A timely note on current developments, copied from http://cryptome.org/2013/06/obama-prism.pdf for your information and enjoyment. Sadly though does it reveal all too clearly an executive presidential administration in crisis and lacking the requisite novel and/or NEUKlearer HyperRadioProActive Future IntelAIgencies and CyberIntelAIgents to Lead Right Royally, with Virtual Immunity and Programmed and Programmeable Impunity.

President Obama’s Data Harvesting Program: NSA as Pollster, PRISM as MISO
by John Stanton

It is way too soon to bet the house fortune on the reliability of reports by the Washington Post (Washington, DC) and The Guardian (United Kingdom) on President Obama’s data harvesting program, known for the moment as PRISM.

With the hot pursuit of mainstream media reporters underway by the US Department of Justice (Associated Press, for example); a US Corporate‐State show trial of Bradley Manning, Julian Assange/Wikileaks (Obama has already stated they are guilty); the extraordinary cyberwar/hacking accusations against the Chinese government; and the shrill sound of cyber quackery from the Defense Science Board and its legion of security contractors, caution all around is the order of the day.

Indeed, the membership of President Obama’s National Security Telecommunications Advisory Committee (NTSAC) reflects the close proximity of the President to critical cyber/telecom/ISP leaders who likely get advanced warning of the incoming nukes. Some of the NSTAC members include Verizon Business Group, Raytheon, AT&T, Vonage, Intelsat, Avaya, Microsoft and Lockheed Martin. And they did not know that their networks, switches, routers, and packets were being violated? Of interest is the presence of FireEye, a cybersecurity firm. One of FireEye’s Board members is Robert Lentz who has an excellent DOD/NSA pedigree. “Robert has served as a member of the board of directors since March 2010. He has served as the president of Cyber Security Strategies since October 2009. He served as the deputy assistant secretary of defense for cyber, identity, and information assurance in the Office of the Assistant Secretary of Defense, Networks and Information Integration/Chief Information Officer from November 2007 to October 2009. Since November 2000, he has also served as the chief information security officer for the U.S. Department of Defense. He previously worked at the National Security Agency from 1975 to 2000, where he served in the first National Computer Security Center.”

The US national security machinery has stated time and again that the Internet and World Wide Web are fair game for military information support operations (MISO) and that means shaping the consciousness of individuals, organizations and governments to the benefit of America’s national interests. Viewed in this manner, it is possible to argue that PRISM would have a chilling effect on not only whistleblowers and their media handlers, but perhaps on practitioners of industrial espionage whether they are French, Chinese or Israeli’s.

The calculated pursuit of mainstream media by President Obama, the publicizing by the US corporate‐ national security machinery of PRISM, Stuxnet—and the takedown of BitCoin websites; and the entry of Cyber Command into the daily lives of Americans seems to suggest that a new order is afoot, or at least that the US Corporate State is trying to recover/wrest control of the US historical‐current‐future narrative from independent internal and foreign news/information sources. Obama seems to have taken US presidential paranoia to new levels.

President Obama’s national security aides and political handlers appear to have adopted the John Haldeman—John Erlichman philosophy and practice of protecting Obama. According to the Telegraph, UK, “Vali Nasr, a university professor who was seconded in 2009 to work with Richard Holbrooke, Mr Obama’s special envoy to Afghanistan and Pakistan, records his profound disillusion at how a “Berlin Wall” of domestic‐focused advisers was erected to protect Mr Obama. “The president had a truly disturbing habit of funneling major foreign policy decisions through a small cabal of relatively inexperienced White House advisers whose turf was strictly politics,” reports The Telegraph.

Intelligence Agencies as Pollsters

Would it surprise anyone of some eager Obama aides decided to use data mined through a program like PRISM to figure out what American citizens are thinking? Forget Gallup and Pew. With the thoughts, pictures, video, travel records and expenditures of tens of millions of Americans harvested and interpreted by various machine programs and human analysts in the NSA, CIA, and DIA, who needs commercial pollsters. Talk about sample size! And thanks to many US Court decisions, data gathering is largely legal.

And would it not be a matter of national security for the President of the United States to know what Americans are thinking as the USA remains in a state of emergency since 911. Moreover the American nation is still at war and just steps away from lighting up Iran, Syria and Iraq (again). For the global carnage to proceed as planned, the US Corporate State must control the flow of information as it did in World War II (1939‐1945).

Obama “is the boss” has a need for “the info” as Doctor Evil so eloquently put it the movie Austin Powers. PRISM data must be in his hands, particularly given that Obama can say with a straight face “civil liberties improve with this type of surveillance.” US Senators must have the info too. Senators like Diane Feinstein, John McCain and Lindsey Graham are “happy” to be monitored and, well, why not all of us. All four of these characters know that American’s will collectively shrug their shoulders and forget about the matter by immersing themselves in the celebrity breakdown of the day.

Perhaps the most unsettling aspect of US government data harvesting and analysis programs is that the all of the work is researched, developed, tested and deployed by for‐profit companies like those belonging to NSTAC. According to the Defense Security Service (DSS), “U.S. industry develops and produces the majority of our nation’s defense technology – much of which is classified – and thus plays a significant role in creating and protecting the information that is vital to our nation’s security… DSS has Industrial Security oversight and assistance responsibility for over 13,000 cleared facilities participating in the National Industrial Security Program and estimates that there are over 11 million classified documents in the hands of U.S. industry.” DSS, always understaffed but extraordinarily dedicated, do their best to keep US industry within a tolerable degree of greed.

All PRISM’s are Not Created Equal

Email, voice, video capture would seem to rely on some sort of read‐module within a switch. Analyzing it all—separating wheat and chafe—would appear to require some sort of autonomous machine language. Perhaps some of these PRISM’s are tangentially related to the NSA’s PRISM.

Over at Cryptome, a document from the US Department of Homeland Security (DHS) describes Protect, Respond, Inform, Secure, and Monitor (PRISM). According to DHS PRISM is composed of two primary components: Contora and ESRI ArcIMS. Additional and optional components include Message 911, Ensco Sentry, and Lunar Eye. These components have been tightly integrated into a single end‐user application that provides a messaging, alerting, geo‐referenced mapping, asset tracking, CBRN sensing, and public warning system. Lunar Eye is a GPS tracking suite.

A USAF “communications” dictionary shortens Programmable‐Reconfigurable‐Integrated‐Switch and Multiplex to PRISM.

Alcatel‐Lucent’s product PRISM/GORI manages SMS (text) messages. A sample of DOD’s DTIC search engine returns when PRISM is entered follows: MITRE’s PRISM is a software program used to request intelligence collection on moving vehicles, aircraft, people and animals; PaRallel Inference SysteM‐‐ PRISM—a connectionist inference for developing machine language and autonomous network management programs; and RDTE Budget Note‐‐PRISM to MAJIIC Interoperability Assessment: assessed that Planning Tool for Resource, Integration, Synchronization and Management (PRISM) and the interface to NATO Multi‐Sensor Aerospace‐Ground Joint ISR Interoperability Coalition (MAJIIC) was functional and ready for operations by demonstrating automated interoperability and exchange of intelligence requirements.

What’s the Big Deal?

David Bromwich at the Huffington Post sums it up best, “Even now, government aides are most concerned about “the magnitude of the leak.” The question that troubles them is not, How did we come to this? but rather, Shall we prosecute the whistleblower? The pattern is so galling and tedious, and its harms so invisible to all but a few, that we may be tempted to relax and wait for the next election. But remember again the language of the court order. On an ongoing daily basis. All call detail records. Including local telephone calls. The next president will inherit this. No names, no records of words (not yet), no inculpating or exculpating evidence (just “signatures”), but still: these are outlines of the communicative behavior of upward of a million persons, with similarly compelling orders out to the other telecoms. The aim is to capture by index the whole of the U.S. population. The amazing and routine FISA order is a blind command for the opening of a thousand eyes. The plainest rebuke to such procedures comes from the language of the fourth amendment itself.”

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

“By what right are the addressed envelopes of the spoken communications of 280 million citizens plucked from the air by government and filed away? Supported by whose oath and what affirmation? There is a simple force to the words of the fourth amendment after all. It says: we do not live by secret laws, and we will not abide by general warrants. And to the comfort offered by senators Chambliss, Graham, and Feinstein, who ask us to sleep well and sleep long, there is a simple reply. In what country do they think they are living, and under what constitution?”

John Stanton is a Virginia based writer specializing in national security matters. His latest book is Cyber Noodles (cyber security), Orphan Nukes and the Failure of the US National Security State. Reach him at cioran123@yahoo.com

Posted Sunday 9th June 2013 01:26 GMT amanfromMars 1 …. commenting on http://forums.theregister.co.uk/forum/1/2013/06/07/hold_the_death_of_conspiracy_theory_for_conspiracy_science/
Of novel ploys and disgraceful strategies …… strange bedfellows, but in reality, poles apart

Re: Getting right down to ITs Nitty Gritty. No one is immune and able to act as if with impunity. …… WatAWorld Posted Saturday 8th June 2013 09:28 GMT

Politicians, including those in Westminster and on Capitol Hill will be key targets of surveillance.

You need to get those politicians under your thumbs or the rest of the operation is doomed.

Judges too, same reason.

If you think about it, it would be virtually impossible to not monitor them, since their computers and phones are using the same internet and same cellphone services as everyone else.

Quite so, WatAWorld, Well said, Sir/Madam. And that does present the secrets and security systems with a problem of their own making, does it not?
And if the targets of surveillance act badly or would seek an immunity to act as with impunity, would both secret public and private security services be failing to preserve and advance their powers of control, with that failure delivering anarchy and chaos, madness and mayhem instead of peace and prosperity, unless and until a new service and/or services appears to save the day and provide dodgy failed systems with their needs and feeds to seed with lead with ….. well, in this Coming of Age in the Sublime and the Surreal and in this Novel Era with IT Arenas of Virtualisation, Sweet SpotD Stealth and Sticky InterNetworking Source Provision*
And with regard to politicians in Westminster, is the following question a perk they expect to be available and freely provided at tax-payers expense? ………

The BBC understands Mr Yeo has referred himself to the Parliamentary standards commissioner.” ….. http://www.bbc.co.uk/news/uk-politics-22830707

Is that a particular and peculiarly exclusive executive action, which many might very easily consider quite cynical, primarily designed to ensure that there be no immediate investigative police and public and/or private prosecution services action taken ….. or it be at least delayed and forestalled whilst favours are called in and/or palms cross with silver?

It is something relatively new to mainstream readerships/viewers being tried by those hanging out in Westminster, and quite popular of late amongst them, but never whenever there is no easy money involved in the shenanigans, which must make the presence of easy money, the primary key factor, surely?

* And in SMARTR AI Systems Singularity … Both Noble and Nobel in Extremis. And if you don’t know what D is, Google it with a search engine of your choice.
Posted by amanfromMars on 06/08/13 10:19 PM …. on http://thedailybell.com/29212/Was-Guardian-SpyGate-Article-Planted-to-Support-Pending-British-Snooper-Law
DB, Hi,
Sir Malcolm Rifkind, the chairman of the Intelligence and Security Committee, and his ilk, are on no more than a pretentious jolly to Washington and will have no more of an impact on the situation than would they have if you had written of them …… “British Intelligence watchdog flies fly to Washington to demand answers on snooping scandal
It seems that the art of supplying actionable intelligence has been usurped and replaced by the useless, after the fact exercise of investigating and searching for it, and in places where it doesn’t exist either, which is a double whammy of continental incompetence, publicly shared and squared.
And of course, one imagines that the powers that be, and one doesn’t actually need to know who and/or what they actually be, are now realising, far, far too late to be able to do anything about it and IT, that certain and many services and/or servers, over which they have no control or ready administrative access, nor will ever have, have loads of information and intelligence being gleaned and viewed by others, which would be able to be easily used for special inequitable but beautifully advantageous leverage, should it be so desired by those forces able to use such a fab fabless facility/ability.
But that is nothing new at all, is it, for it is the traditional modus operandi/vivendi of systems for ages, although nowadays the difference would be that with IT being the way that it now is, is the control and power in control in a completely different set of hands/hearts and minds which fully recognise the abuses which have been made and can be made and used to their own personal advantage at the expense of the serial abuser of systems now being totally reformed and reinvented afresh by virtual means and memes and obviously more intelligent beings and virtual machines running complex computerised services and global programs and universal Forbin type projects*.:-)
* … http://www.trailersfromhell.com/trailers/7

Leave a Reply

Your email address will not be published. Required fields are marked *