Skip to main content

Home/ Indie Nation/ Group items tagged online community

Rss Feed Group items tagged

John Lemke

Online Community Building and the Secret Sauce | Spin Sucks - 0 views

  • the real juice is in the content.
  • I read a blog post he wrote about community. He said (I’m paraphrasing) that you don’t have a community until people begin talking to one another without your participation. Until then, it’s just comments. And he’s right. You know you’ve hit community mecca when people come to your site to talk to one another, with your content as the conversation starter.
John Lemke

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputatio... - 0 views

  • “The Art of Deception: Training for Online Covert Operations.”
  • Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. 
  • Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends. The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:
    • John Lemke
       
      Wow, how is not changing pictures and creating false victims not identity theft and conspiracy?  
  • ...4 more annotations...
  • it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption.
    • John Lemke
       
      Not only are you now guilty until proven innocent but, if you are guilty enough, we shall create a situation so that you are.
  • Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups. Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).
    • John Lemke
       
      So one of the guys who advocates this and approves of it, gets to be on the NSA review committee?  Isn't that like Ted Kennedy on the Ethics Review Committee or the Warren Commission?
  • Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.
John Lemke

FBI pushes for surveillance backdoors in Web 2.0 tools - 0 views

  •  
    The FBI pushed Thursday for more built-in backdoors for online communication, but beat a hasty retreat from its earlier proposal to require providers of encrypted communications services to include a backdoor for law enforcement wiretaps. LUMPY HAS NOTES BELOW ties in with securirty and cyber attack.. use it as excuse
John Lemke

New Zealand Launched Mass Surveillance Project While Publicly Denying It - The Intercept - 0 views

  • Documents provided by NSA whistleblower Edward Snowden show that the government worked in secret to exploit a new internet surveillance law enacted in the wake of revelations of illegal domestic spying to initiate a new metadata collection program that appeared designed to collect information about the communications of New Zealanders.
  • Those actions are in direct conflict with the assurances given to the public by Prime Minister John Key (pictured above), who said the law was merely designed to fix “an ambiguous legal framework” by expressly allowing the agency to do what it had done for years, that it “isn’t and will never be wholesale spying on New Zealanders,” and the law “isn’t a revolution in the way New Zealand conducts its intelligence operations.”
  • Snowden explained that “at the NSA, I routinely came across the communications of New Zealanders in my work with a mass surveillance tool we share with GCSB, called ‘X KEYSCORE.”" He further detailed that “the GCSB provides mass surveillance data into XKEYSCORE. They also provide access to the communications of millions of New Zealanders to the NSA at facilities such as the GCSB facility in Waihopai, and the Prime Minister is personally aware of this fact.”
  • ...4 more annotations...
  • Top secret documents provided by the whistleblower demonstrate that the GCSB, with ongoing NSA cooperation, implemented Phase I of the mass surveillance program code-named “Speargun” at some point in 2012
  • Over the weekend, in anticipation of this report, Key admitted for the first time that the GCSB did plan a program of mass surveillance aimed at his own citizens, but claimed that he ultimately rejected the program before implementation. Yesterday, after The Intercept sought comment from the NSA, the Prime Minister told reporters in Auckland that this reporting was referring merely to “a proposed widespread cyber protection programme that never got off the ground.” He vowed to declassify documents confirming his decision.
  • That legislation arose after it was revealed in 2012 that the GCSB illegally surveilled the communications of Megaupload founder Kim Dotcom, a legal resident of New Zealand. New Zealand law at the time forbade the GCSB from using its surveillance apparatus against citizens or legal residents. That illegal GCSB surveillance of Dotcom was followed by a massive military-style police raid by New Zealand authorities on his home in connection with Dotcom’s criminal prosecution in the United States for copyright violations. A subsequent government investigation found that the GCSB not only illegally spied on Dotcom but also dozens of other citizens and legal residents. The deputy director of GCSB resigned. The government’s response to these revelations was to refuse to prosecute those who ordered the illegal spying and, instead, to propose a new law that would allow domestic electronic surveillance.
    • John Lemke
       
      The Dotcom raid was ruled illegal.  Yet the Dotcom spying was exactly the type of activity of this plan.
  • n high-level discussions between the Key government and the NSA, the new law was clearly viewed as the crucial means to empower the GCSB to engage in metadata surveillance. On more than one occasion, the NSA noted internally that Project Speargun, in the process of being implemented, could not and would not be completed until the new law was enacted.
John Lemke

NSA reportedly intercepting laptops purchased online to install spy malware | The Verge - 0 views

  • According to a new report from Der Spiegel based on internal NSA documents, the signals intelligence agency's elite hacking unit (TAO) is able to conduct sophisticated wiretaps in ways that make Hollywood fantasy look more like reality. The report indicates that the NSA, in collaboration with the CIA and FBI, routinely and secretly intercepts shipping deliveries for laptops or other computer accessories in order to implant bugs before they reach their destinations. According to Der Spiegel, the NSA's TAO group is able to divert shipping deliveries to its own "secret workshops" in a method called interdiction, where agents load malware onto the electronics or install malicious hardware that can give US intelligence agencies remote access. While the report does not indicate the scope of the program, or who the NSA is targeting with such wiretaps, it's a unique look at the agency's collaborative efforts with the broader intelligence community to gain hard access to communications equipment. One of the products the NSA appears to use to compromise target electronics is codenamed COTTONMOUTH, and has been available since 2009; it's a USB "hardware implant" that secretly provides the NSA with remote access to the compromised machine.
  • The Der Spiegel report, which gives a broad look at TAO operations, also highlights the NSA's cooperation with other intelligence agencies to conduct Hollywood-style raids. Unlike most of the NSA's operations which allow for remote access to targets, Der Spiegel notes that the TAO's programs often require physical access to targets. To gain physical access, the NSA reportedly works with the CIA and FBI on sensitive missions that sometimes include flying NSA agents on FBI jets to plant wiretaps. "This gets them to their destination at the right time and can help them to disappear again undetected after even as little as a half hour's work," the report notes.
  •  
    While the scope or the targets are reportedly not known, the article also does not mention anything about a search warrant. This is what happens when the government feels they are above the law.
John Lemke

The NSA Uses Powerful Toolbox in Effort to Spy on Global Networks - SPIEGEL ONLINE - 0 views

  • According to internal NSA documents viewed by SPIEGEL, these on-call digital plumbers are involved in many sensitive operations conducted by American intelligence agencies. TAO's area of operations ranges from counterterrorism to cyber attacks to traditional espionage. The documents reveal just how diversified the tools at TAO's disposal have become -- and also how it exploits the technical weaknesses of the IT industry, from Microsoft to Cisco and Huawei, to carry out its discreet and efficient attacks. The unit is "akin to the wunderkind of the US intelligence community," says Matthew Aid, a historian who specializes in the history of the NSA. "Getting the ungettable" is the NSA's own description of its duties. "It is not about the quantity produced but the quality of intelligence that is important," one former TAO chief wrote, describing her work in a document. The paper seen by SPIEGEL quotes the former unit head stating that TAO has contributed "some of the most significant intelligence our country has ever seen." The unit, it goes on, has "access to our very hardest targets."
  •  
    Page One of a good three page read on just how extensive the government's illegal spying operations actually are... the worst part is it is just how extensive the portions of it we know about are!
John Lemke

Snowden leak examines gaming as a terrorist propaganda and training tool | Ars Technica - 0 views

  • But those leaked documents also include an in-depth report on the potential for games to be used as recruitment, training, and propaganda tools by extremist organizations.
  • Even if, as the report says, "the line between the ‘virtual’ world and the ‘real’ world is blurring, and to some users may be non-existent," most of the game-related terrorist training and planning scenarios laid out here seem a lot less likely than plain old non-game-related options. In any case, the leak of this report and the scenarios it outlines show that the security apparatus is interested in online games as more than just a place to spy on potential enemy communications.
John Lemke

Scientists May Have Decoded One of the Secrets to Superconductors | Science | WIRED - 0 views

  • “In the same way that a laser is a hell of a lot more powerful than a light bulb, room-temperature superconductivity would completely change how you transport electricity and enable new ways of using electricity,” said Louis Taillefer, a professor of physics at the University of Sherbrooke in Quebec.
  • ripples of electrons inside the superconductors that are called charge density waves. The fine-grained structure of the waves, reported in two new papers by independent groups of researchers, suggests that they may be driven by the same force as superconductivity. Davis and his colleagues directly visualized the waves in a study posted online in April, corroborating indirect evidence reported in February by a team led by Riccardo Comin, a postdoctoral fellow at the University of Toronto.
  • Taken together, the various findings are at last starting to build a comprehensive picture of the physics behind high-temperature superconductivity. “This is the first time I feel like we’re making real progress,” said Andrea Damascelli, a professor of physics at the University of British Columbia who led two recent studies on charge density waves. “A lot of different observations which have been made over decades did not make sense with each other, and now they do.”
  • ...4 more annotations...
  • The community remained divided until 2012, when two groups using a technique called resonant X-ray scattering managed to detect charge density waves deep inside cuprates, cementing the importance of the waves. As the groups published their findings in Science and Nature Physics, two new collaborations formed, one led by Damascelli and the other by Ali Yazdani of Princeton University, with plans to characterize the waves even more thoroughly. Finishing in a dead heat, the rival groups’ independent studies appeared together in Science in January 2014. They confirmed that charge density waves are a ubiquitous phenomenon in cuprates and that they strenuously oppose superconductivity, prevailing as the temperature rises.
  • y applying Sachdev’s algorithm to a new round of data, Davis and his group mapped out the structure of the charge density waves, showing that the d-wave distribution of electrons was, indeed, their source.
  • The waves’ structure is particularly suggestive, researchers say, because superconducting pairs of electrons also have a d-wave configuration. It’s as if both arrangements of electrons were cast from the same mold. “Until a few months ago my thought was, OK, you have charge density waves, who cares? What’s the relevance to the high-temperature superconductivity?” Damascelli said. “This tells me these phenomena feed off the same interaction.”
  • In short, antiferromagnetism could generate the d-wave patterns of both superconductivity and its rival, charge density waves.
1 - 8 of 8
Showing 20 items per page