Category Archives: Five Eyes

Google challenges U.S. gag order, citing First Amendment

The Washington Post reports: Google asked the secretive Foreign Intelligence Surveillance Court on Tuesday to ease long-standing gag orders over data requests the court makes, arguing that the company has a constitutional right to speak about information it is forced to give the government.

The legal filing, which invokes the First Amendment’s guarantee of free speech, is the latest move by the California-based tech giant to protect its reputation in the aftermath of news reports about far-reaching National Security Agency surveillance of Internet traffic.

Revelations about the program, called PRISM, have opened fissures between U.S. officials and the involved companies, which have scrambled to reassure their users without violating strict rules against disclosing information that the government has classified as top-secret.

A high-profile legal showdown might help Google’s efforts to portray itself as aggressively resisting government surveillance, and a victory could bolster the company’s campaign to portray government surveillance requests as targeted narrowly and affecting only a small number of users. [Continue reading…]

Facebooktwittermail

Europe must protect itself from America

Jakob Augstein writes: On Tuesday, Barack Obama is coming to Germany. But who, really, will be visiting? He is the 44th president of the United States. He is the first African American to hold the office. He is an intelligent lawyer. And he is a Nobel Peace Prize laureate.

But is he a friend? The revelations brought to us by IT expert Edward Snowden have made certain what paranoid computer geeks and left-wing conspiracy theorists have long claimed: that we are being watched. All the time and everywhere. And it is the Americans who are doing the watching.

On Tuesday, the head of the largest and most all-encompassing surveillance system ever invented is coming for a visit. If Barack Obama is our friend, then we really don’t need to be terribly worried about our enemies.

It is embarrassing: Barack Obama will be arriving in Berlin for only the second time, but his visit is coming just as we are learning that the US president is a snoop on a colossal scale. German Chancellor Angela Merkel has said that she will speak to the president about the surveillance program run by the National Security Agency, and the Berlin Interior Ministry has sent a set of 16 questions to the US Embassy. But Obama need not be afraid. German Interior Minister Hans Peter Friedrich, to be sure, did say: “That’s not how you treat friends.” But he wasn’t referring to the fact that our trans-Atlantic friends were spying on us. Rather, he meant the criticism of that spying.

Friedrich’s reaction is only paradoxical on the surface and can be explained by looking at geopolitical realities. The US is, for the time being, the only global power — and as such it is the only truly sovereign state in existence. All others are dependent — either as enemies or allies. And because most prefer to be allies, politicians — Germany’s included — prefer to grin and bear it. [Continue reading…]

Facebooktwittermail

How dozens of companies know you’re reading about those NSA leaks

Electronic Frontier Foundation: As news websites around the globe are publishing story after story about dragnet surveillance, these news sites all have one thing in common: when you visit these websites, your personal information is broadcast to dozens of companies, many of which have the ability to track your surfing habits, and many of which are subject to government data requests.

How Does This Happen?

When you load a webpage in your browser, the page normally includes many elements that get loaded separately, like images, fonts, CSS files, and javascript files. These files can be, and often are, loaded from different domain names hosted by different companies. For example, if a website has a Facebook Like button on it, your browser loads javascript and images from Facebook’s server to display that Like button, even if the website you’re visiting has nothing to do with Facebook.

Why Does This Matter?

Each time your browser makes a request it sends the following information with it:

  • Your IP address and the exact time of the request
  • User-Agent string: which normally contains the web browser you’re using, your browser’s version, your operating system, processor information (32-bit, 64-bit), language settings, and other data
  • Referrer: the URL of the website you’re coming from—in the case of the Facebook Like button example, your browser tells Facebook which website you’re viewing
  • Other HTTP headers which contain potentially identifying information
  • Sometimes tracking cookies

Every company has different practices, but they generally log some or all of this information, perhaps indefinitely.

It takes very little information about your web browser to build a unique fingerprint of it. [Continue reading…]

Facebooktwittermail

Edward Snowden Q&A

1) Why did you choose Hong Kong to go to and then tell them about US hacking on their research facilities and universities?

2) How many sets of the documents you disclosed did you make, and how many different people have them? If anything happens to you, do they still exist?

Edward Snowden: 1) First, the US Government, just as they did with other whistleblowers, immediately and predictably destroyed any possibility of a fair trial at home, openly declaring me guilty of treason and that the disclosure of secret, criminal, and even unconstitutional acts is an unforgivable crime. That’s not justice, and it would be foolish to volunteer yourself to it if you can do more good outside of prison than in it.

Second, let’s be clear: I did not reveal any US operations against legitimate military targets. I pointed out where the NSA has hacked civilian infrastructure such as universities, hospitals, and private businesses because it is dangerous. These nakedly, aggressively criminal acts are wrong no matter the target. Not only that, when NSA makes a technical mistake during an exploitation operation, critical systems crash. Congress hasn’t declared war on the countries – the majority of them are our allies – but without asking for public permission, NSA is running network operations against them that affect millions of innocent people. And for what? So we can have secret access to a computer in a country we’re not even fighting? So we can potentially reveal a potential terrorist with the potential to kill fewer Americans than our own Police? No, the public needs to know the kinds of things a government does in its name, or the “consent of the governed” is meaningless.

2) All I can say right now is the US Government is not going to be able to cover this up by jailing or murdering me. Truth is coming, and it cannot be stopped. [Continue reading…]

Facebooktwittermail

I fear the chilling effect of NSA surveillance on the open internet

Jeff Jarvis writes: I fear the collateral damage the NSA’s spying via technology will do to that technology. The essential problem is not the internet or internet companies or even the spies. The real problem is the law and what it does not prevent the American government from doing with technology, and how it does not protect the principles upon which this nation was founded.

The damage to the net and its freedoms will take many forms: users may come to distrust the net for communication, sharing, and storage because they now fear – with cause – that the government will be spying on them, whether or not they are the object of that surveillance. International users – properly concerned that they are afforded even less protection than Americans – may ditch American platforms. The European Union and other national governments, which already were threatening laws targeting US technology companies, will work harder to keep their citizens’ data away from the US. Technologists may find it necessary to build in so many protections, so much encryption and caution, that the openness that is a key value of the net becomes lost.

If we trust the net less, will we use it less? Will it become less of an engine for innovation and economic development? Will it be a diminished tool for speech and assembly among citizens?

If governments use this event as an excuse to exercise more oversight and control over the net, will that not then, in turn, reduce citizens’ trust in the net and their freedom using it? Governments present themselves as the protector of our privacy, but as the NSA story demonstrates, governments present the greatest threat to our privacy as they have the means both to surveil us and to use our information against us. [Continue reading…]

Facebooktwittermail

PRISM is a small part of a much more expansive and intrusive eavesdropping effort

The Associated Press reports: In the months and early years after 9/11, FBI agents began showing up at Microsoft Corp. more frequently than before, armed with court orders demanding information on customers.

Around the world, government spies and eavesdroppers were tracking the email and Internet addresses used by suspected terrorists. Often, those trails led to the world’s largest software company and, at the time, largest email provider.

The agents wanted email archives, account information, practically everything, and quickly. Engineers compiled the data, sometimes by hand, and delivered it to the government.

Often there was no easy way to tell if the information belonged to foreigners or Americans. So much data was changing hands that one former Microsoft employee recalls that the engineers were anxious about whether the company should cooperate.

Inside Microsoft, some called it “Hoovering” – not after the vacuum cleaner, but after J. Edgar Hoover, the first FBI director, who gathered dirt on countless Americans.

This frenetic, manual process was the forerunner to Prism, the recently revealed highly classified National Security Agency program that seizes records from Internet companies. As laws changed and technology improved, the government and industry moved toward a streamlined, electronic process, which required less time from the companies and provided the government data in a more standard format.

The revelation of Prism this month by the Washington Post and Guardian newspapers has touched off the latest round in a decade-long debate over what limits to impose on government eavesdropping, which the Obama administration says is essential to keep the nation safe.

But interviews with more than a dozen current and former government and technology officials and outside experts show that, while Prism has attracted the recent attention, the program actually is a relatively small part of a much more expansive and intrusive eavesdropping effort.

Americans who disapprove of the government reading their emails have more to worry about from a different and larger NSA effort that snatches data as it passes through the fiber optic cables that make up the Internet’s backbone. That program, which has been known for years, copies Internet traffic as it enters and leaves the United States, then routes it to the NSA for analysis.

Whether by clever choice or coincidence, Prism appears to do what its name suggests. Like a triangular piece of glass, Prism takes large beams of data and helps the government find discrete, manageable strands of information. [Continue reading…]

Facebooktwittermail

NSA veterans say NSA leaders should face prosecution

In a roundtable discussion, a trio of former National Security Agency whistle-blowers — Thomas Drake, William Binney and J. Kirk Wiebe — tell USA TODAY that Edward Snowden succeeded where they failed.

Q: Did Edward Snowden do the right thing in going public?

William Binney: We tried to stay for the better part of seven years inside the government trying to get the government to recognize the unconstitutional, illegal activity that they were doing and openly admit that and devise certain ways that would be constitutionally and legally acceptable to achieve the ends they were really after. And that just failed totally because no one in Congress or — we couldn’t get anybody in the courts, and certainly the Department of Justice and inspector general’s office didn’t pay any attention to it. And all of the efforts we made just produced no change whatsoever. All it did was continue to get worse and expand.

Q: So Snowden did the right thing?

Binney: Yes, I think he did.

Q: You three wouldn’t criticize him for going public from the start?

J. Kirk Wiebe: Correct.

Binney: In fact, I think he saw and read about what our experience was, and that was part of his decision-making.

Wiebe: We failed, yes.

Jesselyn Radack
: Not only did they go through multiple and all the proper internal channels and they failed, but more than that, it was turned against them. … The inspector general was the one who gave their names to the Justice Department for criminal prosecution under the Espionage Act. And they were all targets of a federal criminal investigation, and Tom ended up being prosecuted — and it was for blowing the whistle.

Binney: [T]he NSA [has become] … a processing service for the FBI to use to interrogate information directly. … The implications are that everybody’s privacy is violated, and it can retroactively analyze the activity of anybody in the country back almost 12 years.

Now, the other point that is important about that is the serial number of the order: 13-dash-80. That means it’s the 80th order of the court in 2013. … Those orders are issued every quarter, and this is the second quarter, so you have to divide 80 by two and you get 40.

If you make the assumption that all those orders have to deal with companies and the turnover of material by those companies to the government, then there are at least 40 companies involved in that transfer of information. However, if Verizon, which is Order No. 80, and the first quarter got order No. 1 — then there can be as many as 79 companies involved.

So somewhere between 40 and 79 is the number of companies, Internet and telecom companies, that are participating in this data transfer in the NSA.

A transcript and videos of the complete discussion can be found here.

Facebooktwittermail

Domestic dissent can change U.S. foreign policy for the better

Mark Weisbrot writes: Several years ago, I had lunch with a US government official who told me about a trip that I had taken, that almost nobody knew about. I didn’t have to ask him where he got the information. For as long as I can remember, our government has been spying on dissidents, especially those who oppose crimes committed in the name of “national security”.

When I was a student at the University of Michigan, the FBI took down the license plates numbers of the people who drove to our meetings of the local Latin American Solidarity Committee, which was trying to end the US-sponsored terrorism and wars in Central America. This we learned from documents released under the Freedom of Information Act. The surveillance of our local, peaceful, and law-abiding group – long before the Patriot Act or the “war on terror” – was so extensive that one of our members who wrote a history of the group had to thank the FBI for keeping such a complete and detailed record of our activities.

The current revelations of a vast, secret NSA surveillance program are, of course, a continuation of what our government has been doing for the past century – the main difference being that the dragnet has gotten much larger due to change in communications technology. But there is an often-overlooked political reason for this mass intrusion on our personal communications: the government is gathering actionable intelligence in order to use it against those who oppose unpopular, unjust, and often criminal policies of that same government. And it has good reason to do so, because that opposition can be quite effective.

It is well-known that a mass protest movement, as well as its lobbying of Congress helped get us out of Vietnam. It is less widely known that the movement against the Central American wars in the 1980s, which involved hundreds of thousands of people, succeeded in cutting off congressional funding for the war against Nicaragua. And perhaps more historically significant, that result caused major problems for then-President Reagan, when his government turned to illegal funding and got caught, resulting in the infamous “Iran-Contra” scandal. [Continue reading…]

Facebooktwittermail

Chinese hail Edward Snowden as a hero

Helen Gao writes: After initially muted responses to the NSA spying controversy, the Chinese media and public are beginning to take stronger stances as it has emerged that Edward Snowden is taking refuge in Hong Kong, where he divulged classified data about US government-sponsored hacking activities directed toward China.

Editorials published by state newspapers argue, in a concerted voice, that the US owes China “an explanation of Prism” given its earlier high-profile accusation of Chinese government’s hacking of US companies. “We can see … that when American politicians and businessmen make accusatory remarks, their eyes are firmly fixed on foreign countries and they turn a blind eye to their own misdeeds,” read an editorial in People’s Daily, the Communist party mouthpiece. “The information Snowden has revealed concerns China, and we need to understand our situation well,” another editorial on Global Times, a popular nationalistic tabloid, maintained. “We have the right to ask the US government to issue explanations on, for example, whether Prism is being applied to the US’s business negotiation with the Chinese government and corporations.”

While the state media seizes the case as evidence of US double standards in its dealing with the world, it is also careful to steer the story away from aspects that may evoke domestic associations deemed too sensitive by the Chinese government. Snowden’s choice of Hong Kong as his temporary haven, for example, was only glossed over, perhaps because it brings too quickly to mind the two epic US consulate runs committed last year, by the Chongqing police chief Wang Lijun, and of human rights advocate Cheng Guangcheng, both of which put the Chinese government in an embarrassing light domestically and internationally. It would also serve as yet another reminder to the mainland Chinese of the greater social freedom and judicial independence in Hong Kong, a depressing contrast to what they have at home. [Continue reading…]

Facebooktwittermail

Larry Hunter’s prescient warnings about the digital threat to privacy

The cover of Whole Earth Review, January, 1985

The Boston Globe’s Ideas section: In the mid 1980s, when Mark Zuckerberg was still in diapers, computers ran on floppy disks, and a web was something a spider built, a computer-science graduate student at Yale University started to worry about a problem that would have struck most people as far-fetched.

Larry Hunter began to realize that as computers became bigger parts of our lives, they would come to know more and more about us, whether we liked it or not. They would gather data and build profiles, and this technology would someday have meaningful implications for our privacy and freedom of choice.

In January 1985 he published a warning essay in the inaugural issue of a techno-revolutionary journal called The Whole Earth Review. “The ubiquity and power of the computer blur the distinction between public and private information,” he wrote. “Our revolution will not be in gathering data — don’t look for TV cameras in your bedroom — but in analyzing information that is already willingly shared.”

In just the past few years, Hunter’s concerns — recently unearthed and reposted on the Smithsonian Magazine’s Paleofuture blog — have come to look almost spookily prescient. His solution, however — new laws to give people property rights over their information — has never come to pass. Today, every time we click a link, shop on Amazon, or retweet a news story, we offer the vast digital world one more free clue about who we are and what we like. All this information is stored and analyzed, bought and sold — last week, it emerged that the FBI and National Security Agency have been collecting this data directly from some of the largest Internet companies. The scope of our private lives is shrinking, and we still don’t really know the implications of this shift.

Hunter is now a professor of computational biology at the University of Colorado Denver, where he creates software that pulls together distant strands of biomedical research. Though he has also kept a finger in the privacy debate, his personal positions on privacy aren’t necessarily what you might think: He encrypts e-mails to friends and extols the privacy benefits of all-cash transactions, but he’s also posted his genetic data online.

Ideas reached out to him for his perspective on how the last 30 years have unfolded, and to ask what he sees as the next big privacy concerns. This transcript was edited from interviews by phone and e-mail. [Continue reading…]

Facebooktwittermail

GCHQ intercepted foreign politicians’ communications at G20 summits

The Guardian reports: Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts, according to documents seen by the Guardian. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic.

The revelation comes as Britain prepares to host another summit on Monday – for the G8 nations, all of whom attended the 2009 meetings which were the object of the systematic spying. It is likely to lead to some tension among visiting delegates who will want the prime minister to explain whether they were targets in 2009 and whether the exercise is to be repeated this week.

The disclosure raises new questions about the boundaries of surveillance by GCHQ and its American sister organisation, the National Security Agency, whose access to phone records and internet data has been defended as necessary in the fight against terrorism and serious crime. The G20 spying appears to have been organised for the more mundane purpose of securing an advantage in meetings. Named targets include long-standing allies such as South Africa and Turkey.

There have often been rumours of this kind of espionage at international conferences, but it is highly unusual for hard evidence to confirm it and spell out the detail. The evidence is contained in documents – classified as top secret – which were uncovered by the NSA whistleblower Edward Snowden and seen by the Guardian. [Continue reading…]

Facebooktwittermail

The whistleblowers are the new generation of American patriots

Gary Younge writes: When Darrell Anderson, 22, joined the US military he knew there was going to be a war, and he wanted to fight it. “I thought I was going to free Iraqi people,” he told me. “I thought I was going to do a good thing.”

Until, that is, he realised precisely what he had to do. While on patrol in Baghdad, he thought: “What are we doing here? Are we looking for weapons of mass destruction? No. Are we helping the people? No, they hate us. What are we working towards, apart from just staying alive? If this was my neighbourhood and foreign soldiers were doing this then what would I be doing?” Within a few months, he says, “I was cocking my weapon at innocent civilians without any sympathy or humanity”. While home on leave he realised he was not going to be able to lead a normal life if he went back. His mum drove him to Canada, where I met him in 2006 at a picnic for war resisters in Fort Erie.

Anderson’s trajectory, from uncritical patriotism to conscious disaffection and finally to conscientious dissent, is a familiar one among a generation of Americans who came of political age after 9/11. Over time, efforts to balance the myth of American freedom on which they were raised, with the reality of American power that they have been called on to monitor or operate, causes a profound dislocation in their world view. [Continue reading…]

Facebooktwittermail

Secret court ruling put tech companies in data bind

The New York Times reports: In a secret court in Washington, Yahoo’s top lawyers made their case. The government had sought help in spying on certain foreign users, without a warrant, and Yahoo had refused, saying the broad requests were unconstitutional.

The judges disagreed. That left Yahoo two choices: Hand over the data or break the law.

So Yahoo became part of the National Security Agency’s secret Internet surveillance program, Prism, according to leaked N.S.A. documents, as did seven other Internet companies.

Like almost all the actions of the secret court, which operates under the Foreign Intelligence Surveillance Act, the details of its disagreement with Yahoo were never made public beyond a heavily redacted court order, one of the few public documents ever to emerge from the court. The name of the company had not been revealed until now. Yahoo’s involvement was confirmed by two people with knowledge of the proceedings. Yahoo declined to comment.

But the decision has had lasting repercussions for the dozens of companies that store troves of their users’ personal information and receive these national security requests — it puts them on notice that they need not even try to test their legality. And despite the murky details, the case offers a glimpse of the push and pull among tech companies and the intelligence and law enforcement agencies that try to tap into the reams of personal data stored on their servers. [Continue reading…]

Facebooktwittermail

The NSA’s PRISM creates smaller haystacks — it can’t find needles

Whenever the frequency of an event of interest is extremely low — such as with acts of terrorism — even a very accurate test will fail very often. Corey Chivers explains why.

Recent revelations about PRISM, the NSA’s massive program of surveillance of civilian communications have caused quite a stir. And rightfully so, as it appears that the agency has been granted warrantless direct access to just about any form of digital communication engaged in by American citizens, and that their access to such data has been growing significantly over the past few years.

Some may argue that there is a necessary trade-off between civil liberties and public safety, and that others should just quit their whining. Lets take a look at this proposition (not the whining part). Specifically, let’s ask: how much benefit, in terms of thwarted would-be attacks, does this level of surveillance confer?

Lets start by recognizing that terrorism is extremely rare. So the probability that an individual under surveillance (and now everyone is under surveillance) is also a terrorist is also extremely low. Lets also assume that the neck-beards at the NSA are fairly clever, if exceptionally creepy. We assume that they have devised an algorithm that can detect ‘terrorist communications’ (as opposed to, for instance, pizza orders) with 99% accuracy.

P(+ | bad guy) = 0.99

A job well done, and Murica lives to fight another day. Well, not quite. [Continue reading…]

Facebooktwittermail

The sickening Snowden backlash

Kirsten Powers writes: Hell hath no fury like the Washington establishment scorned.

Since Edward Snowden came forward to identify himself as the leaker of the National Security Agency spying programs, the D.C. mandarins have been working overtime to discredit the man many view as a hero for revealing crucial information the government had wrongfully kept secret. Apparently, if you think hiding information about spying on Americans is bad, you are misguided. The real problem is that Snowden didn’t understand that his role is to sit and be quiet while the “best and the brightest” keep Americans in the dark about government snooping on private citizens.

By refusing to play this role, Snowden has been called a “traitor” by House Majority Leader John Boehner. Sen. Dianne Feinstein called the leaks “an act of treason.” The fury among the protectors of the status quo is so great that you have longtime Washington Post columnist Richard Cohen smearing Snowden as a “cross-dressing Little Red Riding Hood.” The New York Times’s David Brooks lamented that Snowden, who put himself in peril for the greater good, was too “individualistic.” It seems that he wasn’t sufficiently indoctrinated to blindly worship the establishment institutions that have routinely failed us. Brooks argued that “for society to function well, there have to be basic levels of trust and cooperation, a respect for institutions and deference to common procedures.”

This is backward. It’s the institutions that need to demonstrate respect for the public they allegedly serve. If Snowden or any other American is skeptical of institutional power, it is not due to any personal failing on their part. The lack of respect is a direct outgrowth of the bad behavior of the nation’s institutions, behavior that has undermined Americans’ trust in them. According to Gallup’s “confidence in institutions” poll, trust is at an historic low, with Congress clocking in at a 13 percent approval rating in 2012. Yes, this is the same Congress that has “oversight” of the government spying programs. [Continue reading…]

Facebooktwittermail

Hong Kong lawmakers urge Obama to ‘tread very carefully’ on Snowden case

The South China Morning Post reports: Two pan-democratic lawmakers urged US President Barack Obama on Friday to stop all legal action against and “consider letting go” NSA whistle-blower Edward Snowden who has taken refuge in Hong Kong.

They made the comments at a press conference at which they also made public a letter they have sent to Obama urging him to not allow “national security” claims to justify abuse of state power.

In an exclusive interview with the South China Morning Post on Wednesday, Snowden, a 29-year-old former Central Intelligence Agency analyst, made the explosive claims that the US government had been hacking into computers in Hong Kong and on the mainland for years. He had earlier revealed that the US has been secretly collecting the phone and online data of its citizens for national security reasons.

In the 400-word letter, Claudia Mo Man-ching of the Civic Party and Gary Fan Kwok-wai of the NeoDemocrats, democratically elected members of the Legislative Council urged Obama to “tread very carefully and take into account the views of America’s democratic friends around the world.”

Facebooktwittermail

The real war on reality

Peter Ludlow writes: To get some perspective on the manipulative role that private intelligence agencies play in our society, it is worth examining information that has been revealed by some significant hacks in the past few years of previously secret data.

Important insight into the world these companies came from a 2010 hack by a group best known as LulzSec (at the time the group was called Internet Feds), which targeted the private intelligence firm HBGary Federal. That hack yielded 75,000 e-mails. It revealed, for example, that Bank of America approached the Department of Justice over concerns about information that WikiLeaks had about it. The Department of Justice in turn referred Bank of America to the lobbying firm Hunton and Willliams, which in turn connected the bank with a group of information security firms collectively known as Team Themis.

Team Themis (a group that included HBGary and the private intelligence and security firms Palantir Technologies, Berico Technologies and Endgame Systems) was effectively brought in to find a way to undermine the credibility of WikiLeaks and the journalist Glenn Greenwald (who recently broke the story of Edward Snowden’s leak of the N.S.A.’s Prism program), because of Greenwald’s support for WikiLeaks. Specifically, the plan called for actions to “sabotage or discredit the opposing organization” including a plan to submit fake documents and then call out the error. As for Greenwald, it was argued that he would cave “if pushed” because he would “choose professional preservation over cause.” That evidently wasn’t the case.

Team Themis also developed a proposal for the Chamber of Commerce to undermine the credibility of one of its critics, a group called Chamber Watch. The proposal called for first creating a “false document, perhaps highlighting periodical financial information,” giving it to a progressive group opposing the Chamber, and then subsequently exposing the document as a fake to “prove that U.S. Chamber Watch cannot be trusted with information and/or tell the truth.”

(A photocopy of the proposal can be found here.)

In addition, the group proposed creating a “fake insider persona” to infiltrate Chamber Watch. They would “create two fake insider personas, using one as leverage to discredit the other while confirming the legitimacy of the second.”

The hack also revealed evidence that Team Themis was developing a “persona management” system — a program, developed at the specific request of the United States Air Force, that allowed one user to control multiple online identities (“sock puppets”) for commenting in social media spaces, thus giving the appearance of grass roots support. The contract was eventually awarded to another private intelligence firm.

This may sound like nothing so much as a “Matrix”-like fantasy, but it is distinctly real, and resembles in some ways the employment of “Psyops” (psychological operations), which as most students of recent American history know, have been part of the nation’s military strategy for decades. The military’s “Unconventional Warfare Training Manual” defines Psyops as “planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals.” In other words, it is sometimes more effective to deceive a population into a false reality than it is to impose its will with force or conventional weapons. Of course this could also apply to one’s own population if you chose to view it as an “enemy” whose “motives, reasoning, and behavior” needed to be controlled. [Continue reading…]

Facebooktwittermail