A bird's eye view of the vineyard
Alternative Copy of thesaker.is site is available Thu May 25, 2023 14:38 | Ice-Saker-V6bKu3nz
Alternative site: https://thesaker.si/saker-a... Site was created using the downloads provided Regards Herb
The Saker blog is now frozen Tue Feb 28, 2023 23:55 | The Saker
Dear friends As I have previously announced, we are now “freezing” the blog. We are also making archives of the blog available for free download in various formats (see below).
What do you make of the Russia and China Partnership? Tue Feb 28, 2023 16:26 | The Saker
by Mr. Allen for the Saker blog Over the last few years, we hear leaders from both Russia and China pronouncing that they have formed a relationship where there are
Moveable Feast Cafe 2023/02/27 ? Open Thread Mon Feb 27, 2023 19:00 | cafe-uploader
2023/02/27 19:00:02Welcome to the ‘Moveable Feast Cafe’. The ‘Moveable Feast’ is an open thread where readers can post wide ranging observations, articles, rants, off topic and have animate discussions of
The stage is set for Hybrid World War III Mon Feb 27, 2023 15:50 | The Saker
Pepe Escobar for the Saker blog A powerful feeling rhythms your skin and drums up your soul as you?re immersed in a long walk under persistent snow flurries, pinpointed by
The Saker >>
Interested in maladministration. Estd. 2005
Robert Watt complaint: Time for decision by SIPO Anthony
RTE in breach of its own editorial principles Anthony
Waiting for SIPO Anthony
Formal complaint against Robert Watt Anthony
RTE bias complaint Anthony
Public Inquiry >>
A Blog About Human Rights
UN human rights chief calls for priority action ahead of climate summit Sat Oct 30, 2021 17:18 | Human Rights
5 Year Anniversary Of Kem Ley?s Death Sun Jul 11, 2021 12:34 | Human Rights
Poor Living Conditions for Migrants in Southern Italy Mon Jan 18, 2021 10:14 | Human Rights
Right to Water Mon Aug 03, 2020 19:13 | Human Rights
Human Rights Fri Mar 20, 2020 16:33 | Human Rights
Human Rights in Ireland >>
As More and More Patients Opt For Private Healthcare, the NHS Continues to Sink into the Mire Mon May 29, 2023 07:00 | In-house doctor
Recent data reveal that record numbers of patients are opting for private healthcare because they can't get the treatment they need on the NHS. The Daily Sceptic's in-house doctor thinks things will only get worse.
The post As More and More Patients Opt For Private Healthcare, the NHS Continues to Sink into the Mire appeared first on The Daily Sceptic.
News Round-Up Mon May 29, 2023 01:08 | Toby Young
A summary of the most interesting stories in the past 24 hours that challenge the prevailing orthodoxy about the virus and the vaccines, the ?climate emergency? and the supposed moral defects of Western civilisation.
The post News Round-Up appeared first on The Daily Sceptic.
What if Putin Falls From Power? Sun May 28, 2023 17:00 | Toby Young
Duncan Allan, a fellow of Chatham House, has written a report speculating about what might happen if Ukraine's counter-offensive is successful and Putin is deposed. He fears that may not end well.
The post What if Putin Falls From Power? appeared first on The Daily Sceptic.
Why Should I Spend £40,000 Making My House More Energy Efficient, Given It Will Take 25 Years to Ear... Sun May 28, 2023 15:00 | Guy de la Bédoyère
Guy de la Bédoyère in the Daily Sceptic says the Government is having a laugh if it expects him to pay £40,000 on making his house more energy efficient, including sticking a wind turbine on his roof.
The post Why Should I Spend £40,000 Making My House More Energy Efficient, Given It Will Take 25 Years to Earn That Back in Savings on My Energy Bills? appeared first on The Daily Sceptic.
Deliberately Exaggerating the Risks of Climate Change is Undermining Public Trust in Science and Des... Sun May 28, 2023 13:00 | Chris Morrison
The Washington Post recently reported that climate change has raised the risk of flight turbulence. In fact, the number of accidents or injuries per flight due to turbulence has fallen dramatically in the last 30 years.
The post Deliberately Exaggerating the Risks of Climate Change is Undermining Public Trust in Science and Destroying Young People?s Mental Health appeared first on The Daily Sceptic.
Lockdown Skeptics >>
Hacking Online Polls and Other Ways British Spies Seek to Control the Internet
From "The Intercept" by Glenn Greenwald based on Snowden leaks
The Intercept -the website setup by Glenn Greenwald and others this week publishes a new summary of intercept capabilities used by the NSA and Britain's GCHQ, this time covering how the intelligence agencies working on behalf of the surveillance state disrupt public discourse on the Internet and seek to control the Internet.
The revelations cover a range of surveillance tools that are used to spy and collect information and as well as to disrupt individuals computers and to attack websites using the very same tools that the same state has imprisoned hackers for.
Here is a summary of the key findings from the site:
The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.
The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIG’s use of “fake victim blog posts,” “false flag operations,” “honey traps” and psychological manipulation to target online activists, monitor visitors to WikiLeaks, and spy on YouTube and Facebook users.
But as the U.K. Parliament today debates a fast-tracked bill to provide the government with greater surveillance powers, one which Prime Minister David Cameron has justified as an “emergency” to “help keep us safe,” a newly released top-secret GCHQ document called “JTRIG Tools and Techniques” provides a comprehensive, birds-eye view of just how underhanded and invasive this unit’s operations are. The document—available in full here—is designed to notify other GCHQ units of JTRIG’s “weaponised capability” when it comes to the dark internet arts, and serves as a sort of hacker’s buffet for wreaking online havoc
The “tools” have been assigned boastful code names. They include invasive methods for online surveillance, as well as some of the very techniques that the U.S. and U.K. have harshly prosecuted young online activists for employing, including “distributed denial of service” attacks and “call bombing.” But they also describe previously unknown tactics for manipulating and distorting online political discourse and disseminating state propaganda, as well as the apparent ability to actively monitor Skype users in real-time—raising further questions about the extent of Microsoft’s cooperation with spy agencies or potential vulnerabilities in its Skype’s encryption. Here’s a list of how JTRIG describes its capabilities:
• “Change outcome of online polls” (UNDERPASS)
• “Mass delivery of email messaging to support an Information Operations campaign” (BADGER) and “mass delivery of SMS messages to support an Information Operations campaign” (WARPARTH)
• “Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.” (SILVERLORD)
• “Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.” (MINIATURE HERO)
• “Find private photographs of targets on Facebook” (SPRING BISHOP)
• “A tool that will permanently disable a target’s account on their computer” (ANGRY PIRATE)
• “Ability to artificially increase traffic to a website” (GATEWAY) and “ability to inflate page views on websites” (SLIPSTREAM)
• “Amplification of a given message, normally video, on popular multimedia websites (Youtube)” (GESTATOR)
• “Targeted Denial Of Service against Web Servers” (PREDATORS FACE) and “Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG” (ROLLING THUNDER)
• “A suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk)” (ELATE)
• “Ability to spoof any email address and send email under that identity” (CHANGELING)
• “For connecting two target phone together in a call” (IMPERIAL BARGE)
A PDF version of the Intercept document listing these tools is attached.
But if that is not enough an earlier news report from Greenwald and friends reported:
Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas
The full report is here: https://firstlook.org/theintercept/article/2014/05/19/d...amas/
What may not be known is that Irish business man Denis O'Brien owns Digicel which operates mobile phone networks throughout the caribbean. It remains unknown whether he is aware of any of this activity and that the spy agencies may have inflitrated his mobile networks. See https://en.wikipedia.org/wiki/Digicel
The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas.
According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month.
SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.
All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere.
In March, The Washington Post revealed that the NSA had developed the capability to record and store an entire nation’s phone traffic for 30 days. The Post reported that the capacity was a feature of MYSTIC, which it described as a “voice interception program” that is fully operational in one country and proposed for activation in six others. (The Post also referred to NSA documents suggesting that MYSTIC was pulling metadata in some of those countries.) Citing government requests, the paper declined to name any of those countries.
The Intercept has confirmed that as of 2013, the NSA was actively using MYSTIC to gather cell-phone metadata in five countries, and was intercepting voice data in two of them. Documents show that the NSA has been generating intelligence reports from MYSTIC surveillance in the Bahamas, Mexico, Kenya, the Philippines, and one other country, which The Intercept is not naming in response to specific, credible concerns that doing so could lead to increased violence. The more expansive full-take recording capability has been deployed in both the Bahamas and the unnamed country.
View Comments Titles Only
Comments (3 of 3)Jump To Comment: 1 2 3
A recent article discusses why Tor is probably not as safe as the media would have you believe. It is always a bit suspicious when the NSA drone on about how they don't like Tor pretending they can't crack it. It is more likely they actually run many of the Tor sites.
From CounterPunch: The NSA Wants You to Trust Tor, Should You?
The Secret Government Rulebook For Labeling You a Terrorist
new hard to block supercookies ask your browser draw an image then fingerprint it uniquely from that
even the secure "Tails" Linux based operating system is currently not secure:
Apple backdoor services spill your information:
You can secure your idevice much better by limiting what it can pair with (careful though!):
Mozilla firefox has some security critical bugs which need an update to V.31
Great article T and a good list of stuff there to read Fred.
It was inevitable that the masters of the corporate state would tighten their controls over this latest human space to inhabit - the net
But actions like Wiki-leaks and Edward Snowden is showing up the "Free World" for what it really is.