Bonum Certa Men Certa

Governments Complicit in NSA Cracking Crimes and Blackmail



Summary: New scandals involving the NSA, including COINTELPRO-like targeting by the NSA

RECENT bombshells from Snowden et al. revealed a high degree of criminality in the NSA, which infects computer networks [1]. Perhaps they can no longer accuse China of doing such things. But to what degree have governments other than the United States' played in all this? Well, there's allegation that Canada's government is now part of the same institutional corruption [2]. Other US allies, even neighbours of China (where the majority of the nation is of Chinese descent), may be complicit [3]. The high degree of state surveillance [4] is being studied [5] and citizens in the United States (not to be confused with the government) want some answers [6,7,8] about the NSA's facilities. Networks got compromised [9], essentially subverting any notion of security [10]. Now we have it confirmed that the NSA used information it had gathered for blackmail [11-14]. This is a huge deal as it makes complicit nations accomplices in the act. Back in the days of COINTELPRO, the FBI used surveillance in an attempt to drive Martin Luther King to suicide.



Related/contextual items from the news:



  1. New Snowden document reveals NSA’s international malware operation
    A presentation slide provided by Edward Snowden and published by the Dutch media outlet NRC on November 23 shows that the NSA has infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive and private information.


  2. Canada let NSA spy on G8 and G20 Ontario summits during week-long operation in 2010
    The NSA used U.S. Embassy in Ottawa as command post during summits


  3. Korea and Singapore Alleged to Have Assisted NSA in Eavesdropping


  4. Snowden spyware revelations: we need to unmask the five-eyed monster
    With revelations of spyware planted on 50,000 networks, the "Five Eyes" states have been allowed to trample over their citizens' privacy for far too long


  5. Call-Log App Aims to Reverse-Engineer NSA Surveillance
    The MetaPhone project asks volunteers to install an Android app that sends the researchers copies of a device’s call logs and basic data from a person’s Facebook account. The researchers say that a large collection of such data will make it possible to use data-mining techniques to discover which aspects of people’s lives—as recorded in their Facebook data—can be revealed by examining just their calling and texting logs.


  6. Citizens Protest NSA Data Center
  7. Utah Cyber Attacks on the Rise as NSA Facility Draws International Attention


  8. Utah town gave NSA a deal on water
    Bluffdale agreed to sell water to the National Security Agency at a rate below its own guidelines and the Utah average in order to secure the contract and spur economic development in the town, according to records and interviews.


  9. Quoted: on how the NSA may have tapped into Internet data
    As other countries push for more control over the Internet, “you’re going to see national boundaries begin in cyberspace,” said Jason Healey, director of policy group Cyber Statecraft Initiative at the Atlantic Council, according to Bloomberg.


  10. Death and the NSA: Motherboard Meets Bruce Schneier
    That's not to say that the NSA has "broken" all cryptography: "the math works," says Schneier, and while anonymizing tools like Tor are targeted by NSA, they seem to remain secure. Instead, the NSA appears to have manipulated encryption tools and tapped into data center links and fiber backbones—in essence, silently removing the hinges from their doors.


  11. NSA 'planned to discredit radicals over web-porn use'
    The US authorities have studied online sexual activity and suggested exposing porn site visits as a way to discredit people who spread radical views, the Huffington Post news site has reported.


  12. NSA 'tracked online sexual habits of suspected terrorists'


  13. NSA attempted to shame radicals with online porn records


  14. NSA's Porn-Shaming Strategy
    The disclosures from the Snowden files keep on coming, with each revelation more disturbing than the last. The latest report reveals a plan by the National Security Agency to collected information on six people's online activity, particularly their visits to pornographic websites, to discredit them within their community.

    This is an example of "how 'personal vulnerabilities' can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation, and authority," activist Glenn Greenwald wrote in the Huffington Post on Tuesday evening.




Recent Techrights' Posts

Gemini Links 16/03/2025: Threats to Canada and How to Process News Online
Links for the day
Many Reports About Microsoft Layoffs Are LLM Slop Based on Other LLM Slop (From Microsoft-controlled LLMs That Downplay the Layoffs or Give Badly Outdated Data)
The LLM slopfarms also dilute/derank actual news about Linux by pushing Microsoft Azure instead; it's a spamfest!
 
Links 16/03/2025: American Press Under Attack, "France Offers to Take in US Scientists"
Links for the day
Links 16/03/2025: Growing Tariff Hostilities and Social Media Surveillance
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, March 15, 2025
IRC logs for Saturday, March 15, 2025
Gemini Links 15/03/2025: Sleeping in March, Headless Raspberry Pi 4
Links for the day
Links 15/03/2025: Hey Hi (AI) Hype Waning, Microsoft and Apple Ridiculed for Vapourware
Links for the day
When You Expose Corporate Crimes, Misconduct and Lies They Harasses and Troll You. Then You Write About the Harassment and Trolling and They Allege It's "All Personal".
protect women's safety
Gemini Links 15/03/2025: Bandcamp and DST
Links for the day
Links 15/03/2025: Albania TikTok Ban, No Skinnerboxes in Danish Schools
Links for the day
Sierra Leone: Android Up to Record Highs, Windows Falls to Record Lows of Almost 5% (15 Years Ago It Was 100%)
This is what happens when about 83% of Web requests come from mobile
Margarita Manterola (marga, Google) & Debian DebConf13 Swiss venue intrigue
Reprinted with permission from Daniel Pocock
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, March 14, 2025
IRC logs for Friday, March 14, 2025
'India Today' is a Slopfarm, Sometimes 'Covering' "Linux" With Slop Images
New example of pure BS
Gemini Links 14/03/2025: Grizzy Bear and Prime Beats
Links for the day
Links 14/03/2025: ProPublica Admitting That It Uses Slop (Foolish Move), RIP Mark Klein
Links for the day
Windows is Fast Becoming Insignificant to Zimbabweans
based on this survey, less than 1 in 6 Web requests may originate from Windows
Rumours of IBM Layoffs Again, This Time Marketing
It's "bad marketing" to talk about layoffs
The Fall of the Open Source Initiative (OSI): The OSI Does Not Speak For You, OSI Staff Speaks for GAFAM/Microsoft (the Paymasters)
they speak for proprietary software companies, but they wear "open" on their sleeve
Microsoft Money Used for Abuse of Women and Against Journalism in Support of Women (the Victims)
"Never interrupt your opponent while he is in the middle of making a mistake."
Slopwatch: linuxsecurity.com and hamradio.my (in Planet Ubuntu) Are at It Again With LLM Slop About "Linux"
LLM slop does not save time
Links 14/03/2025: Chinese Tensions With Australia, Putin Turns Down Ceasefire
Links for the day
Gemini Links 14/03/2025: Löjl and Docker Context Stuff
Links for the day
Links 14/03/2025: Scam Currencies in the US and Oligarchs (Including GAFAM) Controlling All the Major Policies
Links for the day
Antisemitic Attacks on Richard Matthew Stallman (RMS) in Wikipedia This Week
Did the man strike a nerve or what?
Bluewashing Ends DEI at IBM and at Red Hat (HR or Hiring Become Gender- and Race-Neutral)
All that "whitelist is racist" stuff is likely a thing of the past
Links 13/03/2025: Intel Rotates Figurehead and South Korea Imports Karen People From Myanmar
Links for the day
Meanwhile at Microsoft Canonical...
Promoting proprietary surveillance by a company that actively attacks Linux in a lot of ways
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, March 13, 2025
IRC logs for Thursday, March 13, 2025