The Unchallenged Man Of The Year

Constitution, Fascism, Homeland Security, Technology, Terrorism, The State, Uncategorized

Those who are not suspended in the moral abyss with mainstream media already know that Edward Joseph Snowden is the best of America. (Included in the septic mainstream are the interchangeable females on a Fox News idiot’s extravaganza called ‘The Five.’ Said a nimble mind by the name of Andrea Tarantula: ‘If the [National Security Agency] are competent with my information; they can have it.'”)

“At 29, Snowden upended the National Security Agency on its own turf,” heroically bringing to light how—contrary to the Bill of Rights, the Fourth Amendment to the Constitution, in particular—the NSA had instituted “a global surveillance system that cast off many of its historical restraints after the attacks of Sept. 11, 2001. Secret legal authorities empowered the NSA to sweep in the telephone, Internet and location records of whole populations.”.

One of the positive outcomes of Snowden’s actions is that “U.S. technology giants including Google, Microsoft and Yahoo,” are taking “extraordinary steps to block the collection of data by their government”:

Led by Google and then Yahoo, one company after another announced expensive plans to encrypt its data traffic over tens of thousands of miles of cable. It was a direct — in some cases, explicit — blow to NSA collection of user data in bulk. If the NSA wanted the information, it would have to request it or circumvent the encryption one target at a time.
As these projects are completed, the Internet will become a less friendly place for the NSA to work. The agency can still collect data from virtually anyone, but collecting from everyone will be harder.
The industry’s response, Smith acknowledged, was driven by a business threat. U.S. companies could not afford to be seen as candy stores for U.S. intelligence. But the principle of the thing, Smith said, “is fundamentally about ensuring that customer data is turned over to governments pursuant to valid legal orders and in accordance with constitutional principles.”

It is to a heroic young man such as this that we should all say: “Thank you for your service, Mr. Snowden.”

Have a happy New Year.
ilana

UPDATED: The TAO Of Tyranny (The Israeli Difference)

Government, Homeland Security, Israel, Technology, Terrorism, The State

The TAO of tyranny was devised in 1997. In the USA.

The German weekly Der Spiegel has performed the service the British Guardian performed before it. Once again it falls to the serious foreign press to expose the machinations of the U.S. state apparatus; in this case, the works of The Office of Tailored Access Operations, or Tao.

“… TAO … is the National Security Agency’s top operative unit — something like a squad of plumbers that can be called in when normal access to a target is blocked.” So writes Der Spiegel.

According to internal NSA documents viewed by SPIEGEL, these on-call digital plumbers are involved in many sensitive operations conducted by American intelligence agencies. TAO’s area of operations ranges from counterterrorism to cyber attacks to traditional espionage. The documents reveal just how diversified the tools at TAO’s disposal have become — and also how it exploits the technical weaknesses of the IT industry, from Microsoft to Cisco and Huawei, to carry out its discreet and efficient attacks. …

… one former TAO chief wrote … that TAO “needs to continue to grow and must lay the foundation for integrated Computer Network Operations,” and that it must “support Computer Network Attacks as an integrated part of military operations.” To succeed in this, she wrote, TAO would have to acquire “pervasive, persistent access on the global network.” An internal description of TAO’s responsibilities makes clear that aggressive attacks are an explicit part of the unit’s tasks. In other words, the NSA’s hackers have been given a government mandate for their work. During the middle part of the last decade, the special unit succeeded in gaining access to 258 targets in 89 countries — nearly everywhere in the world. In 2010, it conducted 279 operations worldwide.

Indeed, TAO specialists have directly accessed the protected networks of democratically elected leaders of countries. They infiltrated networks of European telecommunications companies and gained access to and read mails sent over Blackberry’s BES email servers, which until then were believed to be securely encrypted. Achieving this last goal required a “sustained TAO operation,” one document states.

This TAO unit is born of the Internet — created in 1997, a time when not even 2 percent of the world’s population had Internet access and no one had yet thought of Facebook, YouTube or Twitter. From the time the first TAO employees moved into offices at NSA headquarters in Fort Meade, Maryland, the unit was housed in a separate wing, set apart from the rest of the agency. Their task was clear from the beginning — to work around the clock to find ways to hack into global communications traffic.

… The TAO workers authorized to access the special, secure floor on which the unit is located are for the most part considerably younger than the average NSA staff member. Their job is breaking into, manipulating and exploiting computer networks, making them hackers and civil servants in one. Many resemble geeks — and act the part, too.

Their leader: the dangerous NSA Director, Keith Alexander.

Read on about “‘Computer Network Exploitation’ (CNE), the goal [of which] is to “subvert endpoint devices,” according to an internal NSA presentation that SPIEGEL has viewed. The presentation goes on to list nearly all the types of devices that run our digital lives — ‘servers, workstations, firewalls, routers, handsets, phone switches, SCADA systems, etc.’ SCADAs are industrial control systems used in factories, as well as in power plants. Anyone who can bring these systems under their control has the potential to knock out parts of a country’s critical infrastructure.”

The most well-known and notorious use of this type of attack was the development of Stuxnet, the computer worm whose existence was discovered in June 2010. The virus was developed jointly by American and Israeli intelligence agencies to sabotage Iran’s nuclear program, and successfully so.

AND READ HOW TAO techies are “Having Fun at Microsoft’s Expense”—and at ours, since so many of us use Microsoft’s Windows.

