Thursday, August 15, 2013

(Control of the Internet) What Do the Actions Against Aaron Swartz, Michael Hastings, Wikileaks, Manning, Assange, and, perhaps even, Ed Snowden Portend? (Fear Mongering, Inc.)



(Please consider making even a small contribution to the Welcome to  Pottersville2 Quarterly Fundraiser happening now ($5.00 is suggested for those on a tight budget) or sending a link to your friends if you think the subjects discussed here are worth publicizing. Thank you for your support. We really appreciate it. Anything you can do will make a huge difference in this blog's ability to survive in these difficult economic times.)


Still think Obama a pretty innocuous choice for the POTUS?

Lots of reasons to rethink that one below.

It's getting late in the hour to still be so hopeful.


From Comments at WhoWhatWhy:

. . . there's an extremely common thread running through the work, and death, of Aaron Swartz, the recent death of journalist Michael Hastings, and the concentrated witch hunt against WikiLeaks people and Julian Assange.

It appears to all be about the control of the Internet.

Swartz had made strategic inroads against the ongoing movement by the government, as represented through its privatized intelligence community and the NSA, to control the Internet.

Michael Hastings, the former Rolling Stone journalist who wrote the articles on Gen. McChrystal, leading to his firing by President Obama, was supposed to be working on a story about the NSA, and appeared to have interacted with Barrett Brown, who had been concerned with the subject of cybersecurity firms working for the government. This involved data mining those hacked (by Anonymous) HBGary emails, which mentioned Endgame Systems.

Some interesting members on the Board of Directors at Endgame: Chris Darby, also president of the CIA's venture firm, In-Q-Tel; Lt. Gen. Ken Minihan, former director of the DIA, and Chris Rouland, who had been a vice president at Lehman Brothers. Swartz, WikiLeaks' Assange, and what Michael Hastings was evidently working on concerned the potential absolute control over the Internet by the NSA, the privatized intel establishment, and the giant telecoms, AT&T among them. (Interesting to note that it was Jay Rockefeller who led the successful drive in the US Senate to grant legal immunity from criminal prosecution to the telecoms for their actions involving warrantless wiretapping.


AT&T loves Jay Rockefeller and AT&T has traditionally been a Rockefeller company [originally owned by Morgan and Vanderbilt, it was traded to Rockefeller sometime in the 1900s so Morgan could purchase Carnegie's steel companies].)

And Lawrence Lessig attends the recent Bilderberger conference (normally run by David Rockefeller) for the first time after Swartz's death, along with the usual Carl Bildt, longtime member (who is the primary power in Sweden promoting the extradition of Assange back to that country), and other new attendees from those government cybersecurity and private intel firms of Palantir and Stratfor.

For some background on Michael Hastings and his peculiar death (an auto accident in his Mercedes, involving multiple explosions and fire) and some of those connections mentioned:


http://whowhatwhy.com/2013/08/...

And an interesting Guardian article on recently FOIA-released data on the persecution of Aaron Swartz:

http://www.theguardian.com/tec...

Hacking auto computers:

http://www.mbusa.com/mercedes/...

From the site above: Michael Hastings’ Mercedes came with MBRACE2 technology incorporating computer-controlled acceleration and braking.

http://lazytechguys.com/news/b...

Researchers Gain Access to Car Remotely by Hacking the Internal Computer

Researchers from U.C. San Diego and the University of Washington successfully hacked into a car remotely and gained control of it’s vital functions. With the increasing addition of services like OnStar, Sync and Mbrace coming from companies like GM, Ford and Mercedes, these researchers wanted to see how high tech criminals in the future could break into vehicles.

They used a cellular channel that is used for connection to the security call center, and installed software giving them remote control over the vehicle. The commands would control the car’s electronic control unit or the cars brain and gave them control over the locks and the brakes. Also, it allows for them to remotely track a vehicle as well as eavesdropping on the cabin.

http://www.hubberts-arms.org/b...

In the comments section of the above-mentioned web site:

An eyewitness at the scene, Jose, employed at nearby business ALSCO Inc said, the car was traveling very fast and he heard a couple explosions shortly before the car crashed. In fact, the explosion was so intense that it took the LA County assistant corner, Ed Winter, two days to identify the burned-beyond recognition body of Hastings. Officials confirm that an autopsy has been performed, but the cause of death is pending.

Furthermore,

http://rt.com/usa/michael-hast...

A former cybersecurity advisor to President George W. Bush says a sophisticated computer hack could have been the cause of the automobile accident that claimed the life of journalist Michael Hastings last week in Los Angeles.

Richard Clarke, a State Department official-turned-special advisor to several United States presidents, said the early morning auto crash last Tuesday was "consistent with a car cyberattack,” raising new questions about the death of the award-winning journalist.

And,

http://www.newscientist.com/ar...

http://www.popularmechanics.co...

http://www.examiner.com/articl...

The 2013 Mercedes Hastings drove that fateful night in June is equipped with MBRACE (emergency call system), SOS telephone and the Voice Control System. It is similar to the ONSTAR program, and can directly link the driver to a representative in case of emergencies. The Mercedes manual reads: “Information about electronic data acquisition in the vehicle (Including notice pursuant to California Code § 9951). If your vehicle is equipped with MBRACE, data is transmitted in the event of an accident.”

. . . SO • 2 days ago

We should also consider the biographies here. Michael Hastings, fresh out of journalism school, goes to work for Newsweek Magazine, and spends 6 years in their employ, 2002-2008. Then, he makes the move that made him famous, his field trip with Stanley McChrystal. Five years later, his car explodes in a fireball seen by investigative journalists all over the country. And his wife, Elise Jordan, who spent time at Yale, btw, according to her Wikipedia entry, "...served as a director for communications in the National Security Council from 2008-09. She worked in the White House Office of Presidential Speechwriting, at the U.S. Embassy, Baghdad and for the Commanding General's Strategic Advisory Group at the International Security Assistance Force (ISAF) headquarters in Kabul, Afghanistan, as well as speechwriter to Secretary of State Condoleezza Rice." The ISAF Commander at the time, btw, was a guy named Stanley McChrystal. Yep. The same Stanley McChrystal her future husband rode with on the bus. One might be excused for thinking that Mr. & Mrs. Hastings were actually insiders themselves.

. . . OCCUPY FEARRINGTON • 2 days ago

Those are hard questions about Hastings. Others include: did the fire destroy his papers, his computer, his phone? Did the FBI or some other operatives visit his home and confiscate evidence? Was the family or friends told to shut up?


Lots more at the links above. And don't forget how brave an investigative reporter Russ Baker is.

When I first read about the crusades (and I don't use that word lightly) of Cass Sunstein (after he was chosen by Obama for such work), I wasn't surprised that I never heard anything else from him.

But I surely witnessed the effects of his stewardship.

And I don't mean that for the good of the country.


New Obama Disclosure Block


By Russ Baker on Aug 9, 2013

4224165851_b9f005dbc8

Washington’s hunger to know everything about its citizens seems to be matched only by its reticence in revealing its own activities to its citizens.

This was true of George W. Bush, and it is no less true of his successor, Barack Obama. At first, Obama promised reform. As a candidate, he criticized the Bush administration’s “none of your business” approach toward public inquiries into government decisions. And as a new president, Obama proposed to dramatically open up the process and to let transparency be the norm.

Yet, as his “information czar,” Obama chose his friend Cass Sunstein — a Harvard professor who seemed less interested in fostering debate than in suppressing it. In fact, while in academia, Sunstein had written a controversial paper calling for government agents to “cognitively infiltrate” Internet chat rooms to discourage speculation about “conspiracies.”

One consequence of this desire to discourage dark thoughts about power is seen in the Obama Administration’s foot-dragging on the release of JFK assassination records in the months and years approaching  the 50th anniversary of that event. The Obama administration even put a CIA person with ties to that agency’s disastrous 9/11 intelligence in charge of the overall document declassification process.

At WhoWhatWhy, we wrote on several occasions about Sunstein and the Orwellian double sword of a disclosure mandate that worked against disclosure. Sunstein attracted his share of criticism, and in the summer of 2012, as Obama was trying to rally his base for the re-election campaign, the “czar” quietly left the administration. But even with Sunstein gone, the Administration continues to delay declassifying key JFK assassination documents.

But there is more.


The latest move to prevent us from knowing what is going on relates to so-called transparency policies whose fine print instead does the opposite — by effectively blunting the stated intent of the regulations.


Meet “The Mosaic Effect”

The new policy is presented as an entirely forward-looking one. Government agencies are ordered to make life easier for those seeking federal data, by releasing it in a form that makes it easier to analyze it. And that, of course, sounds great.

But buried in the middle of a section on “definitions” is something that most might miss — and that might turn out to be the real purpose of the new policy. It reminds us of how vigilant you need to be in reading notices from all manner of institutions — whether your bank or your power company — on changed terms and conditions.

The suspect phrase refers to something called “the mosaic effect.” Government officials are told that they must consider this “effect” when deciding what to release and what to withhold.


The mosaic effect occurs when the information in an individual dataset, in isolation, may not pose a risk of identifying an individual (or threatening some other important interest such as security), but when combined with other available information, could pose such risk.

Before disclosing potential personally identifiable information (PII) or other potentially sensitive information, agencies must consider other publicly available data – in any medium and from any source – to determine whether some combination of existing data and the data intended to be publicly released could allow for the identification of an individual or pose another security concern.”


Get Those Black Markers Out

Is this an ominous development? You bet your black marker.

Have you ever seen documents released in redacted form, i.e., with certain names blocked out? Well, under the new rules, someone inside the government could argue that certain documents ought not to be released because someone outside the government, using other information sources, could put two and two together and figure out the information that was blocked out.

The result? Documents that were previously released, either in full or in redacted form, might now never see the light of day.

Let’s imagine that, say, the government’s failure to release documents related to the JFK assassination rouses public anger to such a pitch that media pressure (this really takes imagination) finally forces the government to consider opening up the fifty-year-old files to public scrutiny, with names and other identifying info blacked out, purportedly to protect “sources and methods” from half a century ago.

But wait — under the newly articulated Mosaic Doctrine, if there is even the remotest chance that some enterprising citizen or sleuth could use the unredacted material, along with other information already available, to figure out some of those names, a bureaucrat could simply withhold all the information.

Indeed, government officials could pretty much withhold anything they wanted to.
Is this progress? Are we glad that the forces of “change” are now in charge?

Not so much.


The Homeland Security Mosaic

This latest development came to our attention via the IRE Journal, the magazine of the national organization Investigative Reporters and Editors, of which WhoWhatWhy is a member. (That article is not linkable.)

But what the fine article in the IRE Journal did not point out is who exactly is behind this little clause — and what it might actually be about. The people nominally in charge of transparency are the folks at the Office of Information and Regulatory Affairs, which is part of the White House’s Office of Management and Budget. But was this clause their idea?

The answer can be teased out of the following paper, which we found at Data.Gov, an official government site whose motto is “empowering people”.

The title of the paper is “National/Homeland Security and Privacy/Confidentiality Checklist and Guidance,” and the key paragraphs are:

The Open Government Initiative Privacy and Security Working Group (“Working Group”) is an interagency group led by the National Security Staff. The Working Group is composed of Executive Branch agencies with specialization in the security and privacy realms.

It developed the screening procedures outlined in this document to help reduce the risk associated with the mosaic effect, in which datasets that pose no disclosure threat by themselves can create a national/homeland security concern or produce identifiable information when combined with other datasets. This is of particular concern for datasets available in formats that are conducive to mash-ups, as are the datasets at sites such as Data.gov.

The Working Group will continue to evaluate, and where appropriate, enhance Federal data dissemination guidelines to guard against intentional and unintentional unmasking of sensitive or personally identifiable information and/or national/homeland security - sensitive information. As additional opportunities to enhance policies and procedures for evaluating datasets for mosaic effect concerns are developed, agency training will be provided.

What is the possibility that the same agencies which are increasingly conducting surveillance of American citizens are sympathetic to our privacy concerns? That these agencies want to urge caution in the release of documents so that the public is protected?

Isn’t it more likely that they would act instead in a way consistent with defending their own interests, as demonstrated over not just years but decades? That is, collect as much information as possible, and tell the public as little as possible.

We’ve been asked for an awfully long time to accept on faith that these people are looking out for our safety. But when the end of the Cold War brought no more transparency to Washington’s behavior, thoughtful folks began to wonder. Two decades later, the question remains: whose interests, really, are being protected under the current system?

***
To get some answers, I did what every concerned citizen in an open democracy is free to do: I called Washington. I spoke to a fellow named Jamal at the Office of Management and Budget, who suggested I send an email. So I did:


To: FN-OMB-Communications Office
Subject: Media Inquiry

Jamal,

I wonder if someone can speak to me — phone or email — about information policy? I’m particularly interested in administration guidelines mandating that governmental agencies release data in a form that is easily usable by the public and media. Am also interested in learning more about the Open Government Initiative Privacy and Security Working Group.

Best,
Russ Baker

Editor-in-Chief, WhoWhatWhy

To this, I got the following super fast reply from another staffer, named Ari:

Hi Russ,



Warm regards,
Ari

This pretty much blew my mind, because Ari was using the journalistic term “on background” — which typically refers to confidential material being provided to journalists in return for their not identifying the source. But here Ari was invoking it for links to publicly available material. I wrote Ari back, asking him if this was some kind of joke.

He wrote me right back, not to address my question, but to ask me how he might help.

Hi Russ – if you have specific questions that aren’t addressed by the policies on those pages, feel free to send them over. Thanks !

I replied to ask whose idea it was to frame the “mosaic effect.”

That was July 25. And I have not heard back.


I hate conspiracy theories.

They just make me feel sad.

And give up any hope I may have previously entertained.

(And I'm normally such an optimistic person.)


No comments: