Showing posts with label wikileaks wednesday. Show all posts
Showing posts with label wikileaks wednesday. Show all posts

Wednesday, December 29, 2021

Does The CIA Expend Resources Battling Cartels Like It Has Spent Resources Battling Assange?

talkliberation |  In a document titled The WikiLeaks Threat: An Overview authored by Palantir Technologies in conjunction with HBGary Federal and Berico Technologies, a slide centrally featuring the WikiLeaks logo depicts spokes leading to key public supporters. Notes at the bottom of the slide outline the corporate grievances in play, decrying “established professionals… with a liberal bent” and declaring that “this level of support needs to be disrupted”. The final line reads “without the support of people like Glenn, WikiLeaks would fold”.

What folded, in fact, was very nearly HBGary itself. CEO and minority shareholder Aaron Barr stepped down in disgrace.


 

It wouldn’t be the first time or the last that Greenwald would be targeted in some form for his journalism. That he is also named (and even central) in some of the new #WLDragnet documents, will likely come as no surprise.

Nor to the other influencers identified in the documents. Popular Australian independent journalist Caitlin Johnstone, repeatedly named in the NodeXL files said that it was “not surprising” but “still pretty freaky”.


A who’s who of high profile independent media, whistleblowers and support organizations who stand with Julian Assange and WikiLeaks are named again and again in the #WLDragnet documents. 

 As are thousands of their followers, members of their personal networks and frankly, damn near anyone with even the vaguest sense of political awareness or understanding as to the historic importance of the battle to save Julian Assange.


It has long been assumed by all and sundry that only WikiLeaks staff, closest collaborators or other persons of significance could be plausibly caught in such a web. That those possessing insider knowledge, occupying positions of some influence or power, or with the ability to extend significant social reach were the logical focal targets of state-led efforts to clip the wings of WikiLeaks.

But new evidence points to a truly global network of digital repression targeted at WikiLeaks supporters who possess little if any such secret knowledge, significance or power. The documents we are publishing, sourced from publicly available data, contain the social media user account handles of hundreds of members of the public, with thousands collected on.

Palantir Is A Creepy Cannibalistic Eye Of Sauron

bloomberg  |  Palantir Technologies Inc. has long pursued some of the largest governments and companies in the world as customers. Now, in a dramatic shift in strategy, it’s chasing startups.

The controversial data integration and analytics company co-founded by billionaire Peter Thiel plans to announce Tuesday it will sell software on a monthly subscription model to smaller companies, starting first with a handful of startups connected to former Palantir employees.

The startup sales push is a break with tradition for the $40 billion company that made its name on large contacts with the U.S. Army, Merck KGaA and a handful of other high-profile organizations -- and is part of Palantir’s larger effort to diversify its sources of revenue away from a few big customers.

The new program, called Foundry for Builders, will start with five startups in fields including robotics, health and fintech. The group will experiment with software that Palantir says functions as an operating system for company data. Palantir chose startups connected to former employees, who are already familiar with how to operate the system, and use their feedback to refine the product for startups before rolling it out more broadly in coming months.

Palantir had 149 customers driving $341 million revenue for the first quarter, with the bulk of sales coming from government contracts. A flurry of deal-making during the pandemic, including agreements with the U.S. Centers for Disease Control and Prevention, pushed the company’s government business to more than 60% of revenue -- an imbalance that unsettled some investors.

Foundry for Builders aims to counteract that disparity by adding a larger number of potentially fast-growing companies to Palantir’s customer base. Developing closer relationships with early-stage companies appears to have been an increasing focus in recent months for Denver-based Palantir.

Besides expanding sales to startups, the company has also been investing in them. Palantir recently made a string of direct investments in companies going public through SPACs totaling more than $130 million. All of those companies also became customers, a practice that has raised some eyebrows.

Tuesday, November 03, 2020

The Seth Rich Assassination And Coverup Yet Another Reason Julian Assange Must Die In Jail

sicsempertyrannis |  While the law enforcement and intelligence community, along with the mainstream media, has been pushing the meme that there is no basis to believe that Seth Rich, as claimed by multiple independent sources, had contact with Julian Assange’s Wikileaks, the evidence suggests otherwise and it turns out the FBI has been covering up more relevant documents.

The first hint of the coverup came from David Hardy, an FBI Senior official, who affirmed in a 2017 affidavit that there were no responsive records. Hardy is the Section Chief of the Record/Information Dissemination Section (“RIDS”), Information Management Division (“IMD”), Federal Bureau of Investigation (“FBI”), in Winchester, Virginia. Here are the relevant portions of his first affidavit:

(19) CRS Search and Results. In response to Plaintiff’s request dated September 1, 2017, RIDS conducted an index search of the CRS for responsive main and reference file records employing the UNI application of ACS. The FBI searched the subject’s name, “Seth Conrad Rich,” in order to identify files responsive to Plaintiff’s request and subject to the FOIA. The FBI’s searches included a three-way phonetic breakdown5 of the subject’s name. These searches located no main or reference records responsive to Plaintiff’s FOIA request.

