Watching Watchbirds: On Surveillance, Watch Lists, Disinformation, and Secrecy

 

Watchbird, spotted at FishDucky

Watchbirds were those annoying little stick-figure birds who perched in some Munro Leaf children’s stories, always ready to instruct kids in proper protocols when they were misbehaving. Our current flock of watchbirds rarely have to instruct us because we mostly maintain civil decorum knowing they’re there. Talk about the nanny state.

 

Continue reading “Watching Watchbirds: On Surveillance, Watch Lists, Disinformation, and Secrecy”

The Net’s Good Old Boys (3)

Part 3: Dr. (Don’t Be) Evil Meets Dr. Strangelove

Former Google EC Dr. Eric Schmidt has called for intelligence agencies to stop illegally prying into personal information and has been doing his best to convince the government to pay Google to do it legally instead. That said, in 2009 he was widely rebuked for telling CNBC:

If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place, but if you really need that kind of privacy, the reality is that search engines including Google do retain this information for some time, and it’s important, for example that we are all subject in the United States to the Patriot Act. It is possible that that information could be made available to the authorities. ~ Dr. Eric Schmidt, Google CEO, 2009

Schmidt didn’t add that Google is obliged to turn over email content under court order and not tell users it did so. He didn’t have to. We all know about FISA and PATRIOT. Same goes for Hotmail, AOL, or any US email provider, only Google has much more to give. Continue reading “The Net’s Good Old Boys (3)”

The Net’s Good Old Boys (1)

Part 1: Hacking the Arpanet

It’s hard to imagine now, but there was a time before the Internet, a time when computers took up more space than the acolytes who tended to their needs. In the 70s I was one such boffin, a postgrad hacking FORTRAN in a university R&D lab. Computers then were still quite dear, and so we made do with terminals that sucked electrons from the teat of a minicomputer several blocks away through fiber cable. Our digital host had recently been hooked up to the Arpanet, the Internet’s predecessor, giving us real-time access to several dozen academic, government, and military computers scattered across the US. We used it to chat and exchange files and email with people we knew here and there, but mostly we wasted time and bandwidth psyching out the robot psychotherapist Eliza and playing text-based games like Adventure and Hunt the Wumpus, just like today’s youth do but more primitively.

Continue reading “The Net’s Good Old Boys (1)”

The Net’s Good Old Boys (2)

Part 2: If We Only Knew Then

Continued from Hacking the Arpanet

Although it seems like it, the Internet just didn’t assemble itself from a kit. Engineers made it. Engineers just want to design and build cool useful things. Generally they like this much more than repairing things they have sent into the world. And, for the most part, they are not wont to worry how their darlings might be used to destructive ends or what unforeseen consequences their adoption might occasion. Except for the evil ones, inventors steer clear of the dark side of their bright ideas as they push on to their next big thing.

Not that the rest of us can take much pride in foreseeing un-wished-for effects of technologies (or our actions, for that matter); due diligence is not most people’s thing. Somebody should be doing that but unless we engineer something, why should figuring out what could go wrong be our job? Well it is, because elites make rules, build stuff, and write code conducive to their own hegemonic aspirations. We the people are supposed to suck it all up without a peep, occasionally acknowledging that shit sometimes happens.

Continue reading “The Net’s Good Old Boys (2)”

Cutting Cords to Kurds: Facebook’s Foreign Policy

NOTE: This article has been updated to include subsequent events. It is also posted on CounterPunch.

One of my correspondents (let’s call her Jinwar), a supporter of autonomous areas in northwestern Kurdistan, notified me that Facebook had deleted her support group’s page plus her personal page as well those of others, requesting that the above graphic be shared widely on social media. (But before doing so, please read the last four paragraphs.)

Continue reading “Cutting Cords to Kurds: Facebook’s Foreign Policy”

The Company We Sadly Keep

“It is difficult to get a man to understand something when his salary depends upon his not understanding it.” ~ Upton Sinclair

A triple-threat epidemic is sweeping the land—not just some deadly virus, water-born disease, or auto-immune reactions to toxins, although those too plague us—but of secrecy, unaccountability, and impunity, bypassing checks and balances, impervious to any outside scrutiny or supervision. This cancer on the Republic has metastasized throughout halls of power and workplaces almost everywhere.

Continue reading “The Company We Sadly Keep”

Harvard, the CIA, and All That

After Harvard’s John F. Kennedy School of Government rescinded its invitation to Army whistle-blower Chelsea Manning (whom Obama sprung from the brig by pardoning her), a chorus of protest (led by 19,000 Harvard alumni and 169 professors) ensued. The main issue, according to them and the press, was how the Institute of Politics (IOP) at the Kennedy School of Government (KSG) caved to deep-state pressure. Specifically, current CIA Director Mike Pompeo cancelled his talk at the school, and former CIA deputy director Michael Morrell tendered his resignation to Harvard’s Belfer Center, saying “I cannot be a part of an organization…that honors a convicted felon and leaker of classified information,” apparently believing that only the best and brightest war criminals deserve such honorifics (horrorifics?). When, after all, has the CIA ever taken Harvard publicly to task for slack on the national security front?

Continue reading “Harvard, the CIA, and All That”

Catch of the Day

Flash fiction from a while ago, refurbished and scanned for malware

As usual, Max was working late. Not so usual for the pair of quality engineers who had invaded his cubicle, waiting to be noticed. “Earth to Max,” one of them finally annouced.

       “Sorry, I didn’t catch what you said,” he murmured, looking up from his tablet. His glasses were fogged from running through thickets of text and chasing after hyperlinks as he panned his face over to his two coworkers. His complexion seemed paler than usual.
       “I was trying to finger an entity that entered our room,” he said by way of an excuse. “Some of us think it’s an NSA droid.”
       His tone was hushed even though they were alone on the floor. Lakshmi asked “How can you tell it’s an agent, and how do you know it’s NSA?”
       Max glanced back to his screen. “It fits a profile, the way it insinuates itself. MrEd ID’ed it as the type that showed up in May trolling for Wikileaks sources.”
       Rob reiterated. “Anyway, I asked you how the tests were coming along. We need to validate the release tonight.”
       “It’ll happen. But this thing that barged into the chat room calling itself SkyRocket spooks me. Has to be disposed of.”
       “You’re sure?” Lakshmi asked, eyes imploring. “Can’t it wait?”
       “For what?” Max snapped back. “For them to bust us before we finish collecting evidence from the agency?”
       “About…?”
       “Can’t go there, Lakshmi. You know that. Just assume it involves the surveillance state peeking up your address.”
       Lakshmi sighed. “Okay, okay. We know you hack for freedom, but must you handle this thing now? We only have twelve hours to wrap testing and upload the release, you know.” Her fingers drummed out Helter Skelter on Max’s desk.
       Max was adamant. “Somebody needs to fire off Skyrocket, and I think I know how.” He punched some keys, stuffed his tablet into his backpack, and struggled up, his chair and his limbs creaking in unison. “Gotta go. Back in a few hours to mop up.”
       “Where are you going?” Rob asked. “Home?”
       “Norway, actually” was Max’s reply. “TTFN.”
       They stared after Max as he padded down the corridor. They had dropped by his cube to dope-slap him back to work. It hadn’t worked.
       Rob growled “I guess we gotta run his test code, if we can figure out how. Let’s hope it doesn’t find too many bugs.”

Max hurried through the parking lot to his car, unholstering his cell phone to dash off a message. When a response beeped he cranked the engine and lurched onto the highway. Fifty minutes later his wheels were two counties away. His mind was elsewhere, but the GPS kept him on course.

At daybreak, Lakshmi and Rob were still in his cubicle sorting through test logs when Max waddled in clutching a coffee cup.
       “How was Norway?” inquired Lakshmi. “Catch any fish?”
       “Big ones,” Max purred through a yawn.
       “Cut bait,” Rob demanded. “Where did you really go?”
       “I needed to visit a friend of mine. He has this really obscure tap into the Net. I couldn’t risk using my connection.”
       Lakshmi tossed her hair. “In Norway, right?”
       “No, but the proxy server we hooked into is, and it spoofed an IP address for us inside the FBI.”
       “Then what?”
       “So I suckered Skyrocket into a private chat room and told him Israel was collecting certain stuff they had no need to know and offered a few tidbits. When they analyze what went down between us, NSA will see Skyrocket debriefing some rogue FBI agent. Just a little red herring to keep them off balance until we’re ready to reveal all.”
       Creaking into his seat, Max continued, “Now let me run the other tests you should have done while you go fix whatever bugs you found.” Max—or at least his body—was back.