Total Pageviews

Showing posts with label 1984. Show all posts
Showing posts with label 1984. Show all posts

4/18/2012

GPS placed on vehicles during traffic stops.

"Jensen has testified that the battery-powered devices, which agents could turn on and off remotely, were used to follow vehicles into remote areas or if agents lost vehicles in traffic.
In one instance, agents placed a GPS tracker on one of Amaya's vehicles during a traffic stop in Kansas after obtaining information that he was making a trip to Texas. In another, agents used a GPS device to track a vehicle that was sent with suspected drug money on a car carrier from Iowa to California, changing its batteries after a stop in Nebraska where they seized $29,000.
Jensen has testified the tracking helped confirm a tip that Amaya went to a bank to transfer money to a California marijuana supplier. When on, the devices updated their location every 15 seconds, which was transmitted to a website where agents could track movements."

According to this source
Naturally, there will be no serious repercussions from this corrupt system. Who will watch the watchers? When they are all corrupt, there is no incentive to police them to even hold fast to their own stated rules and procedures. Corruption, while deplorable, at least points at the cracks in the foundations of this decaying imperial power. Corruption in the courts will lead to corruption of the security forces, and eventually they will be unable to take concerted action against a domestic insurgency and...if we are lucky, popular revolution against the bankers and the FEDGOV. 

3/31/2012

Advanced packet analysis and the end of interpersonal violence in technologically advanced Western societies.

In Ira Levin's book "This Perfect Day" the computer was more of an economic and transportation recorder than a personality or agent program that its top level users accessed. The need for a centralized system is no longer necessary nor great concentration pf computer resources, merely the collection and storage of sufficient data.

It seems that the packet analysis systems deployed by the security forces to cover and collect digital network traffic has resulted in a tremendous advance in law enforcement capacity. Public safety has never been better and stands only to improve by leaps and bounds as digital devices expand into all levels of the public space.

The reduction of interpersonal violence from advanced digital forensics and surveillance means that perpetrators are nearly always caught with a high degree of precision, and may increasingly be expected to be intercepted through advanced "real time" intelligence. The possibility that interpersonal violence, which is the most egregious form of (possibly preventable) human suffering is on the decline has been noted by philosophers such as Steven Pinker, for example. That interpersonal violence is on the decline in western countries is perhaps increasingly attributable to this trend in lawful intercept surveillance technology, increasing penetration of mobile devices, and the almost exponential process of increasing transistor density.

Violence as a means to an end or an end in and of itself is increasingly being disclosed as an impossibility (or an irrational one-off event at worst) in technologically advanced western countries. The use of violence as a means to some end is almost always invariably contrary to the stated end desired but that is a philosophical topic to be discussed else where. The securitization of suburban and urban space and ensuing enhancement of public safety is a great achievement akin to a rocket program or nuclear power.  Just as nuclear power and rockets, surveillance and expert analysis monitoring programs require adequate safeguards in place in order to prevent this network management style from degenerating into a myriad of  dystopian possibilities. 

We must admit that the technology of Orwell's 1984 has been deployed as a means to enhance public safety without necessarily devolving into a dictatorship of repression, at least in the US. The neo-conservatives and the neo-liberal factions have steered a careful course so far. They deserve at least to some extent the benefit of the doubt from a historical perspective by, for example, inheriting and not using the cold war nuclear weapons complex.

We (US and European citizens) may encounter ( if we are not currently already experiencing ) a computer-ized analysis which examines the individual behind the IP address that their networked devices and workstations pull. These individuals are examined through an automated process such as a special forensic psychologist social monitoring "expert AI" system perhaps like IBM Watson for law enforcement.* These systems are increasingly sophisticated and nuanced in the execution of their tasks. They may also be useful for detecting the operation of foreign intelligence and espionage agents or cells operating within a give you geographical area. Not only is this network capable of sniffing out the would be violent actors, but it is also able to detect and unmask the spys. The only persons who are not subject to this regime of monitoring would be those persons who are working under the false identity of under cover domestic spy and Leo agents.