UPDATED (12/31): The Israeli Difference, in reply to the Facebook Thread:

Israel possesses this capability, Don Darkes. But Israel seems far more prone to using these “tools” to do what they believe, and most of Israelis believe, is in the interest of national survival. The US state, however, turns on its own people, seldom acting in their interest. I mean, if Uncle Sam is so smart, and is spying on Mexico, why give drug dealers weapons to kill Americans and innocent Mexicans? A lot of people hate Israel. But a lot of what the state does (and I do not necessarily support these intrusions) is executed by a leadership that perceives its interest to be one with the people it represents. In other words, when Israelis release a cyber-virus on Iran, it is b/c Mosad members are not emigrating (they can’t; no one will have them). They want to secure the future of their own kind.

Decentralized ‘Al Qaeda’ Represents Ordinary Invaded Muslims

Foreign Policy, Media, Middle East, Neoconservatism, Terrorism

“Us against Al Qaeda” is the narrowly conceived narrative among neoconservatives. As the politically provincial neoconservative foreign-policy paradigm has it, those were the forces that allegedly played out in Benghazi.

Understandably, Fox News is fuming over “A Deadly Mix in Benghazi,” David D. Kirkpatrick’s expose in the New York Times. For these Republicans hold that:

Mr. Stevens died in a carefully planned assault by Al Qaeda to mark the anniversary of its strike on the United States 11 years before. Republicans have accused the Obama administration of covering up evidence of Al Qaeda’s role to avoid undermining the president’s claim that the group has been decimated, in part because of the raid that killed Osama bin Laden.

The investigation by The Times, however, shows:

…that the reality in Benghazi was different, and murkier, than either of those story lines suggests. Benghazi was not infiltrated by Al Qaeda, but nonetheless contained grave local threats to American interests. The attack does not appear to have been meticulously planned, but neither was it spontaneous or without warning signs.

In particular are neoconservatives fulminating over the NYT findings that “turned up no evidence that Al Qaeda or other international terrorist groups had any role in the assault.” “The attack,” it was revealed, “was led, instead, by fighters who had benefited directly from NATO’s extensive air power and logistics support during the uprising against Colonel Qaddafi.”

I have no doubt, simply based on the history and policies of the US in the Middle-East, that to the extent the “American-made video denigrating Islam” is a symbolic proxy for the hatred harbored by the invaded Muslims for the invading Americans-–to that extent it is probably correct to say that the video, more so than the mythical Al Qaeda, was a catalyst for the attack on our embassy in Benghazi.

However, the NYT is hardly unsparingly honest; it is, in fact, as dishonest and politically provincial as the neocons of Fox News.

Predictably ignored in the Kirkpatrick article is that Al Qaeda has morphed into many decentralized operations that mirror the aspirations of the invaded Muslims to be free of invading Westerners—unless of course they can get us to bankroll their Baksheesh economy.

There is cross-pollination between these double-crossing entities. So wrong was the Gray Eminence on Iraq that the NYT reporter who piped lies straight form Bush’s White House to her Times readers was recruited to Fox News: She is Judith Chalabi Miller.

Ducking Around As Freedoms Go POOF

Constitution, Fascism, Federalism, Founding Fathers, Law, Liberty, The Courts

Face it, the idea of a judiciary that would police the executive as an arm of a self-correcting tripartite government is worse than naive. Rather, it WAS recklessly naive of the American Founding Fathers to imagine that branches of a government, each of whose power is enhanced when the power of the other branches grows, would serve as a check on one another.

Today, Judge William Pauley, “a Clinton appointee to the Southern District of New York,” ruled that “privacy protections enshrined in the fourth amendment of the US constitution needed to be balanced against a government need to maintain a database of records to prevent future terrorist attacks. ‘The right to be free from searches is fundamental but not absolute,’ he said. ‘Whether the fourth amendment protects bulk telephony metadata is ultimately a question of reasonableness.’”

Pauley argued that al-Qaida’s “bold jujitsu” strategy to marry seventh century ideology with 21st century technology made it imperative that government authorities be allowed to push privacy boundaries.

As if the purview of an American justice is to “marry” American law with Islamic ideology; a US judge must apply the constitution to the facts. In truth, any protection the natural law once provided us has been lost, buried under the rubble of legislation, statute, precedents, whatever.

The Guardian:

The judgement, in a case brought before a district court in New York by the American Civil Liberties Union, directly contradicts the result of a similar challenge in a Washington court last week which ruled the NSA’s bulk collection program was likely to prove unconstitutional and was “almost Orwellian” in scale.
Friday’s ruling makes it more likely that the issue will be settled by the US supreme court, although it may be overtaken by the decision of Barack Obama on whether to accept the recommendations of a White House review panel to ban the NSA from directly collecting such data.

There you have the sum of American freedom and federalism: Legislation that flouts the Fourth Amendment is already in place to provide Pauley with all the positive-law backing he needs to justify an anti-Constitutional ruling.

To wit:

The [Judge dismissed the] ACLU case against the NSA … primarily on the grounds that bulk collection was authorised under existing laws allowing “relevant” data collection to be authorised by secret US courts.

And if the Supreme Court doesn’t play (as nicely as Supremo Roberts played for ObamaCare)—there is always an extra-constitutional committee to kill off/override constitutional protections.

As the nation f-cks around with the huckster Ducksters, the ‘privacy protections enshrined in the Fourth Amendment of the US Constitution’ just got still weaker, as if this were possible.