Bonum Certa Men Certa

Governments Complicit in NSA Cracking Crimes and Blackmail



Summary: New scandals involving the NSA, including COINTELPRO-like targeting by the NSA

RECENT bombshells from Snowden et al. revealed a high degree of criminality in the NSA, which infects computer networks [1]. Perhaps they can no longer accuse China of doing such things. But to what degree have governments other than the United States' played in all this? Well, there's allegation that Canada's government is now part of the same institutional corruption [2]. Other US allies, even neighbours of China (where the majority of the nation is of Chinese descent), may be complicit [3]. The high degree of state surveillance [4] is being studied [5] and citizens in the United States (not to be confused with the government) want some answers [6,7,8] about the NSA's facilities. Networks got compromised [9], essentially subverting any notion of security [10]. Now we have it confirmed that the NSA used information it had gathered for blackmail [11-14]. This is a huge deal as it makes complicit nations accomplices in the act. Back in the days of COINTELPRO, the FBI used surveillance in an attempt to drive Martin Luther King to suicide.



Related/contextual items from the news:



  1. New Snowden document reveals NSA’s international malware operation
    A presentation slide provided by Edward Snowden and published by the Dutch media outlet NRC on November 23 shows that the NSA has infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive and private information.


  2. Canada let NSA spy on G8 and G20 Ontario summits during week-long operation in 2010
    The NSA used U.S. Embassy in Ottawa as command post during summits


  3. Korea and Singapore Alleged to Have Assisted NSA in Eavesdropping


  4. Snowden spyware revelations: we need to unmask the five-eyed monster
    With revelations of spyware planted on 50,000 networks, the "Five Eyes" states have been allowed to trample over their citizens' privacy for far too long


  5. Call-Log App Aims to Reverse-Engineer NSA Surveillance
    The MetaPhone project asks volunteers to install an Android app that sends the researchers copies of a device’s call logs and basic data from a person’s Facebook account. The researchers say that a large collection of such data will make it possible to use data-mining techniques to discover which aspects of people’s lives—as recorded in their Facebook data—can be revealed by examining just their calling and texting logs.


  6. Citizens Protest NSA Data Center
  7. Utah Cyber Attacks on the Rise as NSA Facility Draws International Attention


  8. Utah town gave NSA a deal on water
    Bluffdale agreed to sell water to the National Security Agency at a rate below its own guidelines and the Utah average in order to secure the contract and spur economic development in the town, according to records and interviews.


  9. Quoted: on how the NSA may have tapped into Internet data
    As other countries push for more control over the Internet, “you’re going to see national boundaries begin in cyberspace,” said Jason Healey, director of policy group Cyber Statecraft Initiative at the Atlantic Council, according to Bloomberg.


  10. Death and the NSA: Motherboard Meets Bruce Schneier
    That's not to say that the NSA has "broken" all cryptography: "the math works," says Schneier, and while anonymizing tools like Tor are targeted by NSA, they seem to remain secure. Instead, the NSA appears to have manipulated encryption tools and tapped into data center links and fiber backbones—in essence, silently removing the hinges from their doors.


  11. NSA 'planned to discredit radicals over web-porn use'
    The US authorities have studied online sexual activity and suggested exposing porn site visits as a way to discredit people who spread radical views, the Huffington Post news site has reported.


  12. NSA 'tracked online sexual habits of suspected terrorists'


  13. NSA attempted to shame radicals with online porn records


  14. NSA's Porn-Shaming Strategy
    The disclosures from the Snowden files keep on coming, with each revelation more disturbing than the last. The latest report reveals a plan by the National Security Agency to collected information on six people's online activity, particularly their visits to pornographic websites, to discredit them within their community.

    This is an example of "how 'personal vulnerabilities' can be learned through electronic surveillance, and then exploited to undermine a target's credibility, reputation, and authority," activist Glenn Greenwald wrote in the Huffington Post on Tuesday evening.




Recent Techrights' Posts

The FSF Board and FSF Beard
So the FSF's Board has grown
Law Firms Facing the Consequences for Patently Abusive Litigation on Behalf of Microsoft Employees Who Got Arrested for Strangulation and Had Done Even Worse Things
Having spent 1.5 years bullying me with patronising letters on behalf of Microsofters, last week they got served a massive bill and, in effect, lost the Hearing
LLMs Breaking Everything
Computing and the Net became a playground for scammers and "bros", like people who "invented" fake currencies and also try to tell us that LLMs spewing out things will have some real value
 
Links 22/06/2025: Windows TCO Tales and YouTube Getting More Hostile to Users
Links for the day
New Report From the EPO's Staff Representatives in The Hague (LSCTH) Reveals Many Unsolved Issues
Local Staff Committee The Hague (LSCTH) wrote to staff just before the weekend
Links 22/06/2025: More Slop Lawsuits (Copyrights) and "America’s Oligarch Problem"
Links for the day
Gemini Links 22/06/2025: Gigantic Toolchest and Annoying Bots
Links for the day
The Calling
Persist and persevere, justice will come your way
So Far Every BetaNews 'Article' is LLM Slop, So BetaNews is Officially Just a Slopfarm
They just don't seem to value what they have
IBM Rumour: Mass Layoffs (RAs) Lists Being Made for Consulting, With Effect in July 2025
Bogus companies with no viable products and no world-leading (in their field) staff are doomed to perish
Links 21/06/2025: Data Breach With 16 Billion Passwords, Dutch Government Recommends Children Under 15 Stay off TikTok and Instagram
Links for the day
Gemini Links 21/06/2025: Notes about Typst (and LaTeX) and Opos
Links for the day
Microsoft's Competition Tactics: Sabotage GNU/Linux Installs, Block Chrome
Edge is dying
1989: Free Software as "Open" Software (OSI Didn't Coin "Open Source", It Also Predates Linux)
"One man's fight for Free software"
The Microsoft OOXML Modus Operandi: Throw 1,000 Pages of Other People's Work for a Judge to Read Ahead of a One-Hour Meeting
No time to discuss this - that's the point
Formalities Officers (FOs) at the EPO Are in Trouble, Reveals Internal Report
We already know, based on an HR pattern we saw at IBM and elsewhere, that reallocating roles can be prerequisite for dismissal and those who do so expect many to resign anyway
The Web is Slop and FUD, Let's Go to Gemini Protocol
Lupa sees self-signed capsules at 92.4%
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, June 20, 2025
IRC logs for Friday, June 20, 2025
Links 21/06/2025: Phone Bans for Concerts, Tensions in Taiwan Strait
Links for the day
Gemini Links 21/06/2025: Spoilers, Public Yggdrasil Node, Changes to AuraGem Search
Links for the day
"Six years of Gemini!"
From gemini://geminiprotocol.net
Gemini Links 20/06/2025: Summer Updates and Hardware Failures
Links for the day
Links 20/06/2025: Google Shareholder Sues Google and Google Sued for Defamatory Slop ('Hey Hi') Word Salads ('Summaries')
Links for the day
Linux Journal Might Have Become the Latest Slopfarm Targeting "Linux", the Trends Are Concerning for Dying News Sites
They tarnish the Web with junk and then die
On "Learning to Code"
quality may suffer, plus things get bloated
Quick Points Regarding This Week's Court Hearing
it paves the way for us to squash all the SLAPPs from Microsofters
Common Mistake: Believing Social Control Media Will Document Your Writings/Thoughts and Search Engines Like Google Will Help You Find These
Many news sites wrongly assumed that posting directly to Twitter would be acceptable
The Manchester Bees and This Hot Summer
We have had a fantastic week so far this week
Gemini Protocol Enters Its Seventh Year, Growth Has Accelerated!
Maybe in June 20 2026 there will be over 3,500 active capsules?
Mastodon and the Fediverse Have an Issue: Liability for Content (Even in Other Instances) and Costs
self-hosting is the only logical path forward
Why Microsoft and Its 'Hey Hi' (Slop) Frenzy Fail While Sinking in Deep, Growing Debt
Right now, like Twitter around the time it was sold to MElon, "open" "hey hi" is a big pile of debt with a lot to pay for that debt (interest payments)
Europe is Leaving Microsoft, the Press Coverage Isn't Sufficiently Helpful
The news is generally positive, but the press coverage leaves so much to be desired
Slopwatch: Linuxsecurity, BetaNews, and Linux Journal
slippery slope
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, June 19, 2025
IRC logs for Thursday, June 19, 2025
Gemini Links 20/06/2025: Gemini Protocol Turns 6!
Links for the day