EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

02.11.14

Skynet Watch: Surveillance for Assassination

Posted in Law at 5:46 am by Dr. Roy Schestowitz

Summary: Abuse of technology and removal of technological rights like privacy for political goals

  • Skynet Is Here (And Stealing Your Jobs)

    In a bid to make local communities safer and give local law enforcement agencies more tools to fight crime, California-based Knightscope recently unveiled a line of K5 robots that it believes will “predict and prevent crime with an innovative combination of hardware, software and social engagement.”

  • Mass Surveillance: The Day We Fight Back
  • Snowden plea bargain speculation played down by ex-CIA and NSA chief

    Michael Hayden says he sees little appetite for deal with whistleblower, and portrays US surveillance reforms as limited

  • Reddit, Tumblr and More Protest NSA With “Day We Fight Back”

    On Tuesday, a little more than two years after the “blackout” in opposition to the Stop Online Piracy Act (SOPA), Internet freedom activists are officially “planning a day of protest against mass surveillance” aimed at the National Security Agency.

  • NSA Strives to Restore 100% Coverage of Phone Calls as in the Days of George W. Bush

    If you’re concerned about the privacy of your phone calls, take heart: There’s less than a 30% chance the federal government is tracking them…for now.

  • Request to Caitlin Hayden for Full NSA Comments

    Hayden has been quoted in a recently published book, “The Snowden Files: The Inside Story of the World’s Most Wanted Man,” as responding to inquiries from the Guardian newspaper concerning disclosure of classified NSA documents, and quoted as well in a news report today, 10 February 2014, “The NSA’s Secret Role in the U.S. Assassination Program,” by Jeremy Scahill and Glenn Greenwald, concerning release of classified information about alleged NSA role in drone strikes. It would be beneficial for the public to have access to Hayden’s full remarks in both these cases rather than snippets favoring the news outlets’ side. I would like to publish Hayden’s full remarks on the public education website, Cryptome.org, of which I am the administrator, which since 1996 has provided information on intelligence agencies.

  • Whistleblower: NSA targets SIM cards for drone strikes, ‘Death by unreliable metadata’

    The “NSA has played an increasingly central role in drone killings over the past five years,” according to a former drone operator for the Joint Special Operations Command’s (JSOC) High Value Targeting task force who has also worked with the NSA. On the condition of anonymity, the whistleblower agreed to talk about the top-secret programs to The Intercept’s reporters Jeremy Scahill and Glenn Greenwald. His account was backed up by former U.S. Air Force drone sensor operator Brandon Bryant as well as documents leaked by Edward Snowden.Drone strikes based on NSA geolocation of SIM cards

  • How drone strikes based on NSA surveillance kill innocents

    The first report from Greenwald and Scahill’s new site highlights dangerous role of NSA phone tracking

  • Report alleges NSA role in U.S. drone assassinations
  • New Whistleblower Reveals NSA Picking Drone Targets Based On Bad Data: ‘Death By Unreliable Metadata’

    Late last night, the new publication from Laura Poitras, Glenn Greenwald and Jeremy Scahill launched. It’s called The Intercept, and I imagine that it’s going to be a must-follow for a variety of reasons. Its first major article digs deep into the NSA’s role in killing people with drones (often innocent people) based on questionable metadata. Remember how NSA defenders kept insisting that “it’s just metadata” as if that was no big deal? Well, what about when that metadata is being used to kill people?

  • Why Should AP Withhold Name of Country Where US Might Launch Drone & Kill Another US Citizen?

    Late in the afternoon, the Los Angeles Times went ahead and released the name of the country: Pakistan. That it explains the concern. There definitely are special operations forces from the US operating covertly in the country and the US cannot call too much attention to them without risking blowback.

    A United States citizen, who happens to be an alleged member of al Qaeda, is reportedly planning attacks on Americans who are overseas. The Associated Press reports, based on the comments of four anonymous United States officials, that President Barack Obama’s administration is contemplating how it can legally add this citizen to a “kill list” so he could be killed by a drone.

  • Obama administration mulls drone strike to kill suspected American Al-Qaeda member feared plotting attacks

    An American citizen who is a member of Al-Qaeda is actively planning attacks against Americans overseas, U.S. officials say, and the Obama administration is wrestling with whether to kill him with a drone strike and how to do so legally under its new stricter targeting policy issued last year.

  • US considers drone strike on American al-Qaida suspect abroad

    An American citizen who is a member of al-Qaida is actively planning attacks against Americans overseas, US officials say, and the Obama administration is wrestling with whether to kill him with a drone strike and how to do so legally under its new stricter targeting policy issued last year.

  • Obama administration considering drone killing of US citizen

    A United States citizen accused of being an overseas “Al-Qaeda facilitator” could soon be killed by an American drone, the Associated Press reported on Monday, but first the US government must find a way to legally launch such a strike.

  • Administration Officials Perform Some Very Public Handwringing Over Extrajudicial Drone Killing

    The administration has sort of painted itself into a corner with its new rules on drone strikes. It’s apparently seeking to take out a US citizen who has joined al-Qaeda and is “actively plotting” against the US. Multiple issues have arisen, thanks to Obama’s better-late-than-never drone guidelines, which were issued last year to appease the many countries perturbed by the US government’s increasing reliance on drones to take out suspected terrorists.

  • Obama Officials Weigh Drone Attack on US Suspect
  • Obama administration American terror suspect possibly targeted for drone attack

    The case of an American citizen and suspected member of al-Qaida who is planning attacks on U.S. targets overseas underscores the complexities of President Barack Obama’s new stricter targeting guidelines for the use of deadly drones.

    The CIA drones watching him cannot strike because he’s a U.S. citizen. The Pentagon drones that could are barred from the country where he’s hiding, and the Justice Department has not yet finished building a case against him.

  • Giuliani: Leak of Drone Target Compromises Mission

    U.S. officials who leaked plans for a possible drone strike on a U.S. citizen planning terror attacks don’t take their oaths of office seriously and should worry President Barack Obama, says former New York Mayor Rudolph Giuliani.

  • The U.S. May Be Planning to Kill Another U.S. Citizen Abroad

    “U.S. officials” have told Kimberly Dozier of the Associated Press that the Obama administration is wrestling with a decision over whether to kill a U.S. citizen who is a member of al-Qaida and is reportedly actively planning attacks against U.S. citizens abroad.

  • Should Obama administration murder American citizen with drone strike?

    There is a reason we have courts and constitutional protection that one will get a fair trial before being punished for the crime he/she may or may not have done. Killing a suspect without giving fair trail is taking away his/her constitutional rights.

  • Anti-drone activist kidnapped in Pakistan before he was due to testify in Europe

    A prominent Pakistani journalist and anti-drone activist has gone missing after nearly two dozen men stormed his home and abducted him, his lawyer announced on Monday – just days before he was due to testify before European parliamentarians.

    Kareem Khan was taken from his home in Rawalpindi – a city located just nine miles away from Islamabad in Punjab province – by approximately 20 men. Shahzad Akbar, Khan’s lawyer, told AFP that many of the men were wearing police uniforms, though the affiliation of the kidnappers remains unknown.

  • Google Unmasks the Anonymous With Google Authorship

    Google has a goal in mind and it has more to do with visitor identification as it relates to targeted advertising than it has to do with improving the quality, speed, or usefulness of searching or finding. This demands drawing out as many anonymous visitors as possible. This includes members with false names, stage names, brand names, noms de plume, and noms de guerre. Google wants to triangulate real name with as much online behavior as possible. Google’s apps, products, phones, OSes, and services are just elaborate strategies to lure Internet denizens out of the cold and into the system. The greater the number of points of reference connecting that user with online behavior the better. And it’s all for market data. It all comes down to revenue generation: AdWords, ad networks, and back-office partnerships and deals with other ad networks and revenue-generating schemes.

  • Another Successful Cryptoparty

    On Thursday night, as part of Manchester’s week long free software festival, Manchester Open Rights Group were helping to run a CryptoParty.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Links 28/8/2014: Many New Games, CTO of Red Hat Steps Down

    Links for the day



  2. We Are Gradually Winning the Battle Against Software Patents

    The once-elusive war on software patents is finally leading to some breakthrough and even the Federal Circuit reinforces the trend of software patents' demise



  3. Free/Open Source Software (FOSS) Companies Versus FOSS Moles (VMware, Sonatype, Xamarin)

    A look at three entities which pretend to be pro-FOSS but are actually FOSS-hostile and very much determined to replace FOSS with proprietary software



  4. Links 27/8/2014: GNU/Linux in Space, China, LinuxCon

    Links for the day



  5. FUD Against Google and FOSS Security Amid Microsoft Windows Security Blunders

    In the age of widespread fraud due to Microsoft Windows with its back doors there is an attempt to shift focus to already-fixed flaws/deficiencies in competitors of Microsoft



  6. Microsoft Spin Watch: IDG Turns to More Microsoft Propaganda, Hires Microsoft Boosters

    Media in Microsoft's pocket is telling Microsoft's lies and deceives the public for Microsoft's bottom line



  7. Microsoft's Massive Tax Evasion Becomes Better Known

    A new report about Microsoft's admission that it plays dirty tricks with tax (sometimes using moles in government) is increasing awareness of Microsoft's criminal aspects



  8. Links 25/8/2014: China's Linux Revolution Imminent

    Links for the day



  9. Links 24/8/2014: GNU/Linux Specialisation and Benchmarks

    Links for the day



  10. Links 23/8/2014: GNU/Linux Growth

    Links for the day



  11. Microsoft-Funded Attacks on Android Security and Patent/Copyright

    A look back at examples of people who smear Android and are receiving (or received) money from Microsoft



  12. Blowback in Chile and Munich After Microsoft Intervention

    Microsoft's attacks on the digital sovereignty of countries involves lobbying, corruption, an attack on standards (e.g. ODF), an attack on FOSS policies, and even an attack on accurate reporting (truth itself)



  13. The End of Microsoft is Nigh

    A look back at a tough year for Microsoft and a not-so-promising future



  14. Links 22/8/2014: Linux Foundation LFCS, LFCE

    Links for the day



  15. UPS Burned by Microsoft Windows, Gives Away Massive Number of Credit Card Details

    UPS is the latest victim of Microsoft's shoddy back door with software on top of it (Windows); attempts to blame FOSS for data compromise actually divert attention from the real culprit, which is proprietary software



  16. Microsoft's Funding of ALEC and Other Systemic Corruption

    Microsoft role in writing of laws by proxy, via groups such as ALEC



  17. Microsoft is Still Preying on British Taxpayers, Playing Politics

    Some news from the UK showing how Microsoft uses politics to extract money out of taxpayers, irrespective of their preferences



  18. Microsoft's Patent Troll Intellectual Ventures is Collapsing as 20% of Staff Laid Off

    More good news regarding the demise of patents as Microsoft's leading patent proxy is collapsing more rapidly than anyone ever imagined and software patents too are collectively doubted



  19. Links 21/8/2014: Conferences of Linux Foundation, Elephone Emerges

    Links for the day



  20. Links 20/8/2014: Linux Event, GNOME Milestone

    Links for the day



  21. Corruption Watch: Microsoft Lobbying Designed to Kill Chile's Free Software Policy and Promote Microsoft With Subsidies, More Dirty Tricks Emerge in Munich

    icrosoft is systematically attacking migrations to GNU, Linux and Free software, using dirty tricks, as always



  22. Vista 8 Such a Disaster That Even Microsoft Cannot Cope With It, Vapourware Tactics Start Early

    Microsoft's Windows-powered services are failing and Windows gets bricked by Microsoft patches, whereupon we are seeing yet more of Microsoft's vapourware tactics (focusing in imaginary, non-existent versions of Windows)



  23. On BlackBerry and Other Patent Trolls

    A roundup regarding patent trolls, starting with the bigger and latest joiner, BlackBerry's new patents apparatus



  24. Links 19/8/2014: Humble Jumbo Bundle 2 Betrayal, Mercedes-Benz Runs GNU/Linux

    Links for the day



  25. BlackBerry -- Like Microsoft Nokia -- Could be the Next Patent Proxy Troll

    BlackBerry is restructuring for patent assertion (i.e. trolling) in the wake of some alliances with Microsoft



  26. After Microsoft's Soft Bribe Some Non-Technical Deputy Does Not Like Free Software, Microsoft-Linked Media Responds to This Non-News by Making Bogus Claims of Munich Leaving GNU/Linux (Updated)

    The subversive forces that have secretly been attacking Munich over its migration to GNU/Linux (Microsoft press, Gartner, and even HP) are back to doing it while China and Russia follow Munich's lead



  27. Gates Foundation CFO Quits and Debate About Revolving Doors Recalled Amid Systematic and Shrewd Bribery of Public Officials

    More officials step out of the Gates Foundation and their destination is not known yet; Gates continues to corrupt the public sector with his money so as to increase personal gain at taxpayers' expense



  28. Links 19/8/2014: GNU/Linux Raves and Alternative to Proprietary Voice Chat

    Links for the day



  29. Links 18/8/2014: Linux 3.17 RC1, Escalation in Ferguson

    Links for the day



  30. Gartner Group Advocates Using Defective Software With Back Doors

    Despite strong evidence that Microsoft has been complicit in illegal surveillance, Gartner continues to recommend the use of Windows and other espionage-ready Microsoft software


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts