] body. A thorough search [may] be made of [your] arms and armpits, waistline and back, the groin and area about the testicles, and entire surface of the legs down to the feet.’”

If you still can’t read the writing on the wall, Sotomayor breaks it down further: “This case allows the police to stop you on the street, demand your identification, and check it for outstanding traffic warrants—even if you are doing nothing wrong… So long as the target is one of the many millions of people in this country with an outstanding arrest warrant, anything the officer finds in a search is fair game for use in a criminal prosecution. The officer’s incentive to violate the Constitution thus increases…”

Just consider some of the many other ways in which the Fourth Amendment—which ensures that the government can’t harass you, let alone even investigate you, without probable cause—has been weakened and undermined by the courts, the legislatures and various government agencies and operatives.

Breath tests, blood draws: Americans have no protection against mandatory breathalyzer tests at a police checkpoint, although mandatory blood draws violate the Fourth Amendment (Birchfield v. North Dakota).

Ignorance of the law is defensible if you work for the government: Police officers who violate the law can be granted qualified immunity if they claim ignorance of the law (Heien v. North Carolina). That rationale was also applied to police who clearly used excessive force when they repeatedly tasered a pregnant woman during a routine traffic stop and were granted immunity from prosecution (Brooks v. City of Seattle).

Highspeed car chases: Police officers can use lethal force in car chases without fear of lawsuits (Plumhoff v. Rickard).

Noknock raids: Police can perform a “no-knock” as long as they have a reasonable suspicion that knocking and announcing their presence, under the particular circumstances, would be dangerous or futile or give occupants a chance to destroy evidence of a crime (Richards v. Wisconsin). Legal ownership of a firearm is also enough to justify a no-knock raid by police (Quinn v. Texas).

Warrantless searches by police: Police can carry out warrantless searches on our homes based on a “reasonable” concern by police that a suspect (or occupant) might be attempting to destroy evidence, fleeing or hurt, even if it’s the wrong house (Kentucky v. King). Police can also, without a warrant, search anyone who has been lawfully arrested (United States v. Robinson) as well as their property post-arrest (Colorado v. Bertine) and their vehicle (New York v. Belton), search a car they suspect might contain evidence of a crime (Chambers v. Maroney), and search a home when the arrest is made on its premises (Maryland v. Buie).

Forced DNA extractions: Police can forcibly take your DNA, whether or not you’ve been convicted of a crime. Innocent or not, your DNA will then be stored in the national FBI database (Maryland v. King).

Strip searches: Police can subject Americans to virtual strip searches, no matter the “offense” (Florence v. Board of Chosen Freeholders of the County of Burlington). This “license to probe” is now being extended to roadside stops, as police officers throughout the country have begun performing roadside strip searches—some involving anal and vaginal probes—without any evidence of wrongdoing and without a warrant.

Seizures: For all intents and purposes, you’re “seized” within the meaning of the Fourth Amendment from the moment an officer stops you (Brendlin v. California).

Search warrants on a leash: Police have free reign to use drug-sniffing dogs as “search warrants on leashes,” justifying any and all police searches of vehicles stopped on the roadside (Florida v. Harris), but the use of a K-9 unit after a reasonable amount of time has passed during a stop does violate the Fourth Amendment (Rodriguez v. United States).

Police and DUI Checkpoints: Police can conduct sobriety and “information-seeking” checkpoints (Illinois v. Lidster and Mich. Dept of State Police v. Sitz).

Interrogating public transit passengers: Police officers are free to board a bus, question passengers, and ask for consent to search without notifying them of their right to refuse (U.S v. Drayton).

Warrantless arrests for minor criminal offenses: Police can arrest you for minor criminal offenses, such as a misdemeanor seatbelt violation, punishable only by a fine (Atwater v. City of Lago Vista).

Stop and identify: Refusing to answer when a policeman asks “What’s your name?” can rightfully be considered a crime. No longer do Americans, even those not charged with any crime, have the right to remain altogether silent when stopped and questioned by a police officer (Hiibel v. Sixth Judicial District Court of the State of Nevada).

Traffic stops: As long as police have reasonable cause to believe that a traffic violation occurred, they may stop any vehicle (Whren v. U.S.). If probable cause justifies a vehicle search, then every part of the vehicle can be searched (U.S. v. Ross). A vehicle can be stopped even if the driver has not committed a traffic offense (U.S. v. Cortez).

Anonymous tips, careful driving, rigid posture and acne: Police officers can stop cars based only on “anonymous” tips (Navarette v. California). Police can also pull you over if you are driving too carefully, with a rigid posture, taking a scenic route, and have acne (U.S. v. Westhoven).

What many Americans fail to understand is the devastating amount of damage that can be done to one’s freedoms long before a case ever makes its way to court by government agents who are violating the Fourth Amendment at every turn. This is how freedoms, long undermined, can give way to tyranny through constant erosion and become part of the fabric of the police state through constant use.

Phone and email surveillance, databases for dissidents, threat assessments, terror watch lists, militarized police, SWAT team raids, security checkpoints, lockdowns, roadside strip searches: there was a time when any one of these encroachments on our Fourth Amendment rights would have roused the public to outrage. Today, such violations are shrugged off matter-of-factly by Americans who have been assiduously groomed to accept the intrusions of the police state into their private lives.

So when you hear about the FBI hacking into Americans’ computers without a warrant with the blessing of the courts, or states assembling and making public terror watch lists containing the names of those who are merely deemed suspicious, or the police knocking on the doors of activists in advance of political gatherings to ascertain their plans for future protests, or administrative government agencies (such as the FDA, Small Business Administration, Smithsonian, Social Security, National Oceanic and Atmospheric Administration, U.S. Mint, and Department of Education) spending millions on guns and ammunition, don’t just matter-of-factly file it away in that part of your brain reserved for things you may not like but over which you have no control.

It’s true that there may be little the average person can do to push back against the police state on a national level, but there remains some hope at the local level as long as we retain a speck of our independence and individuality—as long as we can resist the defeatist sense of double-consciousness (a phrase coined by W. E. B. Du Bois in which we view ourselves as inferior through the prism of our oppressors)—as long as we continue to cry out for justice for ourselves and those around us—as long as we refuse to be shackled and made prisoners—and as long as we continue to recognize that the only way the police state can truly acquire and retain power is if we relinquish it through our negligence, complacence and ignorance.

Unfortunately, we have been utterly brainwashed into believing the government’s propaganda and lies. Americans actually celebrate with perfect sincerity the anniversary of our independence from Great Britain without ever owning up to the fact that we are as oppressed now—more so, perhaps, thanks to advances in technology—than we ever were when Redcoats stormed through doorways and subjected colonists to the vagaries of a police state.

You see, by gradually whittling away at our freedoms—free speech, assembly, due process, privacy, etc.—the government has, in effect, liberated itself from its contractual agreement to respect our constitutional rights while resetting the calendar back to a time when we had no Bill of Rights to protect us from the long arm of the government.

Aided and abetted by the legislatures, the courts and Corporate America, the government has been busily rewriting the contract (a.k.a. the Constitution) that establishes the citizenry as the masters and agents of the government as the servants. We are now only as good as we are useful, and our usefulness is calculated on an economic scale by how much we are worth—in terms of profit and resale value—to our “owners.”

Under the new terms of this one-sided agreement, the government and its many operatives have all the privileges and rights and “we the prisoners” have none.

As Sotomayor concluded in her ringing dissent in Utah v. Strieff:

By legitimizing the conduct that produces this double consciousness, this case tells everyone, white and black, guilty and innocent, that an officer can verify your legal status at any time. It says that your body is subject to invasion while courts excuse the violation of your rights. It implies that you are not a citizen of a democracy but the subject of a carceral state, just waiting to be cataloged. We must not pretend that the countless people who are routinely targeted by police are “isolated.” They are the canaries in the coal mine whose deaths, civil and literal, warn us that no one can breathe in this atmosphere. They are the ones who recognize that unlawful police stops corrode all our civil liberties and threaten all our lives. Until their voices matter too, our justice system will continue to be anything but.

This commentary is also
available at www.rutherford.org.

Conclusion: This attack on dissent is serious. Educate your family and friends about what’s going on. Do not be fooled by their propaganda, but beware of the risks of speaking out too freely.

Believe in conspiracy theories? You’re probably a narcissist: People who doubt the moon landings are more likely to be selfish and attention-seeking … Psychologists from the University of Kent carried out three online studies … -UK Daily Mail

We are seeing an increasing number of academic studies analyzing the psychology behind “conspiracy theorists” and those who question government propaganda. The idea being that people who don’t trust government may be mentally ill.

These analyses are published in prominent publications in the UK and are building a “scientific” literature revolving psychological dysfunction and “conspiracy theory.”

More:

Do you think the moon-landings were faked, vaccines are a plot for mind control, or that shadowy government agencies are keeping alien technology locked up in hidden bunkers?

If so, chances are you’re a narcissist with low self-esteem, according to psychologists. In the internet age conspiracy theories can incubate in quiet corners of the web, but it may be psychological predispositions of believers which keep them alive, rather than cold hard facts.

The article goes on to explain that researchers at the University of Kent have used online studies  from hundreds of people to generate the study’s conclusions.

The findings appeared in the journal Social Psychological and Personality Science with the suggestion that those who adopt conspiracy theories have “outwardly inflated self-confidence” but may be “overcompensating for a lack of belief in themselves.”

The article mentions a previous study conducted by Oxford’s Dr. David Robert Grimes.

From what we’ve written on this study:

Grimes had the idea that mathematics could prove or disprove certain conspiracy theories. A physicist, he “developed a mathematical equation to derive the truth of conspiracy theories,” according to the Christian Science Monitor …

Grimes calculated that the moon landing and climate change conspiracies “would require about 400,000 secret-keepers each, the unsafe vaccination conspiracy would involve 22,000 people, and the cancer cure conspiracy would involve over 710,000 people.”  Even with the utmost secrecy, Grimes reports, his equations show within four years the conspiracies would be exposed nonetheless.

At the time, we commented on Grimes’s apparent “earnestness” in struggling to “understand how people can even engage in conspiratorial thinking to begin with.” We made this comment in relationship to yet a third article on the psychology of conspiracy.

This commentary appeared in the Guardian and, as we pointed out, “argued against conspiratorial thinking based on a new book, Suspicious Minds … written by Rob Brotherton.”

Basically, the idea is that people are naturally prone to conspiracy theories because of the way their brains have evolved. “Identifying patterns and being sensitive to possible threats,” the article explains, “is what has helped us survive in a world where nature often is out to get you.”

Brotherton explains in the article that he decided that the best way to present his thesis was to avoid confronting conspiracy theories head on. Instead, he wanted to explain how people adopted such theories for psychological reasons.

“I wanted to take a different approach, to sidestep the whole issue of whether the theories are true or false and come at it from the perspective of psychology. The intentionality bias, the proportionality bias, confirmation bias. We have these quirks built into our minds that can lead us to believe weird things without realising that’s why we believe them.”

So here we have three explanations of conspiracy theories presented by major publications in less than three month’s time. And, who knows, perhaps there were more.

In the conclusion to our Grimes’ analysis, we noted that: “It looks as if a more powerful and disciplined program may be underway. Something to ponder along with a further moderation of certain public declarations.”

By “public declarations” we meant those of individuals prone to mentioning conspiracy theories in non-appropriate contexts. As it turns out, we anticipated the current news cycle only by a couple of months.

Just this week, in fact, Attorney General Loretta Lynch attended a Senate Judiciary Hearing and acknowledged discussions at the Department of Justice of taking civil action against “climate change deniers.”

Sen. Sheldon Whitehouse (D-R.I.) questioned her on the issue and drew comparisons between such deniers and the tobacco industry that claimed for decades that the tobacco was not proven to cause ill health.

The Clinton administration eventually brought a successful civil suit against Big Tobacco. And Whitehouse suggested that civil or criminal charges might be brought against “anti-warmists.”

The forces of intolerance are gathering in the US, just as overseas.

We have urged in the past that people pay close attention to these growing trends. By turning statements of opinion into a psychological condition they are trying to discredit anyone who speaks out against the government.

In the Soviet Union, people who spoke out against government policies were often placed in mental asylums. At the time, concerned citizens in the West protested such incarcerations as barbaric abuses. Yet now, if our supposition is correct, these practices are about to expand in the West as well.

Conclusion: This attack on dissent is serious. Educate your family and friends about what’s going on. Do not be fooled by their propaganda, but beware of the risks of speaking out too freely.

source

Via John Whitehead @ The Rutherford Institute

We want no Gestapo or secret police. The FBI is tending in that direction. They are dabbling in sex-life scandals and plain blackmail. J. Edgar Hoover would give his right eye to take over, and all congressmen and senators are afraid of him.”—President Harry S. Truman

Don’t Be a Puppet” is the message the FBI is sending young Americans.
As part of the government’s so-called ongoing war on terror, the nation’s de facto secret police force is now recruiting students and teachers to spy on each other and report anyone who appears to have the potential to be “anti-government” or “extremist.”
Using the terms “anti-government,” “extremist” and “terrorist” interchangeably, the government continues to add to its growing list of characteristics that could distinguish an individual as a potential domestic terrorist.
For instance, you might be a domestic terrorist in the eyes of the FBI (and its network of snitches) if you:

  • express libertarian philosophies (statements, bumper stickers)
  • exhibit Second Amendment-oriented views (NRA or gun club membership)
  • read survivalist literature, including apocalyptic fictional books
  • show signs of self-sufficiency (stockpiling food, ammo, hand tools, medical supplies)
  • fear an economic collapse
  • buy gold and barter items
  • subscribe to religious views concerning the book of Revelation
  • voice fears about Big Brother or big government
  • expound about constitutional rights and civil liberties
  • believe in a New World Order conspiracy

Despite its well-publicized efforts to train students, teachers, police officers, hairdressers, store clerks, etc., into government eyes and ears, the FBI isn’t relying on a nation of snitches to carry out its domestic spying.
There’s no need.
The nation’s largest law enforcement agency rivals the NSA in resources, technology, intelligence, and power. Yet while the NSA has repeatedly come under fire for its domestic spying programs, the FBI has continued to operate its subversive and clearly unconstitutional programs with little significant oversight or push-back from the public, Congress or the courts. Just recently, for example, a secret court gave the agency the green light to quietly change its privacy rules for accessing NSA data on Americans’ international communications.
Indeed, as I point out in my book Battlefield America: The War on the American People, the FBI has become the embodiment of how power, once acquired, can be easily corrupted and abused.
When and if a true history of the FBI is ever written, it will not only track the rise of the American police state but it will also chart the decline of freedom in America.
Owing largely to the influence and power of the FBI, the United States—once a nation that abided by the rule of law and held the government accountable for its actions—has steadily devolved into a police state where justice is one-sided, a corporate elite runs the show, representative government is a mockery, police are extensions of the military, surveillance is rampant, privacy is extinct, and the law is little more than a tool for the government to browbeat the people into compliance.
The FBI’s laundry list of crimes against the American people includes surveillance, disinformation, blackmail, entrapment, intimidation tactics, harassment and indoctrination, governmental overreach, abuse, misconduct, trespassing, enabling criminal activity, and damaging private property.
And that’s just based on what we know.
Whether the FBI is planting undercover agents in churches, synagogues and mosques; issuing fake emergency letters to gain access to Americans’ phone records; using intimidation tactics to silence Americans who are critical of the government; recruiting high school students to spy on and report fellow students who show signs of being future terrorists; or persuading impressionable individuals to plot acts of terror and then entrapping them, the overall impression of the nation’s secret police force is that of a well-dressed thug, flexing its muscles and doing the boss’ dirty work of ensuring compliance, keeping tabs on potential dissidents, and punishing those who dare to challenge the status quo.
The FBI was established in 1908 as a small task force assigned to deal with specific domestic crimes. Initially quite limited in its abilities to investigate so-called domestic crimes, the FBI has been transformed into a mammoth federal policing and surveillance agency. Unfortunately, whatever minimal restrictions kept the FBI’s surveillance activities within the bounds of the law all but disappeared in the wake of the 9/11 attacks. The USA Patriot Act gave the FBI and other intelligence agencies carte blanche authority in investigating Americans suspected of being anti-government.
As the FBI’s powers have grown, its abuses have mounted.
The FBI continues to monitor Americans engaged in lawful First Amendment activities.
COINTELPRO, the FBI program created to “disrupt, misdirect, discredit, and neutralize” groups and individuals the government considers politically objectionable, was aimed not so much at the criminal element but at those who challenged the status quo—namely, those expressing anti-government sentiments such as Martin Luther King Jr. and John Lennon. It continues to this day, albeit in other guises.
The FBI has become a master in the art of entrapment.
In the wake of the 9/11 terrorist attacks the FBI has not only targeted vulnerable individuals but has also lured them into fake terror plots while actually equipping them with the organization, money, weapons and motivation to carry out the plots—entrapment—and then jailing them for their so-called terrorist plotting. This is what the FBI characterizes as “forward leaning—preventative—prosecutions.”
FBI agents are among the nation’s most notorious lawbreakers.
In addition to creating certain crimes in order to then “solve” them, the FBI also gives certain informants permission to break the law, “including everything from buying and selling illegal drugs to bribing government officials and plotting robberies,” in exchange for their cooperation on other fronts. USA Today estimates that agents have authorized criminals to engage in as many as 15 crimes a day. Some of these informants are getting paid astronomical sums: one particularly unsavory fellow, later arrested for attempting to run over a police officer, was actually paid $85,000 for his help laying the trap for an entrapment scheme.
The FBI’s powers, expanded after 9/11, have given its agents carte blanche access to Americans’ most personal information.
The agency’s National Security Letters, one of the many illicit powers authorized by the USA Patriot Act, allows the FBI to secretly demand that banks, phone companies, and other businesses provide them with customer information and not disclose the demands. An internal audit of the agency found that the FBI practice of issuing tens of thousands of NSLs every year for sensitive information such as phone and financial records, often in non-emergency cases, is riddled with widespread violations.
The FBI’s spying capabilities are on a par with the NSA.
The FBI’s surveillance technology boasts an invasive collection of spy tools ranging from Stingray devices that can track the location of cell phones to Triggerfish devices which allow agents to eavesdrop on phone calls.  In one case, the FBI actually managed to remotely reprogram a “suspect’s” wireless internet card so that it would send “real-time cell-site location data to Verizon, which forwarded the data to the FBI.”
The FBI’s hacking powers have gotten downright devious.
FBI agents not only have the ability to hack into any computer, anywhere in the world, but they can also control that computer and all its stored information, download its digital contents, switch its camera or microphone on or off and even control other computers in its network. Given the breadth of the agency’s powers, the showdown between Apple and the FBI over customer privacy appears to be more spectacle than substance.
James Comey, current director of the FBI, knows enough to say all the right things about the need to abide by the Constitution, all the while his agency routinely discards it. Comey argues that the government’s powers shouldn’t be limited, especially when it comes to carrying out surveillance on American citizens. Comey continues to lobby Congress and the White House to force technology companies such as Apple and Google to keep providing the government with backdoor access to Americans’ cell phones.
The FBI’s reach is more invasive than ever.
This is largely due to the agency’s nearly unlimited resources (its minimum budget alone in fiscal year 2015 was $8.3 billion), the government’s vast arsenal of technology, the interconnectedness of government intelligence agencies, and information sharing through fusion centers—data collecting intelligence agencies spread throughout the country that constantly monitor communications (including those of American citizens), everything from internet activity and web searches to text messages, phone calls and emails.
Today, the FBI employs more than 35,000 individuals and operates more than 56 field offices in major cities across the U.S., as well as 400 resident agencies in smaller towns, and more than 50 international offices. In addition to their “data campus,” which houses more than 96 million sets of fingerprints from across the United States and elsewhere, the FBI is also, according to The Washington Post, “building a vast repository controlled by people who work in a top-secret vault on the fourth floor of the J. Edgar Hoover FBI Building in Washington. This one stores the profiles of tens of thousands of Americans and legal residents who are not accused of any crime. What they have done is appear to be acting suspiciously to a town sheriff, a traffic cop or even a neighbor.”
If there’s one word to describe the FBI’s covert tactics, it’s creepy.
The agency’s biometric database has grown to massive proportions, the largest in the world, encompassing everything from fingerprints, palm, face and iris scans to DNA, and is being increasingly shared between federal, state and local law enforcement agencies in an effort to target potential criminals long before they ever commit a crime.
This is what’s known as pre-crime.
If it were just about fighting the “bad guys,” that would be one thing. But as countless documents make clear, the FBI has no qualms about using its extensive powers in order to blackmail politicians, spy on celebrities and high-ranking government officials, and intimidate dissidents of all stripes.
It’s an old tactic, used effectively by former authoritarian regimes.
In fact, as historian Robert Gellately documents, the Nazi police state was repeatedly touted as a model for other nations to follow, so much so that Hoover actually sent one of his right-hand men, Edmund Patrick Coffey, to Berlin in January 1938 at the invitation of Germany’s secret police. As Gellately noted, “[A]fter five years of Hitler’s dictatorship, the Nazi police had won the FBI’s seal of approval.”
Indeed, so impressed was the FBI with the Nazi order that, as the New York Times revealed, in the decades after World War II, the FBI, along with other government agencies, aggressively recruited at least a thousand Nazis, including some of Hitler’s highest henchmen, brought them to America, hired them on as spies and informants, and then carried out a massive cover-up campaign to ensure that their true identities and ties to Hitler’s holocaust machine would remain unknown. Moreover, anyone who dared to blow the whistle on the FBI’s illicit Nazi ties found himself spied upon, intimidated, harassed and labeled a threat to national security.
So not only have American taxpayers been paying to keep ex-Nazis on the government payroll for decades but we’ve been subjected to the very same tactics used by the Third Reich: surveillance, militarized police, overcriminalization, and a government mindset that views itself as operating outside the bounds of the law.
This is how freedom falls, and tyrants come to power.
The similarities between the American police state and past totalitarian regimes such as Nazi Germany grow more pronounced with each passing day.
Secret police. Secret courts. Secret government agencies. Surveillance. Intimidation. Harassment. Torture. Brutality. Widespread corruption. Entrapment. Indoctrination. These are the hallmarks of every authoritarian regime from the Roman Empire to modern-day America.
Yet it’s the secret police—tasked with silencing dissidents, ensuring compliance, and maintaining a climate of fear—who sound the death knell for freedom in every age.

source

Federal government lists are vulnerable to inaccuracy, and misuse by politicians to push political agendas. The proposal to use the no-fly list as the basis for stripping U.S. citizens of constitutional rights is a case in point. Regardless of one’s position on gun control, using a secret government process to tinker with the Bill of Rights is wrong, and very dangerous.

“What could possibly be the argument for allowing a terrorist suspect to buy a semi-automatic weapon?” President Obama recently asked, suggesting falsely the no-fly list is a list of known terrorists, inferring that using it would have made a difference in San Bernardino, although the names of neither of the San Bernardino terrorists appeared on it. In his exploitation of yet another terrible gun tragedy, the president has created a false argument, politician-speak, internally consistent, but based on untruths. Who indeed would argue for allowing terrorists to buy semi-automatic weapons?

The problem is not people the president would have you believe want terrorists to have guns, but politicians, lacking imagination, who want to use a flawed, unreliable, secret government process to brand U.S. citizens as terrorists, without a court hearing, and then deny them their constitutional rights.

The no-fly list is demonstrably inaccurate, a product of subjective decision-making, using the lowest possible legal standard of proof, to identify people “reasonably suspected to have engaged in terrorism or related activities.” The courts recognize the standard, but it is not enough to arrest or indict anyone, or even get a search warrant, much less a criminal conviction. It’s best described as gut instinct, the kind that allows a police officer who sees something not quite right to stop people briefly, and question them about what’s going on. The president would use gut instinct to tinker with fundamental freedoms.

There is no shortage of stories about Americans wronged by the no-fly list: children under 5, a Marine returning from Iraq, a brigadier general, Sen. Ted Kennedy, Rep. John Lewis, Rep. John Young, reputable journalists, outspoken political figures, the list goes on and on. In some cases, the mistake is so egregious that it helps the victim to muscle their way through an opaque bureaucracy to get off the list, but that is not true for most folks. For them, redress is virtually nonexistent, a fact recognized as a violation of the Constitution by at least two federal courts. A classified government document, leaked in 2014, showed that about 40 percent of people on the watch list had “no recognized terrorist group affiliation.” This is the president’s list of “terrorist suspects.”

Read more @ The Washington Times here

You just know in your bones that the NSA spied on you and shared that data with Britain’s GCHQ spy agency, right? So how can you confirm this? Through a new online tool offered by the British civil liberties group Privacy International.

Thanks to a legal victory Privacy International obtained earlier this year, the UK’s Investigatory Powers Tribunal is now required to search through data the GCHQ obtained from the NSA for information collected on anyone in the world if that person so requests it. If you request the info and the Tribunal finds something, it must let you know. The catch is you have to make the request before December 5, 2015. Privacy International has made this easy with its “Did GCHQ Illegally Spy on You?” online tool.

Earlier this year the Investigatory Powers Tribunal in the UK ruled that British intelligence services acted unlawfully when they accessed the private communications of millions of people that had been collected by the NSA under its mass-surveillance programs known as PRISM and Upstream and shared with the British spy agency. The PRISM program, which began in 2007, allowed the NSA to collect data in bulk from U.S. companies like Yahoo and Google. The Upstream program involved the collection of data from taps placed on hundreds of undersea cables outside the U.S.

The Tribunal will only search for records shared between the NSA and GCHQ prior to December 2014. And, unfortunately, it won’t reveal if the GCHQ obtained data about you on its own and/or shared it with the NSA, or if the NSA spied on you and didn’t share that data with GCHQ. The amount of data the Tribunal will search may also be limited.

“Once a claim is filed, the IPT will usually only search GCHQ’s records for unlawful activity during the year before the claim was submitted,” Privacy International notes. “What this means is that a claim submitted on 14 September 2015 would lead to records being searched for the time period between 14 September 2014 and 5 December 2014.”

There’s one other caveat about the request. The Tribunal can only search its data for information about you if you submit details such as your name, email address and phone number. Of course in submitting your email address and phone number, you’re potentially providing the British government with information it doesn’t already have about you. But, as Privacy International points out in its FAQ about the tool, there’s no way around this.

The good news is that if the tribunal does find information collected about you, GCHQ must delete that data once the investigation into your records is done, along with the request form you submitted.

Source

h/t Kerodin

Privacy Apocalypse: 5 Devices You Can’t Hide From

Devices you can't hide from

I’m going to alert you to what many are considering to be on of the worst doomsday scenarios for free American patriots. One that apparently not many are prepping for, or even seem to care about.

By now everybody knows that the government ‘alphabet agencies’ including mainly the NSA have been methodically collecting data on us. Everything we do, say, buy and search on the internet will be on permanent data base file by next year. All phone calls now are computer monitored, automatically recorded and stored with certain flag/trigger words (in all languages).

As technology improves, every single phone call will be entirely recorded at meta-data bases in government computer cloud storage, when ‘They’ finish the huge NSA super spy center in Utah. Which means they will be available anytime authorities want to look them up and personally listen for any information reference to any future investigation. Super computer algorithms will pin point search extrapolations of ANY relationship to the target point.

You can rest uneasily, but assured, that in the very near future when a cop stops you and scans your driver license into his computer, he will know anything even remotely ’suspicious’ or ’questionable’ about ALL the recent activities and behavior in your life he chooses to focus upon!

This is the ‘privacy apocalypse’ coming upon us. And you need to know these five devices that you can run to protect your privacy, but you can’t hide from.

When Security Overlaps Freedom

The NSA does more spying on ‘We the People’ than it does on the enemies of the country! Even simple text messages over a certain number of characters will join the wealth of stolen private communications flagged by certain trigger words, in the happy hunting grounds of mega-data heaven.

The two biggest fallacy arguments are that ‘those with nothing to ‘hide’ have nothing to fear’, or ‘this is the price we pay for living in a fast paced convenient modern computerized world if we want to improve our security and safety’.

Why does all these lame excuses remind me of something the old sage Ben Franklin used to say to slap that kind of thinking? “Those who are willing to give up any freedoms for a little more security deserve neither.’

The factual true reality is that these egregious violations of our privacy rights are premised on the never ending lies of the government. Maybe ‘They’ still get away with it because for some reason people are so dumbed down or not paying attention, or simply don’t know or see the bigger picture.

So assuming that most of us really don’t want the government or police to know our most private business just because it’s so easy for them to do so even though we are not doing anything wrong, we’ll provide a little edification herein about the cold hard realities.

Read the whole thing @ http://www.survivopedia.com/devices-that-you-cant-hide-from/#