FBI Targets Internet Archive With Secret ‘National Security Letter’, Loses

The Internet Archive, a project to create a digital library of the web for posterity, successfully fought a secret government Patriot Act order for records about one of its patrons and won the right to make the order public, civil liberties groups announced Wednesday morning.

On November 26, 2007, the FBI served a controversial National Security Letter (.pdf) on the Internet Archive‘s founder Brewster Kahle, asking for records about one of the library’s registered users, asking for the user’s name, address and activity on the site.

The Electronic Frontier Foundation, the Internet Archive’s lawyers, fought the NSL, challenging its constitutionality in a December 14 complaint (.pdf) to a federal court in San Francisco. The FBI agreed on April 21 to withdraw the letter and unseal the court case, making some of the documents available to the public.

The Patriot Act greatly expanded the reach of NSLs, which are subpoenas for documents such as billing records and telephone records that the FBI can issue in terrorism investigations without a judge’s approval. Nearly all NSLs come with gag orders forbidding the recipient from ever speaking of the subpoena, except to a lawyer.

Brewster Kahle called the gag order “horrendous,” saying he couldn’t talk about the case with his board members, wife or staff, but said that his stand was part of a time-honored tradition of librarians protecting the rights of their patrons.

“This is an unqualified success that will help other recipients understand that you can push back on these,” Kahle said in a conference call with reporters Wednesday morning.

Though FBI guidelines on using NSLs warned of overusing them, two Congressionally ordered audits revealed that the FBI had issued hundreds of illegal requests for student health records, telephone records and credit reports. The reports also found that the FBI had issued hundreds of thousands of NSLs since 2001, but failed to track their use. In a letter to Congress last week, the FBI admitted it can only estimate how many NSLs it has issued.

The Internet Archive’s case is only the third known court challenge to an NSL, all of which ended with the FBI rescinding the NSL, according to the ACLU’s Melissa Goodman.

That makes you wonder about the the hundreds of thousands of NSLs that haven’t been challenged,” Goodman said, suggesting that the FBI had collected sensitive information on innocent Americans.

Read moreFBI Targets Internet Archive With Secret ‘National Security Letter’, Loses

Gates says big changes in store for Internet in next decade

SEOUL, South Korea (AP) – Microsoft Chairman Bill Gates said there will be a vast shift in Internet technology over the next decade as he met Tuesday with South Korean President Lee Myung-bak.”We’re approaching the second decade of (the) digital age,” the software mogul and philanthropist told Lee at the start of their meeting at the presidential Blue House, according to a media pool report.

“The Internet has been operating now for 10 years,” Gates said. “The second 10 years will be very different.”

Read moreGates says big changes in store for Internet in next decade

Spy Grid Part Of Consumer Technology

Tech savy proponents might think it’s great, meanwhile skeptics and naysayers still deny its existence, but microphones and internal listening devices are being installed in hi-tech hardware, and have been for several years.

Motorola released a fact sheet concerning their next generation HD cable boxes and broadband devices and admitted that:

This innovative plug-and-play technology enables broadband operators to offer consumers a way to control their digital services by voice commands with no complicated set-up or the need for training. Consumers can “talk” to their TV through a remote which incorporates a microphone. By just spoken commands, they can navigate digital programming, the IPG and on-demand services using phrases like “scan sports” or “find movies with Julia Roberts”. From a consumer’s perspective, the solution only requires a small receiver which attaches to the cable set-top to receive signals from the enhanced remote. The technology, which recognizes over 100,000 phrases and deciphers multiple languages, has been field tested in an alpha deployment on the Motorola DCT2000 digital set-top platform.”

The next generation equipment is being fused by Motorola into their ‘AgileTv‘ program, which will allow customers to use voice commands to search and choose programs, listen to music, order movies, etc etc. The program is called ‘PromptU’ and promises to allow seamless voice recognition in order to remove tedious typing and scanning by customers to find what they want. The PromptU spoken search is described as:

“Phones can support more content than ever, and subscribers want it all: ringtones, games, wallpapers, songs and videos. There are hundreds of thousands of titles, and the selection grows daily. Yet subscribers don’t buy as much as they could, because looking for content with text searches, or endless scrolling and clicking, is frustrating. Too many searches are abandoned or not even attempted. Promptu Spoken Search™ changes everything. With Promptu finding content as easy as asking for it. For example, requesting “Tiger Woods,” “Coldplay,” “Spiderman,” or any other favorite from a mobile handset returns on-target search results instantly, from across all types of content. So subscribers find everything they want, and discover all kinds of related titles to buy in the process.”

Last year Microsoft also acquired its own listening technology in the Tellme Networks which will allow consumers to choose and interact with multimedia via voice recognition software over their own systems. Of course what they won’t tell you is how these voice recognition commands will be interpreted, which of course will be done by internal audio devices called microphones – implemented into the hardware via remotes, boxes, or even ones as small as mobiles and pdas.

Bill Gates has been championing this next generation, interactive technology, and in his Strategic Account Summit speech last year, he glowed over the introduction and acceptance of this new technology by customers. Apparently, the industry is ecstatic that the privacy concerns aren’t presenting any kind of hurdle for consumers who are only intent on getting things that are bigger, faster, and in higher resolution. As long as it blinks and lets them veg out, all the better.

Web 2.0 should actually be called World 2.0 and will incorporate technology into every aspect of our lives, even more so than it is now. The next generation of cable boxes, internet, IPTV, VOIP, iphones, PDAs, and mobiles are all being absorbed into the control grid; and the cameras, microphones and other spy technology is just being pitched to the public as a product feature, rather than the all-invasive big brother hardware that it is. Private companies don’t mind it because it allows more focused marketing strategies, ie more profits for the bottom line; and of course governments love it because it allows them to circumvent privacy rights by integrating with companies in order to use this technology grid to spy on its own people.

But to simplify it all, yes, microphones exist in our cable boxes and computers, and will continue to be used, whether we accept it or not. The corporations are listening, the governments are listening; are you?

05-02-2008
Ethan Allen

Source: Rogue Government

Pentagon Expands Propaganda Reach With Foreign “News” Websites

The Pentagon is expanding “Information Operations” on the Internet with purposefully set up foreign news websites that are designed to look like independent media sources but in reality are nothing more than direct military propaganda.

USA Today reports:

“The Pentagon is setting up a global network of foreign-language news websites, including an Arabic site for Iraqis, and hiring local journalists to write current events stories and other content that promote U.S. interests and counter insurgent messages.”

The websites at http://www.balkantimes.com, http://www.magharebia.com and http://mawtani.com are three of the said Pentagon run operations aimed at people in the Balkans, North Africa and Iraq.

The front pages of the sites appear to be populated with regionalized news stories, but the disclaimers buried within the sites and accessible only via small links at the bottom of the pages reveal that all three are run by the US Department of Defense.

See screenshots below for the disclaimers (click to link through):

The Mawtani.com disclaimer is in Arabic. It reads:

“(Mawtani.com is) sponsored by the U.S. Department of Defense to support the resolution No. 1723 (of the) Security Council of the United Nations. (Mawtani.com) highlights and emphasizes the move towards greater regional stability through bilateral and multilateral cooperation … and the steps taken by governments towards stability in Iraq.”

Though Deputy Defense Secretary Gordon England commented that the sites are “an essential part of (their) responsibility … to shape the security environment in their respective areas.”, other Pentagon spokesmen have claimed that the sites’ content is not intended as propaganda, but is “a counter to extremist propaganda … with truth.”

Michael Vickers, the assistant secretary of Defense in charge of special operations commented that the websites are designed to counter enemies on the internet who put out information that is not in keeping with the interests and goals of the U.S. military:

“It’s important to … engage these foreign audiences and inform,” Vickers said. “Our adversaries use the Internet to great advantage, so we have the responsibility of countering (their messages) with accurate, truthful information, and these websites are a good vehicle.”

Since when has the federal government and its war machine military been concerned with promoting the truth?

Read morePentagon Expands Propaganda Reach With Foreign “News” Websites

Unleashing the Bugs of War

The Defense Advanced Research Project Agency, that secretive band of Pentagon geeks that searches obsessively for the next big thing in the technology of warfare, is 50 years old. To celebrate, DARPA invited Vice President Dick Cheney, a former Defense Secretary well aware of the Agency’s capabilities, to help blow out the candles. “This agency brought forth the Saturn 5 rocket, surveillance satellites, the Internet, stealth technology, guided munitions, unmanned aerial vehicles, night vision and the body armor that’s in use today,” Cheney told 1,700 DARPA workers and friends who gathered at a Washington hotel to mark the occasion. “Thank heaven for DARPA.”

