Skip to main content

Home/ Indie Nation/ Group items tagged crime

Rss Feed Group items tagged

John Lemke

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputatio... - 0 views

  • “The Art of Deception: Training for Online Covert Operations.”
  • Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. 
  • Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends. The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:
    • John Lemke
       
      Wow, how is not changing pictures and creating false victims not identity theft and conspiracy?  
  • ...4 more annotations...
  • it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption.
    • John Lemke
       
      Not only are you now guilty until proven innocent but, if you are guilty enough, we shall create a situation so that you are.
  • Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups. Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).
    • John Lemke
       
      So one of the guys who advocates this and approves of it, gets to be on the NSA review committee?  Isn't that like Ted Kennedy on the Ethics Review Committee or the Warren Commission?
  • Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.
John Lemke

Police Delete Aftermath Footage Of Suspect Shot 41 Times | Techdirt - 0 views

  • Wallace took cellphone pictures and video after the shooting stopped, but he said Mesquite police confiscated the phone and deleted the video and pictures. The phone was returned four days later, he said.
  • The law states that police need a court order to confiscate a camera unless it was used in a commission of a crime. The only exception is if there are exigent circumstances, such as a strong belief that the witness will destroy the photos, therefore destroying evidence. Under no circumstances do police have the right to delete footage.
John Lemke

Bad Police Info Led Spies To Monitor Dotcom, Govt. Suppressed Information | TorrentFreak - 0 views

  • On Monday, Prime Minister John Key announced that he had requested an inquiry by the Inspector-General of Intelligence and Security after it was revealed that the Government Communications Security Bureau (GSCB) illegally intercepted the communications of individuals in the Megaupload case.
  • GCSB is an intelligence agency of the New Zealand government responsible for spying on external entities. It is forbidden by law from conducting surveillance on its own citizens or permanent residents in the country. Now it has been revealed that incorrect information supplied by the police’s Organized and Financial Crime Agency (OFCANZ) led the GCSB to spy on Kim Dotcom and Bram van der Kolk.
  • During an earlier hearing, Detective Inspector Grant Wormald of OFCANZ said that apart from surveillance carried out by the police, no other surveillance had been carried out against Dotcom. But with the revelation that GCSB had indeed been monitoring the Megaupload founder at the behest of OFCANZ, questions are now being raised about this apparent inconsistency, not least since Wormald previously acknowledged that a secret government unit had been involved in a pre-raid planning meeting in January.
John Lemke

Bad Police Info Led Spies To Monitor Dotcom, Govt. Suppressed Information | TorrentFreak - 0 views

  • Court documents have revealed how information supplied by New Zealand’s Organised and Financial Crime Agency led to Kim Dotcom and his associates being illegally monitored by GCSB, the Kiwi spy agency comparable to the United States’ CIA. Today a High Court judge expressed concern at the situation, with Dotcom’ legal team calling for an independent inquiry into the fiasco. Meanwhile, pressure continues to mount on Prime Minister John Key as it’s revealed the government issued an information suppression order.
  • According to court documents, GCSB checked with OFCANZ that both Dotcom and der Kolk were indeed foreign nationals. OFCANZ said they were, but in fact neither should have been spied on by GCSB. The monitoring went ahead anyway. In the High Court today, Justice Helen Winkelmann asked lawyers how it could be possible that GCSB hadn’t known about Dotcom’s New Zealand residency.
  • During an earlier hearing, Detective Inspector Grant Wormald of OFCANZ said that apart from surveillance carried out by the police, no other surveillance had been carried out against Dotcom. But with the revelation that GCSB had indeed been monitoring the Megaupload founder at the behest of OFCANZ, questions are now being raised about this apparent inconsistency, not least since Wormald previously acknowledged that a secret government unit had been involved in a pre-raid planning meeting in January.
John Lemke

DNA from maggot guts used to identify corpse in criminal case | Ars Technica - 0 views

  • It had already been suggested by other researchers that the gastrointestinal contents of maggots could be used to identify the subjects they feed on. However, never before has the theory been trialed in a legal, criminal case. Pathologists at Autonomous University of Nuevo León in San Nicolás, Mexico, led by María de Lourdes Chávez-Briones and Marta Ortega-Martínez, carried out short tandem repeat typing tests (a common method of DNA profiling) on the matter extracted from three dissected maggots found on the victim's face and neck, and separately on the alleged father of the missing woman. Preliminary results showed that the body was female, and the final outcome was a 99.685 percent probability of positive paternity—the victim had been identified.
  •  
    "It had already been suggested by other researchers that the gastrointestinal contents of maggots could be used to identify the subjects they feed on. However, never before has the theory been trialed in a legal, criminal case. Pathologists at Autonomous University of Nuevo León in San Nicolás, Mexico, led by María de Lourdes Chávez-Briones and Marta Ortega-Martínez, carried out short tandem repeat typing tests (a common method of DNA profiling) on the matter extracted from three dissected maggots found on the victim's face and neck, and separately on the alleged father of the missing woman. Preliminary results showed that the body was female, and the final outcome was a 99.685 percent probability of positive paternity-the victim had been identified."
John Lemke

FBI surveillance malware in bomb threat case tests constitutional limits | Ars Technica - 0 views

  • The FBI has an elite hacker team that creates customized malware to identify or monitor high-value suspects who are adept at covering their tracks online, according to a published report.
  • as the capability to remotely activate video cameras and report users' geographic locations—is pushing the boundaries of constitutional limits on searches and seizures
  • Critics compare it to a physical search that indiscriminately seizes the entire contents of a home, rather than just those items linked to a suspected crime. Former US officials said the FBI uses the technique sparingly, in part to prevent it from being widely known.
  • ...1 more annotation...
  • "We have transitioned into a world where law enforcement is hacking into people’s computers, and we have never had public debate,” Christopher Soghoian, principal technologist for the American Civil Liberties Union, told The Washington Post, speaking of the case against Mo. "Judges are having to make up these powers as they go along."
John Lemke

A Social Networking Site For Criminals Lands Two Teens In Jail « The Blade by... - 0 views

  •  
    Most of us are familiar with Facebook, but has anyone heard of 'Crimebook'? The novel social networking site was set up by two British teens to entertain the criminal element of society. These teens were raking in the money to the tune of some $26M with some 8,000 crooks using the social site to exchange stolen credit card information. The teens also shared the bank accounts of some 65,000 customers who had their accounts hacked by the thieves.
1 - 8 of 8
Showing 20 items per page