Governmental control is nothing compared to what Google is up to. The company is creating a wholly new genus of capitalism, a systemic coherent new logic of accumulation we should call surveillance capitalism. Is there nothing we can do?surveillance capitalism
Google surpassed Apple as the world’s most highly valued company in January for the first time since 2010. (Back then each company was worth less than 200 billion. Now each is valued at well over 500 billion.) While Google’s new lead lasted only a few days, the company’s success has implications for everyone who lives within the reach of the Internet. Why? Because Google is ground zero for a wholly new subspecies of capitalism in which profits derive from the unilateral surveillance and modification of human behavior. This is a new surveillance capitalism that is unimaginable outside the inscrutable high velocity circuits of Google’s digital universe, whose signature feature is the Internet and its successors. While the world is riveted by the showdown between Apple and the FBI, the real truth is that the surveillance capabilities being developed by surveillance capitalists are the envy of every state security agency. What are the secrets of this new capitalism, how do they produce such staggering wealth, and how can we protect ourselves from its invasive power?
“Most Americans realize that there are two groups of people who are monitored regularly as they move about the country. The first group is monitored involuntarily by a court order requiring that a tracking device be attached to their ankle. The second group includes everyone else…” Continue reading »
A couple of days ago I received a disturbing message from a reader in Australia.
* * *
I’m a long term but previously silent reader in Sydney Australia. For most of 2016 your site has been unreachable for me, and I thought it must be down. Turns out it is being blocked by the Australian carrier Optusnet* (my ISP.) I’m now using the Tor Browser to access your site.
See my thread on an Australian electronics forum with trace route and ping details: http://www.eevblog.com/forum/chat/optusnet-blocking-a-news-site-what-to-do/ Continue reading »
(MiddleEastEye) Twitter suspended over 125,000 accounts, most of them linked to the Islamic State (IS) group, as part of a stepped-up effort to eradicate “terrorist content” on the popular messaging platform, it said on Friday.
The accounts frozen since mid-2015 were targeted “for threatening or promoting terrorist acts,” said Twitter, which is under pressure from governments to act but faces a delicate balancing act and is keen not to be seen as censoring free speech.
If you’re an American citizen, then the government has a personal file on you. Think of it like your permanent record from your grade school days. These records contain highly sensitive personal information about you such as where you live, your contact info, your relatives and associates, arrest records, and even speeding tickets. But what many people don’t know, is that this information is all considered “public record,”—and anyone can access it.
Now, a controversial new site is taking things a step further by gathering these records together and posting them online, so anyone with a computer and Internet access can see them. Continue reading »
Earlier today, I published a report which detailed the threat posed to Facebook users. Reportedly, Facebook is releasing private information to the Chinese military. This is to aid the Chinese military when they are called in by the UN to restore order inside the United as civil unrest is tearing apart the country in an economic collapse scenario. I have also covered how Facebook data is mined by the NSA and is being used to compile an enemies of the state list, we frequently refer to as the “Red List”.
Below is an astute Info Wars report on the creation of a world-wide martial law force. There is no question that Infowars and The Common Sense Show are speaking about the same programs with the same objectives. Continue reading »
On Monday the Supreme Court declined to hear a petition from the Electronic Privacy Information Center (EPIC) that sought to force the Department of Homeland Security to release details of a secret “killswitch” protocol to shut down cellphone and internet service during emergencies.
EPIC has been fighting since 2011 to release the details of the program, which is known as Standard Operating Procedure 303. EPIC writes, “On March 9, 2006, the National Communications System (‘NCS’) approved SOP 303, however it was never released to the public. This secret document codifies a ‘shutdown and restoration process for use by commercial and private wireless networks during national crisis.’” Continue reading »
In 2015, the iron fist of power clamped down on humanity, from warfare to terrorism (I repeat myself) to surveillance, police brutality, and corporate hegemony. The environment was repeatedly decimated, the health of citizens was constantly put at risk, and the justice system and media alike were perverted to serve the interests of the powers that be.
However, while 2015 was discouraging for more reasons than most of us can count, many of the year’s most underreported stories evidence not only a widespread pattern that explicitly reveals the nature of power, but pushback from human beings worldwide on a path toward a better world.
1. CISA Pushed Through the Senate, Effectively Clamping Down on Internet Freedom: For years, Congress has attempted to legalize corporate and state control of the internet. In 2011, they attempted to pass PIPA and SOPA, companion bills slammed by internet and tech companies and ultimately defeated after overwhelming public outcry. Then they passed CISPA — which the president threatened to veto, having caught wind of the public’s opposition to heavy regulation of the internet (earlier this year, Obama reversed his position). However, corporate interests, like Hollywood’s studio monopoly, kept lawmakers’ tenacity afloat. Continue reading »
Tags: 1984, 9/11, Activism, Barack Obama, Brain cancer, Cancer, Cannabis, Children, CIA, CISA, Corporate Media, DIA, Dictatorship, Drugs, Environment, Fascism, George Orwell, Global News, Government, Internet, ISIL, ISIS, Journalism, Law, Marijuana, Military, Nestle, New World Order, Obama administration, Pentagon, Politics, Society, Surveillance, Terrorism, TPP, U.S., Water, water wars
Last week, Congress passed CISA by hiding it in the middle of a sure-to-pass spending bill, and Obama signed it into law … even though the Department of Homeland Security had previously said that the bill will HURT national security and destroy privacy (numerous experts agreed).
And – just like with previous spying laws – the government has a secret interpretation of CISA which will make it even worse.
So why was the bill passed? Continue reading »
Tags: 1984, Barack Obama, Big Brother, CIA, CISA, Dictatorship, Fascism, FBI, George Orwell, Global News, Government, Internet, Law, New World Order, NSA, Obama administration, Politics, Society, Surveillance, U.S.
Update: CISA is now the law: OBAMA SIGNS SPENDING, TAX BILL THAT REPEALS OIL EXPORT BAN
* * *
Back in 2014, civil liberties and privacy advocates were up in arms when the government tried to quietly push through the Cybersecurity Information Sharing Act, or CISA, a law which would allow federal agencies – including the NSA – to share cybersecurity, and really any information with private corporations “notwithstanding any other provision of law.” The most vocal complaint involved CISA’s information-sharing channel, which was ostensibly created for responding quickly to hacks and breaches, and which provided a loophole in privacy laws that enabled intelligence and law enforcement surveillance without a warrant.
Ironically, in its earlier version, CISA had drawn the opposition of tech firms including Apple, Twitter, Reddit, as well as the Business Software Alliance, the Computer and Communications Industry Association and many others including countless politicians and, most amusingly, the White House itself. Continue reading »
Tags: 1984, Barack Obama, Big Brother, CIA, CISA, Dictatorship, Fascism, FBI, George Orwell, Global News, Government, Internet, Law, New World Order, NSA, Obama administration, Politics, Surveillance, U.S.
The controversial Cybersecurity Information Sharing Act (CISA) may be added as a provision in the looming government budget bill.
(TRUTHINMEDIA) The Cybersecurity Information Sharing Act (CISA) was officially approved by the Senate back in October. Since that time, the bill has languished in committee as lawmakers sought to align the Senate bill with the versions passed by the House of Representatives in April.
CISA is designed to allow private companies to easily share threat intelligence with government agencies. Sharing of intelligence is supposed to be voluntary. Critics of the bill say the provisions will only increase the indiscriminate monitoring of legal activity by giving companies immunity from lawsuits for sharing information with the government. Continue reading »
The Pentagon has been given formal approval to start an online propaganda campaign against the Islamic State following a recent push by the US Department of Defense (DoD).
Congress approved the National Defense Authorization Act for 2016 last week and included in it a whole section (1056) on “Information operations and engagement technology demonstrations.”
The section states that the Secretary of Defense “should develop creative and agile concepts, technologies, and strategies across all available media to most effectively reach target audiences, and to counter and degrade the ability of adversaries and potential adversaries to persuade, inspire, and recruit inside areas of hostilities or in other areas in direct support of the objectives of commanders.”
“The Islamic State has grown that strong due to the irresponsible policy of the United States,” exclaimed Russian PM Dmitry Medvedev this morning, demanding that “really consolidated efforts” are needed to counter ISIS’ terrorist threats. This comes just hours after President Obama toughened his rhetoric, vowing that the global coalition formed to destroy ISIS “will not relent,” adding, rather oddly, that the group responsible for the Paris terror attacks is “a bunch of killers with good social media.”
Obama toughens up…
Obama was hit with a wave of criticism in the wake of the terrorists’ attacks in France and Lebanon, which left hundreds dead, having described that burst of violence as a “setback” in the battle against ISIS. So now, as CNN reports, U.S. President Barack Obama toughened his rhetoric against ISIS at a weekend press conference in Malaysia… Continue reading »
Get off Facebook NOW, and NEVER hit anyone elses profile or click a like again, EVER, Facebook is now BANNED for anyone with an ounce of awareness
Via a bug Facebook installs when you visit their web site or click a like, even if you have no account with facebook Facebook can keep on monitoring visitors permanently forever after, including all phone numbers, PASSWORDS TO OTHER WEB SITES, every site you ever visit ever again, and more.
There has been a new development with Facebook. Facebook now plants a bug on your computer that hands them your phone numbers, browsing history, and tracks all future history as well as all photos and anything else you do on your computer if you ever hit the web site or ever click a like, even if you have no facebook account. Facebook has gone full hostile, AVOID FACEBOOK LIKE THE PLAGUE.
