[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]  [Register] 

Status: Not Logged In; Sign In

45 Funny Cybertruck Memes So Good, Even Elon Might Crack A Smile

Possible Trump Rally Attack - Serious Injuries Reported

BULLETIN: ISRAEL IS ENTERING **** UKRAINE **** WAR ! Missile Defenses in Kiev !

ATF TO USE 2ND TRUMP ATTACK TO JUSTIFY NEW GUN CONTROL...

An EMP Attack on the U.S. Power Grids and Critical National Infrastructure

New York Residents Beg Trump to Come Back, Solve Out-of-Control Illegal Immigration

Chicago Teachers Confess They Were told to Give Illegals Passing Grades

Am I Racist? Reviewed by a BLACK MAN

Ukraine and Israel Following the Same Playbook, But Uncle Sam Doesn't Want to Play

"The Diddy indictment is PROTECTING the highest people in power" Ian Carroll

The White House just held its first cabinet meeting in almost a year. Guess who was running it.

The Democrats' War On America, Part One: What "Saving Our Democracy" Really Means

New York's MTA Proposes $65.4 Billion In Upgrades With Cash It Doesn't Have

More than 100 killed or missing as Sinaloa Cartel war rages in Mexico

New York state reports 1st human case of EEE in nearly a decade

Oktoberfest tightens security after a deadly knife attack in western Germany

Wild Walrus Just Wanted to Take A Summer Vacation Across Europe

[Video] 'Days of democracy are GONE' seethes Neil Oliver as 'JAIL' awaits Brits DARING to speak up

Police robot dodges a bullet, teargasses a man, and pins him to the ground during a standoff in Texas

Julian Assange EXPOSED

Howling mad! Fury as school allows pupil suffering from 'species dysphoria' to identify as a WOLF

"I Thank God": Heroic Woman Saves Arkansas Trooper From Attack By Drunk Illegal Alien

Taxpayers Left In The Dust On Policy For Trans Inmates In Minnesota

Progressive Policy Backfire Turns Liberals Into Gun Owners

PURE EVIL: Israel booby-trapped CHILDRENS TOYS with explosives to kill Lebanese children

These Are The World's Most Reliable Car Brands

Swing State Renters Earn 17% Less Than Needed To Afford A Typical Apartment

Fort Wayne man faces charges for keeping over 10 lbs of fentanyl in Airbnb

🚨 Secret Service Announces EMERGENCY LIVE Trump Assassination Press Conference | LIVE Right Now [Livestream in progress]

More Political Perverts, Kamala's Cringe-fest On Oprah, And A Great Moment For Trump


Science/Tech
See other Science/Tech Articles

Title: The Worst Snowden Revelation of Them All
Source: [None]
URL Source: http://original.antiwar.com/justin/ ... nowden-revelation-of-them-all/
Published: Feb 28, 2014
Author: Justin Raimondo
Post Date: 2014-02-28 06:41:12 by Ada
Keywords: None
Views: 72

So far ...

One common reaction to Edward Snowden’s exposure of the National Security Agency’s pervasive surveillance of Americans and people around the world has been: Well, at least they aren’t doing what US government agents did in the 1960s and 1970s – targeting dissident political activists, spying on and disrupting their constitutionally-protected activities, and seeking to discredit them with programs like Cointelpro.

Except they are, as it turns out.

The latest revelations and newly-released documents, detailed by Glenn Greenwald in a shocking piece for his new outlet, The Intercept, show that’s exactly what they’re doing. Whereas J. Edgar Hoover’s FBI used old-fashioned methods – primitive bugging devices, poison pen letters, and physical infiltration of "suspect" groups – today’s Thought Police use the Internet to, as Greenwald puts it, "control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the Internet itself."

In a presentation by the British spy agency GCHQ to the NSA, and the Canadian, Australian, and New Zealand intelligence agencies, the top-secret JTRIG unit instructed their allies in the methodology of targeting and destroying political dissidents, and countering their influence on the Internet. Their approach is oh-so-"scientific," citing social science theories about human motivation, giving the whole document the aura of an academic study – albeit one written by someone with a sensibility that veers from the playful to the downright sinister.

The goal of this covert action program is to create what GCHQ describes as "cyber-magicians," who can work their "magic" on the Internet and their designated targets – and indeed the presentation is illustrated with a photo of John Mulholland, the renown "magician" who was hired by the CIA in the 1950s to write a manual on the uses of "misdirection, concealment, and stagecraft," as Noah Shachtman put in it Wired. Also pictured are Jasper Maskelyne, a British stage magician of the 1930s recruited by British intelligence, and Houdini, who is noted for his "1865 mission on behalf of Napoleon III to help quell the Marabout-led uprising in Algeria."

Interesting that GCHQ and their American and other partners would identify with Napoleon III and his mostly unsuccessful attempts to plant the French flag far and wide. In the Algerian case, however, he was relatively successful: the Arab rebels, it seems, had been inspired to rise by religious figures, charismatic imams supposedly capable of performing magic. The French decided to out-do the imams with some magic tricks of their own, and so they brought in Houdini, who performed the old bullet-between-the-teeth stunt. This supposedly so impressed the rebels that they became too afraid to go on with their rebellion – although the horrific slaughter inflicted on Algerian villages by occupying troops may have had something to do with it as well.

This unrestrained violence, while motivated by the usual racism, was also a manifestation of something new. Edward Burke III, professor of history emeritus at the University of California, Santa Cruz, traces it to the anti-clericalist legacy of the French Revolution. The wholesale destruction of the rebels’ religious and ideological infrastructure – which Burke refers to as "the French kulturkampf in Algeria" – was "a Jacobin step toward the diffusion of reason and science."

Utilizing the techniques of the social and psychological "sciences," our "cyber- magicians," in waging their cyber-kulturkampf, see their targets – us – the same way 19th century French colonialists viewed their Algerian helots. If you look through the slides published by Greenwald the theme is crystal-clear: human beings are depicted as emotion-driven easily-manipulated idiots who have to be fooled into behaving properly.

How to fool them? In 19th century Algeria it was Houdini awing the natives with magic tricks: in the online world of the 21st century, it’s "cyber-magicians" planting "false flags" – posts attributed to the target that were not written by him or her. Or posts ostensibly by people who are members or sympathizers of a targeted group. This is what the FBI did to the antiwar movement of the 1960s: entire "cells" of radical groups were set up and controlled by the feds, who then used them to divide, disrupt, and discredit rising antiwar sentiment.

Another GCHQ ploy: what Greenwald calls "fake victim posts," in which alleged victims of the target describe their victimization at the hands of the targeted individual or group. This technique seems to have been used to great effect against Julian Assange and WikiLeaks, who have racked up a record number of "tell-all" books and articles by former associates relating Assange’s alleged sins.

Aside from the above, a number of other techniques are listed, most of which are fairly descriptive:

Ruse Set piece False rescue Disruption Sting Anything is possible – and everything is permitted – with the kind of "cyber- magic" performed by our government sneaks: if you want to discredit a target, you can "set up a honey-trap" – a sexual assignation – or if you’re in a juvenile mode you can "change their photo on social networking sites." And there’s always the old tactic of sending "emails/texts to their colleagues, neighbors, friends, etc." Again, there’s nothing new under the sun as far as the immorality and cheap vulgarity of our rulers is concerned: they did the same thing in the 1960s to Martin Luther King and a host of other civil rights and assorted "radical" figures, the only difference being they used the Post Office rather than email and texting. The technology may change, but the venality is a constant.

Of particular interest to GCHQ and its eager students at the NSA are techniques designed to "pull a group apart." Listed as likely points of rupture are issues of "personal power," "preexisting cleavages," "competition," and "ideological differences." Again, these are old techniques empowered by new technology and gussied up in the pseudo-"scientific" language of sociology and behavioral psychology.

What’s new, however, is the nature of some of the targets: it’s not only high profile political dissidents like Assange (and Greenwald) alongside criminal suspects who might find themselves in the sights of GCHQ/NSA, but also private companies, as explicitly stated in the new documents. Suggested covert actions against these corporate targets include leaking confidential information to rival companies and the media "via blogs, etc.", and posting "negative information in appropriate forums," resulting in stopping the target’s business deals and ruining business relationships.

Given the amount of purely industrial espionage detailed in previously released documents, the scope – and cost – of this destructive rampage across the corporate landscape by our vaunted "cyber-magicians" is absolutely mind- boggling.

The new documents describe a "cyber-offensive session" by two GCHQ officers on "Pushing the Boundaries and Action Against Hacktivism" which does indeed push the boundaries very far beyond the ostensible purpose of "fighting terrorism." The fine line between "hacktivist" and any sort of online political activism is not one likely to be precisely defined by these people: Julian Assange’s and Edward Snowden’s defenders, as well as those two individuals themselves, are fair game in this grand scale "cyber-offensive." And what about the corporate entities enabling these revelations to come out in the first place?

Pierre Omidyar, the financial force behind First Look Media, which puts out The Intercept, is a principal of eBay, and has a financial interest in other companies. Will those companies now find themselves under attack? Will confidential information sucked up by the NSA "leak" onto various blogs and into the media?

Speaking of the media, this whole covert action program assumes easy access on the part of government agents to sympathetic contacts in the "mainstream" news and opinion outlets: it posits a ready consumer base of "journalists" hungry for a constant diet of smears, "false flags," and compromising material. And we can all guess as to who some of them might be….

Cass Sunstein, President Obama’s close advisor and head of a commission to "reform" the NSA, has long advocated infiltrating online communities devoted to supposedly dangerous "conspiracy theories," and otherwise steering online discourse in a more pro-government direction – and it looks like his ideas are being put into practice. The new documents promise a "full rollout complete by early 2013," with "500+ GCHQ analysts" on the job – and how many from the NSA and US law enforcement agencies?

So let’s be clear about this: individuals, groups, and private companies accused of no crime are having their reputations destroyed, their private lives exposed and their financial affairs disrupted by a government-orchestrated smear campaign extending all across the globe.

If that doesn’t unmask our rulers as the ruthless authoritarians we libertarians always said they were, then I don’t know what will. Behind the mask of "democracy" and "progressivism" lurks the same old ugly face of a J. Edgar Hoover, only updated to look like the dome-headed professorial Cass Sunstein.

Post Comment   Private Reply   Ignore Thread  



[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]  [Register]