Total Pageviews

Showing posts with label police state. Show all posts
Showing posts with label police state. Show all posts

3/31/2012

Advanced packet analysis and the end of interpersonal violence in technologically advanced Western societies.

In Ira Levin's book "This Perfect Day" the computer was more of an economic and transportation recorder than a personality or agent program that its top level users accessed. The need for a centralized system is no longer necessary nor great concentration pf computer resources, merely the collection and storage of sufficient data.

It seems that the packet analysis systems deployed by the security forces to cover and collect digital network traffic has resulted in a tremendous advance in law enforcement capacity. Public safety has never been better and stands only to improve by leaps and bounds as digital devices expand into all levels of the public space.

The reduction of interpersonal violence from advanced digital forensics and surveillance means that perpetrators are nearly always caught with a high degree of precision, and may increasingly be expected to be intercepted through advanced "real time" intelligence. The possibility that interpersonal violence, which is the most egregious form of (possibly preventable) human suffering is on the decline has been noted by philosophers such as Steven Pinker, for example. That interpersonal violence is on the decline in western countries is perhaps increasingly attributable to this trend in lawful intercept surveillance technology, increasing penetration of mobile devices, and the almost exponential process of increasing transistor density.

Violence as a means to an end or an end in and of itself is increasingly being disclosed as an impossibility (or an irrational one-off event at worst) in technologically advanced western countries. The use of violence as a means to some end is almost always invariably contrary to the stated end desired but that is a philosophical topic to be discussed else where. The securitization of suburban and urban space and ensuing enhancement of public safety is a great achievement akin to a rocket program or nuclear power.  Just as nuclear power and rockets, surveillance and expert analysis monitoring programs require adequate safeguards in place in order to prevent this network management style from degenerating into a myriad of  dystopian possibilities. 

We must admit that the technology of Orwell's 1984 has been deployed as a means to enhance public safety without necessarily devolving into a dictatorship of repression, at least in the US. The neo-conservatives and the neo-liberal factions have steered a careful course so far. They deserve at least to some extent the benefit of the doubt from a historical perspective by, for example, inheriting and not using the cold war nuclear weapons complex.

We (US and European citizens) may encounter ( if we are not currently already experiencing ) a computer-ized analysis which examines the individual behind the IP address that their networked devices and workstations pull. These individuals are examined through an automated process such as a special forensic psychologist social monitoring "expert AI" system perhaps like IBM Watson for law enforcement.* These systems are increasingly sophisticated and nuanced in the execution of their tasks. They may also be useful for detecting the operation of foreign intelligence and espionage agents or cells operating within a give you geographical area. Not only is this network capable of sniffing out the would be violent actors, but it is also able to detect and unmask the spys. The only persons who are not subject to this regime of monitoring would be those persons who are working under the false identity of under cover domestic spy and Leo agents.

*Of course we may reserve a more narrow definition. For "expert" in the sense that the computer or server cluster is a natural language capable engine capable of limited hypothesis testing and so on.


3/11/2012

POLICE STATE AMERICA: "American Jihadist Terrorism: Combating a Complex Threat"



"In the post-9/11 environment, the public has expected law enforcement to adopt a proactive
posture in order to disrupt terrorist plots before an attack occurs. Investigative leads about
terrorist plots in the homeland may originate from foreign intelligence sources. But, for the most
part, information about homegrown plots is available only through domestic intelligence
activities. In order to proactively gather intelligence, law enforcement has adopted a preventive
policing approach that focuses not just on crime that has occurred, but on the possibility that a
crime may be committed in the future.
In this context, a major challenge for law enforcement is gauging how quickly and at what point
individuals move from radicalized beliefs to violence so that a terrorist plot can be detected and
disrupted. At the federal level, the Department of Justice (DOJ) and the Federal Bureau of
Investigation (FBI) have implemented a forward-leaning approach with a revision to the Attorney
General’s Guidelines for Domestic FBI Operations.2 The revision, meant to streamline the FBI’s
investigations and make them more proactive, has at its heart a new investigative tool,
assessments. These allow for the investigation of individuals or groups without factual
predication. The new guidelines have, however, generated some controversy among civil
libertarians.
Also critical among the proactive approaches employed by law enforcement is the monitoring of
Internet and social networking sites. The USA PATRIOT Act (P.L. 107-56) authorizes the FBI to
use National Security Letters to obtain a range of information including data pertaining to e-mail
and Internet use. It appears that U.S. law enforcement has effectively exploited the Internet—
which radicalizing individuals can mine for information and violent jihadists use while plotting—
in its pursuit of terrorists. A review of criminal complaints and indictments in terrorism cases
reveals that the FBI has exploited the Internet and/or e-mail communications to build cases
against defendants in at least 22 of the post-9/11 cases studied in this report. Although much is
said about terrorist use of the Internet for recruitment, training, and communications, these cases
suggest that terrorists and aspiring terrorists will not find the Internet to be a uniformly
permissive environment."

2/13/2012

FBI Social media software

I would think they have already got Zuckerberg to build this into the PHP code from the ground up. No? 




Also, why doesn't anyone ever play red team by build a completely fictional terror cadre with all the necessary connections on a social network site (not going to name any names for who is teh obvious candidate) and then watch the results. Depends on the type of attack, but it would be interesting to see how the agency attempts to track/arrest persons who aren't real. 


Of course how to build the Redteam enterprise while steering clear of being found out, leaving a digital path that can be traced back to you. No doubt the secfor would attempt to drop the hammer on you for "endangering natsec" and the like. I can hear their histrionics now...


but anyways, as always let me know what you think. Leave comments in the boxs below why don't ya? 




(H) FBI to build software to monitor social media 


The U.S. government is requesting proposals for the development of a software system that can mine social media.


Federal law enforcement and intelligence agencies are looking to use it to anticipate everything from terrorist attacks to foreign uprisings by sifting through billions of posts from Twitter and other social networks.


The proposals already have raised privacy concerns among advocates who worry that such monitoring efforts could have a chilling effect on users. The FBI says the proposed system would only monitor publicly available information. WTOL.com


HIGHLIGHTS


Hundreds of intelligence analysts already sift overseas Twitter and Facebook posts to track events such as the Arab Spring. But in a formal notice to potential contractors, the FBI recently outlined its desire for a digital tool to scan the entire universe of social media - more data than humans could ever crunch. Boston Globe


The Department of Defense and the Office of the Director of National Intelligence also have solicited the private sector for ways to automate the process of identifying emerging threats and upheavals using the billions of posts people around the world share every day. NY Times


Ginger McCall, director of the open government project at the Electronic Privacy Information Center In Washington, D.C., said the FBI has no business monitoring legitimate free speech without a narrow, targeted law enforcement purpose. AP

2/06/2012

Terrorist/Revolutionary Literature and the FBI Orwellian Police State paranoia

Fascinating document posted on the always interesting public intelligence.

Notable for it's mention of Peroxides. Electronics.

Peroxides b/c TATP which has been blogged about elsewhere, perhaps even on Schnieder on Security?

Give it a look and see?

http://www.schneier.com/

Also timers and RF, electronics? The whole planet is filling up with consumer electronics and increasingly agile mobile devices. Should this technology be somehow alien to the consumer? Is a consumer of electronics curiosity about these electronics to be suspect?

ALSO:

It closes with this:

"Some of the activities, taken individually,
could be innocent and must be examined by
law enforcement professionals in a larger
context to determine whether there is a basis
to investigate.  The activities outlined on this
handout are by no means
all-inclusive but have been compiled from a
review of terrorist events over several years."

"and must be examined by
law enforcement professionals in a larger
context to determine whether there is a basis
to investigate."

-----> What is the nature of this "investigation" and is the usual legal process of getting a warrant pursued? What about notice of the individual being investigated?


THE FINE PRINT....


Notice the fine print: "

This project was supported by Grant Number 2007-MU-BX-K002, awarded by the Bureau of Justice Assistance, Office of Justice Programs, U.S. Department of Justice.  Each indictor listed above, is by
itself, lawful conduct or behavior and may also constitute the exercise of rights guaranteed by the U.S. Constitution. In addition, there may be a wholly innocent explanation for conduct or behavior that
appears suspicious in nature. For this reason, no single indicator should be the sole basis for law enforcement action. The totality of behavioral indicators and other relevant circumstances should be
evaluated when considering any law enforcement response or action."

---->"Each indictor listed above, is by
itself, lawful conduct or behavior and may also constitute the exercise of rights guaranteed by the U.S. Constitution."

---->"In addition, there may be a wholly innocent explanation for conduct or behavior that
appears suspicious in nature."

---->"The totality of behavioral indicators and other relevant circumstances should be
evaluated when considering any law enforcement response or action."


This last comment is disturbing. It almost seems like an axiomatic statement of intent? Who is going to decide what the "totality of behavioral indicators" are? What is a behavioral indicator for that matter? Who will do this evaluation? Are computers already deciding these things and then pushing red flagged data streams further up the chain of command in some FBI signals intercept and analysis operation? We as American citizens do not know the answers to these questions even though we have been asking for some time. The system is silent in regards to details about the way in which intelligence data is handled. And that lack of transparency is unconstitutional, insofar as it infringes upon the liberty of the individual without due process protections, etc.




http://info.publicintelligence.net/FBI-SuspiciousActivity/Internet_Cafe.pdf

Brought to us by the FBI and the BJA

Document titled "Defending Communities against Terrorism: Potential Indicators of Terrorist Activities Related to Internet Cafes"



Asks: WHAT SHOULD I CONSIDER SUSPICIOUS?


People Who:
 Are overly concerned about privacy, attempts to shield the screen from view of
others
 Always pay cash or use credit card(s) in different name(s)
 Apparently use tradecraft: lookout, blocker or someone to distract employees
 Act nervous or suspicious behavior inconsistent with activities
 Are observed switching SIM cards in cell phone or use of multiple cell phones
 Travel illogical distance to use Internet CafĂ©
Activities on Computer indicate:
 Evidence of a residential based internet provider (signs on to Comcast, AOL,
etc.)
 Use of anonymizers, portals, or other means to shield IP address
 Suspicious or coded writings, use of code word sheets, cryptic ledgers, etc.
 Encryption or use of software to hide encrypted data in digital photos, etc.
 Suspicious communications using VOIP or communicating through a PC game



 Download or transfer files with “how-to” content such as:
- Content of extreme/radical nature with violent themes
- Anarchist Cookbook, explosives or weapons information
- Military tactics, equipment manuals, chemical or biological information
- Terrorist/revolutionary literature
- Preoccupation with press coverage of terrorist attacks
- Defensive tactics, police or government information
- Information about timers, electronics, or remote transmitters / receivers


7/13/2011

Facebook warrents by leo

http://www.allfacebook.com/facebook-warrants-by-law-enforcement-agencies-surge-2011-07

Requests for warrants to investigate the Facebook
accounts of known suspects is surging.
The U.S . Federal Bureau of Investigation , Immigration
and Customs Enforcement, Drug Enforcement
Administration and other such agencies often
gain access to the social networking accounts with the
user’ s knowledge.
The cases typically range from acts of terrorism , to
rape and even arson. Law enforcement will generally
scour the accounts, delving into everything from
friend’ s lists, calendars, events, posting updates, links,
videos, photos and will even look back at rejected
friend requests. Under U.S . laws , neither Facebook
nor the government has to inform a user when an
account is being searched by law officials.
According to Reuters, at least two dozen warrants
have been granted by federal judges to search the
Facebook accounts of suspects. In addition, another
11 warrants have been authorized by federal agencies
this year alone, nearly double that for 2010 .
Not one of the warrants have been challenged
regarding violating a person’ s Fourth Amendment
rights against unlawful search and seizure. The exact
number of warrants served on Facebook is not easy to
figure out because a few records are sealed, and
warrant applications oftentimes involve case names
that are not typical according to Reuters.
In a telephone interview with Reuters, Facebook’s
Chief Security Officer Joe Sullivan, did not disclose the
number of warrants that had been served on the
company. He said Facebook is mindful of user privacy
and that it does not openly welcome law- enforcement
“fishing expeditions.”
The Facebook search warrants typically demand a
user’ s “neoprint” and “photoprint, ” Facebook terms for
profile and photo information that are unavailable to
account holders — these words appear in manuals for
law enforcement agencies on how to request data
from Facebook. The manuals, which are said to be
posted on various public- advocacy websites ,
according to Reuters, appear to have been prepared
by Facebook, although a spokesman for the company
declined to confirm their authenticity.
Reportedly, Twitter and some other social networking
sites have adopted policies to contact customers when
their accounts are being investigated with regards to
legal matters.
Readers, what do you think about the surge in law
enforcement requests to search Facebook users
accounts?