A priceless juxtaposition (if it weren't so common)

Moderators: Elvis, DrVolin, Jeff

A priceless juxtaposition (if it weren't so common)

Postby JackRiddler » Mon Jun 13, 2011 7:03 pm

.

I'll cross post this in some longer thread (hard to decide: "Global Cyberwar" or "Top Secret America"?) but the juxtaposition of two of today's top news items is delicious enough for its own thread: What if US dissidents asked the State Department to help them avoid FBI surveillance?

It is inevitable that the FBI will one day arrest Americans who are using the same communications technology the State Department touts as a way to evade government surveillance in Iran or China. It is inevitable that US politicians will one day demand that this technology be registered and controlled more effectively.

It is also inevitable that this technology will come to be used by drug cartels, smugglers and money launderers in the US.

The United States Government:
Now offering one-stop shopping for all
your freedom-fighting, repression and gangsta needs!

In truth, neither of the following are news stories. They are both information management, announcing or repackaging that which has already long been the case. All one needs to say here about the FBI is that the term of J. Edgar Hoover still represents more than half of its history, and that history has not seen a significant break in its primary function as the political police. Abuses of Constitutional rights like the ones described in today's news have always been the rule, and FBI officials are always hankering to give it legal cover. One might add that the next time the FBI is judged to have failed to prevent something bad, it will be claimed anyway that the failure was due to unreasonable legal or misguided humanist restrictions on their work; the media will discover the "Holder Wall."

As for the CIA/State Department, they were providing technology to and recruiting -- also monitoring, controlling, exploiting, and burning -- networks of dissidents in Soviet bloc and other designated enemy countries already in the late 1940s and 1950s. When they weren't just flat-out inventing or constructing them via propaganda. All that has never stopped. As for what the article describes in the sections on Afghanistan, that is, simply, a military program to bring all communications there under the control of the US command.


http://www.nytimes.com/2011/06/13/us/13 ... nted=print

June 12, 2011
F.B.I. Agents Get Leeway to Push Privacy Bounds

By CHARLIE SAVAGE


WASHINGTON — The Federal Bureau of Investigation is giving significant new powers to its roughly 14,000 agents, allowing them more leeway to search databases, go through household trash or use surveillance teams to scrutinize the lives of people who have attracted their attention.

The F.B.I. soon plans to issue a new edition of its manual, called the Domestic Investigations and Operations Guide, according to an official who has worked on the draft document and several others who have been briefed on its contents. The new rules add to several measures taken over the past decade to give agents more latitude as they search for signs of criminal or terrorist activity.

The F.B.I. recently briefed several privacy advocates about the coming changes. Among them, Michael German, a former F.B.I. agent who is now a lawyer for the American Civil Liberties Union, argued that it was unwise to further ease restrictions on agents’ power to use potentially intrusive techniques, especially if they lacked a firm reason to suspect someone of wrongdoing.

“Claiming additional authorities to investigate people only further raises the potential for abuse,” Mr. German said, pointing to complaints about the bureau’s surveillance of domestic political advocacy groups and mosques and to an inspector general’s findings in 2007 that the F.B.I. had frequently misused “national security letters,” which allow agents to obtain information like phone records without a court order.

Valerie E. Caproni, the F.B.I. general counsel, said the bureau had fixed the problems with the national security letters and had taken steps to make sure they would not recur. She also said the bureau, which does not need permission to alter its manual so long as the rules fit within broad guidelines issued by the attorney general, had carefully weighed the risks and the benefits of each change.

“Every one of these has been carefully looked at and considered against the backdrop of why do the employees need to be able to do it, what are the possible risks and what are the controls,” she said, portraying the modifications to the rules as “more like fine-tuning than major changes.”

Some of the most notable changes apply to the lowest category of investigations, called an “assessment.” The category, created in December 2008, allows agents to look into people and organizations “proactively” and without firm evidence for suspecting criminal or terrorist activity.

Under current rules, agents must open such an inquiry before they can search for information about a person in a commercial or law enforcement database. Under the new rules, agents will be allowed to search such databases without making a record about their decision.

Mr. German said the change would make it harder to detect and deter inappropriate use of databases for personal purposes. But Ms. Caproni said it was too cumbersome to require agents to open formal inquiries before running quick checks. She also said agents could not put information uncovered from such searches into F.B.I. files unless they later opened an assessment.

The new rules will also relax a restriction on administering lie-detector tests and searching people’s trash. Under current rules, agents cannot use such techniques until they open a “preliminary investigation,” which — unlike an assessment — requires a factual basis for suspecting someone of wrongdoing. But soon agents will be allowed to use those techniques for one kind of assessment, too: when they are evaluating a target as a potential informant.

Agents have asked for that power in part because they want the ability to use information found in a subject’s trash to put pressure on that person to assist the government in the investigation of others. But Ms. Caproni said information gathered that way could also be useful for other reasons, like determining whether the subject might pose a threat to agents.

The new manual will also remove a limitation on the use of surveillance squads, which are trained to surreptitiously follow targets. Under current rules, the squads can be used only once during an assessment, but the new rules will allow agents to use them repeatedly. Ms. Caproni said restrictions on the duration of physical surveillance would still apply, and argued that because of limited resources, supervisors would use the squads only rarely during such a low-level investigation.

The revisions also clarify what constitutes “undisclosed participation” in an organization by an F.B.I. agent or informant, which is subject to special rules — most of which have not been made public. The new manual says an agent or an informant may surreptitiously attend up to five meetings of a group before those rules would apply — unless the goal is to join the group, in which case the rules apply immediately.


And now for a nice, American touch: having dispensed with any pretense to rights, pretend to respect religious sensibilities. Those are sacred!

At least one change would tighten, rather than relax, the rules. Currently, a special agent in charge of a field office can delegate the authority to approve sending an informant to a religious service. The new manual will require such officials to handle those decisions personally.

In addition, the manual clarifies a description of what qualifies as a “sensitive investigative matter” — investigations, at any level, that require greater oversight from supervisors because they involve public officials, members of the news media or academic scholars.

The new rules make clear, for example, that if the person with such a role is a victim or a witness rather than a target of an investigation, extra supervision is not necessary. Also excluded from extra supervision will be investigations of low- and midlevel officials for activities unrelated to their position — like drug cases as opposed to corruption, for example.

The manual clarifies the definition of who qualifies for extra protection as a legitimate member of the news media in the Internet era: prominent bloggers would count, but not people who have low-profile blogs. And it will limit academic protections only to scholars who work for institutions based in the United States.

Since the release of the 2008 manual, the assessment category has drawn scrutiny because it sets a low bar to examine a person or a group. The F.B.I. has opened thousands of such low-level investigations each month, and a vast majority has not generated information that justified opening more intensive investigations.

Ms. Caproni said the new manual would adjust the definition of assessments to make clear that they must be based on leads. But she rejected arguments that the F.B.I. should focus only on investigations that begin with a firm reason for suspecting wrongdoing.





Image
Volunteers have built a wireless Internet around Jalalabad, Afghanistan, from off-the-shelf electronics and ordinary materials.

http://www.nytimes.com/2011/06/12/world ... ent&st=cse

June 12, 2011
U.S. Underwrites Internet Detour Around Censors

By JAMES GLANZ and JOHN MARKOFF


The Obama administration is leading a global effort to deploy “shadow” Internet and mobile phone systems that dissidents can use to undermine repressive governments that seek to silence them by censoring or shutting down telecommunications networks.

The effort includes secretive projects to create independent cellphone networks inside foreign countries, as well as one operation out of a spy novel in a fifth-floor shop on L Street in Washington, where a group of young entrepreneurs who look as if they could be in a garage band are fitting deceptively innocent-looking hardware into a prototype “Internet in a suitcase.”

Financed with a $2 million State Department grant, the suitcase could be secreted across a border and quickly set up to allow wireless communication over a wide area with a link to the global Internet.

The American effort, revealed in dozens of interviews, planning documents and classified diplomatic cables obtained by The New York Times, ranges in scale, cost and sophistication.

Some projects involve technology that the United States is developing; others pull together tools that have already been created by hackers in a so-called liberation-technology movement sweeping the globe.

The State Department, for example, is financing the creation of stealth wireless networks that would enable activists to communicate outside the reach of governments in countries like Iran, Syria and Libya, according to participants in the projects.

In one of the most ambitious efforts, United States officials say, the State Department and Pentagon have spent at least $50 million to create an independent cellphone network in Afghanistan using towers on protected military bases inside the country. It is intended to offset the Taliban’s ability to shut down the official Afghan services, seemingly at will.

The effort has picked up momentum since the government of President Hosni Mubarak shut down the Egyptian Internet in the last days of his rule. In recent days, the Syrian government also temporarily disabled much of that country’s Internet, which had helped protesters mobilize.

The Obama administration’s initiative is in one sense a new front in a longstanding diplomatic push to defend free speech and nurture democracy. For decades, the United States has sent radio broadcasts into autocratic countries through Voice of America and other means. More recently, Washington has supported the development of software that preserves the anonymity of users in places like China, and training for citizens who want to pass information along the government-owned Internet without getting caught.

But the latest initiative depends on creating entirely separate pathways for communication. It has brought together an improbable alliance of diplomats and military engineers, young programmers and dissidents from at least a dozen countries, many of whom variously describe the new approach as more audacious and clever and, yes, cooler.

Sometimes the State Department is simply taking advantage of enterprising dissidents who have found ways to get around government censorship. American diplomats are meeting with operatives who have been burying Chinese cellphones in the hills near the border with North Korea, where they can be dug up and used to make furtive calls, according to interviews and the diplomatic cables.

The new initiatives have found a champion in Secretary of State Hillary Rodham Clinton, whose department is spearheading the American effort. “We see more and more people around the globe using the Internet, mobile phones and other technologies to make their voices heard as they protest against injustice and seek to realize their aspirations,” Mrs. Clinton said in an e-mail response to a query on the topic. “There is a historic opportunity to effect positive change, change America supports,” she said. “So we’re focused on helping them do that, on helping them talk to each other, to their communities, to their governments and to the world.”

Developers caution that independent networks come with downsides: repressive governments could use surveillance to pinpoint and arrest activists who use the technology or simply catch them bringing hardware across the border. But others believe that the risks are outweighed by the potential impact. “We’re going to build a separate infrastructure where the technology is nearly impossible to shut down, to control, to surveil,” said Sascha Meinrath, who is leading the “Internet in a suitcase” project as director of the Open Technology Initiative at the New America Foundation, a nonpartisan research group.

“The implication is that this disempowers central authorities from infringing on people’s fundamental human right to communicate,” Mr. Meinrath added.

The Invisible Web

In an anonymous office building on L Street in Washington, four unlikely State Department contractors sat around a table. Josh King, sporting multiple ear piercings and a studded leather wristband, taught himself programming while working as a barista. Thomas Gideon was an accomplished hacker. Dan Meredith, a bicycle polo enthusiast, helped companies protect their digital secrets.

Then there was Mr. Meinrath, wearing a tie as the dean of the group at age 37. He has a master’s degree in psychology and helped set up wireless networks in underserved communities in Detroit and Philadelphia.

The group’s suitcase project will rely on a version of “mesh network” technology, which can transform devices like cellphones or personal computers to create an invisible wireless web without a centralized hub. In other words, a voice, picture or e-mail message could hop directly between the modified wireless devices — each one acting as a mini cell “tower” and phone — and bypass the official network.

Mr. Meinrath said that the suitcase would include small wireless antennas, which could increase the area of coverage; a laptop to administer the system; thumb drives and CDs to spread the software to more devices and encrypt the communications; and other components like Ethernet cables.

The project will also rely on the innovations of independent Internet and telecommunications developers.

“The cool thing in this political context is that you cannot easily control it,” said Aaron Kaplan, an Austrian cybersecurity expert whose work will be used in the suitcase project. Mr. Kaplan has set up a functioning mesh network in Vienna and says related systems have operated in Venezuela, Indonesia and elsewhere.

Mr. Meinrath said his team was focused on fitting the system into the bland-looking suitcase and making it simple to implement — by, say, using “pictograms” in the how-to manual.

In addition to the Obama administration’s initiatives, there are almost a dozen independent ventures that also aim to make it possible for unskilled users to employ existing devices like laptops or smartphones to build a wireless network. One mesh network was created around Jalalabad, Afghanistan, as early as five years ago, using technology developed at the Massachusetts Institute of Technology.

Creating simple lines of communication outside official ones is crucial, said Collin Anderson, a 26-year-old liberation-technology researcher from North Dakota who specializes in Iran, where the government all but shut down the Internet during protests in 2009. The slowdown made most “circumvention” technologies — the software legerdemain that helps dissidents sneak data along the state-controlled networks — nearly useless, he said.

“No matter how much circumvention the protesters use, if the government slows the network down to a crawl, you can’t upload YouTube videos or Facebook postings,” Mr. Anderson said. “They need alternative ways of sharing information or alternative ways of getting it out of the country.”

That need is so urgent, citizens are finding their own ways to set up rudimentary networks. Mehdi Yahyanejad, an Iranian expatriate and technology developer who co-founded a popular Persian-language Web site, estimates that nearly half the people who visit the site from inside Iran share files using Bluetooth — which is best known in the West for running wireless headsets and the like. In more closed societies, however, Bluetooth is used to discreetly beam information — a video, an electronic business card — directly from one cellphone to another.

Mr. Yahyanejad said he and his research colleagues were also slated to receive State Department financing for a project that would modify Bluetooth so that a file containing, say, a video of a protester being beaten, could automatically jump from phone to phone within a “trusted network” of citizens. The system would be more limited than the suitcase but would only require the software modification on ordinary phones.

By the end of 2011, the State Department will have spent some $70 million on circumvention efforts and related technologies, according to department figures.

Mrs. Clinton has made Internet freedom into a signature cause. But the State Department has carefully framed its support as promoting free speech and human rights for their own sake, not as a policy aimed at destabilizing autocratic governments.

That distinction is difficult to maintain, said Clay Shirky, an assistant professor at New York University who studies the Internet and social media. “You can’t say, ‘All we want is for people to speak their minds, not bring down autocratic regimes’ — they’re the same thing,” Mr. Shirky said.

He added that the United States could expose itself to charges of hypocrisy if the State Department maintained its support, tacit or otherwise, for autocratic governments running countries like Saudi Arabia or Bahrain while deploying technology that was likely to undermine them.

Shadow Cellphone System

In February 2009, Richard C. Holbrooke and Lt. Gen. John R. Allen were taking a helicopter tour over southern Afghanistan and getting a panoramic view of the cellphone towers dotting the remote countryside, according to two officials on the flight. By then, millions of Afghans were using cellphones, compared with a few thousand after the 2001 invasion. Towers built by private companies had sprung up across the country. The United States had promoted the network as a way to cultivate good will and encourage local businesses in a country that in other ways looked as if it had not changed much in centuries.

There was just one problem, General Allen told Mr. Holbrooke, who only weeks before had been appointed special envoy to the region. With a combination of threats to phone company officials and attacks on the towers, the Taliban was able to shut down the main network in the countryside virtually at will. Local residents report that the networks are often out from 6 p.m. until 6 a.m., presumably to enable the Taliban to carry out operations without being reported to security forces.

The Pentagon and State Department were soon collaborating on the project to build a “shadow” cellphone system in a country where repressive forces exert control over the official network.

Details of the network, which the military named the Palisades project, are scarce, but current and former military and civilian officials said it relied in part on cell towers placed on protected American bases. A large tower on the Kandahar air base serves as a base station or data collection point for the network, officials said.

A senior United States official said the towers were close to being up and running in the south and described the effort as a kind of 911 system that would be available to anyone with a cellphone.

By shutting down cellphone service, the Taliban had found a potent strategic tool in its asymmetric battle with American and Afghan security forces.

The United States is widely understood to use cellphone networks in Afghanistan, Iraq and other countries for intelligence gathering. And the ability to silence the network was also a powerful reminder to the local populace that the Taliban retained control over some of the most vital organs of the nation.

When asked about the system, Lt. Col. John Dorrian, a spokesman for the American-led International Security Assistance Force, or ISAF, would only confirm the existence of a project to create what he called an “expeditionary cellular communication service” in Afghanistan. He said the project was being carried out in collaboration with the Afghan government in order to “restore 24/7 cellular access.”

“As of yet the program is not fully operational, so it would be premature to go into details,” Colonel Dorrian said.

Colonel Dorrian declined to release cost figures. Estimates by United States military and civilian officials ranged widely, from $50 million to $250 million. A senior official said that Afghan officials, who anticipate taking over American bases when troops pull out, have insisted on an elaborate system. “The Afghans wanted the Cadillac plan, which is pretty expensive,” the official said.

Broad Subversive Effort

In May 2009, a North Korean defector named Kim met with officials at the American Consulate in Shenyang, a Chinese city about 120 miles from North Korea, according to a diplomatic cable. Officials wanted to know how Mr. Kim, who was active in smuggling others out of the country, communicated across the border. “Kim would not go into much detail,” the cable says, but did mention the burying of Chinese cellphones “on hillsides for people to dig up at night.” Mr. Kim said Dandong, China, and the surrounding Jilin Province “were natural gathering points for cross-border cellphone communication and for meeting sources.” The cellphones are able to pick up signals from towers in China, said Libby Liu, head of Radio Free Asia, the United States-financed broadcaster, who confirmed their existence and said her organization uses the calls to collect information for broadcasts as well.

The effort, in what is perhaps the world’s most closed nation, suggests just how many independent actors are involved in the subversive efforts. From the activist geeks on L Street in Washington to the military engineers in Afghanistan, the global appeal of the technology hints at the craving for open communication.

In a chat with a Times reporter via Facebook, Malik Ibrahim Sahad, the son of Libyan dissidents who largely grew up in suburban Virginia, said he was tapping into the Internet using a commercial satellite connection in Benghazi. “Internet is in dire need here. The people are cut off in that respect,” wrote Mr. Sahad, who had never been to Libya before the uprising and is now working in support of rebel authorities. Even so, he said, “I don’t think this revolution could have taken place without the existence of the World Wide Web.”


Reporting was contributed by Richard A. Oppel Jr. and Andrew W. Lehren from New York, and Alissa J. Rubin and Sangar Rahimi from Kabul, Afghanistan.

Last edited by JackRiddler on Tue Jun 14, 2011 12:14 pm, edited 2 times in total.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: A priceless juxtaposition (if it weren't so common)

Postby Hugh Manatee Wins » Mon Jun 13, 2011 10:55 pm

The offered meme that this spook-created communication system is to 'circumvent oppressive dictatorships'....is cover for CIA destabilization of uncooperative regimes.
CIA runs mainstream media since WWII:
news rooms, movies/TV, publishing
...
Disney is CIA for kidz!
User avatar
Hugh Manatee Wins
 
Posts: 9869
Joined: Wed Nov 23, 2005 6:51 pm
Location: in context
Blog: View Blog (0)

Re: A priceless juxtaposition (if it weren't so common)

Postby StarmanSkye » Tue Jun 14, 2011 11:04 am

"The Obama administration’s initiative is in one sense a new front in a longstanding diplomatic push to defend free speech and nurture democracy."

Whatta Turd. Who writes this Shiite? "May open themselves to charges of hypocrisy." Y'think?

I can see a big market for this surveillance-proof tech right HERE in the good ol'. As Jack suggests, there are plenty of needs and uses for secure communications within the bastion of 'freedom' and 'human rights' that aren't susceptable to the gummint's increasingly frenetic 'oversight' and 'management' snooping, with great overlap -- essentially unlimited -- between 'allowable' and forbidden/criminal types of communication. IOts so cat-and-mouse w/ new 'rules' and changing tactics, like including rats and cheese, ratcatchers and ratpoison.

I guess the cover-story about disseminating 'freedom' and liberty is what the two-faced info-warriers need to keep themselves immune (at least in their own minds) from being compared w/ Fascist, Stalinist and Stasi thought-police.

Info-management at its finest (sic).
StarmanSkye
 
Posts: 2670
Joined: Thu Nov 03, 2005 11:32 pm
Location: State of Jefferson
Blog: View Blog (0)

Re: A priceless juxtaposition (if it weren't so common)

Postby JackRiddler » Sun Sep 11, 2011 12:20 pm

Ooops! Bump is accidental, really.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: A priceless juxtaposition (if it weren't so common)

Postby Plutonia » Sun Sep 11, 2011 1:28 pm

18.08.2011
International hacktivists help Syrian citizens circumvent Internet censorship

Anti-government protestesters in Syria are being attacked by the authorities
As the government cracks down on protesters in Syria, hacker groups from abroad are helping people to get access to the Web and to communicate safely despite surveillance and repression.


Human rights groups and the international community are calling for an arms embargo and an end to government repression in Syria, which has resulted in almost 2,000 deaths since March.

Like in Egypt and Tunisia earlier this year, Syria has responded to the uprising not only with violence, but also by putting its citizens under surveillance and censoring the internet.

What such regimes didn't count on was that international internet activists would step in and fight back.

Since the Arab Spring began, hacktivists have been building ad hoc telecommunications systems all over the Middle East to help citizens get information on what's going on there out of these countries.

When the government shut down the Internet, Telecomix helped Egyptians by getting them access to dial-up modems.Tactics of 'Telecomix' online activists are less controversial than those of the group Anonymous


Rather than describing themselves as a group, members say Telecomix is an idea or a working group where international hackers – or hacktivists – get together to collaborate on particular issues.

Their aims are to provide free and secure communication, anonymity on the net, freedom of speech and news via their Twitter account. And they've stepped up the game by entering the fray in the Middle East.

Under Surveillance

Distributing videos and sharing information about anti-government protests in Syria is incredibly difficult because the government has cracked down on all forms of telecommunications. It's become dangerous to post a picture, video or even make a phone call to try to tell others what's going on. One Syrian protester who asked to remain anonymous said via encrypted email that Iranian experts have been helping the regime spy on people.

"The Syrian government and branches of intelligence are exploiting this crisis to develop their ability to try to control our words and hopes. We know they are using strong programs to do this," said the Syrian protestor.

"In addition, when they arrest an activist, they try to take over his or her accounts and passwords through torture, especially Facebook accounts. So they can catch his friends who support the revolution," said the protestor, whose identity must be protected.

Maha Abu Shama, a Syrian campaigner from Amnesty International, said that Syrian authorities are also using personal statements from social networking sites against people.

"If people write things on their Facebook page or in some correspondences that are critical of the authorities, if they happen to be arrested, these written statements on their Facebook or Internet accounts could be used against them as evidence," said Abu Shama.

Safety Guidelines

To help Syrians keep safe on the internet, international hacktivist group Telecomix is giving them practical advice. Stephan Urbach explains the basic rules.

Two members of TelecomixStephan Urbach (left) and Jonatan Walck (right) of Telecomix"Safety guideline number one is to use, whenever possible, https – SSL encrypted connections. If you want to chat with people, use an instant messenger with OTR – Off The Record – it's a protocol to encrypt your communication," explained Telecomix member Stephan Urbach, who is from Germany.

To secure emails, people can use PGP – Pretty Good Privacy – and Tor to obfuscate their surfing. Urbach said that if people follow these steps, it makes it difficult for anyone to read their messages.

While the Syrian government hasn't shut down the Internet completely, Jonatan Walck, a Swedish hacktivist with Telecomix, said that it varies from city to city. Connections are often unreliable and may go down for hours or days. Human rights groups suspect that these cutoffs are done strategically to coincide with attacks by the security forces.

Despite knowing that the Internet is under surveillance, many people are still using it, often in an insecure way.

"Just as in Egypt, there's a risk of people being tracked. The government is listening," said Walck, adding, "So we listen and see when people come in and contact us, and we try to make sure that they don't get caught for it."

Urbach said with a laugh that essentially around 10 Telecomix members are providing tech support for an entire country.

But it's the seriousness of the situation that motivated him to act.

"I just fear for the people that they are getting harmed. I am sitting in Europe, everything is fine for me. I am not there, fearing for my life. So if we can help the people feeling a little bit more secure and getting a little bit more secure, then it's worth it," said Urbach.

Beyond the border

The Syrian government has imposed a media blackout, so it's very difficult to find out what is actually happening in the country.

But for Telecomix, this is just another challenge to be overcome. Recently they helped distribute an amateur video of a peaceful demonstration where police officers assaulted protestors, and one person was shot and killed.

Telecomix not only helped him get this information out of the country, but protected the Syrian's anonymity. Yet every day, it's getting more and more difficult to get this kind of information out.

"We do figure out one way or another, that they safely can get it outside of the Syrian border, and then we can of course publish it so it's up for everyone," said Walck.

Dr. Asiem El Difraoui, researcher at the German Institute for International and Security Affairs, said that Telecomix and Anonymous are making a huge difference in the Middle East. Screenshot of hacked website'Anonymous' hackers brought down the Syrian Defense Ministry's website this August

Both Telecomix and Anonymous try to help people directly, although Anonymous has gained a lot of media attention in recent months for its high-profile attacks against companies like Sony. But they're not just after corporations. Anonymous members also attacked the official websites of the oppressive Tunisian regime.

"They really hacked into governmental websites, brought the presidential websites down and so on," said El Difraoui, and added "Anonymous is not as purely destructive as we think. The French Anonymous members, for instance, helped the Tunisians also to maintain communications in the same way as Telecomix."

But the Syrian government has learned from Egypt, and instead of just shutting down the internet, they're also using social networks for their own agenda.

"They try to create some solidarity movement on Facebook and the other new media, and use YouTube as well, for showing alleged atrocities by the Syrian opposition, which they deem terrorists," said El Difraoui.

For Telecomix, circumventing Syrian censorship and surveillance is a constant game of cat and mouse. But for the Syrian people, their hard work and practical safety tips are really important.

"The Telecomix team helps us, emotionally and physically. They give us advice on how to be safe on the internet, dos and don'ts, and they help us to spread the word," wrote a Syrian protestor via encrypted email. "[Telecomix] are like one family and they are always there for support and assistance. They are people [with] a high degree of humanity and responsibility."

Hacktivists also under surveillance

Due to their activities, Telecomix and Anonymous are also getting attention from the authorities. When the FBI conducted a sweep last month of Anonymous members, Stephan Ubrach from Telecomix received a letter from the Federal Criminal Police Office saying that he was no longer under surveillance. [!!!]

With the recent riots in London, Urbach warns that surveillance is also increasing in Western democratic countries, where leaders are contemplating Internet and mobile network kill switches.

"What we are doing is showing that if they do it, we evolve and find ways to circumvent these censorship methods and hopefully our politicians in Europe learn from that, that they don't do it here," concluded Urbach.

Author: Cinnamon Nippard / sad
Editor: Anke Rasper

http://www.dw-world.de/dw/article/0,,15324784,00.html
[the British] government always kept a kind of standing army of news writers who without any regard to truth, or to what should be like truth, invented & put into the papers whatever might serve the minister

T Jefferson,
User avatar
Plutonia
 
Posts: 1267
Joined: Sat Nov 15, 2008 2:07 pm
Blog: View Blog (0)

Re: A priceless juxtaposition (if it weren't so common)

Postby Nordic » Mon Sep 12, 2011 3:24 am

The American effort, revealed in dozens of interviews, planning documents and classified diplomatic cables obtained by The New York Times, ranges in scale, cost and sophistication.


Translation: the NYT was given this information deliberately, with instructions to plant it in the corporate stooge media, for purposes beneficial to the U.S. And the NYT did as it was told, like they always do.
"He who wounds the ecosphere literally wounds God" -- Philip K. Dick
Nordic
 
Posts: 14230
Joined: Fri Nov 10, 2006 3:36 am
Location: California USA
Blog: View Blog (6)

Re: A priceless juxtaposition (if it weren't so common)

Postby Luther Blissett » Mon Sep 12, 2011 9:53 am

JackRiddler wrote:It is also inevitable that this technology will come to be used by drug cartels, smugglers and money launderers in the US.


I believe it is already.
The Rich and the Corporate remain in their hundred-year fever visions of Bolsheviks taking their stuff - JackRiddler
User avatar
Luther Blissett
 
Posts: 4991
Joined: Fri Jan 02, 2009 1:31 pm
Location: Philadelphia
Blog: View Blog (0)


Return to General Discussion

Who is online

Users browsing this forum: No registered users and 169 guests