(9) By letter executed on November 9, 2017, OIP advised Plaintiff it affirmed the FBI’s determination. OIP further advised Plaintiff that to the extent his request sought access to records that would either confirm or deny an individual’s placement on any government watch list, the FBI properly refused to confirm or deny the existence of any such records because their existence is protected from disclosure pursuant to 5 U.S.C. § 552(b)(7)(E). . .

David Hardy either was lying or dangerously incompetent. The FBI did have documents–emails to be specific. The FBI’s habit of stonewalling or denying that it has documents, in this case documents related to Seth Rich, is not unique to this case. Just ask Carter Page or General Michael Flynn.

  The FBI finally admitted to Judicial Watch in January 2020 that they had emails between the Washington Field Office and FBI Headquarters. These are dynamite because they show that the FBI’s Washington Field Office (which is not located at FBI Headquarters on 9th and Pennsylvania Avenue, NW in Washington, DC) was communicating with the FBI’s Peter Strzok and the Counter Intelligence Division. Why in the world would the FBI be involved in investigating what was supposedly a mere robbery of an unfortunate white victim (i.e., Seth Rich) and communicating on this investigation with the Counter Intelligence Division (CID) of the FBI. The CID only works international spy cases.

Here are the emails (I transcribed them and put them in chronological order to facilitate your ability to read them and understand what is being communicated).

Thursday, April 30, 2020

Controlavirus Immunity Doesn't Last...,


technologyreview |  Starting in the fall of 2016 and continuing into 2018, researchers at Columbia University in Manhattan began collecting nasal swabs from 191 children, teachers, and emergency workers, asking them to record when they sneezed or had sore throats. The point was to create a map of common respiratory viruses and their symptoms, and how long people who recovered stayed immune to each one.

The research included four coronaviruses, HKU1, NL63, OC42, and C229E, which circulate widely every year but don’t get much attention because they only cause common colds. But now that a new coronavirus in the same broad family, SARS-CoV-2, has the world on lockdown, information about the mild viruses is among our clues to how the pandemic might unfold.

What the Columbia researchers now describe in a preliminary report is cause for concern. They found that people frequently got reinfected with the same coronavirus, even in the same year, and sometimes more than once. Over a year and a half, a dozen of the volunteers tested positive two or three times for the same virus, in one case with just four weeks between positive results.

That’s a stark difference from the pattern with infections like measles or chicken pox, where people who recover can expect to be immune for life.

For the coronaviruses “immunity seems to wane quickly,” says Jeffrey Shaman, who carried out the research with Marta Galanti, a postdoctoral researcher.

Whether covid-19 will follow the same pattern is unknown, but the Columbia results suggest one way that much of the public discussion about the pandemic could be misleading. There is talk of getting “past the peak” and “immunity passports” for those who’ve recovered. At the same time, some hope the infection is more widespread than generally known, and that only a tolerable death total stands between us and high enough levels of population immunity for the virus to stop spreading.

All that presumes immunity is long-lived, but what if it is fleeting instead?

Wednesday, August 22, 2018

Not Just In Crime-Ridden Inner Cities Any More...,


Rutherford |  Police in a small Georgia town tasered a 5-foot-2, 87-year-old woman who was using a kitchen knife to cut dandelions for use in a recipe. Police claim they had no choice but to taser the old woman, who does not speak English but was smiling at police to indicate she was friendly, because she failed to comply with orders to put down the knife.

Police in California are being sued for using excessive force against a deaf 76-year-old woman who was allegedly jaywalking and failed to halt when police yelled at her. According to the lawsuit, police searched the woman and her grocery bags. She was then slammed to the ground, had a foot or knee placed behind her neck or back, handcuffed, arrested and cited for jaywalking and resisting arrest.

In Alabama, police first tasered then shot and killed an unarmed man who refused to show his driver’s license after attempting to turn in a stray dog he’d found to the local dog shelter. The man’s girlfriend and their three children, all under the age of 10, witnessed the shooting.

In New York, Customs and Border Protection officers have come under fire for subjecting female travelers (including minors) to random body searches that include strip searches while menstruating, genital probing, and forced pelvic exams, X-rays and intravenous drugs at area hospitals.

At a California gas station, ICE agents surrounded a man who was taking his pregnant wife to the hospital to deliver their baby, demanding that he show identification. Having forgotten his documents at home in the rush to get to the hospital, the husband offered to go get them. Refusing to allow him to do so, ICE agents handcuffed and arrested the man for not having an ID with him, leaving his wife to find her way alone to the hospital. The father of five, including the newborn, has lived and worked in the U.S. for 12 years with his wife.

These are not isolated incidents.

These cases are legion.

This is what a state of undeclared martial law looks like, when you can be arrested, tasered, shot, brutalized and in some cases killed merely for not complying with a government agent’s order or not complying fast enough.

This isn’t just happening in crime-ridden inner cities.

Real ID


ericpetersautos |  The REAL ID card, as they’re styled.  

And the “upgrade” – as that is styled – is trackable biometric tagging, just the right word. Like the ear tags ranchers use to keep track of their cattle.

Without which they aren’t allowed beyond the barbed wire. Just like us.

The REAL ID will also plug the cow – whoops, person – into “ . . .national linked databases allowing millions of employees at all levels of government around the national to access personal data.”

That data being … everything.

Not just your DMV record, date of birth, sex and the usual data pertaining to driving. The REAL ID will tie everything about you that’s been uploaded to government/corporate data bases into one easily accessible (by the government and corporations) place. When an armed government worker pulls you over, he’ll be able to know you better than your spouse does just by scanning your card. Also your bank, employer and everyone else you’re forced to ID yourself to. 

And if you don’t get the REAL ID?  It’s the reservation for you.

How did this happen?

The REAL ID Act was imposed upon Americans back in 2005 by the enemies of freedom – that is, by George W. Bush, his puppet master, Dick Cheney and the politicians of both the Democrat and Republican persuasion – who voted to rescind the freedoms of Americans in the aftermath of the (ahem) terrorist attacks of September 11, 2001.

In the name of “fighting terror,” Americans would be terrorized – forced to submit to fingerprinting, retinal-scanning and other such biometric cattle tagging in order to travel . . . anywhere.

Including within the United States.

Wednesday, July 04, 2018

.45, Double-O, And The True Nature Of Facism...,


Counterpunch |  Clinton lost to Trump, not because millions of poor people were mobilized by a fascist message; but because millions of poor people didn’t turn out to vote; they understood that Obama was a friend of war, a guardian of Wall Street, and a keeper of the neoliberal status quo. They didn’t require more of the same in Clinton.  But the actual facts of Obama’s presidency are increasingly drowned out by the howls of ‘fascist’ which are hurled at Donald Trump week by week, month by month.  This is nothing new, incidentally. Every single thoroughly reactionary Republican president of the past fifty years has had this charge levelled at them: Nixon, Raegan, both Bushes and now Trump.  They were all fascists in their day.

But in allocating to an administration the label fascist – even if it is headed by a person with clear fascist ideological tendencies – we run the risk of underestimating not only the everyday run-of-the-mill racist and war mongering policies enacted by the ‘respectable’ parties of the parliamentary mainstream; we also fail to comprehend the symbiotic connection which opens up between the period of Obama and the time of Trump.  Trump’s regime is, for the most part, more reactionary, and more overtly and rabidly racist than the Obama administration ever was; this cannot be denied.  Trump’s accession marks a truly awful period in American politics.

But it reached its fruition precisely because the Obama administration had exhausted its facile promises of hope and change in the flames of international war and the unrelenting economic oppression of the poorer layers of the domestic population.  It is the continuation of such politics by more extreme means, with the ideological veneer of progressivism set aside, born from the thickening disillusionment of the poorer layers in a decaying political system and their increasing lack of interest in the ballot box (for very good reason).  It has the features of ineptitude and corruption which are the product of such a development.

But is not a fascist administration.  It does not mark a qualitative break in what has come before. The latest farrago involving immigrant children is unutterably awful, but its closest parallel in US history – if not the immigration policies of Obama himself – might be something like the locking up of the families of Japanese Americans in WW2.  That policy was carried out by the Democratic Party headed by Roosevelt.  The same party which, by the way, supported slavery, used nuclear weapons against Japanese cities and escalated the war in Vietnam to a shrieking crescendo.

In describing the Trump administration as fascist we subscribe to a liberal logic which separates out the material realities of fascism from its ideological expression. This helps whitewash the reality of the Democratic Party as a party of war and the financial elite, and instead recasts it in the type of morality play where the beleaguered and high minded liberals like Obama and Clinton become the last bastions of reason and humanity against an ever encroaching darkness – only their tragic struggle against barbarism is doomed to founder on the rocks of the prejudices and the whims of an easily excitable and unsophisticated mob.  It is a vision which combines hatred of the lower classes with a drooling sycophancy toward the elite.  As tragedy goes, it is more Vanity Fair then Shakespeare.
Don’t buy into it.

Speaking Of Protecting Organized Criminal Syndicates...,


WaPo |  Federal prosecutors concluded an 18-month investigation into a former congressional technology staffer on Tuesday by publicly debunking allegations — promoted by conservative media and President Trump — suggesting he was a Pakistani operative who stole government secrets with cover from House Democrats.

As part of an agreement with prosecutors, Imran Awan pleaded guilty to a relatively minor offense unrelated to his work on Capitol Hill: making a false statement on a bank loan application. U.S. prosecutors said they would not recommend jail time.

But the agreement included an unusual passage that described the scope of the investigation and cleared Awan of a litany of conspiracy theories promulgated on Internet blogs, picked up by right-leaning news sites and fanned by Trump on Twitter.

“The Government has uncovered no evidence that your client violated federal law with respect to the House computer systems,” including stealing equipment or illegally accessing or transferring information, prosecutors wrote in an 11-page plea agreement dated and signed Tuesday.
Federal prosecutors described in the agreement a “thorough investigation” that included forensic analysis of computer equipment and other devices, log-on and usage data and interviews with about 40 witnesses. 

Awan and four of his associates, including family members, worked as IT specialists for dozens of Democratic lawmakers until they were banned from the computer network in February 2017, accused of violating House security rules. The ensuing investigation attracted aggressive coverage by conservative media outlets — led by the Daily Caller — and prompted calls from Trump to prosecute Awan, whom the president referred to in one tweet as the “Pakistani mystery man.”

Wednesday, May 30, 2018

WikiLeaks Calls QAnon A Pied-Piper Operation


twitter |  After more than 6 months of watching people get scammed by the #QAnon phenomena, I'm going to make the below thread to explain to you exactly why it is an intelligence agency-backed psyop, what techniques are being used, and why you need to stop people falling for it.

 Thread Guide:

1: #QAnon: Pied Piper op
2. Phase 1: Establishing credibility
3. Phase 2: Making it spiritual
4. Phase 3: Shifting Targets
5. Methodologies
6. Indicators
7. Answering questions
8. Snowden revelations
9. Finish

Wednesday, May 23, 2018

Afrikan Liberation Movement - Amazon Giving RealTime Facial Rekognition To Law Enforcement


WaPo |  Amazon has been essentially giving away facial recognition tools to law enforcement agencies in Oregon and Orlando, according to documents obtained by American Civil Liberties Union of Northern California, paving the way for a rollout of technology that is causing concern among civil rights groups.

Amazon is providing the technology, known as Rekognition, as well as consulting services, according to the documents, which the ACLU obtained through a Freedom of Information Act request.

A coalition of civil rights groups, in a letter released Tuesday, called on Amazon to stop selling the program to law enforcement because it could lead to the expansion of surveillance of vulnerable communities.

“We demand that Amazon stop powering a government surveillance infrastructure that poses a grave threat to customers and communities across the country,” the groups wrote in the letter.
Amazon spokeswoman Nina Lindsey did not directly address the concerns of civil rights groups. “Amazon requires that customers comply with the law and be responsible when they use AWS services,” she said, referring to Amazon Web Services, the company’s cloud software division that houses the facial recognition program. “When we find that AWS services are being abused by a customer, we suspend that customer’s right to use our services.”

She said that the technology has many useful purposes, including finding abducted people.  Amusement parks have used it to locate lost children. During the royal wedding this past weekend, clients used Rekognition to identify wedding attendees, she said. (Amazon founder Jeffrey P. Bezos is the owner of The Washington Post.)

The details about Amazon’s program illustrate the proliferation of cutting-edge technologies deep into American society — often without public vetting or debate. Axon, the maker of Taser electroshock weapons and the wearable body cameras for police, has voiced interest in pursuing face recognition for its body-worn cameras, prompting a similar backlash from civil rights groups.  Hundreds of Google employees protested last month to demand that the company stop providing artificial intelligence to the Pentagon to help analyze drone footage.

Urban Reconnaissance Through Supervised Autonomy (URSA)


DARPA |  DARPA’s Tactical Technology Office is hosting a Proposers Day to provide information to potential applicants on the structure and objectives of the new Urban Reconnaissance through Supervised Autonomy (URSA) program. URSA aims to develop technology to enable autonomous systems operated and supervised by U.S. ground forces to detect hostile forces and establish positive identification of combatants before U.S. troops encounter them. The URSA program seeks to overcome the inherent complexity of the urban environment by combining new knowledge about human behaviors, autonomy algorithms, integrated sensors, multiple sensor modalities, and measurable human responses to discriminate the subtle differences between hostile individuals and noncombatants. Additional details are available at https://www.fbo.gov/spg/ODA/DARPA/CMO/DARPA-SN-18-48/listing.html

To register, visit https://www.client-meeting.net/Proposers-Day-May-2018. Registration closes at 4:00 PM ET on April 25, 2018.

Please address administrative questions to DARPA-SN-18-48@darpa.mil, and refer to the URSA Proposers Day (DARPA-SN-18-48) in all correspondence. 

DARPA hosts Proposers Days to provide potential performers with information on whether and how they might respond to the Government’s research and development solicitations and to increase efficiency in proposal preparation and evaluation. Therefore, the URSA Proposers Day is open only to registered potential applicants, and not to the media or general public.

Full URSA program details will be made available in a forthcoming Broad Agency Announcement posted to the Federal Business Opportunities website. 



Wednesday, April 25, 2018

DNC: Worldwide Defenders of a Free Press and Democracy!!!


truthdig |  Exactly 200 days before the crucial midterm election that will determine whether Republicans maintain control of Congress, the Democratic National Committee filed a 66-page lawsuit that surely cost lots of money and energy to assemble.

Does the lawsuit target purveyors of racist barriers to voting that block and deflect so many people of color from casting their ballots?

No.

Well, perhaps this ballyhooed lawsuit aims to ensure the rights of people who don’t mainly speak English to get full access to voting information?

Unfortunately, no.

Maybe it’s a legal action to challenge the ridiculously sparse voting booths provided in college precincts?

Not that either.

Announced with a flourish by DNC Chair Tom Perez, the civil lawsuit—which reads like a partisan polemic wrapped in legalisms—sues the Russian government, the Trump campaign and operatives, as well as WikiLeaks and its founding editor, Julian Assange.

It’s hard to imagine that many voters in swing districts—who’ll determine whether the GOP runs the House through the end of 2020—will be swayed by the Russia-related accusations contained in the lawsuit. People are far more concerned about economic insecurity for themselves and their families, underscored by such matters as the skyrocketing costs of health care and college education.

To emphasize that “this is a patriotic—not partisan—move,” Perez’s announcement of the lawsuit on April 20 quoted one politician, Republican Sen. John McCain, reaching for the hyperbolic sky: “When you attack a country, it’s an act of war. And so we have to make sure that there is a price to pay, so that we can perhaps persuade the Russians to stop these kind of attacks on our very fundamentals of democracy.”

Setting aside the dangerous rhetoric about “an act of war,” it’s an odd quotation to choose. For Russia, there’s no “price to pay” from a civil lawsuit filed in the U.S. District Court for the Southern District of New York. As the DNC well knows, any judgment against such entities as the Russian Federation and the general staff of its armed forces would be unenforceable.

The DNC’s lawsuit amounts to doubling down on its fixation of blaming Russia for the Democratic Party’s monumental 2016 loss, at a time when it’s essential to remedy the failed approaches that were major causes of Hillary Clinton’s defeat in the first place. Instead of confronting its fealty to Wall Street or overall failure to side with working-class voters against economic elites, the Democratic National Committee is ramping up the party leadership’s 18-month fixation on Russia Russia Russia.

After a humongous political investment in depicting Vladimir Putin as a pivotal Trump patron and a mortal threat to American democracy, strategists atop the Democratic Party don’t want to let up on seeking a big return from that investment. Protecting the investment will continue to mean opposing the “threat” of détente between the world’s two nuclear superpowers, while giving the party a political stake in thwarting any warming of the current ominously frigid relations between Moscow and Washington.

In truth, the party’s Russia fixation leaves significantly less messaging space for economic and social issues that the vast majority of Americans care about far more. Similarly, the Russia obsession at MSNBC (which routinely seems like “MSDNC”) has left scant airtime for addressing, or even noting, the economic concerns of so many Americans. (For instance, see the data in FAIR’s study, “Russia or Corporate Tax Cuts: Which Would Comcast Rather MSNBC Cover?”)

But even some of the congressional Democrats who’ve been prominent “Russiagate” enthusiasts have recognized that the lawsuit is off track. When Wolf Blitzer on CNN asked a member of the House Intelligence Committee, Jackie Speier, whether she believes that Perez and his DNC team “are making a big mistake by filing this lawsuit,” the California congresswoman’s reply was blunt: “Well, I’m not supportive of it. Whether it’s a mistake or not we’ll soon find out.” Speier called the lawsuit “ill-conceived.”

The most unprincipled part of the lawsuit has to do with its targeting of Assange and WikiLeaks. That aspect of the suit shows that the DNC is being run by people whose attitude toward a free press—ironically enough—has marked similarities to Donald Trump’s.

Grasshopper - You Will NEVER Overcome The Money Power!!!


techcrunch |  A new — and theoretical — system for blockchain-based data storage could ensure that hackers will not be able to crack cryptocurrencies once the quantum era starts. The idea, proposed by researchers at the Victoria University of Wellington in New Zealand, would secure cryptocurrency futures for decades using a blockchain technology that is like a time machine.


To understand what’s going on here we have to define some terms. A blockchain stores every transaction in a system on what amounts to an immutable record of events. The work necessary for maintaining and confirming this immutable record is what is commonly known as mining. But this technology — which the paper’s co-author Del Rajan claims will make up “10 percent of global GDP… by 2027” — will become insecure in an era of quantum computers.

Therefore the solution to store a blockchain in a quantum era requires a quantum blockchain using a series of entangled photons. Further, Spectrum writes: “Essentially, current records in a quantum blockchain are not merely linked to a record of the past, but rather a record in the past, one that does not exist anymore.”

Yeah, it’s weird.

From the paper intro:
Our method involves encoding the blockchain into a temporal GHZ (Greenberger–Horne–Zeilinger) state of photons that do not simultaneously coexist. It is shown that the entanglement in time, as opposed to an entanglement in space, provides the crucial quantum advantage. All the subcomponents of this system have already been shown to be experimentally realized. Perhaps more shockingly, our encoding procedure can be interpreted as non-classically influencing the past; hence this decentralized quantum blockchain can be viewed as a quantum networked time machine.
In short, the quantum blockchain is immutable because the photons that it contains do not exist at the current time but are still extant and readable. This means the entire blockchain is visible but cannot be “touched” and the only entry you would be able to try to tamper with is the most recent one. In fact, the researchers write, “In this spatial entanglement case, if an attacker tries to tamper with any photon, the full blockchain would be invalidated immediately.”

Is this possible? The researchers note that the technology already exists.

Putting Command, Control, Communications Permanently Out Of Peasant Reach...,


ieee |  Chinese researchers have put forward a new quantum cryptography standard that could, if confirmed, substantially increase the speed of encrypted messages. The proposed new standard has been simulated on computers although not yet tested in the lab.

Quantum cryptography, the next-generation of secret messages whose secrecy is guaranteed by the laws of quantum mechanics, has been in the news recently. Last fall a group from the Chinese Academy of Sciences transmitted quantum cryptographically encoded communications (via satellite) to a ground station in Vienna, Austria.

The communications included quantum-encoded images and a 75-minute quantum-cryptographically secured videoconference, consisting of more than 2 gigabytes of data. IEEE Spectrum reported on the event at the time. And now, as of last month, the entire project has been detailed in the journal Physical Review Letters.

Media coverage of the event stressed its significance in moving toward a so-called “quantum Internet.” Yet the quantum internet would still be a distant dream when quantum cryptography can only mediate one or, at most, a few quantum-secured communications channels. To scale up to anything worthy of the name quantum Internet, quantum cryptography would need to generate not only thousands of cryptographic keys per second. Rather, a scalable quantum crypto system should aspire to key-generation rates closer to billions per second or greater—in the gigahertz (GHz) range and up, not kilohertz (kHz).

cosmos |  For a few minutes each night in certain parts of China, the brightest light in the sky is the lurid glow of the Micius satellite, shooting a green laser down to Earth as it swings through space 500 kilometres above. When conditions are right, you might also see a red beam lancing back through the darkness from one of the ground stations that send signals in reply. 

Micius is not your average telecommunications satellite. On 29 September 2017, it made history by accomplishing an astonishing feat, harnessing the mysterious qualities of quantum entanglement – what Einstein called ‘spooky action at a distance’ – to ‘teleport’ information into space and back again. In doing so, it enabled the first intercontinental phone call – a video call, in fact, between Beijing and Vienna – that was completely unhackable.

The weird science of quantum physics that powers Micius is at the heart of a technology arms race. On one side are quantum computers, still in their infancy but with enormous potential once they grow in power. Among their most prized, and feared, applications is the capacity to cut through the complex mathematical locks that now secure computer encryption systems – the ones that mean you can confidently conduct financial transactions over the internet. On the other side is the only sure defence – encryption techniques that also rely on the laws of quantum physics.

Until recently scientists had managed to make quantum encryption work only across distances of a hundred kilometres or so. The Chinese scientists behind Micius have now reached around the world. It brings the ultimate prize tantalisingly closer. “I envision a space-ground integrated quantum internet,” says Pan Jianwei, whose team became frontrunners in the quantum communications race after Micius switched on.

Wednesday, April 18, 2018

American Attempt to Niggerize Subvert Cuba with RAP was an Epic FAIL!!!


APNews |  For more than two years, a U.S. agency secretly infiltrated Cuba’s underground hip-hop movement, recruiting unwitting rappers to spark a youth movement against the government, according to documents obtained by The Associated Press.

The idea was to use Cuban musicians “to break the information blockade” and build a network of young people seeking “social change,” documents show. But the operation was amateurish and profoundly unsuccessful.

On at least six occasions, Cuban authorities detained or interrogated people involved in the program; they also confiscated computer hardware, and in some cases it contained information that jeopardized Cubans who likely had no idea they were caught up in a clandestine U.S. operation. Still, contractors working for the U.S. Agency for International Development kept putting themselves and their targets at risk, the AP investigation found.

They also ended up compromising Cuba’s vibrant hip-hop culture — which has produced some of the hardest-hitting grassroots criticism since Fidel Castro came to power in 1959. Artists that USAID contractors tried to promote left the country or stopped performing after pressure from the Cuban government, and one of the island’s most popular independent music festivals was taken over after officials linked it to USAID.

The program is laid out in documents involving Creative Associates International, a Washington, D.C., contractor paid millions of dollars to undermine Cuba’s communist government. The thousands of pages include contracts, emails, preserved chats, budgets, expense reports, power points, photographs and passports.

The work included the creation of a “Cuban Twitter” social network and the dispatch of inexperienced Latin American youth to recruit activists, operations that were the focus of previous AP stories.

“Any assertions that our work is secret or covert are simply false,” USAID said in a statement Wednesday. Its programs were aimed at strengthening civil society “often in places where civic engagement is suppressed and where people are harassed, arrested, subjected to physical harm or worse.”

Creative Associates did not immediately respond to a request for comment.

British Propaganda and Disinformation



strategic-culture |  When it comes to creating bogus news stories and advancing false narratives, the British intelligence services have few peers. In fact, the Secret Intelligence Service (MI-6) has led the way for its American “cousins” and Britain’s Commonwealth partners – from Canada and Australia to India and Malaysia – in the dark art of spreading falsehoods as truths. Recently, the world has witnessed such MI-6 subterfuge in news stories alleging that Russia carried out a novichok nerve agent attack against a Russian émigré and his daughter in Salisbury, England. This propaganda barrage was quickly followed by yet another – the latest in a series of similar fabrications – alleging the Syrian government attacked civilians in Douma, outside of Damascus, with chemical weapons.

It should come as no surprise that American news networks rely on British correspondents stationed in northern Syria and Beirut as their primary sources. MI-6 has historically relied on non-official cover (NOC) agents masquerading primarily as journalists, but also humanitarian aid workers, Church of England clerics, international bankers, and hotel managers, to carry out propaganda tasks. These NOCs are situated in positions where they can promulgate British government disinformation to unsuspecting actual journalists and diplomats.

For decades, a little-known section of the British Foreign Office – the Information Research Department (IRD) – carried out propaganda campaigns using the international media as its platform on behalf of MI-6. Years before Syria’s Bashar al-Assad, Iraq’s Saddam Hussein, Libya’s Muammar Qaddafi, and Sudan’s Omar al-Bashir became targets for Western destabilization and “regime change.” IRD and its associates at the British Broadcasting Corporation (BBC) and in the newsrooms and editorial offices of Fleet Street broadsheets, tabloids, wire services, and magazines, particularly “The Daily Telegraph,” “The Times,” “Financial Times,” Reuters, “The Guardian,” and “The Economist,” ran media smear campaigns against a number of leaders considered to be leftists, communists, or FTs (fellow travelers).

These leaders included Indonesia’s President Sukarno, North Korean leader (and grandfather of Pyongyang’s present leader) Kim Il-Sung, Egypt’s Gamal Abdel Nasser, Cyprus’s Archbishop Makarios, Cuba’s Fidel Castro, Chile’s Salvador Allende, British Guiana’s Cheddi Jagan, Grenada’s Maurice Bishop, Jamaica’s Michael Manley, Nicaragua’s Daniel Ortega, Guinea’s Sekou Toure, Burkina Faso’s Thomas Sankara, Australia’s Gough Whitlam, New Zealand’s David Lange, Cambodia’s Norodom Sihanouk, Malta’s Dom Mintoff, Vanuatu’s Father Walter Lini, and Ghana’s Kwame Nkrumah.

After the Cold War, this same propaganda operation took aim at Serbian President Slobodan Milosevic, Sinn Fein leader Gerry Adams, Venezuela’s Hugo Chavez, Somalia’s Mohamad Farrah Aidid, and Haiti’s Jean-Bertrand Aristide. Today, it is Assad’s, Hungarian Prime Minister Viktor Orban’s, and Catalonian independence leader Carles Puigdemont’s turn to be in the Anglo-American state propaganda gunsights. Even Myanmar leader Aung San Suu Kyi, long a darling of the Western media and such propaganda moguls as George Soros, is now being targeted for Western visa bans and sanctions over the situation with Muslim Rohingya insurgents in Rakhine State. 

Wednesday, April 11, 2018

Did I Miss Eric Schmidt's Testimony Before the Senate?


antimedia |  With all the attention paid to Facebook in recent weeks over ‘data breaches’ and privacy violations (even though what happened with Cambridge Analytica is part of their standard business model), it’s easy to forget that there are four other Big Tech corporations collecting just as much — if not more — of our personal info. Google, Amazon, Apple, and Microsoft are all central players in “surveillance capitalism” and prey on our data. New reports suggest that Google may actually harvest ten times as much as Facebook.
Curious about just how much of his data Google had, web developer Dylan Curran says he downloaded his Google data file, which is offered by the company in a hub called “My Account.” This hub was created in 2015, along with a tool called “My Activity.” The report issued is similar to the one Facebook delivers to its users upon request. Whether or not these reports are comprehensive is still up in the air, but Curran says his was 5.5 GB, which is almost ten times larger than the one Facebook offered him. The amount and type of data in his file, Mr. Curran says, suggests Google is not only constantly tracking our online movements but may also be monitoring our physical locations.

Curran’s Google report contained an incredible amount documentation on his web activity, going back over a decade. But perhaps more importantly, Google had also been tracking his real-life movements via his smartphone device or tablet. This included fairly random places he’d frequented, many of the foreign countries and cities he visited, the bars and restaurants he went to while in these countries, the amount of time he spent there, and even the path he took to get there and back.
This, of course, is not new. It has been well-known for some time that Google silently tracks you everywhere you go and creates a map of your physical movements through its Location History feature. You can deactivate it by going to your timeline and adjusting the preferences.
Another Google user downloaded his file and discovered the company had been archiving his data even when he browsed in Incognito mode, a setting that advertises itself as one that does not save browsing history.

Like Facebook, Google gathers your info for sale to 3rd-party advertisers, including your name, email address, telephone number, credit card, specific ways you use Google’s services, your mode of interaction with any website that uses Google technology (such as AdWords), your device, and your search queries. And if you don’t enter your account and make adjustments, pretty much anything you do online while deploying a Google tool is tracked. Google’s policy states:
If other users already have your email, or other information that identifies you, we may show them your publicly visible Google Profile information, such as your name and photo.
But much of the location data stems from the use of Google apps like Maps or Now, which broadcast your location. If you want to stop this information from being shared, you have to go into your account settings and make adjustments.
The ostensible purpose of this data-sharing is to fine-tune your user experience, but who is benefitting more is arguable. The same year it released its new activity hub, Google also unveiled a new program that shares your email with high-value advertisers. Called Customer Match, this system streamlines consumer info so that an advertiser’s “brand is right there, with the right message, at the moment your customer is most receptive.”

Google’s policy also lists the three major categories of data collection: Things you do; Things you create; and Things that make you “you.”

The Underlying Nature of the Divide in American Politics


medium |  For several years now, political journalists, analysts, and pundits have been arguing that U.S. politics has increasingly turned into a struggle between urban and rural voters. Regional differences were once paramount, Josh Kron observed in the Atlantic after the 2012 election. “Today, that divide has vanished,” he declared. “The new political divide is a stark division between cities and what remains of the countryside.” Two years later, the Washington Post’s Philip Bump wrote that there are “really two Americas; an urban one and a rural one,” going on to observe that since Iowa was growing more urban, Democrats could count on doing better there. Instead, an ever-more urbanized and diverse nation turned not just toward Republicans, but also toward the authoritarian nationalism of Donald Trump, prompting further hand-wringing over the brewing civil war. “It seems likely that the cracks dividing cities from not-cities will continue to deepen, like fissures in the Antarctic ice shelf, until there’s nothing left to repair,” concluded a lengthy New York story on the phenomena this April.

