Jeb Bush – Pro-Domestic Spying Candidate

jeb-obama

Source: Firstlook

One of the most glaring myths propagated by Washington — especially the two parties’ media loyalists — is that bipartisanship is basically impossible, that the two parties agree on so little, that they are constantly at each other’s throats over everything. As is so often the case for Washington partisan propaganda, the reality is exactly the opposite: Continue reading

Advertisements

DARPA & US Intelligence Monitor and Analyse Social Media to Manipulate, Undermine, Propagandize and Attack Undesirable People and Information

FacebookEye

Source: Guardian UK

The activities of users of Twitter and other social media services were recorded and analysed as part of a major project funded by the US military, in a program that covers ground similar to Facebook’s controversial experiment into how to control emotions by manipulating news feeds.

Research funded directly or indirectly by the US Department of Defense’s military research department, known as Darpa, has involved users of some of the internet’s largest destinations, including Facebook, Twitter, Pinterest and Kickstarter, for studies of social connections and how messages spread.

While some elements of the multi-million dollar project might raise a wry smile – research has included analysis of the tweets of celebrities such as Lady Gaga and Justin Bieber, in an attempt to understand influence on Twitter – others have resulted in the buildup of massive datasets of tweets and additional types social media posts. Continue reading

XKeyscore: NSA tool collects ‘nearly everything a user does on the internet’

A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.

The NSA boasts in training materials that the program, called XKeyscore, is its “widest-reaching” system for developing intelligence from the internet.

The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisa surveillance court oversight.

The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. Continue reading

CIA and Google at it Again: Investment Arms Work at Predicting Future Through Web Analysis

The investment arms of the CIA and Google are both backing a company that monitors the web in real time — and says it uses that information to predict the future.

The company is called Recorded Future, and it scours tens of thousands of websites, blogs and Twitter accounts to find the relationships between people, organizations, actions and incidents — both present and still-to-come. In a white paper, the company says its temporal analytics engine “goes beyond search” by “looking at the ‘invisible links’ between documents that talk about the same, or related, entities and events.” Continue reading

US Cyber Command to Take Offensive


Source: Global Security

The U.S. Department of Defense has made a rare acknowledgement that it is developing offensive cyber capabilities.

In testimony before the Senate Armed Services Committee this past week, Gen. Keith Alexander, director of the National Security Agency, said 13 cyber warfare “teams” would be ready by 2015.

According to a prepared statement, the teams would be “analogous to battalions in the Army and Marine Corps—or squadrons in the Navy and Air Force.” Furthermore, “they will soon be capable of operating on their own, with a range of operational and intelligence skill sets, as well as a mix of military and civilian personnel.”

“Let me be clear, this defend-the-nation team is not a defensive team; this is an offensive team that the Department of Defense would use to defend the nation if it were attacked in cyberspace,” he said during the testimony. Continue reading

Iran Nuclear Facility hit with another Virus

Source: Tecca
By: Mike Wehner

Malware can be a major pain for anyone with a computer or mobile device, as it can lead to security risks like identity theft. But when a virus targets a nuclear facility, the stakes are much much higher. According to a report on security site F-Secure, Iran’s nuclear energy group — called the Atomic Energy Organization of Iran, or AEOI for short — is reaching out for help to rid its system of a malicious program that not only threatens the facility’s daily operations, but also plays a 90s rock anthem on the infected computers.

An email to F-Secure — allegedly sent from an AEOI scientist — detailed the attack, noting that the malware has shut down some of the facility’s automated processes. The rather vague wording of the email leaves a few unanswered questions as to just what parts of the AEOI are in danger, but one piece of information was very clear: The insidious software prompted several of the group’s computers to being playing the song “Thunderstruck” by AC/DC in the middle of the night, and at full volume.

This isn’t the first time Iran has come under fire from cyber criminals, and it likely won’t be the last. But the attackers’ decision to play classic rock songs on infected computers is perhaps the most unorthodox way of alerting a nuclear facility that it has fallen victim to hackers.

Original Email:
Source: F Secure

I am writing you to inform you that our nuclear program has once again been compromised and attacked by a new worm with exploits which have shut down our automation network at Natanz and another facility Fordo near Qom.

According to the email our cyber experts sent to our teams, they believe a hacker tool Metasploit was used. The hackers had access to our VPN. The automation network and Siemens hardware were attacked and shut down. I only know very little about these cyber issues as I am scientist not a computer expert.

There was also some music playing randomly on several of the workstations during the middle of the night with the volume maxed out. I believe it was playing ‘Thunderstruck’ by AC/DC.

DARPA Director Now Inside Google

Director of DARPA departs Pentagon for Google, further reinforcing government ties

Source: End The Lie

Regina Dugan, the director of the Defense Advanced Research Projects Agency (DARPA), will be leaving the Pentagon’s mad scientist research agency for the corporate Big Brother known as Google.

Dugan has only been at DARPA for less than three years and was “offered and accepted [a] senior executive position” with Google, according to Eric Mazzacone, a spokesperson with DARPA.

Mazzacone added that Dugan felt she could not refuse such an offer with an “innovative company” like Google, which also has a close relationship with the American intelligence community. Continue reading