Archive for Januar 2nd, 2014

2. Januar 2014

Clues to Future Snowden Leaks Found In His Past – What’s still to come?

Washington’s Blog
January 2, 2014

Only a tiny fraction [2] of Snowden’s documents have been published.

What’s still to come?

We believe one hint comes from Snowden’s past as a security specialist at one of one the NSA’s covert facilities at the University of Maryland.

Pre-Crime and the NSA

We reported [3] in 2008:

new article [4] by investigative reporter Christopher Ketcham reveals, a governmental unit operating in secret and with no oversight whatsoever is gathering massive amounts of data on every American and running artificial intelligence software to predict each American’s behavior, including “what the target will do, where the target will go, who it will turn to for help”.

The same governmental unit is responsible for suspending the Constitution and implementing martial law in the event that anything is deemed by the White House in its sole discretion to constitute a threat to the United States. (this is formally known as implementing “Continuity of Government” plans). [Background here [5].]

As Ketcham’s article makes clear, these same folks and their predecessors have been been busy dreaming up plans to imprison countless “trouble-making” Americans without trial in case of any real or imagined emergency.  What kind of Americans? Ketcham describes it this way:

“Dissidents and activists of various stripes, political and tax protestors, lawyers and professors, publishers and journalists, gun owners, illegal aliens, foreign nationals, and a great many other harmless, average people.”

Do we want the same small group of folks who have the power to suspend the Constitution, implement martial law, and imprison normal citizens to also be gathering information on all Americans and running AI programs to be able to predict where American citizens will go for help and what they will do in case of an emergency? Don’t we want the government to — um, I don’t know — help us in case of an emergency?

Bear in mind that the Pentagon is also running an AI program to see how people will react to propaganda and to government-inflicted terror. The program is called Sentient World Simulation [6]:

“U.S defense, intel and homeland security officials are constructing a parallel world, on a computer, which the agencies will use to test propaganda messages and military strategies.Called the Sentient World Simulation, the program uses AI routines based upon the psychological theories of Marty Seligman, among others. (Seligman introduced the theory of ‘learned helplessness’ in the 1960s, after shocking beagles until they cowered, urinating, on the bottom of their cages.)

Yank a country’s water supply. Stage a military coup. SWS will tell you what happens next.

The sim will feature an AR avatar for each person in the real world, based upon data collected about us from government records and the internet.”

The continuity of government folks’ AI program and the Pentagon’s AI program may or may not be linked, but they both indicate massive spying and artificial intelligence in order to manipulate the American public, to concentrate power, to take away the liberties and freedoms of average Americans, and — worst of all — to induce chaos in order to achieve these ends.

PBS Nova reported [7] in 2009:

The National Security Agency (NSA) is developing a tool that George Orwell’s Thought Police might have found useful: an artificial intelligence system designed to gain insight into what people are thinking.

With the entire Internet and thousands of databases for a brain, the device will be able to respond almost instantaneously to complex questions posed by intelligence analysts. As more and more data is collected—through phone calls, credit card receipts, social networks like Facebook and MySpace, GPS tracks, cell phone geolocation, Internet searches, Amazon book purchases, even E-Z Pass toll records—it may one day be possible to know not just where people are and what they are doing, but what and how they think.

The system is so potentially intrusive that at least one researcher has quit, citing concerns over the dangers in placing such a powerful weapon in the hands of a top-secret agency with little accountability.

Known as Aquaint, which stands for “Advanced QUestion Answering for INTelligence” [which is run by the Intelligence Advanced Research Projects Activity (IARPA)], part of the new M Square Research Park in College Park, Maryland. A mammoth two million-square-foot, 128-acre complex, it is operated in collaboration with the University of Maryland. “Their budget is classified, but I understand it’s very well funded,” said Brian Darmody, the University of Maryland’s assistant vice president of research and economic development, referring to IARPA. “They’ll be in their own building here, and they’re going to grow. Their mission is expanding.”