I don’t disagree that the United States is in crisis, with fissures breaking apart our facade of national unity and revealing structural weaknesses of the republic. Our federation — and, therefore, the world — is in peril, and the stakes are enormous. As the author of American Nations: A History of the Eleven Rival Regional Cultures of North America, however, I strongly disagree with the now-conventional narrative that what ultimately divides us is the difference between metropolitan and provincial life. The real divide is between regional cultures — an argument I fleshed out at the outset of this series—as it always has been. And I now have the data to demonstrate it.

So do we know whether targeted fake news helped swing the election to Donald Trump?


scientificamerican |  When I was a teenager, my parents often asked me to come along to the store to help carry groceries. One day, as I was waiting patiently at the check-out, my mother reached for her brand new customer loyalty card. Out of curiosity, I asked the cashier what information they record. He replied that it helps them keep track of what we’re buying so that they can make tailored product recommendations. None of us knew about this. I wondered whether mining through millions of customer purchases could reveal hidden consumer preferences and it wasn’t long before the implications dawned on me: are they mailing us targeted ads?

This was almost two decades ago. I suppose the question most of us are worried about today is not all that different: how effective are micro-targeted messages? Can psychological “big data” be leveraged to make you buy products? Or, even more concerning, can such techniques be weaponized to influence the course of history, such as the outcomes of elections? On one hand, we’re faced with daily news from insiders attesting to the danger and effectiveness of micro-targeted messages based on unique “psychographic” profiles of millions of registered voters. On the other hand, academic writers, such as Brendan Nyhan, warn that the political power of targeted online ads and Russian bots are widely overblown.

In an attempt to take stock of what psychological science has to say about this, I think it is key to disentangle two prominent misunderstandings that cloud this debate.

First, we need to distinguish attempts to manipulate and influence public opinion, from actual voter persuasion. Repeatedly targeting people with misinformation that is designed to appeal to their political biases may well influence public attitudes, cause moral outrage, and drive partisans further apart, especially when we’re given the false impression that everyone else in our social network is espousing the same opinion. But to what extent do these attempts to influence translate into concrete votes? 

The truth is, we don’t know exactly (yet). But let’s evaluate what we do know. Classic prediction models that only contain socio-demographic data (e.g. a person’s age), aren’t very informative on their own in predicting behavior. However, piecing together various bits of demographic, behavioral, and psychological data from people, such as pages you’ve liked on Facebook, results from a personality quiz you may have taken, as well as your profile photo (which reveals information about your gender and ethnicity) can improve data quality. For example, in a prominent study with 58,000 volunteers, a Stanford researcher found that a model using Facebook likes (170 likes on average), predicted a whole range of factors, such as your gender, political affiliation, and sexual orientation with impressive accuracy.

In a follow-up study, researchers showed that such digital footprints can in fact be leveraged for mass persuasion. Across three studies with over 3.5 million people, they found that psychologically tailored advertising, i.e. matching the content of a persuasive message to an individuals’ broad psychographic profile, resulted in 40% more clicks and in 50% more online purchases than mismatched or unpersonalized messages. This is not entirely new to psychologists: we have long known that tailored communications are more persuasive than a one-size-fits all approach. Yet, the effectiveness of large-scale digital persuasion can vary greatly and is sensitive to context. After all, online shopping is not the same thing as voting!

So do we know whether targeted fake news helped swing the election to Donald Trump?

Wednesday, April 04, 2018

Monetized American Mcdonalds-Fiend Sex Addict Tweeter


rightweb |  Last August, shortly after John Kelly replaced Reince Priebus as White House chief of staff and Steve Bannon was fired as the president’s chief strategist, John Bolton complained that he could no longer get a meeting with Donald Trump.

Just three months later, however, on the eve of Trump’s belligerent address to the United Nations, Bolton was once again in direct contact with the president. How did this turnabout take place? The reconnection was reportedly arranged by none other than Sheldon Adelson, the Trump campaign’s biggest donor.

Politico reported that the most threatening line in Trump’s UN speech—that he would cancel Washington’s participation in the Iran nuclear deal if Congress and U.S. allies did not bend to his efforts to effectively renegotiate it—came directly from Bolton and wasn’t in the original marks prepared by Trump’s staff.
The line was added to Trump’s speech after Bolton, despite Kelly’s recent edict [restricting Bolton’s access to Trump], reached the president by phone on Thursday afternoon from Las Vegas, where Bolton was visiting with Republican megadonor Sheldon Adelson. Bolton urged Trump to include a line in his remarks noting that he reserved the right to scrap the agreement entirely, according to two sources familiar with the conversation.
Some analysts have suggested that Bolton, an anti-Iran uber-hawk, has the visit to Washington of Saudi Crown Prince Mohammed bin Salman to thank for his imminent elevation. But Adelson, a huge supporter of Israeli Prime Minister Benjamin Netanyahu, likely played a critical role in Bolton’s ascendancy.

What Is France To Do With The Thousands Of Soldiers Expelled From Africa?

SCF  |    Russian President Vladimir Putin was spot-on this week in his observation about why France’s Emmanuel Macron is strutting around ...