Tag Archives: William Binney

Russian hacking is a silly smokescreen, so what’s behind it…?

This is one of the daftest stories I’ve heard in a long while, but since the Guardian, Washington Post and even President Obama are still trying to persuade us that this evidence-free allegation of Russian hacking is serious and worthy of the world’s attention then here is definitive debunking courtesy of Veteran Intelligence Professionals for Sanity (VIPS), whose combined expertise includes William Binney and Ray McGovern. They write:

The bottom line is that the NSA would know where and how any “hacked” emails from the DNC, HRC or any other servers were routed through the network. This process can sometimes require a closer look into the routing to sort out intermediate clients, but in the end sender and recipient can be traced across the network.

The various ways in which usually anonymous spokespeople for U.S. intelligence agencies are equivocating – saying things like “our best guess” or “our opinion” or “our estimate” etc. – shows that the emails alleged to have been “hacked” cannot be traced across the network. Given NSA’s extensive trace capability, we conclude that DNC and HRC servers alleged to have been hacked were, in fact, not hacked.

The evidence that should be there is absent; otherwise, it would surely be brought forward, since this could be done without any danger to sources and methods. Thus, we conclude that the emails were leaked by an insider – as was the case with Edward Snowden and Chelsea Manning. Such an insider could be anyone in a government department or agency with access to NSA databases, or perhaps someone within the DNC.

Concluding:

As for the comments to the media as to what the CIA believes, the reality is that CIA is almost totally dependent on NSA for ground truth in the communications arena. Thus, it remains something of a mystery why the media is being fed strange stories about hacking that have no basis in fact. In sum, given what we know of NSA’s existing capabilities, it beggars belief that NSA would be unable to identify anyone – Russian or not – attempting to interfere in a U.S. election by hacking. 1

Click here to read the full and very detailed analysis.

Furthermore, Craig Murray has testified that he actually KNOWS who is behind the leak (and be assured that Murray is no friend of Putin):

Craig Murray, the former UK ambassador to Uzbekistan, who is a close associate of Assange, called the CIA claims “bullshit”, adding: “They are absolutely making it up.”

I know who leaked them,” Murray said. “I’ve met the person who leaked them, and they are certainly not Russian and it’s an insider. It’s a leak, not a hack; the two are different things. 2 [bold emphasis added]

The extract was taken from an article credited to “Damien Gayle and [ahem] agencies” (with éminence grise ‘and agencies’ printed appropriately in a faint grey) published by the Guardian and with Murray’s statement buried deep within the paragraphs of spurious CIA hype. And that was that. Nobody has since cross-examined Murray’s assertion or otherwise acknowledged his testimony and rather than following it up in any fashion, the mainstream media has simply ignored it altogether.

Murray fleshes out his thoughts in an article on his blog on Sunday 11th:

I have watched incredulous as the CIA’s blatant lie has grown and grown as a media story – blatant because the CIA has made no attempt whatsoever to substantiate it. There is no Russian involvement in the leaks of emails showing Clinton’s corruption. Yes this rubbish has been the lead today in the Washington Post in the US and the Guardian here, and was the lead item on the BBC main news. I suspect it is leading the American broadcasts also.

A little simple logic demolishes the CIA’s claims. The CIA claim they “know the individuals” involved. Yet under Obama the USA has been absolutely ruthless in its persecution of whistleblowers, and its pursuit of foreign hackers through extradition. We are supposed to believe that in the most vital instance imaginable, an attempt by a foreign power to destabilise a US election, even though the CIA knows who the individuals are, nobody is going to be arrested or extradited, or (if in Russia) made subject to yet more banking and other restrictions against Russian individuals? Plainly it stinks. The anonymous source claims of “We know who it was, it was the Russians” are beneath contempt.

As Julian Assange has made crystal clear, the leaks did not come from the Russians. As I have explained countless times, they are not hacks, they are insider leaks – there is a major difference between the two. And it should be said again and again, that if Hillary Clinton had not connived with the DNC to fix the primary schedule to disadvantage Bernie, if she had not received advance notice of live debate questions to use against Bernie, if she had not accepted massive donations to the Clinton foundation and family members in return for foreign policy influence, if she had not failed to distance herself from some very weird and troubling people, then none of this would have happened.

The continued ability of the mainstream media to claim the leaks lost Clinton the election because of “Russia”, while still never acknowledging the truths the leaks reveal, is Kafkaesque.

Click here to read Murray’s full article

Meanwhile, as the media obsesses over this ‘fake news’ story of zero substance, it simultaneously misdirects the public from a related scandal that is founded on perfectly solid and assiduously gathered evidence. For the US electoral system is indeed deeply flawed, as Trump has repeatedly told us. However, the significant question is who benefited from its many built-in flaws and did this impact on the final election result?

Election rigging is Greg Palast’s specialism. He has previously investigated the serious irregularities that ensured Bush’s victories in the 2000 and 2004 US elections (read my previous post). As on both past occasions, when votes were either suppressed or lost, Palast has once again discovered that those affected in this election were overwhelmingly voters from ethnic minority districts:

Officially, Donald Trump won Michigan by 10,704 votes. But a record 75,335 votes were never counted. Most of these votes that went missing were in Detroit and Flint, Michigan, majority-black cities.

How could this happen? Did the Russians do it? Nyet. You don’t need Russians to help the Michigan GOP. How exactly do you disappear 75,000 votes? They call them spoiled votes. How do you spoil votes? Not by leaving them out of the fridge. Most are lost because of the bubbles. Thousands of bubbles couldn’t be read by the optical scanning machines.

This is taken from Greg Palast’s latest report. It serves as just a single example of a plethora of irregularities that eventually led Green candidate Jill Stein to call for recounts in Wisconsin, Michigan and Pennsylvania – states where Donald Trump narrowly beat Hillary Clinton. But, as Palast explained on Democracy Now!, the recounts in turn are just another travesty:

Instead of allowing that eyeball count of the votes that are supposedly blank, they said, “Oh, we’ll just run them back through the machines.” It’s like betting on an instant replay. It’s the same game. They just put them through the bad machines again. This is not just a bad way to count the ballots; it’s a way to not count African-American ballots.

And as Palast’s investigation reveals, Black voters already most affected by faults in the machines have been further disenfranchised by methods of voter suppression including, most notably, a system called Crosscheck:

After reading my report on the Kobach/Koch/Trump operation, which has removed tens of thousands of minority voters from the rolls in the swing states that surprisingly shifted to Trump, former federal judge (and now Congressman) Alcee Hastings told me Crosscheck is a criminal violation of federal law. Hastings has called for criminal indictments and written an official Congressional member letter to ask for investigation. 3

As Palast said on Democracy Now!:

Well, you know, people are looking for Russians, but what we had is a real Jim Crow election. Trump, for example, in Michigan, won by less than 11,000 votes. It looks like we had about 55,000 voters, mostly minorities, removed by this racist system called Crosscheck. In addition, you had a stoppage—even before the courts ordered the complete stop of the vote in Michigan, you had the Republican state officials completely sabotage the recount. […]

There were 87 machines in Detroit that were—that didn’t function. They were supposed to count about a thousand ballots each. You’re talking about a massive blockade of the black vote in Detroit and Flint, enough votes, undoubtedly, to overturn that election.

And you saw a mirror of this in Wisconsin, where, for example, there were many, many votes, thousands of votes, lost in the Milwaukee area, another African-American-heavy area.

But the question is: Where are these ballots not counted? They are not counted in African-American areas, in Dearborn, where there’s a heavy Arab-American community, in Latino communities. So, while we’re discussing hacking the machines, a lot of this was old-fashioned Jim Crow tactics, you know, from way back. And by the way, a lot of this is the result of the destruction and the gutting of the 1965 Voting Rights Act, which this is the first election post the Voting Rights Act. So, we saw—and Jill Stein said it correct—she expected to see a lot of hacking. What she found was, as she said, a Jim Crow election.

It is rather unsurprising, of course, that the Republicans and Trump have very actively opposed the recounts, whereas the behaviour of Obama and the liberal media, not to mention Clinton herself, is odder. For rather than backing Jill Stein’s efforts – the only action that could have successfully challenged the final election result – they instead chose to distract the public by demonising Russia with this nonsensical CIA concoction about hacking.

Palast is now calling for a full investigation and encouraging people to stand up for their voting rights:

Well, we need to have kind of a Standing Rock for voting. We need to restart the voting rights movement, because with Jeff Sessions coming in as attorney general, we have to start investigations now. I’m in Washington because 18 Million Rising, the Asian-American group, and the Congressional Black Caucus Representative Hastings, they have presented 50,000 signatures to the Justice Department, begging Justice, please, open an investigation of this racist Crosscheck system created by Donald Trump’s operatives, operating in 30 states, knocking off Asian-American, African-American, Latino voters. Please open the investigation now, before it becomes a new Justice Department—or maybe it’s in an Injustice Department.

Click here to read a full transcript and to watch the report and follow-up interview on the Democracy Now! website.

*

Update:

I am about twenty four hours behind on debunking the “evidence” of Russian hacking of the DNC because I have only just stopped laughing. I was sent last night the “crowdstrike” report, paid for by the Democratic National Committee, which is supposed to convince us. The New York Times today made this “evidence” its front page story.

It appears from this document that, despite himself being a former extremely competent KGB chief, Vladimir Putin has put Inspector Clouseau in charge of Russian security and left him to get on with it. The Russian Bear has been the symbol of the country since the 16th century. So we have to believe that the Russian security services set up top secret hacking groups identifying themselves as “Cozy Bear” and “Fancy Bear”. Whereas no doubt the NSA fronts its hacking operations by a group brilliantly disguised as “The Flaming Bald Eagles”, GCHQ doubtless hides behind “Three Lions on a Keyboard” and the French use “Marianne Snoops”.

writes Craig Murray in a follow-up piece published on December 14th. He continues:

What is more, the Russian disguised hackers work Moscow hours and are directly traceable to Moscow IP addresses. This is plain and obvious nonsense. If crowdstrike were tracing me just now they would think I am in Denmark. Yesterday it was the Netherlands. I use Tunnel Bear, one of scores of easily available VPN’s and believe me, the Russian FSB have much better resources. We are also supposed to believe that Russia’s hidden hacking operation uses the name of the famous founder of the Communist Cheka, Felix Dzerzhinsky, as a marker and an identify of “Guccifer2” (get the references – Russian oligarchs and their Gucci bling and Lucifer) – to post pointless and vainglorious boasts about its hacking operations, and in doing so accidentally leave bits of Russian language script to be found.

The Keystone Cops portrayal of one of the world’s most clinically efficient intelligence services is of a piece with the anti-Russian racism which has permeated the Democratic Party rhetoric for quite some time. Frankly nobody in what is vaguely their right mind would believe this narrative.

It is not that “Cozy Bear”, “Fancy Bear” and “Guccifer2” do not exist. It is that they are not agents of the Russian government and not the source of the DNC documents. Guccifer2 is understood in London to be the fairly well known amusing bearded Serbian who turns up at parties around Camden under the (assumed) name of Gavrilo Princip.

Click here to read Craig Murray’s full article.

*

On December 13th, Greg Palast was interviewed by Thom Hartmann on RT’s The Big Picture about evidence he has uncovered of vote rigging and the role of Kris Kobach, “Crosscheck” and the Koch Brothers in alleged voter suppression:

Palast said: This is a criminal conspiracy – that’s what Hastings said – by Republican operatives for Trump, particularly Kris Kobach, the Secretary of State of Kansas, and his cronies, the Secretaries of State in Michigan, Ohio, Pennsylvania, Alabama and Arizona too.

I spoke to Jill Stein about this the other night. She says, “Okay, if there is, like you say, evidence that the Russians picked our president for us, we want to know it – show the evidence, let’s stop getting distracted by it.” She’s worried that people are going to forget that in fact what happened here is what she calls ‘a Jim Crow election’. And that’s what happened, we had a Jim Crow election. […]

Well, what we did find through a series of cutouts $100,000 came from the Brothers Koch to Mr Kobach. Look, vote heist is not cheap! You need billionaires behind it. And they have their agenda and like you said – a fossil fuel agenda is a big part of it: pipelines. There was the standoff at Standing Rock. But let me tell you that we’re now looking at a President who’s already kind of pre-approved the XL pipeline, says he’s going to reverse the decision at Standing Rock. And let me tell you right now, you have to look at the money behind Trump.

*

Further Update:

On the day of Trump’s inauguration (Friday 20th) Greg Palast released his latest documentary The Best Democracy Money Can Buy for free viewing on Facebook. The documentary provides details of the methods of voter suppression Palast uncovered as well as evidence of a financial trail that leads directly to the Koch Brothers. The upload should be accessible for two days by following this link: https://www.facebook.com/bestdemocracymovie/

You do NOT need a Facebook account to watch it.

*

1 From an article entitled “US Intel Vets Dispute Russia Hacking Claims” published by consortiumnews.com on December 12, 2016. https://consortiumnews.com/2016/12/12/us-intel-vets-dispute-russia-hacking-claims/ 

2 From an article entitled “CIA concludes Russia interfered to help Trump win election, say reports” written by Damien Gayle and agencies, published in the Guardian on December 10, 2016. https://www.theguardian.com/us-news/2016/dec/10/cia-concludes-russia-interfered-to-help-trump-win-election-report?CMP=share_btn_tw

3 From an article entitled “Crosscheck Is Not Just Crooked, It’s Criminal” written by Greg Palast, published on December 5, 2016. http://www.gregpalast.com/crosscheck-not-just-crooked-criminal/  

6 Comments

Filed under Craig Murray, election fraud, Greg Palast, USA

play up! play up! and don’t play the game!

It is a fortnight since the story of NSA whistleblower Edward Snowden first broke with revelations of a “previously undisclosed program called Prism, which allows officials to collect material including search history, the content of emails, file transfers and live chats” announced to the world by Glenn Greenwald writing in the Guardian on Friday 7th:

The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian.

On that very same day I was heading down the M1 motorway to Watford with a friend to protest against the Bilderberg meeting taking place at the Grove hotel. A meeting that evidently has extremely close connections to those same “internet giants” who have been enabling the NSA as well as our own GCHQ to covertly snoop into every aspect of our lives. Indeed Google were already busy having their very own “private gathering” inside the same grounds of the very same hotel on days either side of the Bilderberg confab. In spite of being so closely connected to the inner circle of the Bilderberg clique, and thus to the very people who are engaged in this rampant abuse of our civil liberties, here’s what Google officially said to the Guardian:

In a statement, Google said: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a back door for the government to access private user data.”

Plausible deniability, in other words, and it gets better:

Several senior tech executives insisted that they had no knowledge of Prism or of any similar scheme. They said they would never have been involved in such a program. “If they are doing this, they are doing it without our knowledge,” one said.

An Apple spokesman said it had “never heard” of Prism.1

I imagine he’s probably never heard of those Foxconn factories in China with the suicide nets either.

Driving down in our van together we were missing the coverage of Snowden’s document release but then again we already knew all the most important details of the supposedly breaking story. That we are all now living under constant internet and telephone surveillance being old news to any who have cared to search within the margins or else entirely beyond the mainstream news. Since if you are familiar with the names of William Binney or Tom Drake, to name but two former NSA whistleblowers who have both featured in earlier posts, then Snowden’s document dump comes mainly as confirmation of prior knowledge. Details added, yes, but nothing substantially new or remotely surprising.

As we approached the M25 we had entered a twenty mile section of the M1 with CCTV cameras (unless we were both mistaken) fitted every hundred yards along the hard shoulder and funneling our way ahead to London. Having not driven along this newly refurbished stretch of the M1, I felt a growing unease at this additional and less anticipated evidence of where our society is so obviously heading, thoughts which were also combined with something more primal: a loathing of being so tightly boxed in. My friend said he felt similarly unnerved. The claustrophobia of high surveillance was creeping both of us out.

At Junction 8 we turned off and from there onwards followed the softly spoken instructions of our satnav. As patient as she was mellifluous, surely ‘Emily’, the satnav babe, was on our side, but hang on, what’s this…?

A secret ‘Big Brother’ operation is allowing officials to pinpoint the exact location of thousands of vehicles with satellite navigation systems.

The controversial scheme is built into the small print of a contract between the Department for Transport and the satnav company Trafficmaster.

Currently the ‘spy in the sky’ system is limited to some 50,000 drivers who have Trafficmaster’s Smartnav system.2

And that story was released back in 2007 so god knows what Emily gets up to these days… the flirty little snitch! Still, at least she knew the whereabouts of where we were heading, reliably delivering us to the entrance of the Bilderberg Fringe designated campsite where we were soon spotted by a warden who politely but promptly informed us that we were actually the wrong side of the hundred acres of scout parkland. In view of the latest child protection laws, the protesters, he informed us, were being located well away from the scouts and with access guarded by a couple of police vans on 24-hour patrol outside the gates just in case.

So we turned the van around and, without Emily to guide us now, aimed a little across country, down some forest tracks, and eventually coming to the proper site. It was dusk and we were soon parked up in a beautiful corner of the rolling Hertfordshire countryside, brewing up some teas and pulling out the camping chairs to idle the rest of the evening beside the white blossoms of the hawthorns and the brighter flush of ox-eye daisies. A lovely spot for camping, quiet and secluded, and also close enough to the main field to mingle with other campers who as darkness fell had put together a makeshift bonfire from pallets and entertained themselves with beers and music. It was odd to think that this accidental mix of people had all come along with the same singular intent. There to vent a little of our collective spleen directly towards the secretive banker-CEO-politico hobnobbing which was already well underway but happening five miles away inside the plush Grove hotel.

In many ways it was turning into a rather beautiful weekend. Beautiful weather, beautiful location and the following day, a beautiful gathering of common humanity hollering our peaceful but intransigent dissent across the lines of G4S security guards and towards the high security steel perimeter that surrounded the hotel half a mile away in the distance. Did the Bilderberg delegates hear our cries from our small but thronging paddock of free speech? I think they most probably did. Were they remotely listening to what any one of us had to say? Of course not – what do you think this is… a democracy or something?

In truth I’ve been struggling to decide what to write about the Bilderberg protests ever since I returned. The media, of course, knew exactly where to point its cameras. Alex Jones was bound to provide them with a story and offer a further distraction to the main event. Duly he obliged, goaded into action by the smug Andrew Neil and his supercilious sidekick David Aaronvitch (who ironically enough was once awarded the Orwell Prize – how Orwell must be turning in his grave). His latest rant going viral once again and thus overshadowing the more considered position of Tony Gosling who had sparred with Neil on the same subject only a few days earlier:

But then, Neil and Jones weren’t the only ones playing games over the Bilderberg weekend. For instance, the police liaison officers convivial mingling with the crowds was another little game with different rules. Likewise, the men in sharp suits who were milling around the gates of the Grove before drifting across to be matey with those of us enclosed within our little pen were part of yet another form of the same game. In response to all this or else for more provocative reasons, some of the protesters were playing parallel games of their own. Making entertaining announcements over their personal megaphones or more simply befriending those who helped to keep us under restraint.

And perhaps the one time the protesters really got the upper hand in these ongoing games was when two small children breached the security cordon and briefly ran amok. The G4S guards were clearly flustered and at a total loss to know what to do. Sure the meeting was taking place half a mile away across a canal with only one small bridge crossing and firmly sealed behind the newly installed and heavily patrolled perimeter fence high on the hill in the distance, but just what might have happened if these children had been permitted to run loose… might others have been inspired to boldly follow their lead?

Maybe if we sent all the kids out ahead, perhaps followed soon after by the pensioners and the disabled, then such a diversionary tactic might just be enough to keep the troops of security guards and mounted police sufficiently preoccupied for the rest of us to make a proper assault on the castle walls! I’m fairly sure I wasn’t alone in thinking such subversive thoughts… although these were just games of a purely imaginative kind. The single person who did in fact embark upon such daring act of civil disobedience having already been promptly captured; foiled within seconds by the lines of blue. She hadn’t stood an earthly. So why then had we all been submitted to airport-style security checks before being allowed entry into the paddock? Well, it was just another part of the games being played, as was the enormous police presence that accompanied some of the protesters, keeping an eye on their later pub rendezvous many miles away in a different village. Being followed hither and thither by security vans was all part of the festival, and of course we all enjoyed the romp no end.

Which basically sums up the lasting lesson of Bilderberg 2013 for me at least; that all of the many impositions and cruelties inflicted upon the downtrodden populations of this world by a small but dominant gang of well established oligarchs can actually be maintained only by virtue of such tacitly accepted games – games being so absolutely vital for ensuring that the world goes on working in the unjust way it does, with tyranny being so much more effectively instilled and ensured through disingenuous smiles and knowing winks than by any amount of armed security guards and steel fences. The fences and the guns being reserved for emergencies only and if the herd should ever get too out of control.

“One pro-transparency campaigner has had enough” wrote Charlie Skelton in his final Bilderblog for this year’s event, continuing with a quote:

“For too long, those in power made decisions behind closed doors, released information behind a veil of jargon and denied people the power to hold them to account.”

Who might that have been, you may wonder. Perhaps Michael Meacher, who was the only parliamentarian with the gumption to directly address the protesters gathered at the gates of the Grove. Well, no actually…

This particular critic of closed-doors government is a certain David Cameron, speaking shortly after taking office. “This coalition is driving a wrecking ball through that culture,” he said, “and it’s called transparency.”

And Cameron wasn’t alone in his humbug:

Cameron wasn’t the only one swinging the wrecking-ball of transparency inside this year’s Bilderberg. He was joined on the end of the chain by Jessica Mathews, who sits on the advisory council of Transparency International, and James Wolfensohn, who’s on the advisory council of Transparency International USA. Together, I’m sure, they were lobbying hard to open up this last bastion of murky politicking to the sunlight. If they could find the time between seminars.3

Click here to read more of Charlie Skelton’s summary of this year’s Bilderberg.

When I got home to Sheffield I had some explaining to do. Principally I needed to account for why it was I’d let myself get so sunburnt during the weekend. Now the strict answer was that due to the security checks and the long tailback that had resulted (many of the protesters, we understood, having been turned away at the entrance) I hadn’t been able to return from the paddock to pick up the sunscreen we’d rather foolishly left behind in our van. Not a terribly romantic answer and so I improvised. “A battle scar,” I told my nephews and niece when they asked me later, “received at the cost of fighting against the Bilderbergers.”

“Why are you fighting the Build-A-Bears?” my niece objected. “I love the Build-A-Bears” she added. “Not Build-A-Bears,” I explained, “but Bilderbergers…”

“What do they make?” she asked me. What do the make…? I hesitated. How could I explain to an eight year-old what the Bilderbergers make? “War,” I said bluntly after a pause. With both General Petraeus and Kissinger in attendance it seemed like a fair if simplified version of the truth.

Meanwhile Edward Snowden, the NSA whistleblower, has been involved in quite a caper of his own, leading the American government a merry dance in an almost nostalgic game of Cold War cat and mouse. Landing first in Hong Kong and then taking a flight on to Moscow, the news media is now altogether consumed with speculation about when and where he’ll most likely turn up next, whereas some others, perhaps most notably Naomi Wolf, are also questioning Snowden’s motivations. Is he really who he purports to be?, asks Wolf, with the unstated implication being that his adventures might in some way be part of a “limited hangout” operation; a convenient way to leak out minimal information primarily to the advantage of the spy agencies involved. As a further response, some are already asking who Naomi Wolf really is… here for example is Dave Lindorff offering a counter-offensive in last week’s Counterpunch.

In my opinion questioning the motivation of both parties is perfectly legitimate, since after all I cannot vouch for either Wolf or Snowden, having absolutely no personal association with either one. Wolf’s speculations may indeed be wild and self-promoting, as Lindorff asserts, yet the fuller verdict on Snowden surely remains unclear. For though his release of the Prism documents was undoubtedly in the public interest, and for that reason alone he ought to be protected from any subsequent prosecution, yet as I pointed out above, the evidence he presents adds surprisingly little to what we already knew or might easily have presumed.

What Snowden unquestionably has achieved, however, is to put the matter of public surveillance under the mainstream spotlight. Yet does this alone automatically affirm him as our new hero for freedom and democracy? For there might indeed be, as Wolf tentatively points out, a more hidden agenda going on behind the scenes, and whether or not Snowden is a man of integrity, he may still be an unwitting dupe. This leak, which serves to apply extra pressure to Obama, might, for instance, help with forcing the beleaguered President’s hand in other areas. It could be that by such means, Obama may now be further pressured into engaging in all-out war on Syria – one conflict that Obama has so far managed to steer clear of. Snowden’s leak becoming the straw that finally broke the camel’s back…

That said, charging Snowden under the Espionage Act strikes another fierce blow against freedom of speech, issuing a chill warning to other potential whistleblowers who may contemplate speaking out in the public interest, and thereby further trampling on the tattered remains of the American constitution. It is right therefore that those who stand for freedom ought to back Snowden’s actions and demand that he is pardoned of any crime, but it is also wise to be cautious of all those who cross from behind enemy lines. So let’s also remind ourselves that Snowden worked for the NSA and though we may like to believe that a leopard can change its spots, the associated proverb helpfully cautions us not to wish to be deceived…

The truth is the truth and yet the truth gets harder and harder to find. Take Bilderberg again, which commentators like Andrew Neil assure us is just a private club, and nothing to bother our silly little heads about. Ken Clarke, answering questions in the House of Commons (see below), playing a similar gambit. But then why the cover up for so long, we may legitimately ask, and why does the BBC even now continue to stick with the party line (of “nothing to see here”) rather than asking the tougher questions directly of the Bilderbergers themselves?

As a consequence, when we desire to uncover any meaningful facts about Bilderberg (starting with its actual existence) we are instead forced to turn to the alternative media, and the same goes for most other pressing issues including, to stick with the pertinent illustration, the rise of the surveillance state. The BBC reporting next to nothing when William Binney and Tom Drake were spilling the beans about the NSA, but some years later totally seduced by the story of Edward Snowden. The best we can say is that this is too little too late: closing the stable door after the horse has well and truly bolted.

And the emphasis is also shifted. Stories not to reveal more about Bilderberg or to challenge NSA and GCHQ surveillance, but instead about what Alex Jones believes about Bilderberg or intrigue surrounding the continuing flight of Edward Snowden. The news becoming the metanews and the important message being lost in all the hubbub. In such a fashion we are cajoled into accepting the unacceptable. These kinds of reporting of the news helping to get us more accustomed to the idea of clandestine political gatherings and of the secret services spying into every area of our personal lives. The media playing their own considerable part in the very same game… tricking us into masking our fears with our own false grins as we laugh along with the lies and feign delight in our own deception.

*

Update:

An article published in last Wednesday’s Washington Post [June 26th] offers further reasons to be cautious when it comes to Ed Snowden’s motivations. Entitled “Four years ago, Ed Snowden thought leakers should be ‘shot’”, it begins as follows:

Since he publicly acknowledged being the source of bombshell leaks about the NSA two weeks ago, Ed Snowden has portrayed government secrecy as a threat to democracy, and his own leaks as acts of conscience. But chat logs uncovered by the tech news site Ars Technica suggest Snowden hasn’t always felt that way.

“Those people should be shot in the balls,” Snowden apparently said of leakers in a January 2009 chat.

Click here to read the full article by Timothy B. Lee.

*

Additional:

Here is the best video compilation of the Bilderberg Fringe event I have found uploaded:

1 From an article entitled “NSA Prism program taps in to user data of Apple, Google and others” written by Glenn Greenwald and Ewen MacAskill, published by the Guardian on June 7, 2013. http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data

2 From an article entitled “Big Brother is keeping tabs on satnav motorists” published by the Daily Mail on September 25, 2007. http://www.dailymail.co.uk/news/article-483682/Big-Brother-keeping-tabs-satnav-motorists.html

3 From an article entitled “Bilderberg 2013: The sun sets on Watford” written by Charlie Skelton and published by the Guardian on June 11, 2013. http://www.guardian.co.uk/world/2013/jun/11/bilderberg-davidcameron

1 Comment

Filed under analysis & opinion, Britain, Charlie Skelton, internet freedom, mass surveillance

William Binney on the NSA domestic surveillance programme

On Friday [April 20th] Democracy Now! broadcast a special hour-long episode focusing on the growth of domestic surveillance in America. They spoke with National Security Agency whistleblower, William Binney, the key source for James Bamford’s recent exposé in Wired Magazine about how the NSA is quietly building a huge spy centre in Bluffdale, Utah. You can read more on this in an earlier post.

Binney served in the NSA for over 30 years working on intelligence gathering systems, but then quit his job on 31st October 2001, in the immediate aftermath of the September 11th attacks when, as he puts it “all the wraps came off for NSA” and the agency began its warrantless-wiretapping of citizens. Concerned to draw attention to vast data-mining programmes that he believed could “create an Orwellian state”, and in particular one programme codenamed Stellar Wind, which he had helped to develop, he decided to become a whistleblower. His home was then raided by FBI agents on 26th July 2007, whilst on the same day, the homes of Diane Roark, Kirk Wiebe and Ed Loomis were also subjected to FBI raids, ostensibly to uncover who had leaked information to the New York Times.

According to Binney:

“Well, that was the pretext, the leak on the—to give the New York Times thing. The real thing—what they were really doing was retribution and intimidation so we didn’t go to the Judiciary Committee in the Senate and tell them, “Well, here’s what Gonzales didn’t tell you, OK.” That was what it was really all about.”

And what was it that the then-Attorney General Alberto Gonzales was keeping the lid on?

“Well, it was about—it was about Stellar Wind and all of the domestic spying.”

Binney believes that the intelligence service now hold copies of almost all of the emails passing through the US. Asked if there has been any qualitative change since the Obama administration came in versus what the Bush administration was practicing, Binney says:

Actually, I think the surveillance has increased. In fact, I would suggest that they’ve assembled on the order of 20 trillion transactions about U.S. citizens with other U.S. citizens. […]

[But] The point is, the data that’s being assembled is about everybody. And from that data, then they can target anyone they want.

In the same roundtable interview, Democracy Now! also spoke with Academy Award-nominated filmmaker Laura Poitras, who explained how she is now repeatedly detained and questioned by federal agents whenever she enters the United States, and to Jacob Appelbaum, a computer security researcher who has also faced a stream of interrogations and electronic surveillance since he volunteered with the whistleblowing website, wikileaks.

Click here to watch video of the interview and to read the full transcript on the Democracy Now! website.

*

Additional:

In the second part of the same interview, broadcast on Monday April 23rd, Binney talks about how John Poindexter’s Total Information Awareness programme was a way “to test the waters in Congress to see how they would be receptive to something they were already doing”, and gives further details regarding the case made against fellow NSA whistleblower Tom Drake.

He is also asked his thoughts on the approval that has been granted for law enforcement agencies to use surveillance drones inside the United States. Binney says:

Well, that’s simply another step in the assembly of information. This is the visual part of the electronic information they’re collecting about people. So here’s your visual part. I mean, you could collect on phone—the cell phones as you move around, and then you can watch them now with a drone.

On the same broadcast, Jacob Appelbaum explains some of the ways one may now be able to circumvent this tightening state surveillance apparatus, such as setting up email accounts on Riseup rather than gmail or yahoo, and using browsers that can be downloaded free from the torproject. This actually sounds very promising to me, although not being a technical wiz, I confess that as yet I’m still linked up via the usual proprietary software.

I’ll leave final thoughts with Binney again, here speaking about the role of elected representatives, and their responsibility to uphold the rule of law:

Well, yeah, more importantly, it’s a violation of the constitutional rights of every American citizen. And that’s a violation that they took an oath to defend against.

Click here to watch the video and read a full transcript on the Democracy Now! website.

Leave a comment

Filed under drones, mass surveillance, September 11th, USA

welcome to the Panopticon: a potted history of mass surveillance

Two centuries ago:

In 1791, the Father of Utilitarianism and ardent social reformer Jeremy Bentham published blueprints for a wholly new design of prisons. Called the Panopticon, from observe (-opticon) all (pan-), the design, which involved a circular annulus of cells surrounding a central lodge, allowed the guards to keep an eye on all of the inmates, and importantly, without them, in turn, being aware of when they were being watched.

Bentham had big plans for his design, suggesting that aspects of the concept might usefully be applied to the construction of hospitals, schools and workhouses.

One century ago:

H.G. Wells was the father of a good many utopias. He spent the greater part of his creative life planning the shape of future societies. One of his most complete visions is laid out in a novel entitled simply A Modern Utopia (and published 1905). The story goes that two travellers walking in the Swiss Alps suddenly discover themselves in a parallel world. A new world that is Earth (at least geographically and biologically speaking) but one where civilisation has been reconstructed on altogether more Wellsian principles.

The inhabitants of this world are guaranteed housing, food and basic essentials. Even the unemployed are provided with a minimum wage, this safety net granted as “workfare” rather than “welfare”, with its recipients being coerced into work for the greater good of the state. In this vision of Wellsian meritocracy, the total measure of individual status depends solely upon earned income: the citizens of the new society regarding being broke as “clear evidence of unworthiness”.

Meanwhile criminal types and drug-users are given very short shrift. Removed from the main body of society and placed on high security prison islands, they are also sexually segregated to ensure that such poor genetic stock can never again pollute the otherwise healthy gene-pool.

Central to this alternative civilisation, the two explorers learn, there is a world-government (Wells never can resist the idea) made possible by a monumental database, with information stored on a card-index system housed in Paris. And Wells says that “Such a record is inevitable if a Modern Utopia is to be achieved.” But of course, what Wells could not foretell was how quickly technology would render the card-index system obsolete and make the establishment of such a global database entirely achievable.

Half a century ago:

It was 1948 when George Orwell settled into seclusion on the Isle of Jura, and there began to work on his most lasting contribution to literature and language. A little over a year passed before his terrifying vision of a future dystopia would be published, entitled simply Nineteen Eighty-Four.

Nineteen Eighty-Four isn’t merely gloomy, it is hellish in altogether more Orwellian ways. A one-party state, in which every member of Ingsoc (the Party) lives under close and constant scrutiny, watched on two-way telescreens, which are highly sensitive devices that can never be turned off. Casual conversations are eavesdropped, by friends just as surely as by strangers, and children are actively encouraged to snoop on their parents; enrolling with the juvenile troops of Spies rather than Scouts (often to the delight and pride of their own brainwashed parents).

There is absolutely no place for privacy in Nineteen Eighty-Four, certainly not for anyone in the Party, with the telescreens monitoring indoors, whilst outside, and aside from the hidden microphones, it is safe to presume that everyone is probably an informant. The Party has, however, less concern for minor dissent that may flare up within the lower ranks of ‘the proles’; the masses that it regards as so ignorant and intent on self-preservation as to pose no serious counter-revolutionary threat. Although even amongst the proles there stalks the ever-present menace of the Thought Police.

Orwell’s new world of dread was forged from the same ideological foundations as the just defeated axis of Fascism. It was a world divided by class, hatred and perpetual war. A world riven and driven by Power. And undoubtedly Orwell was in part presenting his critique of the post-war Soviet Union reconstructed under that other great dictator, Joseph Stalin, with his all-new formula for Communism. Indeed, on the basis of Orwell’s images of Big Brother, it’s fair to judge that this all-powerful leader of Ingsoc (the single party governing the new alliance of Oceania1) was a caricature of Stalin.

Aldous Huxley was Orwell’s old teacher, and in his own futurist satire Brave New World (published in 1932), had envisaged a world of shopping and leisure, founded upon gentle Pavlovian conditioning of eugenically perfected infants, made ready for the soft bed of a world constructed in accordance with Freud’s pleasure principle. In Brave New World, everyone is Dolly the Sheep, and so more forcible means of coercion have become a thing of the forgotten past. George Orwell wrote of his old teacher Huxley’s prophesy as follows:

Mr Aldous Huxley’s Brave New World was a good caricature of the hedonistic Utopia, the kind of thing that seemed possible and even imminent before Hitler appeared, but it had no relation to the actual future. What we are moving towards at this moment is something more like the Spanish Inquisition, and probably far worse, thanks to the radio and the secret police. There is very little chance of escaping it unless we can reinstate the belief in human brotherhood without the need for a ‘next world’ to give it meaning.”2

Of course, it has turned out to be more complicated than that. Stalin died, and the Eastern Bloc with its many citizen spies and Stasi Thought Police was eventually overthrown by resistance within as much as without. Aldous Huxley always maintained that all forms of brutal totalitarian oppression must eventually succumb to such internal pressures, being forced to give way to a different and softer kind of centralised control, and for a short time it seemed that he was correct. But then came September 11th and how quickly in its shadows, the jackboots came back on the ground. Stomping down on the face of humanity all across the world.

Since about a decade:

In January 2002, within the months following the September 11th attacks, the US Defense Department, under the umbrella of the Defense Advanced Research Projects Agency (DARPA), began to develop a vast surveillance project, requiring a database even beyond H.G. Wells’ imagining. Set up under the direction of Admiral John Poindexter – formerly Ronald Reagan’s National Security Advisor3 – the Information Awareness Office (IAO) was intended to serve the interests of “National Security”. Its aim was to establish methods of collecting and collating information of all kinds. Records of what an individual purchased, where they travelled, what they watched, and so on, whilst also incorporating information from public records on education and health. More covert snooping was also proposed as a necessary means of analysing internet use, emails, and faxs.

Other plans included the development of “human identification at distance systems” based on biometrics, which would obviate the current reliance on human operators to keep their eyes peeled. Combined with the ever extending network of CCTV, such a system could conceivably keep track of movements of the entire population. In a world soon to be filled with automated face-recognition systems or more probably – given recent technological developments – whole body scanners, it will be unnecessary for government authorities to force the people to carry forms of identity (or under more extreme tyranny, to wear badges), because it will become impossible to hide.

By February 2003, the IAO had begun funding what they called the Total Information Awareness (TIA) Program, although by May 2003 the program had already been renamed the Terrorism Information Awareness Program in an attempt to allay growing public anxiety of its Orwellian spectre. Then in August 2003, Poindexter was forced to resign as TIA chief with concerns that his central role in the Iran-Contra affair had made him unfit to run a sensitive intelligence program. Soon after this the IAO closed and officially the TIA program was terminated with all funding removed, yet it is widely acknowledged that the core of the project remains and that funding was merely switched to other government agencies.4

Finally, perhaps some indication of the true intent of these surveillance projects may be gleaned from the original IAO logo. Featuring a planetary-sized pyramid capped by an all-seeing eye that is scanning the entire Earth, the message is surely loud enough, especially when captioned with the motto “scientia est potentia” (knowledge is power). For what is this pyramid and the all-seeing eye meant to represent? That Big Brother is watching you? That you are already inside the Panopticon? Here was the official explanation of its meaning:

For the record, the IAO logo was designed to convey the mission of that office; i.e., to imagine, develop, apply, integrate, demonstrate, and transition information technologies, components, and prototype, closed-loop information systems that will counter asymmetric threats by achieving total information awareness useful for preemption, national security warning, and national security decision making. On an elemental level, the logo is the representation of the office acronym (IAO) the eye above the pyramid represents “I” the pyramid represents “A,” and the globe represents “O.” In the detail, the eye scans the globe for evidence of terrorist planning and is focused on the part of the world that was the source of the attacks on the World Trade Center and the Pentagon.”5

Meanwhile, British governments have also brought in rafts of new legislation to extend police powers and limit personal freedom. Indeed, the first major new Terrorism Act, which was introduced in 2000 (and thus prior to the September 11th attacks), actually redefined the meaning of terrorism in order to increase the scope for police intervention. Whilst the disconcertingly titled RIP Act, which quickly followed, further extended the rights for government to intercept communications and to patrol the internet. Then, during David Blunkett’s tenure as Home Secretary, the RIP Act (or RIPA) was broadened again, becoming so extensive that almost 800 separate organisations, including more than 450 councils, have the right to invoke it. People might now be snooped on right across the country for offences no more serious than littering and under-age smoking.6

In the aftermath of the London bombings of July 7th 2005, the New Labour governments under both Blair and Brown also pressed hard for an extension of police rights to detain terrorist suspects. What had begun with seven days, quickly progressed to three weeks, and then, at least in the government’s opinion, required not less than 90 days. The justification given for these extraordinary new measures – the worst of which were thankfully rejected by Parliament – being that plots of the most diabolical kind were suddenly so widespread and complex that the ordinary course of justice had to be by-passed in order to ensure public safety. Around the same time, the introduction of national ID cards was also thwarted, in part thanks to a massive public outcry. Nevertheless, the threat of terrorism (the real risk of which is far lower than during the days of IRA attacks) is the overriding justification for ever more surveillance of our public spaces and our personal lives.7

Throughout the last decade we have all been asked to give up our privacy and other civil liberties on the grounds of enhanced security: sacrificing freedom today for the sake of freedom tomorrow, which may well be, of course, a bargain with the devil. By the end of 2006, the United Kingdom was being described by some experts as ‘the most surveilled country’ among all industrialized Western nations.8

I heard someone speaking on Radio 4 a few years ago. Wrongly convicted for a crime he was later cleared of, he had as a direct consequence spent more than ten years of his life in prison. The interviewer asked him what his first thoughts were after being released as a free man. “Well, I was horrified,” he replied, “horrified that there were just as many cameras on the outside as inside. It was like I’d never left prison.”9

Now and the foreseeable future:

Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy10.

From an article entitled “The NSA is Building the Country’s Biggest Spy Center (Watch What You Say)” written by James Bamford, the author of The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America. Published in Wired magazine on March 15th, Bamford continues:

For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail. William Binney was a senior NSA crypto-mathematician largely responsible for automating the agency’s worldwide eavesdropping network. […]

He explains that the agency could have installed its tapping gear at the nation’s cable landing stations—the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore. If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law. Instead it chose to put the wiretapping rooms at key junction points throughout the country—large, windowless buildings known as switches—thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US. […]

The eavesdropping on Americans doesn’t stop at the telecom switches. To capture satellite communications in and out of the US, the agency also monitors AT&T’s powerful earth stations, satellite receivers in locations that include Roaring Creek and Salt Creek. […]

Binney left the NSA in late 2001, shortly after the agency launched its warrantless-wiretapping program. “They violated the Constitution setting it up,” he says bluntly. “But they didn’t care. They were going to do it anyway, and they were going to crucify anyone who stood in the way. When they started violating the Constitution, I couldn’t stay.” Binney says Stellar Wind was far larger than has been publicly disclosed and included not just eavesdropping on domestic phone calls but the inspection of domestic email. At the outset the program recorded 320 million calls a day, he says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts. The haul only grew from there. According to Binney—who has maintained close contact with agency employees until a few years ago—the taps in the secret rooms dotting the country are actually powered by highly sophisticated software programs that conduct “deep packet inspection,” examining Internet traffic as it passes through the 10-gigabit-per-second cables at the speed of light. […]

After he left the NSA, Binney suggested a system for monitoring people’s communications according to how closely they are connected to an initial target. The further away from the target—say you’re just an acquaintance of a friend of the target—the less the surveillance. But the agency rejected the idea, and, given the massive new storage facility in Utah, Binney suspects that it now simply collects everything. “The whole idea was, how do you manage 20 terabytes of intercept a minute?” he says. “The way we proposed was to distinguish between things you want and things you don’t want.” Instead, he adds, “they’re storing everything they gather.” And the agency is gathering as much as it can.

Once the communications are intercepted and stored, the data-mining begins. “You can watch everybody all the time with data- mining,” Binney says. Everything a person does becomes charted on a graph, “financial transactions or travel or anything,” he says. Thus, as data like bookstore receipts, bank statements, and commuter toll records flow in, the NSA is able to paint a more and more detailed picture of someone’s life.

Click here to read more of James Bamford’s eye-opening article, and then, here to read a still more extraordinary article published by Wired magazine on the very same day:

More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them.

Earlier this month, Petraeus mused about the emergence of an “Internet of Things” — that is, wired devices — at a summit for In-Q-Tel, the CIA’s venture capital firm. “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,” Petraeus enthused, “particularly to their effect on clandestine tradecraft.”

All those new online devices are a treasure trove of data if you’re a “person of interest” to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the “smart home,” you’d be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room’s ambiance.

Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing,”11

Orwell, for all of his profound insight and prescience, could never have imagined the sort of universal networks of surveillance being so rapidly put in place today. He didn’t see, for instance, as Huxley might have done, how people would one day almost willingly give up their privacy, and not only as the price for security, but purely for convenience and pleasure. That personal tracking devices would one day become such highly desirable commodities, in the form of mobile phones and ‘sat nav’s, that it would actually be strange not to carry one. That social networking sites would be temptation enough for many millions to divulge huge volumes of personal information, private opinions, dreams and fantasies. That others would broadcast their thoughts via emails, tweets, blogs, and all could be swept up in a worldwide web. The worldwide wiretap, as Julian Assange referred to it.

This post is another part of the immense traffic of data presumably being collected and analysed by those at the NSA (and in all probability also filtered using servers at our own GCHQ). That you are reading this is most probably being recorded too. So feel free to add a comment, although you should be cautioned that whatever you do say may later be used as evidence against you. The Panopticon is watching all of us.

Click here to read a wikipedia overview of the types of mass surveillance now used in the United Kingdom and elsewhere.

*

Additional:

Here is a Russia Today report broadcast a few days later on Friday 30th March entitled: “Minority report: Era of total surveillance zooms-in on US?”

Click here to find the same report at Russia Today website.

As for Britain, and whatever the situation right now, the government is just about to announce new measures that will open the way for GCHQ to have “access to communications on demand, in real time” with the justification being, as always, “to investigate serious crime and terrorism and to protect the public”:

A new law – which may be announced in the forthcoming Queen’s Speech in May – would not allow GCHQ to access the content of emails, calls or messages without a warrant.

But it would enable intelligence officers to identify who an individual or group is in contact with, how often and for how long. They would also be able to see which websites someone had visited.

Click here to read the full BBC news report from April 1st.

1 The setting is roughly as follows. Some time after the World War, the world divided up into three warring superpowers: Oceania (previously America, Australia and Airstrip One); Eurasia (Russia and the rest of Europe); and Eastasia (China and India). These states have since then been engaged in an endless three-sided conflict, fighting to gain control of the resources in a disputed zone which includes North Africa and the Middle East. Progress in this conflict is reported to the citizens of Oceania via a government controlled media, relaying information manufactured by the Ministry of Truth.

2 Taken from “Notes on the way” by George Orwell, first published in Time and Tide. London, 1940.

3 Poindexter had been previously been convicted of lying to Congress and altering and destroying documents pertaining to the Iran-Contra Affair.

4 These include Advanced Research and Development Activity (ARDA), a part of the Disruptive Technology Office (run by to the Director of National Intelligence); and SAIC, run by former Defense and military officials and which had originally been awarded US$19 million IAO contract to build the prototype system in late 2002.

5 Statement of the Information Awareness Office regarding the meaning and use of the IAO logo. Source: Question 15 in the IAO Frequently Asked Questions – document dated February, 2003 which can be accessed at http://www.darpa.mil/iao/TIA_FAQs.pdf

6 The Regulation of Investigatory Powers Act 2000 (RIP or RIPA) regulates the powers of public bodies to carry out surveillance and investigation, especially with regard to the interception of communication. It can be invoked by government officials specified in the Act on the grounds of national security, and for the purposes of preventing or detecting crime, preventing disorder, public safety, protecting public health, or in the interests of the economic well-being of the United Kingdom.

“Councils have used laws designed to combat terrorism to access more than 900 people’s private phone and email records in the latest example of Britain’s growing surveillance state. Town hall spies found out who residents were phoning and emailing as they investigated such misdemeanours as dog quarantine breaches and unlicensed storage of petrol. The news prompted fresh calls from civil rights groups for a reform of the Regulation of Investigatory Powers Act (Ripa), which was originally brought in to combat terrorism and serious crime but is increasingly being used by councils to snoop on members of the public. In April a council in Dorset used Ripa powers to spy for weeks on a family it wrongly suspected of breaking rules on school catchment areas. Other local authorities have used covert surveillance to investigate such petty offences as dog fouling and under-age smoking.” extract from “Council snoopers access 900 phone bills” by Gordon Rayner, Chief Reporter, Daily Telegraph, 5th June 2008. http://www.telegraph.co.uk/news/2075026/Council-snoopers-access-900-phone-bills.html

7 “Deputy chief constable of Hampshire Ian Readhead said Britain could become a surveillance society with cameras on every street corner. He told the BBC‘s Politics Show that CCTV was being used in small towns and villages where crime rates were low… ‘If it’s in our villages, are we really moving towards an Orwellian situation where cameras are at every street corner?’

‘And I really don’t think that’s the kind of country that I want to live in.’ There are up to 4.2 million CCTV cameras in Britain – about one for every 14 people.” from BBC News, Sunday, 20th May 2007. http://news.bbc.co.uk/1/hi/uk/6673579.stm

8 “Produced by a group of academics called the Surveillance Studies Network, the [Surveillance Society] report was presented to the 28th International Data Protection and Privacy Commissioners’ Conference in London, hosted by the Information Commissioner’s Office. […]

The report’s co-writer Dr David Murakami-Wood told BBC News that, compared to other industrialised Western states, the UK was “the most surveilled country”.

“We have more CCTV cameras and we have looser laws on privacy and data protection,” he said.

“We really do have a society which is premised both on state secrecy and the state not giving up its supposed right to keep information under control while, at the same time, wanting to know as much as it can about us.”

The report coincides with the publication by the human rights group Privacy International of figures that suggest Britain is the worst Western democracy at protecting individual privacy.

The two worst countries in the 36-nation survey are Malaysia and China, and Britain is one of the bottom five with ‘endemic surveillance’.”

From a BBC news article entitled “Britain is ‘surveillance society’” published on November 2, 2006. http://news.bbc.co.uk/1/hi/uk/6108496.stm

9 Unfortunately, since I did not have pen at hand – I was driving at the time! – I can no longer recall his precise words and so I have been compelled to paraphrase what he said. I have tried to be accurate so far as memory serves me.

10 From an article entitled “The NSA is Building the Country’s Biggest Spy Center (Watch What You Say)” written by James Bamford, published in Wired magazine on March 15, 2012. http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1

11 From an article entitled “CIA Chief: We’ll Spy on You Through Your Dishwasher”, written by Spencer Ackerman, published by Wired magazine on March 15, 2012. http://www.wired.com/dangerroom/2012/03/petraeus-tv-remote/

3 Comments

Filed under analysis & opinion, Britain, mass surveillance, Uncategorized, USA