TOKYO MASTER BANNER

MINISTRY OF TOKYO
US-ANGLO CAPITALISMEU-NATO IMPERIALISM
Illegitimate Transfer of Inalienable European Rights via Convention(s) & Supranational Bodies
Establishment of Sovereignty-Usurping Supranational Body Dictatorships
Enduring Program of DEMOGRAPHICS WAR on Europeans
Enduring Program of PSYCHOLOGICAL WAR on Europeans
Enduring Program of European Displacement, Dismemberment, Dispossession, & Dissolution
No wars or conditions abroad (& no domestic or global economic pretexts) justify government policy facilitating the invasion of ancestral European homelands, the rape of European women, the destruction of European societies, & the genocide of Europeans.
U.S. RULING OLIGARCHY WAGES HYBRID WAR TO SALVAGE HEGEMONY
[LINK | Article]

*U.S. OLIGARCHY WAGES HYBRID WAR* | U.S. Empire's Casino Unsustainable | Destabilised U.S. Monetary & Financial System | U.S. Defaults Twice A Year | Causes for Global Financial Crisis of 2008 Remain | Financial Pyramids Composed of Derivatives & National Debt Are Growing | *U.S. OLIGARCHY WAGES HYBRID WAR* | U.S. Empire's Casino Unsustainable | Destabilised U.S. Monetary & Financial System | U.S. Defaults Twice A Year | Causes for Global Financial Crisis of 2008 Remain | Financial Pyramids Composed of Derivatives & National Debt Are Growing | *U.S. OLIGARCHY WAGES HYBRID WAR*

Who's preaching world democracy, democracy, democracy? —Who wants to make free people free?
[info from Craig Murray video appearance, follows]  US-Anglo Alliance DELIBERATELY STOKING ANTI-RUSSIAN FEELING & RAMPING UP TENSION BETWEEN EASTERN EUROPE & RUSSIA.  British military/government feeding media PROPAGANDA.  Media choosing to PUBLISH government PROPAGANDA.  US naval aggression against Russia:  Baltic Sea — US naval aggression against China:  South China Sea.  Continued NATO pressure on Russia:  US missile systems moving into Eastern Europe.     [info from John Pilger interview follows]  War Hawk:  Hillary Clinton — embodiment of seamless aggressive American imperialist post-WWII system.  USA in frenzy of preparation for a conflict.  Greatest US-led build-up of forces since WWII gathered in Eastern Europe and in Baltic states.  US expansion & military preparation HAS NOT BEEN REPORTED IN THE WEST.  Since US paid for & controlled US coup, UKRAINE has become an American preserve and CIA Theme Park, on Russia's borderland, through which Germans invaded in the 1940s, costing 27 million Russian lives.  Imagine equivalent occurring on US borders in Canada or Mexico.  US military preparations against RUSSIA and against CHINA have NOT been reported by MEDIA.  US has sent guided missile ships to diputed zone in South China Sea.  DANGER OF US PRE-EMPTIVE NUCLEAR STRIKES.  China is on HIGH NUCLEAR ALERT.  US spy plane intercepted by Chinese fighter jets.  Public is primed to accept so-called 'aggressive' moves by China, when these are in fact defensive moves:  US 400 major bases encircling China; Okinawa has 32 American military installations; Japan has 130 American military bases in all.  WARNING PENTAGON MILITARY THINKING DOMINATES WASHINGTON. ⟴  
Showing posts with label Hacking Team. Show all posts
Showing posts with label Hacking Team. Show all posts

September 07, 2015

Suppressive Police State - USA

SOURCE
http://www.austinchronicle.com/news/2015-09-04/apd-tracks-social-media/
APD Tracks Social Media
Local social media monitoring software company met with shady digital spying group
By John Anderson, Fri., Sept. 4, 2015
Snaptrends software can assign a geographical digital boundary which allows the user "to see conversation clusters and activity heat maps" within the defined area, according to Snap Trends' Matthew Hammer.

As the world increasingly becomes glued to social media, it comes as little surprise that law enforcement would join in. But what some Facebook users or Twitter followers may not be aware of is how local law enforcement is using software to monitor their posts and tweets.

Founded in 2012 as a private company and located just off Capital of Texas High­way, Snap Trends develops software that aggregates public information collected from social media. The company's website claims their software "builds a clear view of social conversations when and where they occur, the influencers driving them, and why." A Feb. 13 letter from Snap Trends Director of Sales Ken Ross to APD Sgt. Jeff Greenwalt, discovered in a Chron­icle open records request to APD and DPS, asserts that Snap Trends "developed its software intelligence system to serve public safety organization [sic] and national intelligence agencies in the United States."

Ross further explained the "system uses advance [sic] algorithms and processes to procure this high density social data footprint." Other documents reveal that both APD and DPS have current subscriptions to Snaptrends software, spending $6,370 and $24,200 respectively in the past year. APD Public Information Specialist Jenni­fer Herber informed the Chronicle that APD began using Snaptrends software on March 1, 2013. DPS began using it one month later, according to DPS Public Information Officer Tom Vinger. DPS currently has 13 employees licensed to use the software, while APD has 25 officers with access.

Emails obtained from APD demonstrate the Snaptrends software "makes it easy to share profiles, groups and persons-of-interests" and "can even integrate custom Facebook accounts." But its main feature is using geolocation to narrow a search using a "Poly Tool" which, according to a Snap Trends email, allows law enforcement "to gather pertinent information from social media platforms over specific areas without drawing in irrelevant content from unwanted areas .... This allows you to monitor precise locations such as parade routes, major highways or areas where protests are occurring." When asked if APD purchased the software for such events, Herber explained: "Real­-time analysis of open sources such as social media has been used to predict crimes and to help law enforcement respond more quickly as needed including, for example, stopping active shooters, tracking gang activity, and anticipating public protests that could escalate into violence." Additionally, she said the mission of the Austin Regional Intelligence Center (ARIC), where the software is used, "is to maximize the region's ability to detect, prevent, apprehend, and respond to criminal/terrorist activity."

Other documents show Snap Trends partnered with a private company called Esri, which develops mapping software called ArcGIS and has also been used by APD in the past. According to internal emails obtained via open records request, APD Senior Crime Analyst Tess Sherman used the Esri software to monitor Occupy Austin's first demonstration at City Hall in October 2011. Sherman pointed out the mapping function "would be neat-o to try. Although it may just end up as a bunch of dots downtown since a lot of it is real-time comments from the scene." Despite receiving tech support from the company, APD Police Planner Nora Evans replied to Sherman, "I don't know a lot about Twitter so maybe you can figure it out." But Snap Trends' emails indicate the company offered to provide tech support for its own software to at least 16 APD employees.

What were the police looking for? In one email, Snap Trends Account Manager Mark Klasson sent APD a document titled "Keywords." Assist­ant City Attorney Cary Grace has asked the Texas Attorney General's office to exempt that document and others from public disclosure. As of press time, the AG's office has not made a decision regarding the exemption.

Expanded surveillance remains a possibility, and a hack in July of the Italian surveillance software company Hacking Team gave hints of what could be on the horizon. The hack shed light on some of the darker sides of digital spying, including conversations between Hacking Team and Snap Trends that revolved around a potential partnership. Instead of monitoring public information, Hacking Team's Remote Control Sys­tem software infects remote computers and mobile phones, allowing control over them. Reporters Without Borders has called Hacking Team "digital mercenaries" and "corporate enemies of the Internet."

According to the hacked emails, available on the Wikileaks website, in March, Snap Trends CEO Eric Klasson met in Dubai for the "first exploratory meeting" with members of Hacking Team. Emails show the Dubai meeting was also attended by Snap Trends' partner Chenega, which resells Snap Trends' software internationally. After the meeting, Hacking Team's Philippe Vinci summarized: "The combination of each parties [sic] capabilities, Massive Social Media monitoring and Tactical Targets' Device interception, could bring a lot of value to customers and prospective customers of each party." Replying to that email, Klasson wrote, "I agree that a joint effort to sort this is something the market will respond to favorably (and quickly)."

The three companies kept up their contact through at least early June, including a meeting in Prague, but the emails lack specific details about the collaboration. Asked by the Chronicle to describe Snap Trends' relationship with Hacking Team, however, Snap­ Trends Marketing Director Matthew Ham­mer wrote via email that "Snap Trends knows of the Hacking Team, but has no relationship with them, and we don't plan on doing any business with them in the future." Open records requests did not yield documents indicating that APD or DPS have purchased Hacking Team's software; nor is there is any evidence that Snaptrends software currently operates as malware.

A LexisNexis 2014 "Social Media Use in Law Enforcement" report (available on the Snap Trends' website) which surveyed "federal, state and local law enforcement professionals" found that 81% "actively use social media as a tool in investigations," and 78% of current users plan "to use it even more in the coming year." Snap Trends' Hammer claims "hundreds" of U.S. law enforcement departments or agencies have bought their software. But raising questions about the effectiveness and accountability of this type of monitoring, the LexisNexis study also concluded that "52% of agencies still don't have a formal process for using social media for investigations."
SOURCE
http://www.austinchronicle.com/news/2015-09-04/apd-tracks-social-media/
---------------------- ꕤ ----------------------
COMMENT
APD = Austin Police Dept

DPS = Dept of Public Safety (I'm guessing)


Check out the policing techniques at work in totalitarian, surveillance & militarised police-state, USA:  straight out of the Czarist-Russia style suppression tools manual -- with a modern, digital technology, mapping & harnessing social media data, twist.
The power to grossly violate the civil liberties of ordinary Americans is at the disposal of Texas police (and has been exercised since 2013).  But it is not limited to Texas:  many other US law enforcement agencies have adopted these same practices. 
It's primarily for maintenance of plutocratic power, although law enforcement representatives will, of course, argue otherwise ... while they make application, seeking to hide their violations of freedom and democracy.
Note, particularly, the intention to keep this secret police monitoring from public knowledge.
So much for what is supposed to be accountability and democratic government transparency -- which is intended to also extend to government agencies, such as the police. 
Abuses of civil liberties such as this go a long way towards explaining why resistant activists, hacktivists, whistleblowers, and whistleblower journalists and publishers, such as WikiLeaks, are so vital.
I Imagine that this information would be relevant to protesters, activists, unionists, political groups, students, and all and any other persons exercising rightful political freedoms, in what is supposed to be democratic society.
PS

In case you think this is limited to USA and doesn't apply to you, think again ... and maybe do some Freedom of Information applications.  lol


August 03, 2015

SINGAPORE - SURVEILLANCE STATE



https://www.digitalnewsasia.com/digital-economy/singapore-is-using-spyware-and-its-citizens-cant-complain

#WikiLeaks #HackingTeam
#Singapore - #Surveillance state, NO:
  • *privacy right
  • *prior judicial auth. req. (leg'n)
#Law #Privacy #Singapore
regulatory structure re #surveillance
= Executive branch controlled / little judicial oversight

#Singapore #SURVEILLANCE incls:
  • CCTV
  • drones
  • Internet / comm. / access
  • SIM card reg.
  • ID req. register websites
  • big data analytics
#Singapore #SURVEILLANCE
'PacketShape
{Blue Coat Systems Inc, USA-based provider}
monitoring various, incl:
  • Facebook
  • Twitter
  • Google Mail
  • Skype
#Singapore
* Has NOT ratified: International Covenant on Civil & Political Rights (ICCPR)


https://www.digitalnewsasia.com/digital-economy/singapore-is-using-spyware-and-its-citizens-cant-complain

---------------------
COMMENT

Mass surveillance must be a given in a country like Singapore, with no constitutional or other legislative checks on monitoring of citizens (and no ratification of the human rights covenant, either).

The degree of surveillance and the lack of civil rights goes back to colonial rule.  

---------------------


Modern Singapore
founded in 1819 as British colony
(by Sir Stamford Raffles)
wikipedia






WikiLeaks - Hacking Team Leak - Release Verified as Legitimate / Singapore Surveillance



Singapore is using spyware, and its citizens can’t complain
By Gabey GohAug 03, 2015

Behind the surveillance curtain

Meanwhile, Goh Su Gim (pic), the security advisor at cybersecurity firm F-Secure in Asia, has examined the Hacking Team documents that have been leaked online, and said he believes them to be legitimate.

“Especially the source code and their Galileo product architecture – it is exactly how security researchers have expected it to be,” he told DNA.

“Many have compiled the source code and replicated what products Hacking Team has been selling to the [Singapore] Government,” he added.

The leaked Hacking Team information also includes email threads that point to other Singaporean agencies showing an interest in the Italian company’s spyware, according to Goh.

These agencies include the Centre for Strategic Infocomm Technologies (CSIT), part of the Ministry of Defence; and the Infocomm Technology Division (ICTD) of the Ministry of Home Affairs (MHA) back in 2013.

Goh noted that an Israeli company, Nice Systems which specialises in telephone voice recording, data security and surveillance, serves as a partner working with Hacking Team to sell to CSIT and MHA.

“Interestingly, the MHA was interested in its IPA device (Injection Proxy Appliance),” he said.

“This is a networking device, typically installed alongside an Internet service provider’s servers, that can hijack targets’ Internet traffic without their knowing, and surreptitiously deliver malware to their device or computer.

“Tricking a target into opening a file or going to a phishing site may be not be as easy, and this is the perfect appliance to intercept Internet activity on the fly – for example, if a target wants to watch a video or download a new app, the IPA could intercept and prompt the target to install a booby-trapped version of Adobe Flash with the spyware.

“It is also interesting to note at the end of the [leaked] email, [there is the statement]: ‘(As always, but especially in this country, confidentiality is a must. Thanks.)’,” he added.

Why the IDA?

There were no further documents available to show whether discussions with the CSIT and MHA panned out and were converted to sales, Goh conceded.

He said that the F-Secure team was also unable to independently confirm whether the IDA and other agencies in South-East Asia, besides the publicly published list of clients available on the Internet, were or are Hacking Team customers.

However, Goh noted that given what Hacking Team offers, it may seem more relevant for CSIT and MHA to purchase such tools in the name of homeland security.

“But the IDA is a statutory board of the Singapore Government, under the Ministry of Communications and Information, whose mission is to develop information technology and telecommunications within Singapore – with a view to servicing citizens of all ages and companies of all sizes.

“With that said, since it is not an enforcement agency – there is no use for a surveillance tool, unless it is used for research purposes,” he said.

The IDA did not respond to DNA’s repeated requests for comment.

https://www.digitalnewsasia.com/digital-economy/singapore-is-using-spyware-and-its-citizens-cant-complain?page=0%2C1

-------- -------- --------
COMMENT

Thought this a cool article, as the WikiLeaks publication of the Hacking Team data has been independently verified as legitimate.

Israeli involvement is interesting.

The rest (surveillance capabilities) just freaks me out.  LOL


More re:  SINGAPORE SURVEILLANCE