10.05.09

Gemini version available ♊︎

Leaked Government Document Shows Investigative Journalists Classed Among “Terrorists”

Posted in Microsoft, Videos at 1:45 pm by Dr. Roy Schestowitz

Summary: The great enemy of authority turns out to be truth seekers

WIKILEAKS has a fantastic new addition, which is 2,389 pages of this manual [PDF, 39MB] from the UK Ministry of Defence.

For those who lack time to study this large volume of leaked material, here are some of the damning parts that prove we’re supposed to be obedient, lacking curiosity, only to repeat conventional thoughts. Watch how the manual daemonises “investigative journalists” for example:

“The main threats of this type are posed by investigative journalists, pressure groups, investigation agencies, criminal elements, disaffected staff, dishonest staff and computer hackers. The types of threat from these sources can be categorized in six broad groups: a. Confidentiality. Compromise of politically sensitive information. This threat is presented by: (1) Pressure groups and investigative journalists attempting to obtain sensitive information. (2) Unauthorized disclosure of official information (leaks)…”

“Investigative journalists have exploited personal tax information; they also target commercial and financial information as do criminal elements seeking financial advantage. ”

[..]

“The threat to operations against these targets is less likely to arise from positive acts of counter-espionage, than from leakage of information through disaffected members of staff, or as a result of the at tentions of an investigative journalist, or simply by accident or carelessness. 1706. In this wider definition of Threat, the “enemy” is unwelcome publicity of any kind, and through any medium. The most effective safeguard is to reinforce those aspects of security that minimise the risk of leakage of sensitive intelligence operations or product into the public domain – whether by accidental exposure or deliberate intent. The STRAP System aims to achieve this.”

[..]

“The security measures in this chapter are aimed primarily to cover contacts made in CSSRAs and have been drawn up to protect the individual from action by FISs, extremist groups, investigative journalists and criminals.”

[..]

“An Annual Threat Assessment (ATA) is issued to all Government Departments giving generic statements as to the main sources of Threat. This will include personnel who may be from or influenced by Foreign Intelligence Services (FIS), authorized users who, for whatever motive, may seek to gain access to official information they have no ‘need to know’, subversive or terrorist organizations, and investigative journalists.”

[..]

“The threat from subversive or terrorist organisations, investigative journalists and others must also be considered.”

“Experience has shown that at least half the attempts to hack into systems arise from this group and that external hackers use “social engineering” techniques to trick authorised users into revealing information which may aid an external penetration. 7. The Media. Investigative journalists are increasingly interested in State IT systems, particularly those operated by the police and the Security and Intelligence agencies. There has been evidence of premeditated attempts to acquire protectively marked information from IT systems. 8. Members of the Public. The fact that inform ation held electronically may be open to novel forms of surreptitious attack provides a special attraction to certain individuals, commonly known as ‘hackers’. Whilst the efforts of hackers are unlikely to be directed specifically against protectively marked information, there is added kudos in breaking into Defence systems, so much information might be discovered fortuitously. ”

“..The threat from subversive and terrorist organizations, criminal activity, investigative journalists, and members of the public cannot be discounted…”

“..Malicious software can originate from many sources such as disaffected staff, foreign intelligence services, investigative journalists or terrorists…”

[..]

“..The main elements of the Audio security threat are: a. The threat from deliberate attempts to overhear conversations posed by FIS (especially at locations overseas), sophisticated terrorist and subversive organisations and in particular from criminals, investigative journalists, private investigators and some members of the public…”

[..]

“..Identify possible threats to your site, such as from: Foreign Intelligence Services. Terrorist groups. Disaffected staff. Criminals. Investigative journalists.”

It is all quite telling, is it not?

“[E]xtremist groups, investigative journalists and criminals…”

“The “enemy” is unwelcome publicity of any kind…”
      –Fewa
It’s as though the above are all more or less the same. People who dare to investigate and form an independent opinion are almost like criminals. They are supposed to just parrot what large media sources say, even if it is misleading propaganda from the corporations that control this media (and other high interests, not necessarily financial).

“Free speech not allowed,” remarks Fewa, “and the trend-setting media only acts after there is public outcry over something or someone with real power raises it [...] or unless it serves a state purpose. I wonder what type of person leaked it — an insider or outsider.”

“The “enemy” is unwelcome publicity of any kind,” he continues, “and through any medium (aka the “enemy” is the truth) [...] or the public having any idea what their tax dollars are doing.”

There is another great new addition to Wikileaks. David Gerard remarks on it as follows: “Someone’s been selling the Orwellian aspirants in the EU some *seriously* strong snake oil.”

This file, marked “confidential”, describes development of an EU-funded intelligence gathering system (“INDECT work package 4″) designed to comb webblogs, chat sites, newsreports, and social-networking sites to inorder to build up automatic dossiers on individuals, organizations and their relationships.

“Automatic dossiers…”

Yay!

Well, Microsoft still uses its PR agencies to do this, some of which (like Visible Technologies) found ways to automate the process.

Lo and behold — Microsoft's lists are exposed.

It is probably an appropriate time to repost the following old skit from Carlin.

Ogg Theora

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

DecorWhat Else is New


  1. Links 17/1/2022: postmarketOS 21.12 Service Pack 1 and Mumble 1.4 Released

    Links for the day



  2. [Meme] Gemini Space (or Geminispace): From 441 Working Capsules to 1,600 Working Capsules in Just 12 Months

    Gemini space now boasts 1,600 working capsules, a massive growth compared to last January, as we noted the other day (1,600 is now official)



  3. [Meme] European Patent Office Space

    The EPO maintains a culture of illegal surveillance, inherited from Benoît Battistelli and taken to a whole new level by António Campinos



  4. Gemini Rings (Like Webrings) and Shared Spaces in Geminspace

    Much like the Web of 20+ years ago, Gemini lets online communities — real communities (not abused tenants, groomed to be ‘monetised’ like in Facebook or Flickr) — form networks, guilds, and rings



  5. Links 16/1/2022: Latte Dock 0.11 and librest 0.9.0

    Links for the day



  6. The Corporate Cabal (and Spy Agencies-Enabled Monopolies) Engages in Raiding of the Free Software Community and Hacker Culture

    In an overt attack on the people who actually did all the work — the geeks who built excellent software to be gradually privatised through the Linux Foundation (a sort of price-fixing and openwashing cartel for shared interests of proprietary software firms) — is receiving more widespread condemnation; even the OSI has been bribed to become a part-time Microsoft outsourcer as organisations are easier to corrupt than communities



  7. EPO's Web Site Constantly Spammed by Lies About Privacy While EPO Breaks the Law and Outsources Data to the United States

    The António Campinos-led EPO works for imperialism, it not only protects the rich; sadly, António’s father isn’t alive anymore and surely he would blast his son for doing what he does to progress his career while lying to staff and European citizens



  8. Links 16/1/2022: Tsunami and Patents

    Links for the day



  9. IRC Proceedings: Saturday, January 15, 2022

    IRC logs for Saturday, January 15, 2022



  10. Links 16/1/2022: Year of the GNU/Linux Desktop and Catch-up With Patent Misinformation

    Links for the day



  11. Patrick Breyer, Unlike Most German Politicians, Highlights the Fact That Unified Patent Court (UPC) and Unitary Patent Are Incompatible With EU Law

    A longtime critic of EPO abuses (under both Benoît Battistelli and António Campinos leadership), as well as a vocal critic of software patents, steps in to point out the very obvious



  12. Links 15/1/2022: Flameshot 11.0 and Libvirt 8.0

    Links for the day



  13. Blogging and Microblogging in Geminispace With Gemini Protocol

    Writing one’s thoughts and other things in Geminispace — even without setting up a Gemini server — is totally possible; gateways and services do exist for this purpose



  14. Links 15/1/2022: Raspberry Pi in Business

    Links for the day



  15. IRC Proceedings: Friday, January 14, 2022

    IRC logs for Friday, January 14, 2022



  16. Gemini Clients: Comparing Moonlander, Telescope, Amfora, Kristall, and Lagrange (Newer and Older)

    There are many independent implementations of clients (similar to Web browsers) that deal with Gemini protocol and today we compare them visually, using Techrights as a test case/capsule



  17. 2022 Starts With Censorship of Christmas and Other Greetings at the EPO

    The nihilists who run the EPO want a monopoly on holiday greetings; to make matters worse, they’re censoring staff representatives in their intranet whilst inconsistently applying said policies



  18. Links 14/1/2022: FFmpeg 5.0 and Wine 7.0 RC6

    Links for the day



  19. White House Asking Proprietary Software Companies That Add NSA Back Doors About Their Views on 'Open Source' Security

    The US government wants us to think that in order to tackle security issues we need to reach out to the collective 'wisdom' of the very culprits who created the security mess in the first place (even by intention, for imperialistic objectives)



  20. Links 14/1/2022: EasyOS 3.2.1 and Qt 6.3 Alpha

    Links for the day



  21. Scientific Excellence and the Debian Social Contract

    The Debian Project turns 30 next year; in spite of it being so ubiquitous (most of the important distros of GNU/Linux are based on Debian) it is suffering growing pains and some of that boils down to corporate cash and toxic, deeply divisive politics



  22. Links 14/1/2022: openSUSE Leap 15.2 EoL, VFX Designers Are Using GNU/Linux

    Links for the day



  23. IRC Proceedings: Thursday, January 13, 2022

    IRC logs for Thursday, January 13, 2022



  24. 2022 Commences With Microsoft-Themed (and Microsoft-Connected) FUD Against GNU/Linux

    A psychopathic Microsoft, aided by operatives inside the mainstream and so-called 'tech' media, keeps spreading old and invalid stigma about "Linux" and Free software; few people still bother responding to these fact-free FUD campaigns, which boil down to ‘perception management’ PR/propaganda



  25. Between January 2021 and January 2022 the Number of Active Gemini Capsules Nearly Quadrupled Based on Publicly-Available Catalogue of Capsules

    Geminispace has grown to about 2,000 known capsules and 1,600 of them are active, permanently online, fully accessible; in January last year these numbers were about 4 times smaller



  26. Links 13/1/2022: NetworkManager 1.34 and Everett 3.0.0

    Links for the day



  27. Links 13/1/2022: Sparky 5.16, Fwupd 1.7.4, and KDE Plasma 5.24 Beta Released

    Links for the day



  28. Call a Spade a Spade (Microsoft 'Contributions' to Linux)

    Call a spade a spade; Microsoft does not love Linux and doesn’t try to help Linux, as it’s still all about Windows and proprietary software with surveillance, back doors, and worse things



  29. No Excuses for Using GitHub Anymore

    Software developers become living witnesses to more and more reasons to abandon Microsoft for good



  30. Links 13/1/2022: Slackware Linux 15.0 RC3 and More Microsoft Aggression Against Linux

    Links for the day


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts