The Banality of ‘Don’t Be Evil’ -By Julian Assange

Moderators: Elvis, DrVolin, Jeff

The Banality of ‘Don’t Be Evil’ -By Julian Assange

Postby 2012 Countdown » Sun Jun 02, 2013 9:56 pm

The Banality of ‘Don’t Be Evil’
By JULIAN ASSANGE
June 1, 2013

“THE New Digital Age” is a startlingly clear and provocative blueprint for technocratic imperialism, from two of its leading witch doctors, Eric Schmidt and Jared Cohen, who construct a new idiom for United States global power in the 21st century. This idiom reflects the ever closer union between the State Department and Silicon Valley, as personified by Mr. Schmidt, the executive chairman of Google, and Mr. Cohen, a former adviser to Condoleezza Rice and Hillary Clinton who is now director of Google Ideas.

The authors met in occupied Baghdad in 2009, when the book was conceived. Strolling among the ruins, the two became excited that consumer technology was transforming a society flattened by United States military occupation. They decided the tech industry could be a powerful agent of American foreign policy.

The book proselytizes the role of technology in reshaping the world’s people and nations into likenesses of the world’s dominant superpower, whether they want to be reshaped or not. The prose is terse, the argument confident and the wisdom — banal. But this isn’t a book designed to be read. It is a major declaration designed to foster alliances.

“The New Digital Age” is, beyond anything else, an attempt by Google to position itself as America’s geopolitical visionary — the one company that can answer the question “Where should America go?” It is not surprising that a respectable cast of the world’s most famous warmongers has been trotted out to give its stamp of approval to this enticement to Western soft power. The acknowledgments give pride of place to Henry Kissinger, who along with Tony Blair and the former C.I.A. director Michael Hayden provided advance praise for the book.

In the book the authors happily take up the white geek’s burden. A liberal sprinkling of convenient, hypothetical dark-skinned worthies appear: Congolese fisherwomen, graphic designers in Botswana, anticorruption activists in San Salvador and illiterate Masai cattle herders in the Serengeti are all obediently summoned to demonstrate the progressive properties of Google phones jacked into the informational supply chain of the Western empire.

The authors offer an expertly banalized version of tomorrow’s world: the gadgetry of decades hence is predicted to be much like what we have right now — only cooler. “Progress” is driven by the inexorable spread of American consumer technology over the surface of the earth. Already, every day, another million or so Google-run mobile devices are activated. Google will interpose itself, and hence the United States government, between the communications of every human being not in China (naughty China). Commodities just become more marvelous; young, urban professionals sleep, work and shop with greater ease and comfort; democracy is insidiously subverted by technologies of surveillance, and control is enthusiastically rebranded as “participation”; and our present world order of systematized domination, intimidation and oppression continues, unmentioned, unafflicted or only faintly perturbed.

The authors are sour about the Egyptian triumph of 2011. They dismiss the Egyptian youth witheringly, claiming that “the mix of activism and arrogance in young people is universal.” Digitally inspired mobs mean revolutions will be “easier to start” but “harder to finish.” Because of the absence of strong leaders, the result, or so Mr. Kissinger tells the authors, will be coalition governments that descend into autocracies. They say there will be “no more springs” (but China is on the ropes).

The authors fantasize about the future of “well resourced” revolutionary groups. A new “crop of consultants” will “use data to build and fine-tune a political figure.”

“His” speeches (the future isn’t all that different) and writing will be fed “through complex feature-extraction and trend-analysis software suites” while “mapping his brain function,” and other “sophisticated diagnostics” will be used to “assess the weak parts of his political repertoire.”

The book mirrors State Department institutional taboos and obsessions. It avoids meaningful criticism of Israel and Saudi Arabia. It pretends, quite extraordinarily, that the Latin American sovereignty movement, which has liberated so many from United States-backed plutocracies and dictatorships over the last 30 years, never happened. Referring instead to the region’s “aging leaders,” the book can’t see Latin America for Cuba. And, of course, the book frets theatrically over Washington’s favorite boogeymen: North Korea and Iran.

Google, which started out as an expression of independent Californian graduate student culture — a decent, humane and playful culture — has, as it encountered the big, bad world, thrown its lot in with traditional Washington power elements, from the State Department to the National Security Agency.

Despite accounting for an infinitesimal fraction of violent deaths globally, terrorism is a favorite brand in United States policy circles. This is a fetish that must also be catered to, and so “The Future of Terrorism” gets a whole chapter. The future of terrorism, we learn, is cyberterrorism. A session of indulgent scaremongering follows, including a breathless disaster-movie scenario, wherein cyberterrorists take control of American air-traffic control systems and send planes crashing into buildings, shutting down power grids and launching nuclear weapons. The authors then tar activists who engage in digital sit-ins with the same brush.

I have a very different perspective. The advance of information technology epitomized by Google heralds the death of privacy for most people and shifts the world toward authoritarianism. This is the principal thesis in my book, “Cypherpunks.” But while Mr. Schmidt and Mr. Cohen tell us that the death of privacy will aid governments in “repressive autocracies” in “targeting their citizens,” they also say governments in “open” democracies will see it as “a gift” enabling them to “better respond to citizen and customer concerns.” In reality, the erosion of individual privacy in the West and the attendant centralization of power make abuses inevitable, moving the “good” societies closer to the “bad” ones.

The section on “repressive autocracies” describes, disapprovingly, various repressive surveillance measures: legislation to insert back doors into software to enable spying on citizens, monitoring of social networks and the collection of intelligence on entire populations. All of these are already in widespread use in the United States. In fact, some of those measures — like the push to require every social-network profile to be linked to a real name — were spearheaded by Google itself.

THE writing is on the wall, but the authors cannot see it. They borrow from William Dobson the idea that the media, in an autocracy, “allows for an opposition press as long as regime opponents understand where the unspoken limits are.” But these trends are beginning to emerge in the United States. No one doubts the chilling effects of the investigations into The Associated Press and Fox’s James Rosen. But there has been little analysis of Google’s role in complying with the Rosen subpoena. I have personal experience of these trends.

The Department of Justice admitted in March that it was in its third year of a continuing criminal investigation of WikiLeaks. Court testimony states that its targets include “the founders, owners, or managers of WikiLeaks.” One alleged source, Bradley Manning, faces a 12-week trial beginning tomorrow, with 24 prosecution witnesses expected to testify in secret.

This book is a balefully seminal work in which neither author has the language to see, much less to express, the titanic centralizing evil they are constructing. “What Lockheed Martin was to the 20th century,” they tell us, “technology and cybersecurity companies will be to the 21st.” Without even understanding how, they have updated and seamlessly implemented George Orwell’s prophecy. If you want a vision of the future, imagine Washington-backed Google Glasses strapped onto vacant human faces — forever. Zealots of the cult of consumer technology will find little to inspire them here, not that they ever seem to need it. But this is essential reading for anyone caught up in the struggle for the future, in view of one simple imperative: Know your enemy.

Julian Assange is the editor in chief of WikiLeaks and author of “Cypherpunks: Freedom and the Future of the Internet.”

-
http://mobile.nytimes.com/2013/06/02/op ... -evil.html
George Carlin ~ "Its called 'The American Dream', because you have to be asleep to believe it."
http://www.youtube.com/watch?v=acLW1vFO-2Q
User avatar
2012 Countdown
 
Posts: 2293
Joined: Wed Jan 30, 2008 1:27 am
Blog: View Blog (0)

Re: The Banality of ‘Don’t Be Evil’ -By Julian Assange

Postby JackRiddler » Mon Jun 03, 2013 1:32 am

Wow. Just wow.

.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: The Banality of ‘Don’t Be Evil’ -By Julian Assange

Postby stickdog99 » Mon Jun 03, 2013 3:06 am

I feel lucky.
stickdog99
 
Posts: 6617
Joined: Tue Jul 12, 2005 5:42 am
Blog: View Blog (0)

Re: The Banality of ‘Don’t Be Evil’ -By Julian Assange

Postby 82_28 » Mon Jun 03, 2013 10:06 am

Just to bump and not really add anything. That was fucking freakishly amazing. Wow, Mr. Assange and also, wow, NYTimes for publishing it. We live in very scary times that look a whole lot like there is nothing afoot when in fact this is probably the biggest shift and retooling of culture ever in humankind's time. That's its power. It looks like nothing and what it does appear as seems benign.

