Showing posts with label Criminal Government. Show all posts
Showing posts with label Criminal Government. Show all posts

Sunday, July 20, 2014

NSA Employees Get Off on Nude Pics Per New Snowden Interview


Not that it is any great surprise considering the level of corruption and abuse of power that permeates the entire American system these days but one of the fringe benefits of the NSA snooping programs is the ability to gather and drool over amateur pornography and naked pictures to take the edge off of a boring day at work. In a new exclusive interview conducted by The Guardian with former government contractor turned NSA whistleblower Edward Snowden the perusing of such personal and intimate material for fun is but one of the many bits of information discussed with the American hero. It is good to see Snowden actually getting the opportunity to speak at length in an honest forum unlike that over-hyped and heavily edited sit down with the state lackey Brian Williams of NBC back in May.
The interview, conducted in Moscow by Alan Rusbridger and Ewen MacAskill won't get any coverage in the USA!, USA!, USA! where the narrative has mostly already been set that Snowden is a "traitor" and "Russian spy" which at least among many who I know personally is taken as the immutable truth as if spoken by God himself. The Guardian however for the most part still manages to publish and report the truth (with the exception of how even this venerable institution has now been transmitting unchallenged the lies of the US and Kiev regimes about the downing of MH17) but is largely unknown to the US public who remain safely enclosed within their red, white and blue cocoons of ignorance and exceptionalism, I excerpt the following from the transcript of the Snowden interview but please go and check it out yourself and pass it around to others:
ON NUDE PHOTOS
Many of the people searching through the haystacks were young, enlisted guys and … 18 to 22 years old. They’ve suddenly been thrust into a position of extraordinary responsibility where they now have access to all your private records. In the course of their daily work they stumble across something that is completely unrelated to their work, for example an intimate nude photo of someone in a sexually compromising situation but they’re extremely attractive. So what do they do? They turn around in their chair and they show a co-worker. And their co-worker says: “Oh, hey, that’s great. Send that to Bill down the way.” And then Bill sends it to George, George sends it to Tom and sooner or later this person’s whole life has been seen by all of these other people. Anything goes, more or less. You’re in a vaulted space. Everybody has sort of similar clearances, everybody knows everybody. It’s a small world.
It’s never reported, nobody ever knows about it, because the auditing of these systems is incredibly weak. Now while people may say that it’s an innocent harm, this person doesn’t even know that their image was viewed, it represents a fundamental principle, which is that we don’t have to see individual instances of abuse. The mere seizure of that communication by itself was an abuse. The fact that your private images, records of your private lives, records of your intimate moments have been taken from your private communication stream, from the intended recipient, and given to the government without any specific authorisation, without any specific need, is itself a violation of your rights. Why is that in the government database?
I’d say probably every two months you see something like that happen. It’s routine enough, depending on the company you keep, it could be more or less frequent. But these are seen as the fringe benefits of surveillance positions. 
[Kind of like the "fringe benefits" of government TSA goons feeling up little children at airport checkpoints]
ON HIS LEAKING OF THE NSA DOCUMENTS TO JOURNALISTS
Snowden wanted the revelations to be published as fast as possible.] So I was very concerned about all these delays. You’ve got to remember I knew nothing of the press. I’d never talked to a journalist … I was a virgin source basically.
It was a nervous period. You have no idea what the future’s going to hold and I was all right because I knew things would get out but I wanted them to get out in the best way, and that was [why] I didn’t want any mistakes. It was what I called the zero fuck-ups policy…
It’s that concept of herd immunity. They run cover for the others. And particularly once you start splitting them over jurisdictions and things like that it becomes much more difficult to subvert their intentions. Nobody could stop it.
But as an engineer, and particularly as somebody who worked in telecoms and things like that on these systems, the thing that you’re always terrified of when you’re thinking about reliability is SPOFs – Single Point Of Failure, right?
This was the thing I told the journalists: “If the government thinks you’re the single point of failure, they’ll kill you.”
[Think about that statement “If the government thinks you’re the single point of failure, they’ll kill you” and it is as terrifying as anything else and the list of bodies of those who got too close to the truth before they published it is as long as it is evident that there are elements of the US government that engage in maintaining death squads for "wet ops"]
ON THE PROGRAMS THEMSELVES & THE US GOVERNMENT
I began to move from merely overseeing these systems to actively directing their use. Many people don’t understand that I was actually an analyst and I designated individuals and groups for targeting.
I was exposed to information about the previous programs like Stellar Wind [used during the presidency of George W Bush] for example. The warrantless wire-tapping of everyone in the United States, including their internet data – which is a violation of the constitution and law in the United States – did cause a scandal and was ended because of that.
When I saw that, that was really the earthquake moment because it showed that the officials who authorised these programs knew it was a problem, they knew they didn’t have any statutory authorisation for these programs. But instead the government assumed upon itself, in secret, new executive powers without any public awareness or any public consent and used them against the citizenry of its own country to increase its own power, to increase its own awareness.
We constantly hear the phrase “national security” but when the state begins … broadly intercepting the communications, seizing the communications by themselves, without any warrant, without any suspicion, without any judicial involvement, without any demonstration of probable cause, are they really protecting national security or are they protecting state security?
What I came to feel – and what I think more and more people have seen at least the potential for – is that a regime that is described as a national security agency has stopped representing the public interest and has instead begun to protect and promote state security interests. And the idea of western democracy as having state security bureaus, just that term, that phrase itself, “state security bureau”, is kind of chilling.
[The machine is fully out of control and there are no overseers in the government, only enablers and cover-up artists]
ON HIS EXILE TO RUSSIA COURTESY OF JOHN KERRY'S STATE DEPARTMENT
So this is the thing that nobody realises. They think there was some masterplan to get out safely and avoid all consequences. That’s what Hong Kong was all about. But it wasn’t. The purpose of my mission was to get the information to journalists. Once I had, that I was done.
That’s why I was so peaceful afterwards, because it didn’t matter what happened … Going to Ecuador and getting asylum there, that would have been great … And that would have just been a bonus. The fact that I’ve ended up so secure is entirely by accident. And as you said, it probably shouldn’t have happened. If we have anybody to thank, it’s the state department. The whole key is, the state department’s the one who put me in Russia.
And
I’m much happier here in Russia than I would be facing an unfair trial in which I can’t even present a public interest defence to a jury of my peers. We’ve asked [the] government again and again to provide a fair trial and they’ve declined. And I feel very fortunate to have received asylum. Russia’s a modern country and it’s been good to me so, yeah, I have a pretty normal life and I would absolutely like to continue to be able to travel as I have in the past. I’d love to be able to visit western Europe again but that’s not a decision for me to make, that’s for the publics and the governments of each of those independent countries.
ON GEORGE ORWELL
Contrary to popular belief I don’t think we are exactly in the Nineteen Eighty-Four universe. The danger is that we can see how [Orwell’s] technologies that are [in] Nineteen Eighty-Four now seem unimaginative and quaint. They talked about things like microphones implanted in bushes and cameras in TVs that look back at us. Nowadays we’ve got webcams that go with us everywhere. We buy cell phones that are the equivalent of a network microphone that we carry around in our pockets with us voluntarily as we go from place to place and move about our lives.
Nineteen Eighty-Four is an important book but we should not bind ourselves to the limits of the author’s imagination. Time has shown that the world is much more unpredictable and dangerous than that.
[I have often remarked that Orwell was an optimist and as Snowden points out - he was limited by his inability to fully anticipate the huge advances in technology that would make his Oceania a reality]
Edward Snowden is a patriot and a true American hero whose risk of everything has provided an invaluable service in helping to expose the nefarious criminal activities of an unaccountable and unconstitutional Deep State shadow government that operates with full impunity.  This anti-democratic nest of vipers uses the visible components of the US government as an exoskeleton, just a costume to trick the masses that all is still right until the day comes for the changes in policy (say a "terrorist" attack or world war) that will bring about the "turnkey totalitarianism" that will be the final evolution of the warfare state.
LINKS

Thursday, May 15, 2014

More NSA Mischief: Purchased Products Intercepted and Tampered With

In another revelation  on still more NSA malfeasance that was published in the just released Glenn Greenwald book "No Place to Hide" the American Stasi has been intercepting computer hardware purchases and implanting spying tools before repackaging the product in the original wrapping. Not this should be a surprise to anyone who has been following the wanton criminality of Obama's out of control surveillance state and an earlier piece that was published in Germany's Der Spiegel back in December already had revealed the hijacking of laptop deliveries but the book adds it to the pile of damning evidence courtesy of heroic whistleblower Edward Snowden that is also available online here in a large file but one that is well worth the space. This story of what is basically theft of a customer's paid for item by government goons and which should be a felony along the lines of mail fraud is not going to go over well with American tech companies, one of which, Cisco Systems just published a stinging letter on exactly what is thought of such sleazy chicanery.
Other than the inclusion in "No Place to Hide" the story is getting increasing circulation as a caveat emptor to all who which to purchase US manufactured network hardware with the expectation that the product will arrive as promised and without surveillance mechanisms illegally implanted. The Guardian in a piece from Greenwald's book has the following in a story entitled "Glenn Greenwald: how the NSA tampers with US-made internet routers" from which I excerpt the following:
For years, the US government loudly warned the world that Chinese routers and other internet devices pose a "threat" because they are built with backdoor surveillance functionality that gives the Chinese government the ability to spy on anyone using them. Yet what the NSA's documents show is that Americans have been engaged in precisely the activity that the US accused the Chinese of doing.
The drumbeat of American accusations against Chinese internet device manufacturers was unrelenting. In 2012, for example, a report from the House Intelligence Committee, headed by Mike Rogers, claimed that Huawei and ZTE, the top two Chinese telecommunications equipment companies, "may be violating United States laws" and have "not followed United States legal obligations or international standards of business behaviour". The committee recommended that "the United States should view with suspicion the continued penetration of the US telecommunications market by Chinese telecommunications companies".
AND
But while American companies were being warned away from supposedly untrustworthy Chinese routers, foreign organisations would have been well advised to beware of American-made ones. A June 2010 report from the head of the NSA's Access and Target Development department is shockingly explicit. The NSA routinely receives – or intercepts – routers, servers and other computer network devices being exported from the US before they are delivered to the international customers.
The agency then implants backdoor surveillance tools, repackages the devices with a factory seal and sends them on. The NSA thus gains access to entire networks and all their users. The document gleefully observes that some "SIGINT tradecraft … is very hands-on (literally!)".
Eventually, the implanted device connects back to the NSA. The report continues: "In one recent case, after several months a beacon implanted through supply-chain interdiction called back to the NSA covert infrastructure. This call back provided us access to further exploit the device and survey the network."
It is quite possible that Chinese firms are implanting surveillance mechanisms in their network devices. But the US is certainly doing the same.
This by the way has not jack shit to do with "terrorism", the justification of this monstrous and ongoing invasion of privacy by a long out of control NSA and the trillion dollars of taxpayer subsidized bottom feeders that contribute to our Surveillance State Gomorrah. This is just plain and simple using a technological advantage as well as laws that have been hollowed out by the phony war on terror - which Obama and others paid homage to today at the grand opening of the obscenity that is the 9/11 Museum - to commit industrial espionage and gain unfair competitive advantage but hey that is the American way now in the land of fuck you, I got mine. The 9/11 Museum is just grotesque and sickening and only perpetuates the myth of the day that everything changed but that is a story for another time - be sure and get your T-shirts, coffee mugs, beer coolers and key chains at the gift shop. 
Greenwald is everywhere right now promoting the book and is getting the well deserved attention that he deserves as an investigative journalist, the careerist, power-sucking scum here in The Homeland would do well to take some lessons from the man who harkens back to the good old days of muckraking and non-celebrity journalists who shined a light on corrupted power like a blowtorch. Two great extended interviews of Greenwald were done by Amy Goodman at the liberal Democracy Now - here are the links (transcripts also available): May 13, 2014 and May 14, 2014 - check them out and pass them around to others. Now may be the last time that we have to really hit these bastards hard and put a choke chain on them while there is still a slim chance to do so.
I have always maintained that the only way that any serious restraint of the cancerous surveillance industrial complex can only be made possible by an alliance of American tech businesses (fuck the corrupt telecoms who are in on the con) to engage in awareness campaigns, implementing stronger encryption and pooling their vast resources to sue the hell out of the US government and fund the campaigns of political opponents of those that protect the NSA - like California's own Dianne Feinstein. If this is the case there is hope in the aforementioned Cisco Systems communique by Mark Chandler which I excerpt from at length:
Today’s security challenges are real and significant.  We want governments to detect and disrupt terrorist networks before they inflict harm on our society, our citizens, and our systems of government.   We also want to live in countries that respect their citizens’ basic human rights.  The tension between security and freedom has become one the most pressing issues of our day.  Societies wracked by terror cannot be truly free, but an overreaching government can also undermine freedom.
It is in this context that I want to offer some thoughts on actions by the US Government that in Cisco’s eyes have overreached, undermining the goals of free communication, and steps that can be taken to right that balance, and I do so on behalf of all of Cisco’s leadership team.
Confidence in the open, global Internet has brought enormous economic benefits to the United States and to billions around the world.  This confidence has been eroded by revelations of government surveillance, by efforts of the US government to force US companies to provide access to communications of non-US citizens even when that violates the privacy laws of countries where US companies do business, and allegations that governments exploit rather than report security vulnerabilities in products.
As a matter of policy and practice, Cisco does not work with any government, including the United States Government, to weaken our products. When we learn of a security vulnerability, we respond by validating it, informing our customers, and fixing it.  We react the same when we find that a customer’s security has been impacted by external forces, regardless of what country or form of government or how that security breach occurred.  We offer customers robust tools to defend their environments against attack, and detect attacks when they are happening. By doing these things, we have built and maintained our customers’ trust.  We expect our government to value and respect this trust.
This past December, eight technology companies expressed concern to the President of the United States and Members of Congress that the US government’s surveillance efforts are in fact harmful. They stated, in part, “We urge the US to take the lead and make reforms that ensure that government surveillance efforts are clearly restricted by law, proportionate to the risks, transparent and subject to independent oversight.”  We agree and support these positions – without customer confidence in the privacy and security of communications, the extraordinary steps toward freedom, productivity and prosperity that is the promise of the Internet can be lost.
This week a number of media outlets reported another serious allegation: that the National Security Agency took steps to compromise IT products enroute to customers, including Cisco products. We comply with US laws, like those of many other countries, which limit exports to certain customers and destinations; we ought to be able to count on the government to then not interfere with the lawful delivery of our products in the form in which we have manufactured them.   To do otherwise, and to violate legitimate privacy rights of individuals and institutions around the world, undermines confidence in our industry.
As our malignantly rotten Supreme Court has made evident: money is speech and there shall be no constraints on those who have a shitload of it. Silicon Valley has an abundance of it and in the best interests of not only keeping the internet free but for just the sake of ensuring that American business won't take another big hit due to crony capitalism and outright fascism should invest as much of it as possible to carpet bomb the corrupt Democrat and Republican criminals back to the stone age in 2014, 2016 and forever after in favor of pro-American, pro-civil liberties and pro-business libertarians and independents.