Tag Archives: Cyber

What Has Become of the American Spirit of Rebellion?

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

This essay will appear in “Revolution,” the Spring 2014 issue of Lapham’s Quarterly. This slightly adapted version is posted at TomDispatch.com with the kind permission of that magazine.

In case of rain, the revolution will take place in the hall.
— Erwin Chargaff

For the last several years, the word “revolution” has been hanging around backstage on the national television talk-show circuit waiting for somebody, anybody—visionary poet, unemployed automobile worker, late-night comedian—to cue its appearance on camera. I picture the word sitting alone in the green room with the bottled water and a banana, armed with press clippings of its once-upon-a-time star turns in America’s political theater (tie-dyed and brassiere-less on the barricades of the 1960s countercultural insurrection, short-haired and seersucker smug behind the desks of the 1980s Reagan Risorgimento), asking itself why it’s not being brought into the segment between the German and the Japanese car commercials.

Surely even the teleprompter must know that it is the beast in the belly of the news reports, more of them every day in print and en blog, about income inequality, class conflict, the American police state. Why then does nobody have any use for it except in the form of the adjective, revolutionary, unveiling a new cellphone app or a new shade of lipstick?

I can think of several reasons, among them the cautionary tale told by the round-the-clock media footage of dead revolutionaries in Syria, Egypt, and Tunisia, also the certain knowledge that anything anybody says (on camera or off, to a hotel clerk, a Facebook friend, or an ATM) will be monitored for security purposes. Even so, the stockpiling of so much careful silence among people who like to imagine themselves on the same page with Patrick Henry—”Give me liberty, or give me death”— raises the question as to what has become of the American spirit of rebellion. Where have all the flowers gone, and what, if anything, is anybody willing to risk in the struggle for “Freedom Now,” “Power to the People,” “Change We Can Believe In”?

My guess is next to nothing that can’t be written off as a business expense or qualified as a tax deduction. Not in America at least, but maybe, with a better publicist and 50 percent of the foreign rights, somewhere east of the sun or west of the moon.

Continue Reading »

Follow this link – 

What Has Become of the American Spirit of Rebellion?

Posted in alo, Anchor, Citizen, Crown, Cyber, FF, GE, LG, ONA, PUR, Radius, The Atlantic, Uncategorized, Venta | Tagged , , , , , , , , , , , | Comments Off on What Has Become of the American Spirit of Rebellion?

Fox News Unleashes Horde of Sock Puppets on an Unsuspecting Blogosphere

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

Every once in a while I get an email from a regular reader insisting that the troll infestation in the comment section is so bad that it can’t possibly be organic. Some of these guys have to be paid professionals who are executing a deliberate strategy. I’ve always poo-poohed this, but maybe I shouldn’t have. Via Media Matters, here’s an excerpt from David Folkenflik’s forthcoming book Murdoch’s World, about the Fox PR department’s systematic effort to counter anti-Fox criticism:

On the blogs, the fight was particularly fierce. Fox PR staffers were expected to counter not just negative and even neutral blog postings but the anti-Fox comments beneath them. One former staffer recalled using twenty different aliases to post pro-Fox rants. Another had one hundred. Several employees had to acquire a cell phone thumb drive to provide a wireless broadband connection that could not be traced back to a Fox News or News Corp account. Another used an AOL dial-up connection, even in the age of widespread broadband access, on the rationale it would be harder to pinpoint its origins. Old laptops were distributed for these cyber operations. Even blogs with minor followings were reviewed to ensure no claim went unchecked.

Do they still do this? Beats me. And obviously most trolls have wider interests than just defending Fox. Still, it shows that the idea of hordes of professional trolls isn’t quite as far-fetched as I might have thought.

Read the article:  

Fox News Unleashes Horde of Sock Puppets on an Unsuspecting Blogosphere

Posted in Cyber, FF, GE, LAI, LG, ONA, organic, Uncategorized, Venta | Tagged , , , , , , | Comments Off on Fox News Unleashes Horde of Sock Puppets on an Unsuspecting Blogosphere

What George Orwell Got Wrong About the New Surveillance State

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

This story first appeared on the TomDispatch website.

In an increasingly phantasmagorical world, here’s my present fantasy of choice: someone from General Keith Alexander’s outfit, the National Security Agency, tracks down H.G. Wells’s time machine in the attic of an old house in London. Britain’s subservient Government Communications Headquarters, its version of the NSA, is paid off and the contraption is flown to Fort Meade, Maryland, where it’s put back in working order. Alexander then revs it up and heads not into the future like Wells to see how our world ends, but into the past to offer a warning to Americans about what’s to come.

He arrives in Washington on October 23, 1962, in the middle of the Cuban Missile Crisis, a day after President Kennedy has addressed the American people on national television to tell them that this planet might not be theirs—or anyone else’s—for long. (“We will not prematurely or unnecessarily risk the costs of worldwide nuclear war in which even the fruits of victory would be ashes in our mouth, but neither will we shrink from the risk at any time it must be faced.”) Greeted with amazement by the Washington elite, Alexander, too, goes on television and informs the same public that, in 2013, the major enemy of the United States will no longer be the Soviet Union, but an outfit called al-Qaeda in the Arabian Peninsula (AQAP), and that the headquarters of our country’s preeminent foe will be found somewhere in the rural backlands of… Yemen.

Yes, Yemen, a place most Americans, then and now, would be challenged to find on a world map. I guarantee you one thing: had such an announcement actually been made that day, most Americans would undoubtedly have dropped to their knees and thanked God for His blessings on the American nation. Though even then a nonbeliever, I would undoubtedly have been among them. After all, the 18-year-old Tom Engelhardt, on hearing Kennedy’s address, genuinely feared that he and the few pathetic dreams of a future he had been able to conjure up were toast.

Had Alexander added that, in the face of AQAP and similar minor jihadist enemies scattered in the backlands of parts of the planet, the US had built up its military, intelligence, and surveillance powers beyond anything ever conceived of in the Cold War or possibly in the history of the planet, Americans of that time would undoubtedly have considered him delusional and committed him to an asylum.

Such, however, is our world more than two decades after Eastern Europe was liberated, the Berlin Wall came down, the Cold War definitively ended, and the Soviet Union disappeared.

Why Orwell Was Wrong

Now, let me mention another fantasy connected to the two-superpower Cold War era: George Orwell’s 1948 vision of the world of 1984 (or thereabouts, since the inhabitants of his novel of that title were unsure just what year they were living in). When the revelations of NSA contractor Edward Snowden began to hit the news and we suddenly found ourselves knee-deep in stories about Prism, XKeyscore, and other Big Brother-ish programs that make up the massive global surveillance network the National Security Agency has been building, I had a brilliant idea—reread 1984.

At a moment when Americans were growing uncomfortably aware of the way their government was staring at them and storing what they had previously imagined as their private data, consider my soaring sense of my own originality a delusion of my later life. It lasted only until I read an essay by NSA expert James Bamford in which he mentioned that, “within days of Snowden’s documents appearing in the Guardian and the Washington Post…, bookstores reported a sudden spike in the sales of George Orwell’s classic dystopian novel 1984. On Amazon.com, the book made the ‘Movers & Shakers’ list and skyrocketed 6,021 percent in a single day.”

Nonetheless, amid a jostling crowd of worried Americans, I did keep reading that novel and found it at least as touching, disturbing, and riveting as I had when I first came across it sometime before Kennedy went on TV in 1962. Even today, it’s hard not to marvel at the vision of a man living at the beginning of the television age who sensed how a whole society could be viewed, tracked, controlled, and surveiled.

But for all his foresight, Orwell had no more power to peer into the future than the rest of us. So it’s no fault of his that, almost three decades after his year of choice, more than six decades after his death, the shape of our world has played havoc with his vision. Like so many others in his time and after, he couldn’t imagine the disappearance of the Soviet Union or at least of Soviet-like totalitarian states. More than anything else, he couldn’t imagine one fact of our world that, in 1948, wasn’t in the human playbook.

In 1984, Orwell imagined a future from what he knew of the Soviet and American (as well as Nazi, Japanese, and British) imperial systems. In imagining three equally powerful, equally baleful superpowers—Oceania, Eurasia, and Eastasia—balanced for an eternity in an unwinnable global struggle, he conjured up a logical extension of what had been developing on this planet for hundreds of years. His future was a version of the world humanity had lived with since the first European power mounted cannons on a wooden ship and set sail, like so many Mongols of the sea, to assault and conquer foreign realms, coastlines first.

From that moment on, the imperial powers of this planet—super, great, prospectively great, and near great—came in contending or warring pairs, if not triplets or quadruplets. Portugal, Spain, and Holland; England, France, and Imperial Russia; the United States, Germany, Japan, and Italy (as well as Great Britain and France), and after World War II, the United States and the Soviet Union. Five centuries in which one thing had never occurred, the thing that even George Orwell, with his prodigious political imagination, couldn’t conceive of, the thing that makes 1984 a dated work and his future a past that never was: a one-superpower world. To give birth to such a creature on such a planet—as indeed occurred in 1991—was to be at the end of history, at least as it had long been known.

Continue Reading »

Continued here: 

What George Orwell Got Wrong About the New Surveillance State

Posted in Brita, Cyber, FF, GE, LG, ONA, Uncategorized, Venta | Tagged , , , , , , | Comments Off on What George Orwell Got Wrong About the New Surveillance State

There Is No Such Thing As NSA-Proof Email

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

Since last June, when Edward Snowden tore the veil off the National Security Agency’s vast data dragnet, Americans have been flocking to ultrasecure email services in the hopes of keeping the government out of their private business. Use of the most popular email encryption software, PGP, tripled between June and July, while revenue for the data-encryption company Silent Circle has shot up 400 percent.

But even these services may not be able to protect your email from government prying. That fact came into stark relief last Thursday, when Lavabit, the secure email service used by Snowden, abruptly shut down. Lavabit’s 32-year-old founder, Ladar Levison, issued a statement saying he pulled the plug because he didn’t want to be “complicit in crimes against the American people.” He has since given up using email entirely, and he urges others to consider doing the same. “I would strongly recommend against entrusting your privacy to a company with physical ties to the United States,” he told Mother Jones. “I honestly don’t think it’s possible to provide a secure service in this country.”

Levison, who is reportedly under federal gag order, declined to elaborate (though he opined, based on his experience, that we’re a “whisper’s breath away” from becoming a society where all electronic communications are recorded and scrutinized by the government). But according to other industry insiders and cybersecurity experts, there’s good reason to be wary of transmitting sensitive information via email—even if your provider claims to have iron-clad safeguards.

Tech giants, such as the Microsoft subsidiary Hotmail, regularly hand over data to the government. In fact, in the last eight months of 2012 (the most recent period for which data is available), Hotmail, Google, Facebook, and Twitter provided law enforcement authorities with information on more than 64,000 users. And that doesn’t include responses to secret national security letters ordered by the Foreign Intelligence Surveillance Act Court, or FISA.

Secure emails services, such as Lavabit, are supposed to guard against this kind of snooping (as well as hackers and phishers) by encrypting email messages—turning them into gibberish that can only be read by people who have a password, or “key.” Theoretically, in most cases, the email provider can’t even decipher the contents, much less government agencies. But even the most secure email systems don’t completely encrypt “metadata,” the bits of identifying information that accompany messages, such as the sender’s name and IP address; the subject line; and the date and time the message was sent. Matthew Green, an encryption expert at Johns Hopkins University, says the government can tell a lot about a person from these details. “If you can map out who someone has talked to, that’s almost as useful as knowing what they were talking about,” he explained, “especially if you’re trying to map out a criminal conspiracy or find out who leaked information from reporters.”

Continue Reading »

Continue reading: 

There Is No Such Thing As NSA-Proof Email

Posted in Cyber, FF, GE, LAI, LG, ONA, Uncategorized, Venta | Tagged , , , , , , , | Comments Off on There Is No Such Thing As NSA-Proof Email

Reuters: NSA Secretly Helping Drug Agencies Target US Persons

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

Yesterday, the New York Times informed us that the Drug Enforcement Agency wants greater access to the NSA’s treasure trove of surveillance, but so far they haven’t gotten it. Today, Reuters tells us that this isn’t really true:

A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

….The unit of the DEA that distributes the information is called the Special Operations Division, or SOD. Two dozen partner agencies comprise the unit, including the FBI, CIA, NSA, Internal Revenue Service and the Department of Homeland Security.

….”Remember that the utilization of SOD cannot be revealed or discussed in any investigative function,” a document presented to agents reads. The document specifically directs agents to omit the SOD’s involvement from investigative reports, affidavits, discussions with prosecutors and courtroom testimony. Agents are instructed to then use “normal investigative techniques to recreate the information provided by SOD.”

….A former federal agent in the northeastern United States who received such tips from SOD described the process. “You’d be told only, ‘Be at a certain truck stop at a certain time and look for a certain vehicle.’ And so we’d alert the state police to find an excuse to stop that vehicle, and then have a drug dog search it,” the agent said.

This is not surprising. As you may recall, NSA is allowed to surveil foreign nationals but not US persons. If US persons are “inadvertently” caught up in the surveillance net, their communications have to be discarded. However, there are exceptions for domestic communications that “contain usable intelligence, information on criminal activity, threat of harm to people or property, are encrypted, or are believed to contain any information relevant to cybersecurity.” Drug offenses are criminal activity, so presumably NSA is allowed to keep any drug-related conversations it collects and pass them along to the relevant law enforcement agencies.

Does this give NSA an incentive to “accidentally” collect communications on US persons, so that they can trawl through them to find stuff they’re allowed to keep? Perhaps. Either way, though, it appears that NSA is more involved in drug investigations—and more eager to keep it a secret—than we’ve been lead to believe.

See the original article here: 

Reuters: NSA Secretly Helping Drug Agencies Target US Persons

Posted in alo, Cyber, FF, GE, LG, Northeastern, ONA, Uncategorized, Venta | Tagged , , , , , , , | Comments Off on Reuters: NSA Secretly Helping Drug Agencies Target US Persons

For Once, the Public is a Winner in a Bureaucratic Turf War

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

While all the rest of us are fretting over the NSA’s mind-bogglingly wide surveillance powers, it turns out that the rest of the intelligence community is fretting that they aren’t quite wide enough. The New York Times reports:

Agencies working to curb drug trafficking, cyberattacks, money laundering, counterfeiting and even copyright infringement complain that their attempts to exploit the security agency’s vast resources have often been turned down because their own investigations are not considered a high enough priority, current and former government officials say.

….At the drug agency, for example, officials complained that they were blocked from using the security agency’s surveillance tools for several drug-trafficking cases in Latin America, which they said might be connected to financing terrorist groups in the Middle East and elsewhere.

….The security agency’s spy tools are attractive to other agencies for many reasons. Unlike traditional, narrowly tailored search warrants, those granted by the intelligence court often allow searches through records and data that are vast in scope. The standard of evidence needed to acquire them may be lower than in other courts, and the government may not be required to disclose for years, if ever, that someone was the focus of secret surveillance operations.

Needless to say, this is precisely what a lot of us are concerned about: that every drug investigation in the world will suddenly become linked to “financing of terrorist groups,” and therefore authorized to trawl endlessly through NSA’s information pool and take advantage of rubber-stamp FISA warrants that cover anyone who meets a certain profile. For now, at least, I think we can be grateful that bureaucratic turf wars have apparently kept that under tight control.

See the original article here: 

For Once, the Public is a Winner in a Bureaucratic Turf War

Posted in ATTRA, Cyber, FF, GE, LAI, LG, ONA, Uncategorized, Venta | Tagged , , , , , , | Comments Off on For Once, the Public is a Winner in a Bureaucratic Turf War

Dot Earth Blog: With Arrests, Signs of Justice in Slaying of Costa Rican Turtle Guardian

Eight arrests are made two months after the brutal murder of a young sea turtle guardian in Costa Rica. This article: Dot Earth Blog: With Arrests, Signs of Justice in Slaying of Costa Rican Turtle Guardian ; ;Related ArticlesWith Arrests, Signs of Justice in Slaying of Costa Rican Turtle GuardianOp-Ed Contributors: A Republican Case for Climate ActionDot Earth Blog: Two Climate Analysts Fault Gas Leaks, but Not as a Big Warming Threat ;

See the article here: 

Dot Earth Blog: With Arrests, Signs of Justice in Slaying of Costa Rican Turtle Guardian

Posted in Anker, bamboo, Cyber, eco-friendly, FF, G & F, GE, LAI, LG, Monterey, ONA, PUR, solar, solar power, Uncategorized | Tagged , , , , , , , , , | Comments Off on Dot Earth Blog: With Arrests, Signs of Justice in Slaying of Costa Rican Turtle Guardian

Cyber Model 100 Wind Generator Kit

[amzn_product_post]

Posted in Cyber | Tagged , , , , , , , | Comments Off on Cyber Model 100 Wind Generator Kit

Will Russian Hackers Cause the Next Financial Crisis?

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

The US brought criminal charges Thursday against a gang of Russian and Ukrainian programmers in what is the biggest hacking case yet in the United States. The men were indicted for a long-running scheme of stealing and selling 160 million credit card numbers from more than a dozen big American companies. But the case has bigger implications, according to a story in the New York Times today. One of the men was also able to hack into the servers of the Nasdaq stock exchange, raising fears among US and international authorities that the next financial crisis could be caused by rogue programmers.

One of the Russian men, Aleksandr Kalinin, was also charged Thursday in a separate case with having gained access to Nasdaq servers for two years between 2007 and 2010. The indictment reveals that Kalinin, who also went by the names Grig and Tempo, had access to an unknown amount of information on a bunch of Nasdaq servers, where he was able to enter commands to steal, change, or delete data, and at certain points could even perform systems administrator functions. According to the Times, federal prosecutors, international banking regulators, the FBI, and the financial industry are all worried that next time this happens hackers could gain access to even more tightly secured trading platforms and disrupt the financial system.

From the Times:

While Mr. Kalinin never penetrated the main servers supporting Nasdaq’s trading operations—and appears to have caused limited damage at Nasdaq—the attack raised the prospect that hackers could be getting closer to the infrastructure that supports billions of dollars of trades each hour.

“As today’s allegations make clear, cybercriminals are determined to prey not only on individual bank accounts, but on the financial system itself,” Preet Bharara, the top federal prosecutor in Manhattan, said in announcing the case.

It is a pivotal moment, just a week after a report from the World Federation of Exchanges and an international group of regulators warned about the vulnerability of exchanges to cybercrime. The report said that hackers were shifting their focus away from stealing money and toward more “destabilizing aims.”

In a survey conducted for the report, 89 percent of the world’s exchanges said that hacking posed a “systemic risk” to global financial markets…

At a Senate hearing on cybersecurity on Thursday, a representative of several financial industry groups, Mark Clancy, said that “for the financial services industry, cyberthreats are a constant reality and a potential systemic risk to the industry.”

The World Federation of Exchanges (WFE) report found that 53 percent of all stock exchanges had experienced a cyberattack in the past year.

My colleague Nick Baumann has reported on how mere programming glitches at the mid-sized financial firm Knight Capital a year ago caused losses at the firm of $10 million a minute, and set off turmoil in the stock market. But an intentional attack could have more drastic effects. Baumann pointed to a 2011 article by John Bates, a computer scientist who has designed software behind complicated trading algorithms. “Fears of algorithmic terrorism, where a well-funded criminal or terrorist organization could find a way to cause a major market crisis, are not unfounded,” Bates wrote at the time. “This type of scenario could cause chaos for civilization.”

Link:  

Will Russian Hackers Cause the Next Financial Crisis?

Posted in Cyber, FF, GE, LAI, LG, ONA, Uncategorized, Venta | Tagged , , , , , , , | Comments Off on Will Russian Hackers Cause the Next Financial Crisis?