To all the Sheeples and government trolls out there, these conspiracy theories have been confirmed so many times over. Even a portion of the mainstream media can’t hold their punches anymore.
Politicians are mere errand stooges who have allowed their citizens to be spied upon a constant basis. To make sure they, too, are still serving the puppet masters’ desires, must be snooped at without their full “official” knowledge, although they somehow think they are somebody special and part of the club, and must be exempted from the whole spying exercise.
François Hollande calls emergency meeting after WikiLeaks claims US spied on three French presidents
The French president, François Hollande, has called an emergency meeting of his country’s defence council for Wednesday morning after claims that American agents spied on three successive French presidents between 2006 and 2012. According to WikiLeaks documents published late on Tuesday, even the French leaders’ mobile phone conversations were listened to and recorded.
The leaked US documents, marked “top secret”, were based on phone taps and filed in an NSA document labelled “Espionnage Elysée” (Elysée Spy), according to the newspaper Libération and investigative news website Mediapart. The US was listening to the conversations of centre-right president Jacques Chirac, his successor Nicolas Sarkozy, and the current French leader, Socialist François Hollande, elected in 2012.
The recorded conversations, which were handled by the summary services unit at the NSA, were said to reveal few state secrets but show clear evidence of the extent of American spying on countries considered allies. WikiLeaks documents suggest that other US spy targets included French cabinet ministers and the French ambassador to the United States.
“The documents contain the ‘selectors’ from the target list, detailing the cell phone numbers of numerous officials in the Elysée up to and including the direct cell phone of the president,” a report of the taps published in the French media revealed.
The revelations come as France gives its domestic intelligence and surveillance services controversial greater powers to combat jihadist networks, with more permissions to bug phones and licences to carry out mass surveillance on the internet.
In an article co-authored by Julian Assange, the French newspaper Libération pointed out that in matters of spying, there are no friends. “Spying abroad is the ultimate ‘grey zone’ in surveillance – it is also, in France, the real blind spot of the planned law on surveillance, expected to be adopted this Wednesday,” said the WikiLeaks report.
Mediapart said: “For almost ten years, the United States has listened into French presidents … it was all classed top secret or ‘special intelligence’. In the five documents that we are publishing, four were marked with a G, kept for the most ‘highly sensitive material’, others were labelled ‘NF’, stipulating that they must not be communicated to foreign countries in any circumstances. Most were marked ‘unconventional’, meaning they had been got through hacking.
The documents published by Mediapart suggest that the Americans were tapping into François Hollande’s conversations from the moment he was elected in 2012.
The Elysée has not commented on the revelations except to say it is looking at the leaks to see “what is involved”. Sources close to Nicolas Sarkozy told journalists the spying was “unacceptable as a general rule and even more so among allies”.
Ned Price, spokesperson for the NSA, said: “We are not going to comment on specific intelligence allegations. As a general matter, we do not conduct any foreign intelligence surveillance activities unless there is a specific and national security purpose. This applies to ordinary citizens and world leaders alike.”
Google eavesdropping tool installed on computers without permission
Privacy campaigners and open source developers are up in arms over the secret installing of Google software which is capable of listening in on conversations held in front of a computer.
First spotted by open source developers, the Chromium browser – the open source basis for Google’s Chrome – began remotely installing audio-snooping code that was capable of listening to users.
It was designed to support Chrome’s new “OK, Google” hotword detection – which makes the computer respond when you talk to it – but was installed, and, some users have claimed, it is activated on computers without their permission.
“Without consent, Google’s code had downloaded a black box of code that – according to itself – had turned on the microphone and was actively listening to your room,” said Rick Falkvinge, the Pirate party founder, in a blog post. “Which means that your computer had been stealth configured to send what was being said in your room to somebody else, to a private company in another country, without your consent or knowledge, an audio transmission triggered by … an unknown and unverifiable set of conditions.”
The feature is installed by default as part of Google’s Chrome browser. But open source advocates are up in arms about it also being installed with the open source variant Chromium, because the listening code is considered to be “black box”, not part of the open source audit process.
“We don’t know and can’t know what this black box does,” said Falkvinge.
Google responded to complaints via its developer boards. It said: “While we do download the hotword module on startup, we do not activate it unless you opt in to hotwording.”
However, reports from developers indicate otherwise.
After having identified Chromium as the culprit, developer Ofer Zelig said in a blog post: “While I was working I thought ‘I’m noticing that an LED goes on and off, on the corner of my eyesight [webcam]’. And after a few times when it just seemed weird, I sat to watch for it and saw it happening. Every few seconds or so.”
Google also blamed the Linux distribution Debian for downloading the non-open source component with Chromium automatically, rather than Google Chrome.
“The key here is that Chromium is not a Google product. We do not directly distribute it, or make any guarantees with respect to compliance with various open source policies,” Google developer mgiuca said.
Falkvinge countered Google’s explanations saying: “The default install will still wiretap your room without your consent, unless you opt out, and more importantly, know that you need to opt out, which is nowhere a reasonable requirement.” He says a hardware switch to disable the microphone and camera built into most computers is needed.
Voice search functions have become an accepted feature of modern smartphones, but their movement into the home through the smart TV, and now browser, have caused concerns over the possibility of being listened to within the home.
While most services require a user to opt in, privacy advocates have questioned whether their use, which requires sending voice recordings over the internet to company servers for processing, risks unintentionally exposing private conversations held within the home.
NSA Has Reverse-Engineered Popular Consumer Anti-Virus Software In Order To Track Users
The NSA and its British counterpart the GCHQ have put extensive effort into hacking popular security software products to “track users and infiltrate networks,” according to the latest round of Snowden docs unearthed today by The Intercept.
Cybersecurity companies, including the Moscow-headquartered Kaspersky Lab, were targeted by government agencies to gain intelligence of the latest exploits. Details of the security software’s inner workings were deciphered by agencies through a process called software reverse engineering (SRE), which allowed them to analyze and exploit the software suites.
A top-secret warrant renewal request issued by the GCHQ details the motivations behind infiltrating the products of such anti-virus companies.
“Personal security products such as the Russian anti-virus software Kaspersky continue to pose a challenge to GCHQ’s CNE [Computer Network Exploitation] capability,” the warrant stated, “and SRE is essential in order to be able to exploit such software and to prevent detection of our activities.”
A leaked 2010 presentation called “Project CAMBERDADA” also suggested that the government agencies may be searching through and flagging the emails of employees from cybersecurity firms in order to identify more of these threats.
Documents also disclosed efforts by the NSA of intercepting “leaky” data being sent from users’ computers to the Kaspersky Lab servers. Such data, including sensitive user information, was embedded in “User-Agent” strings in the HTTP requests and could be used to assess and track users’ activity.
In a statement to The Intercept, Kaspersky Lab said:
”It is extremely worrying that government organizations would be targeting us instead of focusing resources against legitimate adversaries, and working to subvert security software that is designed to keep us all safe. However, this doesn’t come as a surprise. We have worked hard to protect our end users from all types of adversaries. This includes both common cyber-criminals or nation state-sponsored cyber-espionage operations.”
In a testament of just how far-reaching the tracking capabilities of these government agencies has become, an interesting tidbit from today’s leak, a top-secret “Five Eyes” presentation, disclosed that the GCHQ was regularly collecting intel on 100 million malware events per day.
Spy Agency’s Secret Plans to Foster Online “Conformity” and “Obedience” Exposed
“Among other things,” The Intercept reports, “the document lays out the tactics the agency uses to manipulate public opinion, its scientific and psychological research into how human thinking and behavior can be influenced, and the broad range of targets that are traditionally the province of law enforcement rather than intelligence agencies.” (Photo: Getty Images)
With never-before-seen documents accompanied by new reporting on Monday, The Intercept‘s Glenn Greenwald and Andrew Fishman are offering a more in-depth look than ever into how a secretive unit of the UK’s GCHQ surveillance agency used a host of psychological methods and online subterfuge in order to manipulate the behavior of individuals and groups through the internet and other digital forms of communication.
According to the reporting, the latest documents, which were leaked to journalists by NSA whistleblower Edward Snowden,
demonstrate how the Joint Threat Research Intelligence Group (JTRIG), a unit of the signals intelligence agency Government Communications Headquarters (GCHQ), is involved in efforts against political groups it considers “extremist,” Islamist activity in schools, the drug trade, online fraud, and financial scams.
Though its existence was secret until last year, JTRIG quickly developed a distinctive profile in the public understanding, after documents from NSA whistleblower Edward Snowden revealed that the unit had engaged in “dirty tricks” like deploying sexual “honey traps” designed to discredit targets, launching denial-of-service attacks to shut down internet chat rooms, pushing veiled propaganda onto social networks, and generally warping discourse online.
Among the most troubling revelations is a 42-page internal JTRIG memo that describes in detail how the elite unit developed, maintained, and apparently sought to expand its “scientific and psychological research into how human thinking and behavior can be influenced” in order to increase its ability to “manipulate public opinion” via online tools like email, social media, video, discussion forums, and other platforms.
Greenwald and Fishman argue JTRIG’s self-documented exploits are most notable because of their “extensive use of propaganda methods and other online tactics of deceit and manipulation” that are not only reserved for “suspected foreign enemies” or criminals, as the agency continues to claim, but have also been used against other groups and individuals that the agency deems threatening or “politically radical.”
As Common Dreams reported in February of 2014—when the existence of JTRIG was first made public—the GCHQ has used the unit to develop and deploy a complex series of “dirty tricks,” “propoganda,” and “false flag” operations designed to spy on selected targets who included not only “suspected terrorists” and “criminals” but also diplomats, journalists, and activists.
Included in the new JTRIG memo is this detailed look at the manipulative online tactics developed by the group:
The reporting also highlights the internal memo’s focus on “manipulation” and how the GCHQ hoped to foster both “conformity” and “obedience” among those targeted:
Read The Intercept‘s full reporting here. And links to the new published documents follow:
- Behavioural Science Support for JTRIG’S Effects and Online HUMINT Operations
- UK Ministry Stakeholder Relationships Spreadsheets (13 documents merged)
The whole situation is out of control, there’s a need to end this Orwellian mindset and the whole Bilderbergers’ plan to automate the entire slavery system. The corrosive slavery system itself must be shut down for good.
The only way we could end all that is to act decisively on our own [and not wait for some third party cowboys to save us]; sever all participation to and install a new system:
- A system that removes all motivations to participate in a scheme that puts the other into a disadvantage;
- A system that promotes cooperation in the fulfillment of basic necessities rather than competing for access to those critical resources;
- Restrict competitions only in the field of art and culture, and in the pursuit of innovations in the field of science and engineering, but;
- The fruits of all these scientific achievements must be made available widely, because honor and due recognition are already its highest rewards.
We don’t have much time.
One of the significant sources of funds for the fascist Nazionist Jesuit Khazarian Mafia is the healthcare industry which registered a whopping $3.09 trillion in 2014, and is projected to soar to $3.57 trillion in 2017, in the US alone.
We can help take down the Dark Cabal by avoiding drugs, defeat any viral attack and scaremongering easily by knowing how to build our own comprehensive antiviral system. Find more about it here.