Category Archives: Privacy

Deny/Disrupt/Degrade/Deceive

Last week at United Liberty, Alice Salles posted a very disturbing article about the NSA and GCHQ intercepting and storing webcam images from supposedly private web chats. Between 3 to 11 percent of these images contain sexually explicit content. What would the NSA and GCHQ possibly want with these images apart from a few individual agents getting their jollies?

According to secret documents leaked by Edward Snowden, it seems that these images are to be used to embarrass any would-be critics of the NSA, GCHQ, or anything else the federal government doesn’t want the citizens to get too uppity about. Glenn Greenwald explains:

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.

Greenwald is in no way being hyperbolic here. Some of this might sound like some kind of Alex Jones nonsense, but these conclusions are based on actual leaked documents he shared in the article itself (I highly recommend everyone read these). Here are two leaked Power Point slides that I found to be very revealing and disturbing:

effects

Pay special attention to the last bullet point on the second slide: “The 4 D’s: Deny / Disrupt / Degrade / Deceive.”

These are the tactics that are to be used against American critics of the federal government! The federal government is using the internet via social media to destroy lives and reputations (for national security?). As outrageous and Orwellian as this all is, as I learned reading Jesse Walker’s latest book, these tactics are not new. J. Edgar Hoover had a program called COINTELPRO, and there was a similar CIA program during the Nixon administration dubbed “Operation CHAOS.” The only difference now is the technology to carry out these operations is vastly improved.

In the light of these blatant, strategic lies, how can we ever trust anything we are told by the federal government? It seems the “Innocence of Muslims” video deception Obama’s Ministry of Truth tried to sell us during the 2012 Benghazi attacks was only par for the course!

This revelation made possible by the hero and patriot Edward Snowden* should serve as a warning to us all any time the government accuses anyone of being a terrorist or a traitor to take such accusations with a great deal of skepticism.

*And yes, he is a hero and a patriot make no mistake about that.

BOOK REVIEW: The United States of Paranoia

Conspiracy theories are only believed by people on the fringe of American politics? Not so says Reason’s Jesse Walker in his latest book: The United States of Paranoia: A Conspiracy Theory. Walker argues quite the opposite in his opening chapter: “The Paranoid Style is American Politics”:

By the time this book is over, I should hope it will be clear that when I say virtually everyone is capable of paranoid thinking, I really do mean virtually everyone, including you, me, and the founding fathers. As the sixties scare about the radical Right demonstrates, it is even possible to be paranoid about paranoids. (p. 24)

For those who are hoping that this is another book in which the author’s goal is to prove or disprove any particular conspiracy theory, Walker makes is clear that this is not what this book is about (for the most part). He also makes a point to acknowledge that some conspiracies have been proven true (ex: Watergate among these, see Chapter 7 for more examples), “At the very moment you are reading this, someone somewhere is probably trying to bribe a politician. The world is filled with plots both petty and grand…” (p.21). Instead telling the reader what to believe, Walker tells a history about what people have believed on this continent from colonial times to now and how these beliefs have shaped the political debate and very the culture itself.

Among the earliest examples of American conspiracies shaping politics and culture resulted in the infamous Salem Witch Trials of the late 1600’s. According to the belief at the time, witches conspired together and with the Devil to bring evil to the land. Disease and other misfortunes the colonists suffered were believed to be the direct result of these alleged Satanic rituals. Men and women were accused, tried, and executed with little or no evidence. The legacy of Salem continues today. When some public official is accused with wrongdoing, credibly or not, the accused and his or her defenders inevitably will call the proceedings a “witch hunt.”

Soon after the colonies won their independence from Great Britain and became the United States of America, the citizenry turned its distrust of power inward. Who could be trusted to lead this new nation and how could the people keep another tyrant or a cabal of tyrants from taking control? As it turns out, many of these fears were quite legitimate. Not everyone was satisfied with the Articles of Confederation. There were actual conspiracies afoot to overthrow existing system under the AOC in which the several states had most of the power while the national government had little. An attempted military coup called the “Newburgh Conspiracy” was stopped when George Washington convinced his fellow soldiers that overthrowing the government by force was not the right way to go about changing the political system.

» Read more

Bye Bye 4th and 5th amendment: Obamacare info may be used for Law Enforcement and Audit activities

Well… we knew that the 4th and 5th amendment meant nothing to them… never mind HIPAA… but really?

 

Obamacare Marketplace: Personal Data Can Be Used For ‘Law Enforcement and Audit Activities’

Maryland’s Health Connection, the state’s Obamacare marketplace, has been plagued by delays in the first days of open enrollment. If users are able to endure long page-loading delays, they are presented with the website’s privacy policy, a ubiquitous fine-print feature on websites that often go unread. Nevertheless, users are asked to check off a box that they agree to the terms.

The policy contains many standard statements about information automatically collected regarding Internet browsers and IP addresses, temporary “cookies” used by the site, and website accessibility. However, at least two conditions may give some users pause before proceeding.

The first is regarding personal information submitted with an application for those users who follow through on the sign up process all the way to the end. The policy states that all information to help in applying for coverage and even for making a payment will be kept strictly confidential and only be used to carry out the function of the marketplace. There is, however, an exception: “[W]e may share information provided in your application with the appropriate authorities for law enforcement and audit activities.” Here is the entire paragraph from the policy the includes the exception [emphasis added]:

Should you decide to apply for health coverage through Maryland Health Connection, the information you supply in your application will be used to determine whether you are eligible for health and dental coverage offered through Maryland Health Connection and for insurance affordability programs. It also may be used to assist you in making a payment for the insurance plan you select, and for related automated reminders or other activities permitted by law. We will preserve the privacy of personal records and protect confidential or privileged information in full accordance with federal and State law. We will not sell your information to others. Any information that you provide to us in your application will be used only to carry out the functions of Maryland Health Connection. The only exception to this policy is that we may share information provided in your application with the appropriate authorities for law enforcement and audit activities.

The site does not specify if “appropriate authorities” refers only to state authorities or if it could include the federal government, as well. Neither is there any detail on what type of law enforcement and/or audit activities would justify the release of the personal information, or who exactly is authorized to make such a determination. An email to the Maryland Health Connection’s media contact seeking clarification has not yet been answered

The second privacy term that may prompt caution by users relates to email communications. The policy reads:

If you send us an e-mail, we use the information you send us to respond to your inquiry. E-mail correspondence may become a public record. As a public record, your correspondence could be disclosed to other parties upon their request in accordance with Maryland’s Public Information Act.

Since emails to the marketplace could conceivably involve private matters regarding finances, health history, and other sensitive issues, the fact that such information could be made part of the “public record” could prevent users from being as free with their information than they might otherwise be. However, as noted, any requests for such emails would still be subject to Maryland’s Public Information Act which contains certain exceptions to the disclosure rules.

Read the fine print eh?

 These are such clear 4th and 5th amendment violations I can’t believe anyone didn’t immediately say “uh guys… we cant actually do this”…

… but as I said, we know that our elected and selected “lords and masters” don’t give a damn about the 4th or 5th amendments (or really any of the others ones any time they become inconvenient).

So while I’m sure they were told they couldn’t do it, I’m sure they said “ahh well the disclaimer and release is enough, we’ll be fine”.

 Yeah no.

 And as far as HIPAA goes… In reality these terms of use are not anywhere near an adequate HIPAA disclosure release, so using any of this data in any manner other than for healthcare purposes would be a federal offense.

I am a cynically romantic optimistic pessimist. I am neither liberal, nor conservative. I am a (somewhat disgruntled) muscular minarchist… something like a constructive anarchist.

Basically what that means, is that I believe, all things being equal, responsible adults should be able to do whatever the hell they want to do, so long as nobody’s getting hurt, who isn’t paying extra

Quote of the Day: Failed Attempt at Intimidation Edition

“If the UK and US governments believe that tactics like this are going to deter or intimidate us in any way from continuing to report aggressively on what these [Snowden] documents reveal, they are beyond deluded. If anything, it will have only the opposite effect: to embolden us even further. Beyond that, every time the US and UK governments show their true character to the world – when they prevent the Bolivian President’s plane from flying safely home, when they threaten journalists with prosecution, when they engage in behavior like what they did today – all they do is helpfully underscore why it’s so dangerous to allow them to exercise vast, unchecked spying power in the dark.”

Glenn Greenwald writing in response to his partner David Miranda’s 9 hour detention by UK authorities at Heathrow Airport.

1 2 3 4 5 46