Great article. Thanks for the heads up on it!
There is no me. There is no you. There is all. There is no you. There is no me. And that is all. A profound acceptance of an enormous pageantry. A haunting certainty that the unifying principle of this universe is love. -- Propagandhi
User avatar
82_28
 
Posts: 11194
Joined: Fri Nov 30, 2007 4:34 am
Location: North of Queen Anne
Blog: View Blog (0)

Re: The Banality of ‘Don’t Be Evil’ -By Julian Assange

Postby JackRiddler » Wed Jun 05, 2013 2:59 am

This is the must read of the week, or month. And what can one add? It's definitive.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: The Banality of ‘Don’t Be Evil’ -By Julian Assange

Postby coffin_dodger » Wed Jun 05, 2013 4:11 am

I watched the BBC's flagship news programme 'Newsnight' earlier this week - they did a feature about google glass being introduced into a London-based US company - all employees were required to wear them at work. The CEO was frantically extolling the virtues - better workrate, more productive, happier and connected staff etc. etc. etc. etc. etc....

It bothered me, somewhat.

No more gazing out the window wishing you were somewhere else. No more pointing out the inadequecies of your manager to your team-mates. No more saying you're going to the toilet to sneak out for a crafty smoke. No more gazing at, or talking about people you fancy or dislike amongst your co-workers. No more reading blogs to free your mind from the drudgery. No more telling jokes or making witty banter. No more purposely jamming the printer/copier to make the office asshole's life just that little harder. No more liberating the stapler or post-its that you urgently need at home. No more wasting a few minutes making a coffee every hour. The list, for me, would be almost endless.

Not to mention the tension created amongst the workforce that everything you say or do must be politically and socially correct. With everything said or done potentially being indelibly recorded, stored and presented as a fait accompli at your tribunal, automatons will be the order of the day.

And of course, no one except the CEO will have access to the CEO's daily activities and if the 'most productive' office employee (who makes the corp millions) also happens to be a boor who likes fondling womens backsides, I'm sure his data will be found to be 'corrupted' on the days that any offenses occur.

I'm getting riled here contemplating all this shit but I guess it doesn't matter that much anyway - industrialized civilisation is on a downward trajectory anyhoo.
User avatar
coffin_dodger
 
Posts: 2216
Joined: Thu Jun 09, 2011 6:05 am
Location: UK
Blog: View Blog (14)

Re: The Banality of ‘Don’t Be Evil’ -By Julian Assange

Postby 82_28 » Wed Jun 05, 2013 4:45 am

I read it again. Bump and all that. There's no getting around this.
There is no me. There is no you. There is all. There is no you. There is no me. And that is all. A profound acceptance of an enormous pageantry. A haunting certainty that the unifying principle of this universe is love. -- Propagandhi
User avatar
82_28
 
Posts: 11194
Joined: Fri Nov 30, 2007 4:34 am
Location: North of Queen Anne
Blog: View Blog (0)

Re: The Banality of ‘Don’t Be Evil’ -By Julian Assange

Postby 2012 Countdown » Wed Jun 05, 2013 7:57 am

This theme ties in to the reported Bilderberg theme this year as well. Amazon and Google attendees... Its like a big marketing push is underway...

June 4, 2013 7:46 pm
Building a ‘Big Data’ strategy
By Svetlana Sicular and Marcus Collins

We can now predict fires in the Amazon rainforest six months before they occur by analysing sea surface data, help arrest a shoplifter who tweets outside the store by analysing social sentiment and geolocation data, and determine whether surgery is the best course of action for a patient by assessing trends across large numbers of lung cancer patients.
The data-driven economy is upon us. First-generation internet companies such as Google and Amazon, have demonstrated “data alchemy” - turning data into gold - and now others realise that great opportunity can be seized by using big data and the big ideas that come along with it.
But generating ideas and knowing which ones to pursue is difficult. One way to get started with big data is to conceive scenarios of extracting insights for decision-making and operational efficiency by taking advantage of the “four internets.” Separately identifiable, virtual Internets of people, of things, of data and of ideas are emerging to enable broader collaboration and knowledge, but are also an invaluable source of big data to fuel advances in business capabilities.
The Internet of People
The Internet of People is represented by the set of interconnected information about individuals, including their social and collective activities and interests, their attitudes, and their images, audio and video. This can offer segmented and holistic views on human behavior, perceptions and interactions in space and time. At its core, it is about customer centricity. Businesses can explore the use of big data by asking the ultimate question ‘What can I do together with you?’ instead of the more traditional, ‘what can I do to you?’
The Internet of People allows organisations to expand business processes beyond the borders of the enterprise. This enables the fashion industry, for example, to find the next craze before it occurs by analysing what people talk about in social media. Or, companies can invite customers to help solve problems and exploit opportunities by giving them rewards and incentives or find what makes individuals more positive or negative and adjust the business accordingly.
In another scenario, businesses identify what they wanted to know all along about the customer - if they had unlimited capabilities. Big data technologies can help find patterns for areas such as, who are the customers of our customers? What do our patients, accountable for the highest costs, have in common? How do we make connections between seemingly disparate people, places and events to detect fraud?
The Internet of Things
The Internet of Things is the data that represents the connections between the physical and digital worlds. It is growing at an unprecedented rate because of the lowering cost of the components that are turning “things” into parts of a network. Whenever there is a possibility to get information about a physical object or a process by instrumenting it with sensors, RFID tags, transmitters, GPSs, logs and other means of sending information via wired or wireless networks, there are opportunities to analyse the data and find new patterns.
Sensors can transmit information from the hardest-to-reach places, such as a working engine, a human body or a pipeline segment in a remote location.
McKenney, the mechanical contractor firm, developed Business Intelligence for Buildings by tracking trends and performance over extended periods. It optimises the uses of energy, water and indoor air quality across hundreds of buildings to achieve new levels of cost efficiency, such as reducing energy usage by 5 per cent to 10 per cent. In another example, Jawbone Up is a personal system that combines a wristband and phone application to track how people sleep, move and eat to know themselves better and make smarter choices to feel better.
To utilise event-driven data from things, companies explore how to prevent undesirable events such as device breakdowns, traffic jams or cyberattacks. They can also assess how to maximise positive events. These include areas such as reordering parts, administering medication or finding parking on a busy street.
The Internet of Data
The Internet of Data is about bridging information silos to understand physical, societal and business environments. It achieves this by connecting data at scale, both inside and outside the enterprise.
The most obvious characteristic of the Internet of Data is variety: text, logs, images, video and geolocation, combined into a data fabric, to hold the information that organisations wanted to have all along. The accelerating liberation of data is the sign of a more open society and, consequently, more open and available information. Many governments provide data about demographics, economy, weather and the well-being of their citizens. Commercial entities seek to monetise their own data.
Companies should seek data-derived opportunities by detecting behavior in groups, fraud or life cycle patterns to gain new or even breakthrough insights. For example, because of linking and analysing longitudinal patient data, family history, genetics and reference data, a healthcare provider can discover a new treatment for a particular patient based on treatment results for “similar” patients.
Or, companies can develop data-driven business models and information products by combining their own data, data sources from partners, and purchased information or open data. It’s also important to drive business strategy by making data-driven choices and find where evidence-based analysis can substitute or complement a “gut feel.”
The Internet of Ideas
The Internet of Ideas is about the power of connected minds. It involves humans at scale and aggregates individual ideas about societal, business and physical environments through crowdsourcing, crowdfunding, leveraging open-source products and integrating ideas from outside the enterprise.
In 2000, Goldcorp made an unprecedented decision to open up its proprietary geological data for the “Goldcorp challenge,” a public competition to find gold in its Canadian mine. Out of the top five entries, four have been drilled, and all four struck gold. Since then, Goldcorp has grown from a $100m company to a $9bn company.
The complementary strengths of humans and technologies are mutually reinforcing. Opportunities for finding cost-effective solutions that involve human touch include business processes where instead of separating people, organisations combine human and machine intelligence for better outcomes or make decisions by relying on machine analytics. Think of the two mediocre players who used a laptop running a commercial chess program to best the chess machine that had beaten a grand master on its own.
The Internet of Ideas also provides solutions for getting new ideas from outside sources or that need multiple perspectives or statistically significant representation of participants. Factual, a location-based technology company, maintains a crowdsourced definitive database of 66m local business and point-of-interest listings across 50 countries. In this case, submissions by thousands of people create detailed information that could not be obtained without individual inputs on a mass scale. Organisations can treat human minds as an equally possible analytical and business solution to find scenarios where they can benefit from crowdsourcing, crowdfunding and the expansion of enterprise borders.
New opportunities require the mental shift toward accepting big data realities. Organisations must revisit the problems that were once impossible or impractical to solve: the answers were contained in the data all along, but they were hard to extract with old technologies.
When organisations allow themselves to ask bigger questions of people, things, data and ideas in today’s interconnected world, they can find new answers to derive business value from big data.
Svetlana Sicular is a research director at Gartner covering data governance, enterprise information management strategy and big data. Marcus Collins is a research director at Gartner covering data architecture, data and information integration, database management system evaluation and selection, database architecture and emerging technologies (big data, NoSQL)
-
http://www.ft.com/intl/cms/s/0/ed3ea2d0 ... z2VLDe4lDQ


==

June 4, 2013 6:22 pm
Amazon set to sell $800m in ads
By Barney Jopson in New York

Amazon’s advertising business is forecast to generate over $800m of revenue this year as the online retailer uses its consumer data and ecommerce engine to woo advertisers from rivals such as Google and Facebook.
The revenue estimate from eMarketer, a digital research group, pointed to advertisers’ desire to use Amazon to target ads based not only on what people search for online but on what they buy.
Amazon sells ad slots on its own sites and Kindle devices, as well as a network of other websites. It does not report its advertising revenue, but eMarketer estimated on Tuesday that it was $610m last year and would rise 37 per cent to $835m this year.
The figures are still dwarfed by Google, whose advertising revenue in 2012 increased 18 per cent year-on-year to $33bn. Facebook’s advertising revenue last year rose 36 per cent to over $4bn. Amazon’s growth also threatens the digital marketing businesses of Yahoo, Microsoft and AOL.
Amazon has not publicised its own business aggressively, but it is benefiting from and accelerating the convergence of advertising and shopping services online.
Clark Fredricksen of eMarketer said: “Whilst they have been quiet, they have an incredible advantage over many of their competitors with the vast stockpile of customer data they have from their core business.”
After 18 years online, Amazon has an unrivalled trove of data on the products people search for, click on and buy.
EMarketer said that the bulk of Amazon’s advertising revenues come from targeted ads that are placed in or near search results that appear when a consumer looks for a product on Amazon.
Three-quarters of its advertising revenue is estimated to come from the US.
Chris Vollmer, a media expert at the consultancy Booz & Co, said Amazon offered a “unique proposition” to advertisers selling goods by combining its data on shopping habits with its ability to complete ecommerce sales.
“They can close the loop on the purchase right there,” he said. “That’s a big advantage for marketers. They don’t lose the consumer between the point where the impression is created and where the sale happens.”
Analysts have noted that while Google has more users than Amazon, it has fewer customers whose credit cards and addresses it knows.
To deepen its ecommerce ties, Google now offers retailers product listing ads that show images and price information.
Mr Vollmer said that in addition to challenging its tech rivals, Amazon was also taking advertising clients from online advertising brokers and media websites that host commercials.
But he said it was not clear whether advertising was a top priority for Amazon, which operates a wide array of businesses.
-
http://www.ft.com/intl/cms/s/0/21f9c1ea ... z2VLDe4lDQ
George Carlin ~ "Its called 'The American Dream', because you have to be asleep to believe it."
http://www.youtube.com/watch?v=acLW1vFO-2Q
User avatar
2012 Countdown
 
Posts: 2293
Joined: Wed Jan 30, 2008 1:27 am
Blog: View Blog (0)

Re: The Banality of ‘Don’t Be Evil’ -By Julian Assange

Postby Canadian_watcher » Wed Jun 05, 2013 9:27 am

the assassination of individuality
Satire is a sort of glass, wherein beholders do generally discover everybody's face but their own.-- Jonathan Swift

When a true genius appears, you can know him by this sign: that all the dunces are in a confederacy against him. -- Jonathan Swift
User avatar
Canadian_watcher
 
Posts: 3706
Joined: Thu Dec 07, 2006 6:30 pm
Blog: View Blog (0)

Re: The Banality of ‘Don’t Be Evil’ -By Julian Assange

Postby 2012 Countdown » Thu Jun 06, 2013 8:22 pm

Documents: U.S. intelligence mining data from nine U.S. Internet companies in broad secret program
By Barton Gellman and Laura Poitras, Thursday, June 6, 4:43 PM

The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person’s movements and contacts over time.

The highly classified program, code-named PRISM, has not been disclosed publicly before. Its establishment in 2007 and six years of exponential growth took place beneath the surface of a roiling debate over the boundaries of surveillance and privacy. Even late last year, when critics of the foreign intelligence statute argued for changes, the only members of Congress who knew about PRISM were bound by oaths of office to hold their tongues.

An internal presentation on the Silicon Valley operation, intended for senior analysts in the NSA’s Signals Intelligence Directorate, described the new tool as the most prolific contributor to the President’s Daily Brief, which cited PRISM data in 1,477 articles last year. According to the briefing slides, obtained by The Washington Post, “NSA reporting increasingly relies on PRISM” as its leading source of raw material, accounting for nearly 1 in 7 intelligence reports.

That is a remarkable figure in an agency that measures annual intake in the trillions of communications. It is all the more striking because the NSA, whose lawful mission is foreign intelligence, is reaching deep inside the machinery of American companies that host hundreds of millions of American-held accounts on American soil.

The technology companies, which participate knowingly in PRISM operations, include most of the dominant global players of Silicon Valley. They are listed on a roster that bears their logos in order of entry into the program: “Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” PalTalk, although much smaller, has hosted significant traffic during the Arab Spring and in the ongoing Syrian civil war.

Dropbox , the cloud storage and synchronization service, is described as “coming soon.”

Government officials declined to comment for this article.

Roots in the ’70s

PRISM is an heir, in one sense, to a history of intelligence alliances with as many as 100 trusted U.S. companies since the 1970s. The NSA calls these Special Source Operations, and PRISM falls under that rubric.

The Silicon Valley operation works alongside a parallel program, code-named BLARNEY, that gathers up “metadata” — address packets, device signatures and the like — as it streams past choke points along the backbone of the Internet. BLARNEY’s top-secret program summary, set down alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”

But the PRISM program appears more nearly to resemble the most controversial of the warrantless surveillance orders issued by President George W. Bush after the al-Qaeda attacks of Sept. 11, 2001. Its history, in which President Obama presided over “exponential growth” in a program that candidate Obama criticized, shows how fundamentally surveillance law and practice have shifted away from individual suspicion in favor of systematic, mass collection techniques.

The PRISM program is not a dragnet, exactly. From inside a company’s data stream the NSA is capable of pulling out anything it likes, but under current rules the agency does not try to collect it all.

Analysts who use the system from a Web portal at Fort Meade key in “selectors,” or search terms, that are designed to produce at least 51 percent confidence in a target’s “foreignness.” That is not a very stringent test. Training materials obtained by the Post instruct new analysts to submit accidentally collected U.S. content for a quarterly report, “but it’s nothing to worry about.”

Even when the system works just as advertised, with no American singled out for targeting, the NSA routinely collects a great deal of American content. That is described as “incidental,” and it is inherent in contact chaining, one of the basic tools of the trade. To collect on a suspected spy or foreign terrorist means, at minimum, that everyone in the suspect’s inbox or outbox is swept in. Intelligence analysts are typically taught to chain through contacts two “hops” out from their target, which increases “incidental collection” exponentially. The same math explains the aphorism, from the John Guare play, that no one is more than “six degrees of separation” from any other person.

A ‘directive’

Formally, in exchange for immunity from lawsuits, companies like Yahoo and AOL are obliged to accept a “directive” from the attorney general and the director of national intelligence to open their servers to the FBI’s Data Intercept Technology Unit, which handles liaison to U.S. companies from the NSA. In 2008, Congress gave the Justice Department authority to for a secret order from the Foreign Surveillance Intelligence Court to compel a reluctant company “to comply.”

In practice, there is room for a company to maneuver, delay or resist. When a clandestine intelligence program meets a highly regulated industry, said a lawyer with experience in bridging the gaps, neither side wants to risk a public fight. The engineering problems are so immense, in systems of such complexity and frequent change, that the FBI and NSA would be hard pressed to build in back doors without active help from each company.

Apple demonstrated that resistance is possible, for reasons unknown, when it held out for more than five years after Microsoft became PRISM’s first corporate partner in May 2007. Twitter, which has cultivated a reputation for aggressive defense of its users’ privacy, is still conspicuous by its absence from the list of “private sector partners.”

“Google cares deeply about the security of our users’ data,” a company spokesman said. “We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a ‘back door’ for the government to access private user data.”

Like market researchers, but with far more privileged access, collection managers in the NSA’s Special Source Operations group, which oversees the PRISM program, are drawn to the wealth of information about their subjects in online accounts. For much the same reason, civil libertarians and some ordinary users may be troubled by the menu available to analysts who hold the required clearances to “task” the PRISM system.

There has been “continued exponential growth in tasking to Facebook and Skype,” according to the 41 PRISM slides. With a few clicks and an affirmation that the subject is believed to be engaged in terrorism, espionage or nuclear proliferation, an analyst obtains full access to Facebook’s “extensive search and surveillance capabilities against the variety of online social networking services.”

According to a separate “User’s Guide for PRISM Skype Collection,” that service can be monitored for audio when one end of the call is a conventional telephone and for any combination of “audio, video, chat, and file transfers” when Skype users connect by computer alone. Google’s offerings include Gmail, voice and video chat, Google Drive files, photo libraries, and live surveillance of search terms.


Firsthand experience with these systems, and horror at their capabilities, is what drove a career intelligence officer to provide PowerPoint slides about PRISM and supporting materials to The Washington Post in order to expose what he believes to be a gross intrusion on privacy. “They quite literally can watch your ideas form as you type,” the officer said.

-

http://www.washingtonpost.com/investiga ... ory_1.html
George Carlin ~ "Its called 'The American Dream', because you have to be asleep to believe it."
http://www.youtube.com/watch?v=acLW1vFO-2Q
User avatar
2012 Countdown
 
Posts: 2293
Joined: Wed Jan 30, 2008 1:27 am
Blog: View Blog (0)

Re: The Banality of ‘Don’t Be Evil’ -By Julian Assange

Postby cptmarginal » Thu Jun 06, 2013 9:42 pm

A link to this belongs here:

Transcript of secret meeting between Julian Assange and Google CEO Eric Schmidt

On the 23 of June, 2011 a secret five hour meeting took place between WikiLeaks publisher Julian Assange, who was under house arrest in rural UK at the time and Google CEO Eric Schmidt.

Also in attendance was Jared Cohen, a former Secretary of State advisor to Hillary Clinton, Scott Malcomson, Director of Speechwriting for Ambassador Susan Rice at the US State Department and current Communications Director of the International Crisis Group, and Lisa Shields, Vice President of the Council on Foreign Relations.

Schmidt and Cohen requested the meeting, they said, to discuss ideas for "The New Digital World", their forthcoming book to be published on April 23, 2013.

We provide here a verbatim transcript of the majority of the meeting; a close reading, particularly of the latter half, is revealing.
The new way of thinking is precisely delineated by what it is not.
cptmarginal
 
Posts: 2741
Joined: Tue Apr 10, 2007 8:32 pm
Location: Gordita Beach
Blog: View Blog (0)

Re: The Banality of ‘Don’t Be Evil’ -By Julian Assange

Postby MayDay » Wed Dec 04, 2013 12:59 pm

My bf will soon begin beta testing for Startmail. :yay
In the meantime, this:

http://www.prwatch.org/news/2013/11/123 ... c-and-more
The Googlization of the Far Right: Why is Google Funding Grover Norquist, Heritage Action and ALEC?

Excerpt-
...New "Substantial" Right-Wing Google Grants in Past Year

CMD examined the information released by Google for the years 2010 to 2013. The voluntary disclosures indicate that the following groups are either new grantees of Google since September 2012, or have been listed as having received a “substantial” Google grant for the first time:

American Conservative Union
Americans for Tax Reform
CATO Institute
Federalist Society
George Mason University Law School Law and Economics Center
Heritage Action
Mercatus Center
National Taxpayers Union
R Street Institute
Texas Public Policy Foundation

Detailed information on each of these groups can be found at CMD’s Sourcewatch website.....
User avatar
MayDay
 
Posts: 350
Joined: Tue Jan 24, 2012 7:30 pm
Blog: View Blog (0)

Re: The Banality of ‘Don’t Be Evil’ -By Julian Assange

Postby cptmarginal » Wed Dec 04, 2013 4:29 pm

cptmarginal
 
Posts: 2741
Joined: Tue Apr 10, 2007 8:32 pm
Location: Gordita Beach
Blog: View Blog (0)

Re: The Banality of ‘Don’t Be Evil’ -By Julian Assange

Postby JackRiddler » Mon May 26, 2014 11:40 am

Still a must read.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)


Return to General Discussion

Who is online

Users browsing this forum: No registered users and 165 guests