Created in the panicky wake of the Soviets’ launching of Sputnik, the world’s first satellite, DARPA’s mission, Cheney said, is “to make sure that America is never again caught off guard.” So, the Agency does the basic research that may be decades away from battlefield applications. It doesn’t develop new weapons, as much as it pioneers the technologies that will make tomorrow’s weapons better.

So what’s hot at DARPA right now? Bugs. The creepy, crawly flying kind. The Agency’s Microsystems Technology Office is hard at work on HI-MEMS (Hybrid Insect Micro-Electro-Mechanical System), raising real insects filled with electronic circuitry, which could be guided using GPS technology to specific targets via electrical impulses sent to their muscles. These half-bug, half-chip creations — DARPA calls them “insect cyborgs” — would be ideal for surveillance missions, the agency says in a brief description on its website.

Read moreUnleashing the Bugs of War

Your Internet provider is watching you

Fine print reveals that you have fewer rights than you might realize


The Comcast case is a rare example of the government getting into the ISP contract nitty-gritty. “There really should be an onus on the regulators to see this kind of thing is done correctly,” said Bob Williams, who deals with telecom and media issues at Consumers Union.

NEW YORK – What’s scary, funny and boring at the same time? It could be a bad horror movie. Or it could be the fine print on your Internet service provider’s contract.

Those documents you agree to — usually without reading — ostensibly allow your ISP to watch how you use the Internet, read your e-mail or keep you from visiting sites it deems inappropriate. Some reserve the right to block traffic and, for any reason, cut off a service that many users now find essential.

The Associated Press reviewed the “Acceptable Use Policies” and “Terms of Service” of the nation’s 10 largest ISPs — in all, 117 pages of contracts that leave few rights for subscribers.

“The network is asserting almost complete control of the users’ ability to use their network as a gateway to the Internet,” said Marvin Ammori, general counsel of Free Press, a Washington-based consumer advocacy group. “They become gatekeepers rather than gateways.”

Read moreYour Internet provider is watching you

We spied on 36,000 customers using the internet, admits BT

BT tested secret “spyware” on tens of thousands of its broadband customers without their knowledge, it admitted yesterday.

It carried out covert trials of a system which monitors every internet page a user visits.

Companies can exploit such data to target users with tailored online advertisements.

An investigation into the affair has been started by the Information Commissioner, the personal data watchdog.

Privacy campaigners reacted with horror, accusing BT of illegal interception on a huge scale. Yesterday, the company was forced to admit that it had monitored the web browsing habits of 36,000 customers.

The scandal came to light only after some customers stumbled across tell-tale signs of spying. At first, they were wrongly told a software virus was to blame.


BT carried out undercover trials of a system which records every website a customer visits (below)

Executives insisted they had not broken the law and said no “personally identifiable information” had been shared or divulged.

BT said it randomly chose 36,000 broadband users for a “small-scale technical trial” in 2006 and 2007.

The monitoring system, developed by U.S. software company Phorm, accesses information from a computer.

It then scans every website a customer visits, silently checking for keywords and building up a unique picture of their interests.

If a user searches online to buy a holiday or expensive TV, for example, or looks for internet dating services or advice on weight loss, the Phorm system will add all the information to their file.

One BT customer who spotted unexplained problems with his computer was told repeatedly by BT helpdesk staff that a virus was to blame.

Read moreWe spied on 36,000 customers using the internet, admits BT

NSA shifts to e-mail, Web, data-mining dragnet

The National Security Agency was once known for its skill in eavesdropping on the world’s telephone calls through radio dishes in out-of-the-way places like England’s Menwith Hill, Australia’s Pine Gap, and Washington state’s Yakima Training Center.

Today those massive installations, which listened in on phone conversations beamed over microwave links, are becoming something akin to relics of the Cold War. As more communications traffic travels through fiber links, and as e-mail and text messaging supplant phone calls, the spy agency that once intercepted telegrams is adapting yet again.

Read moreNSA shifts to e-mail, Web, data-mining dragnet