*Of course we may reserve a more narrow definition. For "expert" in the sense that the computer or server cluster is a natural language capable engine capable of limited hypothesis testing and so on.


3/11/2012

POLICE STATE AMERICA: "American Jihadist Terrorism: Combating a Complex Threat"



"In the post-9/11 environment, the public has expected law enforcement to adopt a proactive
posture in order to disrupt terrorist plots before an attack occurs. Investigative leads about
terrorist plots in the homeland may originate from foreign intelligence sources. But, for the most
part, information about homegrown plots is available only through domestic intelligence
activities. In order to proactively gather intelligence, law enforcement has adopted a preventive
policing approach that focuses not just on crime that has occurred, but on the possibility that a
crime may be committed in the future.
In this context, a major challenge for law enforcement is gauging how quickly and at what point
individuals move from radicalized beliefs to violence so that a terrorist plot can be detected and
disrupted. At the federal level, the Department of Justice (DOJ) and the Federal Bureau of
Investigation (FBI) have implemented a forward-leaning approach with a revision to the Attorney
General’s Guidelines for Domestic FBI Operations.2 The revision, meant to streamline the FBI’s
investigations and make them more proactive, has at its heart a new investigative tool,
assessments. These allow for the investigation of individuals or groups without factual
predication. The new guidelines have, however, generated some controversy among civil
libertarians.
Also critical among the proactive approaches employed by law enforcement is the monitoring of
Internet and social networking sites. The USA PATRIOT Act (P.L. 107-56) authorizes the FBI to
use National Security Letters to obtain a range of information including data pertaining to e-mail
and Internet use. It appears that U.S. law enforcement has effectively exploited the Internet—
which radicalizing individuals can mine for information and violent jihadists use while plotting—
in its pursuit of terrorists. A review of criminal complaints and indictments in terrorism cases
reveals that the FBI has exploited the Internet and/or e-mail communications to build cases
against defendants in at least 22 of the post-9/11 cases studied in this report. Although much is
said about terrorist use of the Internet for recruitment, training, and communications, these cases
suggest that terrorists and aspiring terrorists will not find the Internet to be a uniformly
permissive environment."

2/20/2012

EFF FBI CIPAV


What is CIPAV and How Does It Work?
The documents discuss technology that, when installed on a target's computer, allows the FBI to collect the following information:
  • IP Address
  • Media Access Control (MAC) address
  • "Browser environment variables"
  • Open communication ports
  • List of the programs running
  • Operating system type, version, and serial number
  • Browser type and version
  • Language encoding
  • The URL that the target computer was previously connected to
  • Registered computer name
  • Registered company name
  • Currently logged in user name
  • Other information that would assist with "identifying computer users, computer software installed, [and] computer hardware installed"3
It's not clear from the documents how the FBI deploys the spyware, though Wired has reported that, in the Washington state case, the FBI may have sent a URL via MySpace's internal messaging, pointing to code that would install the spyware by exploiting a vulnerability in the user's browser. Although the documents discuss some problems with installing the tool in some cases, other documents note that the agency's Crypto Unit only needs 24-48 hours to prepare deployment.4 And once the tool is deployed, "it stay[s] persistent on the compromised computer and . . . every time the computer connects to the Internet, [FBI] will capture the information associated with the PRTT [Pen Register/Trap & Trace Order].5

Interestingly, a commentator on Schneier blog had this to say about possibly defeating said trojan:

@ Dirk Praet,
"The real question here however is to which extent governments and their TLA's have agreements with anti-virus and anti-malware vendors to not detect their spyware."
That is a significant consideration, but AVetc software from the major vendors is not going to be the Feebies only concern.
For instance I will assume that as others have noted the spy ware has occasionaly to do an ET and "phone home", the question is how?
The simplest and most visable is if it sends a packet or two of to an 'unknown to the user' IP address that is the Feebies gateway. If the user has IP based whitlist software (which is appearing on homebrew routers) then it's going to throw an exception at the Feebies gateway IP address. Likewise if the user sets the machine up in a "honeypot" style environment.
More covertly it modifies the users browser and hides in their facebook traffic. This would be harder to spot but not impossible. Hardest would be using the timing between packets etc which could be either logged at the ISP or if sufficiently low bandwidth by the end service provider.
Now this makes me think that the Feebies (who supposadly don't currently have ISP cooperation to the level required) would have to either be at some mid point or getting co-operation from the service provider such as facebook the user had this malware downloaded from.
So it's not just the AV vendors you need to be considering but the likes of facebook etc. as well...
Posted by: Clive Robinson at May 12, 2011 1:34 PM

11/15/2011

What is New York? Image factory for fascism.

"The raid was nice. First they blocked off all entrance and ext, including the subway (which they shut down). They then told the reporters (and this was verified by CNN staff on the ground) to leave or they would be arrested. Classy.

 They surrounded the park. There was a long standoff until a pair of large, white open-bed industrial garbage haulers drove in followed by a trail of police. As protesters shouted obscenities or pleaded, the cops grabbed tents, backpacks, luggage, everything- throwing it all into one big, broken pile.

 Then they threw it into the backs of the trucks, swept up what was left and hauled it all off. Meanwhile people were running into the camera guy reporting bludgeoning, people being dragged by their hair or on their faces, tear gas- all in areas that had been swept clear of cameras or reporters. I watched the reports coming in over the chat window. I also watched various people calling in reports from police scanners- Where to avoid. Sometimes one of the possible Anonymous folks would come in with AMBUSH! and street names. It was fascinating and likely a very dumb and expensive way to go about things."

 ---
I think this just goes to show you that New York, and the money lenders in lower manhatten are the real fascists hiding in broad daylight. The globalists, the pro-UN neo-Liberals all issue their marching orders from New York. New York is an image factory that reproduces images of NY, but what is NY politicially? It is a stronghold and bulwark of reactionary corporate oligarchy. It must be resisted by any means necessary. New York is an image factory of fascism.

8/30/2011

Gunwalker scandal: ATF chief assassin/director out of top job

The corrupt Obama administration refuses to prosecute this criminal Kenneth Melson for his presiding over the deaths of innocents on both sides of the border. The Obama administration handed down 'Fast and Furious' as a means to gain political support for a renewed push on the despised Clinton era assault weapons ban. Obama and his minions have no scruples when it comes to the setup.

Does it really surprise us that the director of the ATF who has blood on his hands will not be prosecuted by the executive branch? Just like Janet Reno was not executed for her criminal actions against the Branch Davidians and Ruby Ridge incident, so another ATF scum-scoundrel-murder is let off the hook by an illegal administration. We can only hope that Ron Paul will get elected and disband this criminal para-military execution force known as the ATF. If the ATF were disbanded that *might* stave off another US civil war.



Gunwalker scandal: ATF director out of top job - CBS News Investigates - CBS News:

'via Blog this'



8/11/2011

DHS TERROR DATABASE PRIVACY IMPACT ASSESSMENT

http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_dhs_wls.pdf

"The Homeland Security Presidential Directive 6 (HSPD-6), issued in September 2003, called for the
establishment and use of a single consolidated terrorist watchlist to improve the identification, screening,
and tracking of  individuals known or  appropriately  suspected  to be or have been engaged in conduct
constituting, in preparation for, in aid of, or related to terrorism (known or suspected  terrorists).
Currently, the TSC distributes  the  watchlist information from the TSDB to other government agencies
including the DHS and DHS‟s internal components.

WLS will allow TSC and DHS to move away from a manual and cumbersome process of data
transmission and management to an automated and centralized process.  WLS will replace multiple data
feeds from the TSC to DHS components to more efficiently facilitate DHS mission-related functions, such as
counterterrorism, law enforcement, border security, and inspection activities.  DHS will not receive any
new data as part of the WLS; the system was created for efficiency purposes only.  At this time, WLS is a
system-to-system secure connection with no direct user interface. "