In a 2004 pilot project, a mass of data was gathered from news stories taken from theNew York Times, the AP news wire, and the English portion of the Chinese Xinhua news wire covering 1998 to 2000. Then, 13 U.S. military intelligence analysts searched the data and came up with a number of scenarios based on the material. Finally, using those scenarios, an NSA analyst developed 50 topics, and in each of those topics created a series of questions for Aquaint’s computerized brain to answer. “Will the Japanese use force to defend the Senkakus?” was one. “What types of disputes or conflict between the PLA [People’s Liberation Army] and Hong Kong residents have been reported?” was another. And “Who were the participants in this spy ring, and how are they related to each other?” was a third. Since then, the NSA has attempted to build both on the complexity of the system—more essay-like answers rather than yes or no—and on attacking greater volumes of data.

“The technology behaves like a robot, understanding and answering complex questions,” said a former Aquaint researcher. “Think of 2001: A Space Odyssey and the most memorable character, HAL 9000, having a conversation with David. We are essentially building this system. We are building HAL.” A naturalized U.S. citizen who received her Ph.D. from Columbia, the researcher worked on the program for several years but eventually left due to moral concerns. “The system can answer the question, ‘What does X think about Y?’” she said. “Working for the government is great, but I don’t like looking into other people’s secrets.

A supersmart search engine, capable of answering complex questions such as “What were the major issues in the last 10 presidential elections?” would be very useful for the public. But that same capability in the hands of an agency like the NSA—absolutely secret, often above the law, resistant to oversight, and with access to petabytes of private information about Americans—could be a privacy and civil liberties nightmare. “We must not forget that the ultimate goal is to transfer research results into operational use,” said Aquaint project leader John Prange, in charge of information exploitation for IARPA.

Once up and running, the database of old newspapers could quickly be expanded to include an inland sea of personal information scooped up by the agency’s warrantless data suction hoses. Unregulated, they could ask it to determine which Americans might likely pose a security risk—or have sympathies toward a particular cause, such as the antiwar movement, as was done during the 1960s and 1970s. The Aquaint robospy might then base its decision on the type of books a person purchased online, or chat room talk, or websites visited—or a similar combination of data. Such a system would have an enormous chilling effect on everyone’s everyday activities—what will the Aquaint computer think if I buy this book, or go to that website, or make this comment? Will I be suspected of being a terrorist or a spy or a subversive?

World Net Daily’s Aaron Klein reported [8] in June:

In February, the Sydney Morning Herald reported [9] the Massachusetts-based multinational corporation, Raytheon – the world’s fifth largest defense contractor – had developed a “Google for Spies” operation.

Herald reporter Ryan Gallagher wrote that Raytheon had “secretly developed software capable of tracking people’s movements and predicting future behavior by mining data from social networking websites” like Facebook, Twitter, and Foursquare.

The software is called RIOT, or Rapid Information Overlay Technology.

Raytheon told the Herald it has not sold RIOT to any clients but admitted that, in 2010, it had shared the program’s software technology with the U.S. government as part of a “joint research and development effort … to help build a national security system capable of analyzing ‘trillions of entities’ from cyberspace.”

In April, RIOT was reportedly showcased at a U.S. government and industry national security conference for secretive, classified innovations, where it was listed under the category “big data – analytics, algorithms.”

Jay Stanley, senior policy analyst for the ACLU Speech, Privacy and Technology Project,argued [10] …  that among the many problems with government large-scale analytics of social network information “is the prospect that government agencies will blunderingly use these techniques to tag, target and watchlist people coughed up by programs such as RIOT, or to target them for further invasions of privacy based on incorrect inferences.”

“The chilling effects of such activities,” he concluded, “while perhaps gradual, would be tremendous.”

Ginger McCall, attorney and director of the Electronic Privacy Information Center’s Open Government program, told NBC in February [11], “This sort of software allows the government to surveil everyone.

“It scoops up a bunch of information about totally innocent people. There seems to be no legitimate reason to get this, other than that they can.”

As for RIOT’s ability to help catch terrorists, McCall called it “a lot of white noise.”  [True … Big data doesn’t work [12] to keep us safe.]

The London Guardian further obtained a four-minute video that shows how the RIOT software uses photographs on social networks. The images, sometimes containing latitude and longitude details, are “automatically embedded by smartphones within so-called ‘exif header data.’

RIOT pulls out this information, analyzing not only the photographs posted by individuals, but also the location where these images were taken,” the Guardian reported.
Such sweeping data collection and analysis to predict future activity may further explain some of what the government is doing with the phone records of millions of Verizon customers. [Background here [13].  It may also explain why the NSA is collecting nearly 5 billion cell location records every day [14], all over the world.]


“In the increasingly popular language of network theory, individuals are “nodes,” and relationships and interactions form the “links” binding them together; by mapping those connections, network scientists try to expose patterns that might not otherwise be apparent,” reported the Times. [15]  [Background here [16].]

In February 2006, more than a year after Obama was sworn as a U.S. senator, it was revealed the “supposedly defunct” Total Information Awareness data-mining and profiling program had been acquired by the NSA.

The Total Information Awareness program was first announced in 2002 as an early effort to mine large volumes of data for hidden connections.

What does all of this have to do with Edward Snowden?

Aaron Klein reports [17] that Snowden might have worked at the NSA’s artificial intelligence unit at the University of Maryland:

Edward Snowden, the whistleblower behind the NSA surveillance revelations, told the London Guardian newspaper  [18]that he previously worked as a security guard for what the publication carefully described as “one of the agency’s covert facilities at the University of Maryland.”


Brian Ullmann, the university’s assistant vice president for marketing and communications, was asked for comment. He would not address the query, posed twice to his department by KleinOnline, about whether the NSA operates covert facilities in conjunction with the university.

Ullmann’s only comment was to affirm that Snowden was employed as a security guard at the university’s Center for the Advanced Study of Languages in 2005.

Calling Snowden a “security guard” is like calling James Bond a “bouncer”.  Snowden was a highly-prized expert at finding the NSA’s security vulnerabilities in order to protect the agency’s computer systems from malicious hackers.

Snowden may know a tremendous amount about – and have taken many documents regarding – the NSA’s dystopian plans for a Big Bro, pre-crime computer system.

Postscript:  If we’re right, we urge that these documents be pushed towards the front of the release queue by the journalists holding the documents leaked by Snowden … as they would be central to the NSA’s true plans and visions.

We would also urge the release of any documents regarding NSA’s involvement – if any – in financial manipulation [19] or  false flags [20] to be published quickly, as these would be vital for our information and understanding as a free people.

2. Januar 2014

The New York Times Tells Obama To Stop ‘Vilification’ Of Snowden Because He’s A Whistleblower

The New York Times Editorial Board has published an opinion piece in support of ex-NSA contractor Edward Snowden, calling him a “whistleblower” and ask the president to stop vilifying him for exposing alleged wrongdoings within the U.S. intelligence community.
The board writes that Snowden should be allowed to return home and be granted a plea bargain, “some form of clemency” or reduced punishment for doing his country “a great service.

read more here


2. Januar 2014

[RT] ​Japan to rethink pacifist constitution by 2020 amid rising tensions

Japan will revise its constitution, which limits its military activities to self-defense by 2020, Prime Minister Shinzo Abe said, as tensions in the region build, caused by long-standing territorial disputes.  “Aspiring sincerely to an international peace based on justice and order, the Japanese people forever renounce war as a sovereign right of the nation and the threat or use of force as means of settling international disputes,” states the article. Prime Minister Abe said that the constitution needs to be rethought to deal with the changing times, given that it was laid down over six decades ago.

In addition, Abe spoke of the importance of defending Japanese territory from the growing assertiveness of the Chinese in the region. China raised tensions in the area in November when it created an air defense zone that encroached on the territories of neighboring countries.  weiterlesen @

2. Januar 2014

Das wahre Verbrechen von Chodorkowski – Von William Engdahl

Die letztendliche Gerichtsentscheidung in dem russischen Verfahren gegen den früheren Öl-Oligarchen hatte dramatische Proteste von der Obama-Administration und von Regierungen rund um die Welt hervorgerufen und die russische Justiz als Tyrannei und Schlimmeres gebrandmarkt. Was dabei sorgfältig bei der Chodorkowski-Geschichte vergessen wird, ist der wahre Grund, warum Putin den Ex-Chef des größten privaten russischen Ölgiganten Yukos festnehmen und ins Gefängnis werfen ließ.


2. Januar 2014

The Military Leg in Japan’s Ocean Strategy – The Asia-Pacific Journal: Japan Focus

The complex situation in East Asia and the wider Pacific-Indian Ocean Region is prompting governments to deploy a full range of tools, from economic diplomacy to humanitarian relief operations to declarations of exclusive air space, in their search for a balance between what they consider to be their key national interests and their shared wish to avert open conflict. Tokyo is one of these actors who feel compelled to defend their national interests while at the same time recognizing that war would imply harsh costs, to itself and the region, at many levels, from the human to the economic to the political. While many Asian leaders have expressed the wish to see tensions ease and differences settled without recourse to violence, all understand the high risk of conflict and look to higher levels of military preparedness to enhance their position. Japan is no exception. Japan is unique, however, in moving to reinforce military capabilities despite a restrictive legal and constitutional framework. The development of an amphibious capability by the SDF (Self-Defense Forces), their latest drills featuring among others shore-based anti-ship missile deployment, more frequent joint exercises with the US and appeals to Washington for a firmer position in the Pacific, a push for constitutional change involving the reinterpretation or formal amendment to Article 9, and repeated public references to the late Margaret Thatcher, former British prime minister, illuminate the military leg in Tokyo’s conflict prevention and management strategy. This paper seems to examine these factors, on the understanding that developments in the military sphere are only part of Tokyo’s foreign policy towards East-Asia. –
Read more at:
2. Januar 2014

Japan’s Designated Secrets Protection Law – The Asia-Pacific Journal: Japan Focus

On December 6, 2013, Japan’s Diet (national assembly) passed a controversial Designated Secrets Protection bill, having rushed it through both chambers in barely a month. Both the Liberal Democratic Party [LDP]-led administration that proposed the bill and the LDP-dominated Diet brazenly disregarded many voices of opposition, expressed in the public comments collected by the government (77% against and 13% for the bill), public opinion polls showing twice as many respondents opposing the bill as those in favor, daily demonstrations in front of the Diet building, and statements by an array of professional organizations: lawyers, journalists, academics, writers, film directors and actors, religious leaders as well as human rights and civil rights advocates. The law, promulgated December 13, 2013 and slated to take effect in a year’s time, gives the government potentially unchecked power to designate government information as special secrets, some for an indefinite time, and to punish leakers much more harshly than now. Critics of the law fear that it will further restrict citizens’ already limited access to government information and intimidate public officials, journalists, and citizens, thereby severely eroding the people’s constitutionally guaranteed right to know. Despite the grave and far-reaching implications of the legislation that could seriously jeopardize democracy in Japan, the Abe Shinzo administration rammed the bill through the Diet in less than a month: the administration introduced the bill on November 7, and the Diet spent only 67-68 hours to deliberate it, a strikingly brief time compared with more than 210 hours each that the Diet had spent deliberating the 2005 Postal Service Privatization Act and the 2012 legislation relating to the comprehensive reform of social security and tax systems, commonly known as the tax hike legislation.

Although the bill has been passed, critics believe there is much work to be done: continuing to expose and criticize what is in the law and the process through which it was passed, attempting to prevent it from taking effect and, if that is not possible, monitoring and challenging its implementation so as to curb unbridled government power.

The article below was originally published in Japanese in the October 2013 issue of JCLU [Japan Civil Liberties Union] Newsletter. Although it was written before the passage of the legislation, we publish an English translation here because we believe the issues Professor Sakaguchi raises remain relevant and need to be shared with readers of English.

– See more at:

%d Bloggern gefällt das: