WHAT ELSE IS OUR GOVERNMENT NOT TELLING US ?


And You Thought You Heard It All !




Well Here You Go !





Most people use social media like Facebook and Twitter to share photos of friends and family, chat with friends and strangers about random and amusing diversions, or follow their favorite websites, bands and television shows.
But what does the US military use those same networks for? Well, we can't tell you: That’s “classified,” a CENTCOM spokesman recently informed Raw Story.
One use that’s confirmed, however, is the manipulation of social media through the use of fake online “personas” managed by the military. Recently the US Air Force had solicited private sector vendors for something called “persona management software.” Such a technology would allow single individuals to command virtual armies of fake, digital “people” across numerous social media portals.
These “personas” were to have detailed, fictionalized backgrounds, to make them believable to outside observers, and a sophisticated identity protection service was to back them up, preventing suspicious readers from uncovering the real person behind the account. They even worked out ways to game geolocating services, so these “personas” could be virtually inserted anywhere in the world, providing ostensibly live commentary on real events, even while the operator was not really present.
When Raw Story first reported on the contract for this software, it was unclear what the Air Force wanted with it or even if it had been acquired. The potential for misuse, however, was abundantly clear.
A fake virtual army of people could be used to help create the impression of consensus opinion in online comment threads, or manipulate social media to the point where valuable stories are suppressed.
Ultimately, this can have the effect of causing a net change to the public’s opinions and understanding of key world events.
Wired.com published an article how US spies are making investments in the Company In-Q-Tel in order to monitor your blogs and read your tweets.
In-Q-Tel, the investment arm of the CIA and the wider intelligence community, is putting cash into Visible Technologies, a software firm that specializes in monitoring social media. It’s part of a larger movement within the spy services to get better at using “open source intelligence” – information that’s publicly available, but often hidden in the flood of TV shows, newspaper articles, blog posts, online videos and radio reports generated every day.
Visible crawls over half a million web 2.0 sites a day, scraping more than a million posts and conversations taking place on blogs, online forums, Flickr, YouTube, Twitter and Amazon. (It doesn't touch closed social networks, like Facebook, at the moment.) Customers get customized, real-time feeds of what’s being said on these sites, based on a series of keywords.
“That’s kind of the basic step – get in and monitor,” says company senior vice president Blake Cahill.
Then Visible “scores” each post, labeling it as positive or negative, mixed or neutral. It examines how influential a conversation or an author is. (“Trying to determine who really matters,” as Cahill puts it.) Finally, Visible gives users a chance to tag posts, forward them to colleagues and allow them to response through a web interface.
In-Q-Tel says it wants Visible to keep track of foreign social media, and give spooks “early-warning detection on how issues are playing internationally,” spokesperson Donald Tighe tells Danger Room.
Of course, such a tool can also be pointed inward, at domestic bloggers or tweeters. Visible already keeps tabs on web 2.0 sites for Dell, AT&T and Verizon. For Microsoft, the company is monitoring the buzz on its Windows 7 rollout. For Spam-maker Hormel, Visible is tracking animal-right activists’ online campaigns against the company.
“Anything that is out in the open is fair game for collection,” says Steven Aftergood, who tracks intelligence issues at the Federation of American Scientists. But “even if information is openly gathered by intelligence agencies it would still be problematic if it were used for unauthorized domestic investigations or operations. Intelligence agencies or employees might be tempted to use the tools at their disposal to compile information on political figures, critics, journalists or others, and to exploit such information for political advantage. That is not permissible even if all of the information in question is technically ‘open source.’”
Visible chief executive officer Dan Vetras says the CIA is now an “end customer,” thanks to the In-Q-Tel investment. And more government clients are now on the horizon. “We just got awarded another one in the last few days,” Vetras adds.
Tighe disputes this – sort of. “This contract, this deal, this investment has nothing to do with any agency of government and this company,” he says. But Tighe quickly notes that In-Q-Tel does have “an interested  end customer” in the intelligence community for Visible. And if all goes well, the company’s software will be used in pilot programs at that agency. “In pilots, we use real data. And during the adoption phase, we use it real missions.”
Neither party would disclose the size of In-Q-Tel’s investment in Visible, a 90-person company with expected revenues of about $20 million in 2010. But a source familiar with the deal says the In-Q-Tel cash will be used to boost Visible’s foreign languages capabilities, which already include Arabic, French, Spanish and nine other languages.
Visible has been trying for nearly a year to break into the government field. In late 2008, the company teamed up with the Washington, DC, consulting firm Concepts & Strategies, which has handled media monitoring and translation services for U.S. Strategic Command and the Joint Chiefs of Staff, among others. On its website, Concepts & Strategies is recruiting “social media engagement specialists” with Defense Department experience and a high proficiency in Arabic, Farsi, French, Urdu or Russian. The company is also looking for an “information system security engineer” who already has a “Top Secret SCI [Sensitive Compartmentalized Information] with NSA Full Scope Polygraph” security clearance.
The intelligence community has been interested in social media for years. In-Q-Tel has sunk money into companies like Attensity, which recently announced its own web 2.0-monitoring service. The agencies have their own, password-protected blogs and wikis – even a MySpace for spooks. The Office of the Director of National Intelligence maintains an Open Source Center, which combs publicly available information, including web 2.0 sites. Doug Naquin, the Center’s Director, told an audience of intelligence professionals in October 2007 that “we're looking now at YouTube, which carries some unique and honest-to-goodness intelligence…. We have groups looking at what they call ‘citizens media’: people taking pictures with their cell phones and posting them on the internet. Then there’s social media, phenomena like MySpace and blogs.”
But, “the CIA specifically needs the help of innovative tech firms to keep up with the pace of innovation in social media. Experienced IC [intelligence community] analysts may not be the best at detecting the incessant shift in popularity of social-networking sites. They need help in following young international internet user-herds as they move their allegiance from one site to another,” Lewis Shepherd, the former senior technology officer at the Defense Intelligence Agency, says in an e-mail. “Facebook says that more than 70 percent of its users are outside the U.S., in more than 180 countries. There are more than 200 non-U.S., non-English-language microblogging Twitter-clone sites today. If the intelligence community ignored that tsunami of real-time information, we’d call them incompetent.”


Source:
www.disclose.tv



NSA Can Easily Bug Your Switched off I-Phone: Here’s How You Can Stop Them



Edward Snowden’s recent revelation that the NSA can bug cell phones even when they are turned off left some experts split on whether it is true or not. But a group of hackers claim that at least there is a way to protect your phone from spies’ ears.
Snowden, who exposed the American government’s secret mass surveillance program, has been making headlines in the media for almost a year with shocking details about the scale of snooping by the National Security Agency (NSA).
In last week’s interview with NBC, the former CIA employee yet again added to the spreading privacy panic when he said the NSA can actually eavesdrop on cellphones even when they are turned off.
“Can anyone turn it on remotely if it’s off?” Williams asked Snowden referring to the smartphone he used for travel to Russia for the interview. “Can they turn on apps? Did anyone know or care that I Googled the final score of the Rangers-Canadiens game last night because I was traveling here?”
“I would say yes to all of those,” Snowden replied. “They can absolutely turn them on with the power turned off to the device,” he added.
It is not news that American (and possibly not only American) special services have been able to use mobile phones as a spying tool for at least a decade.
Back in 2006, media reported that the FBI applied a technique known as a “roving bug” which allowed them to remotely activate a cell phone’s microphone and listen to nearby conversations.
Pinpointing a person’s location to within just a few meters has not been a problem either thanks to a tracking device built into mobile phones. This option, a party-spoiler for criminals, has also been helpful in finding people who have gone missing or got into trouble. The general belief has been that removing a battery would make tracking impossible.
In July last year, Washington Post wrote that “By September 2004, a new NSA technique enabled the agency to find cellphones even when they were turned off.”
The agency used it to help American forces in Iraq. Joint Special Operations Command (JSOC) called the method “The Find,” and “it gave them thousands of new targets, including members of a burgeoning al-Qaeda-sponsored insurgency in Iraq,” the paper wrote.
11
It is very likely that the scale of the use of such techniques has grown much bigger and more sophisticated due to SciTech developments. And with millions of people getting addicted to their smartphones – which they carry with them literally everywhere – it is much easier to spy on them.
But, according to a piece published in Wired magazine, there is a way to make sure that no one is listening to you. The article, citing security researchers, says that if an attacker had a chance to install malware before the phone is turned off, the software could make it only look like the phone is shutting down. Instead, it “enters a low-power mode that leaves its baseband chip—which controls communication with the carrier—on”.
Such “playing dead” state would allow the phone to receive commands, including one to activate its microphone, says Eric McDonald, a hardware engineer in Los Angeles told the news outlet. It also gives practical advice on how to deal with the situation. Whether it works or not – is another question.
If you’ve got totally paranoid about your iPhone, you can try to put it into device firmware upgrade (DFU) mode, Eric McDonald, a hardware engineer, told Wired. In this mode, all elements of the phone are shut down except for the USB port which waits for iTunes to install new firmware.
To enter the mode, use any power outlet or computer USB port to plug in the iPhone. Then hold the power button for three seconds, after start holding the home button, too. After 10 seconds, release the power button, but not the home button. Wait for another 10-15 seconds.
The routine is to send “hardware reset” to the phone’s power management unit that overrides any running software, including any malware designed to fake a shutdown, McDonald says.
Now the phone won’t turn on when someone holds the power button or power up when the phone is plugged into a power source and you can leak some NSA secrets to a Glenn Greenwald. But if you decide to make a phone call at some point, you will have to hold the power button and home button together until the Apple logo appears.
The video below explains it with the use of a real iPhone.


There are easier ways to enter a complete shutdown, according to Wired. You can hold the home and power buttons simultaneously for 10 seconds without the DFU button sequence. This will put the phone in too low level a state for anything to able to interact with its baseband.
source

No comments:

Post a Comment