How do I know this? Easy, Belgium ordered them to stop doing it, and published the court case. Continue reading »
The following story exemplifies the human spirit at its best, and provides an example of the kinds of things communities can achieve when they bound together to overcome adversity. The sky really is the limit, and as Doe Bay Internet Users Association founder, Chris Sutton, defiantly proclaims:
I think relying on corporate America to come save us all is just not going to happen, but if we all get together and share our resources, communities can do this themselves and be more resilient.
Here are excerpts from the excellent ArsTechnica article, How a Group of Neighbors Created Their Own Internet Service: Continue reading »
In the wake of Edward Snowden’s revelations detailing pervasive secretive and unconstitutional government spying, many tech companies have taken steps to secure users privacy via end-to-end encryption.
Of all the world’s “leaders,” one person has stood out from the crowd by consistently advocating the most destructive, ignorant and authoritarian solutions. That man is UK Prime Minister David Cameron.
I’ve highlighted this fact time and time again here at Liberty Blitzkrieg. Here are a few examples in case you need some context: Continue reading »
Police are to be given the power to view everyone’s entire internet history in a new surveillance bill to be published next week, according to reports.
The proposed legislation will make it a legal requirement for telecoms and internet service providers to retain all of the web browsing history for all customers for a period of 12 months, according to the Daily Telegraph.
Authorities such as the police, intelligence services and the National Crime Agency would be able to access specific web addresses people had visited, but would need approval from a judge to view the content of websites, emails and social media messages. Continue reading »
There’s a privacy destroying bill moving through Congress called the Cybersecurity Information Sharing Act, or CISA, and it’s imperative that the American public stop it in its tracks. Here are a few bullet points on the bill from Fight for the Future:
- All privacy policies effectively null and void. Companies can share any private user data with the government, without a warrant, as long as the government says it is being used for a “cybersecurity” purpose.
- In exchange, companies are given blanket immunity from civil and criminal laws, like fraud, money laundering, or illegal wiretapping (if a violation was committed or exposed in the process of sharing data).
- Data is shared with a wide array of government agencies, from the FBI and NSA, to the IRS and local law enforcement. Many of these agencies have been breached within the last year and have outdated security systems, opening up the doors to even more cyber attacks.
- Companies that play along can get otherwise classified intelligence data from the government, including private information about their competitors.
While the Constitution protects Americans from the federal government, private companies don’t care about your 4th Amendment rights, particularly if you waive them in a “terms of service” agreement. CISA would essentially allow the U.S. government to violate the U.S. Constitution by coercing companies to provide them with data on American citizens it would not otherwise be allowed to collect on its own.
You know things are not well in the world when you hear claims that the Prime Minister of Great Britain had sex with a dead pig’s head and you barely flinch. That’s because sexual relations with farm animal carcasses simply pales in comparison to the man’s disastrous, authoritarian political positions.
In his latest act of verbal diarrhea, David Cameron has gone on the offensive…against Twitter. Little did he know it, but he’s actually quite late in his perceived “insight” into those who use the social media platform. For instance, it was over two years ago when Saudi authorities made their position quite clear. Here’s a excerpt from the post, Saudi Religious Police Chief Goes on the Attack…Against Twitter: Continue reading »
The very foundation of the free Internet is under severe threat from copyright laws that could ban independent media outlets, according to Matt Drudge. “I had a Supreme Court Justice tell me it’s over for me,” said Drudge, warning web users that they were being pushed “pawn-like” into the cyber “ghettos” of Twitter, Facebook and Instagram.
On Monday, we learned that global “leaders” had come to an agreement on the infamous Trans Pacific Partnership, or TPP. While discouraging, this doesn’t mean the game is over – far from it.
Although politicians have come to a secret agreement, this democracy killing, corporate monstrosity still has to pass the U.S. Congress. So it’s now up to all of us to create an insurmountable degree of opposition and make sure this thing is dead on arrival. Continue reading »
British intelligence has been running a secret programme ‘Karma Police’ to track the browsing activity of internet users around the world. It analyses users’ online habits, helps to build a person’s web profile and identify suspicious activities.
The United Nations has disgraced itself immeasurably over the past month or so.
In case you missed the following stories, I suggest catching up now:
Fresh off the scene from those two epic embarrassments, the UN now wants to tell governments of the world how to censor the internet. I wish I was kidding.
Published on Sep 6, 2015
Mozilla yesterday detailed a security attack on its bug tracker and testing tool Bugzilla, as well as the steps it is taking to mitigate a repeat incident. In short, a hacker compromised the service, stole security-sensitive information, and used it to attack Firefox users.
Bugzilla is open-source software that has been adopted by a variety of organizations in addition to Mozilla: WebKit, the Linux kernel, FreeBSD, Gnome, KDE, Apache, Red Hat, Eclipse, and LibreOffice. While Bugzilla is mostly public, access to security-sensitive information is restricted so that only certain privileged users can access it. Following the attack, Mozilla has now beefed up security on those accounts.
This British gentlemen does not even have an internet connection, because he knows that the government can (and does!) upload child porn unto computers of unwanted people and then come knocking at their door:
Highly recommended to listen to what he has to say.
Nov 13, 2013
Following reports that someone was trying to set-up WeAreChange’s Luke Rudkowski and OathKeepers’ Stewart Rhodes, as well as an eerie e-mail from a group calling themselves “Political Hackerz Squad” claiming that it was trying to set-up dozens of alternative media figures with child porn (and claiming credit for attacks on Rudkowski/Rhodes), Truthstream Media was alerted that email attachments are being sent to prominent people posing as “Melissa Melton” and appearing to request an interview before attaching alleged child porn sent out by unknown provocateurs. These agents declared that they were “soldiers in a digital war”; in the case of Truthstream, they used an e-mail that doesn’t belong to our site but appears to as it used Melissa’s name. Please know that we are under attack; we need your prayers and support.
And what could possibly go wrong?
– The Cyber Wars Begin: Obama Says US “Must Retaliate” Against China For Historic Data Breach (ZeroHedge, Aug 1, 2015):
On Friday, we highlighted a “secret” NSA map which purports to show every Chinese cyber attack on US targets over the past five years. “The prizes that China pilfered during its ‘intrusions’ included everything from specifications for hybrid cars to formulas for pharmaceutical products to details about U.S. military and civilian air traffic control systems,” intelligence sources told NBC, who broke the story.
The release of the map marked the culmination of a cyber attack propaganda campaign which began with accusations that North Korea had attempted to sabotage Sony, reached peak absurdity when Penn State claimed Chinese spies had taken control of the campus engineering department, and turned serious when Washington blamed China for what was deemed “the largest theft of US government data ever.” “Whether all of this is cause for the Pentagon to activate the ‘offensive’ component of its brand new cyber strategy remains to be seen,” we said yesterday.
As it turns out, the Office of Personnel Management breach will indeed be used to justify a cyber “retaliation”against China, because as The New York Times notes, “the hacking attack was so vast in scope and ambition that the usual practices for dealing with traditional espionage cases [do] not apply.” Here’s more:
The Obama administration has determined that it must retaliate against China for the theft of the personal information of more than 20 million Americans from the databases of the Office of Personnel Management, but it is still struggling to decide what it can do without prompting an escalating cyberconflict. Continue reading »
– Facebook’s solar-powered internet plane looks like a stealth bomber (The Verge, July 30, 2015):
Meet the flying ISP
Facebook’s plans to become a flying internet service provider for the developing world are coming to fruition. The company today introduced Aquila, a high-flying, long-endurance plane that will bring basic internet access to the developing world. A working model of the plane is now ready for testing, Facebook said.
Facebook’s shallow, V-shaped plane has the wingspan of a Boeing 737. But even fully loaded down with communications gear, Aquila only weighs between 880 to 1,000 lbs — about a third the weight of a Prius. “When deployed, it will be able to circle a remote region for up to 90 days, beaming connectivity down to people from an altitude of 60,000 to 90,000 [feet],” the company said in a blog post. This means the planes will be flying at an altitude above commercial aircraft, and even above the weather. Continue reading »
– Ashley Madison Hacked: America’s 37 Million ‘Cheaters’ About To Be Exposed (ZeroHedge, July 19, 2015):
Two months ago, AdultFriendFinder was hacked, exposing
fuck buddyfriend-finding federal employees among its 3.5 million user ‘exposure’. Today, as KrebsOnSecurity reports, large caches of data stolen from online cheating site AshleyMadison.com have been posted online by an individual or group that claims to have completely compromised the company’s user databases, financial records and other proprietary information (including profiles with all the customers’ secret sexual fantasies). The hacker group “The Impact Team” manifesto concludes, “too bad for those [37 million] men, they’re cheating dirtbags and deserve no such discretion.”
(Pictured: Proxyham by Benjamin Caudill / Rhino Security Labs)
Data collection and invasive monitoring of American citizens has been at the forefront of government activities for decades. After revelations by Edward Snowden in recent years, the fringe conspiracy theorists who warned of Big Brother surveillance and had been laughed at by the general population were finally proven right.But despite the literal hundreds of thousands of pages of information about government snooping and the Congressional “investigations” that followed, nothing has been done to curb the unabated violations of Americans’ Constitutional rights to be secure in their homes and personal effects.
Thus, as always, the free market began developing its own solutions. Earlier this year an inventor by the name of Benjamin Caudill announced a device he dubbed the ProxyHam which was going to literally change everything about how those concerned with privacy could connect to the internet: Continue reading »