Hackers now not subject to presumption of innocence

Off Topic (Everything besides dubstep)
Forum rules
Please read and follow this sub-forum's specific rules listed HERE, as well as our sitewide rules listed HERE.

Link to the Secret Ninja Sessions community ustream channel - info in this thread
Locked
test_recordings
Posts: 5079
Joined: Tue Mar 10, 2009 5:36 pm
Location: LEEDS

Hackers now not subject to presumption of innocence

Post by test_recordings » Thu Feb 06, 2014 4:20 am

Wired.com wrote:The New Snowden Revelation Is Dangerous for Anonymous — And for All of Us

The latest Snowden-related revelation is that Britain’s Government Communications Headquarters (GCHQ) proactively targeted the communications infrastructure used by the online activist collective known as Anonymous.

Specifically, they implemented distributed denial-of-service (DDoS) attacks on the internet relay chat (IRC) rooms used by Anonymous. They also implanted malware to out the personal identity details of specific participants. And while we only know for sure that the U.K.’s GCHQ and secret spy unit known as the “Joint Threat Research Intelligence Group” (JTRIG) launched these attacks in an operation called “Rolling Thunder,” the U.S.’ NSA was likely aware of what they were doing because the British intelligence agents presented their program interventions at the NSA conference SIGDEV in 2012. (Not to mention the two agencies sharing close ties in general.)

Whether you agree with the activities of Anonymous or not — which have included everything from supporting the Arab Spring protests to DDoSing copyright organizations to doxing child pornography site users — the salient point is that democratic governments now seem to be using their very tactics against them.

The key difference, however, is that while those involved in Anonymous can and have faced their day in court for those tactics, the British government has not. When Anonymous engages in lawbreaking, they are always taking a huge risk in doing so. But with unlimited resources and no oversight, organizations like the GCHQ (and theoretically the NSA) can do as they please. And it’s this power differential that makes all the difference.
Cyber-security just turned in to a case of shoot first and ask questions later. It's highly hypocritical of GCHQ, NSA etc to use what the same tactics as the hackers they're trying to go for when average people would be bum-raped for it, and when there are other methods to go about it. :a:

I also don't think innocent people will be compensated if they're targeted by accident...
Getzatrhythm

User avatar
nowaysj
Posts: 23281
Joined: Fri Sep 18, 2009 4:11 am
Location: Mountain Fortress

Re: Hackers now not subject to presumption of innocence

Post by nowaysj » Thu Feb 06, 2014 5:44 am

The state wants a monopoly of force, obviously. I see a not too distant future where we are not allowed file level access to our private computer systems. Too dangerous.

I'm sure you agree with aspects of that monopoly: gun ownership. I'd go 99/100 that you think only the state should have access to deadly force.

Also interesting is the diminishment of law's power because of an inability to enforce, and an increase in code's power. Check Laurence Lesig, Code is Law, and Code 2.0 for a fairly in-depth look at the interaction of law and code.
Join Me
DiegoSapiens wrote:oh fucking hell now i see how on point was nowaysj
Soundcloud

test_recordings
Posts: 5079
Joined: Tue Mar 10, 2009 5:36 pm
Location: LEEDS

Re: Hackers now not subject to presumption of innocence

Post by test_recordings » Thu Feb 06, 2014 9:03 am

That Laurence Lesig guy was pretty prescient, found an article from 2000 about his views on this stuff that were well ahead of the game: http://harvardmagazine.com/2000/01/code-is-law-html
Getzatrhythm

User avatar
nowaysj
Posts: 23281
Joined: Fri Sep 18, 2009 4:11 am
Location: Mountain Fortress

Re: Hackers now not subject to presumption of innocence

Post by nowaysj » Thu Feb 06, 2014 3:15 pm

Yeah, he kind of changed his tune for Code 2.0. Though, I've not read it.
Join Me
DiegoSapiens wrote:oh fucking hell now i see how on point was nowaysj
Soundcloud

User avatar
_ronzlo_
Posts: 1006
Joined: Wed Mar 19, 2014 7:29 pm

Re: Hackers now not subject to presumption of innocence

Post by _ronzlo_ » Thu Jul 24, 2014 11:29 pm

:x :middlefinger:

Image

Hacking Online Polls and Other Ways British Spies Seek to Control the Internet

The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.

The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIG’s use of “fake victim blog posts,” “false flag operations,” “honey traps” and psychological manipulation to target online activists, monitor visitors to WikiLeaks, and spy on YouTube and Facebook users.

But as the U.K. Parliament today debates a fast-tracked bill to provide the government with greater surveillance powers, one which Prime Minister David Cameron has justified as an “emergency” to “help keep us safe,” a newly released top-secret GCHQ document called “JTRIG Tools and Techniques” provides a comprehensive, birds-eye view of just how underhanded and invasive this unit’s operations are. The document—available in full here—is designed to notify other GCHQ units of JTRIG’s “weaponised capability” when it comes to the dark internet arts, and serves as a sort of hacker’s buffet for wreaking online havoc.

Click here for screenshot of software used

The “tools” have been assigned boastful code names. They include invasive methods for online surveillance, as well as some of the very techniques that the U.S. and U.K. have harshly prosecuted young online activists for employing, including “distributed denial of service” attacks and “call bombing.” But they also describe previously unknown tactics for manipulating and distorting online political discourse and disseminating state propaganda, as well as the apparent ability to actively monitor Skype users in real-time—raising further questions about the extent of Microsoft’s cooperation with spy agencies or potential vulnerabilities in its Skype’s encryption. Here’s a list of how JTRIG describes its capabilities:

• “Change outcome of online polls” (UNDERPASS)

• “Mass delivery of email messaging to support an Information Operations campaign” (BADGER) and “mass delivery of SMS messages to support an Information Operations campaign” (WARPARTH)

• “Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.” (SILVERLORD)

• “Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.” (MINIATURE HERO)

• “Find private photographs of targets on Facebook” (SPRING BISHOP)

• “A tool that will permanently disable a target’s account on their computer” (ANGRY PIRATE)

• “Ability to artificially increase traffic to a website” (GATEWAY) and “ability to inflate page views on websites” (SLIPSTREAM)

• “Amplification of a given message, normally video, on popular multimedia websites (Youtube)” (GESTATOR)

• “Targeted Denial Of Service against Web Servers” (PREDATORS FACE) and “Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG” (ROLLING THUNDER)

• “A suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk)” (ELATE)

• “Ability to spoof any email address and send email under that identity” (CHANGELING)

• “For connecting two target phone together in a call” (IMPERIAL BARGE)

While some of the tactics are described as “in development,” JTRIG touts “most” of them as “fully operational, tested and reliable.” It adds: “We only advertise tools here that are either ready to fire or very close to being ready.”

And JTRIG urges its GCHQ colleagues to think big when it comes to internet deception: “Don’t treat this like a catalogue. If you don’t see it here, it doesn’t mean we can’t build it.”

The document appears in a massive Wikipedia-style archive used by GCHQ to internally discuss its surveillance and online deception activities. The page indicates that it was last modified in July 2012, and had been accessed almost 20,000 times.

GCHQ refused to provide any comment on the record beyond its standard boilerplate, in which it claims that it acts “in accordance with a strict legal and policy framework” and is subject to “rigorous oversight.” But both claims are questionable.

British watchdog Privacy International has filed pending legal action against GCHQ over the agency’s use of malware to spy on internet and mobile phone users. Several GCHQ memos published last fall by The Guardian revealed that the agency was eager to keep its activities secret not to protect national security, but because “our main concern is that references to agency practices (ie, the scale of interception and deletion) could lead to damaging public debate which might lead to legal challenges against the current regime.” And an EU parliamentary inquiry earlier this year concluded that GCHQ activities were likely illegal.

As for oversight, serious questions have been raised about whether top national security officials even know what GCHQ is doing. Chris Huhne, a former cabinet minister and member of the national security council until 2012, insisted that ministers were in “utter ignorance” about even the largest GCHQ spying program, known as Tempora—not to mention “their extraordinary capability to hoover up and store personal emails, voice contact, social networking activity and even internet searches.” In an October Guardian op-ed, Huhne wrote that “when it comes to the secret world of GCHQ and the [NSA], the depth of my ‘privileged information’ has been dwarfed by the information provided by Edward Snowden to The Guardian.”

test_recordings
Posts: 5079
Joined: Tue Mar 10, 2009 5:36 pm
Location: LEEDS

Re: Hackers now not subject to presumption of innocence

Post by test_recordings » Fri Jul 25, 2014 12:18 am

The thing is, if politicians don't know what's going on, who does?
Getzatrhythm

User avatar
mks
Posts: 4155
Joined: Tue Apr 04, 2006 3:35 am
Location: Planet Earth

Re: Hackers now not subject to presumption of innocence

Post by mks » Fri Jul 25, 2014 12:28 am

Also, politicians a generally quite old, and are probably scared of any proficient young person with a computer.

OGLemon
Posts: 5153
Joined: Mon Sep 30, 2013 1:33 pm

Re: Hackers now not subject to presumption of innocence

Post by OGLemon » Fri Jul 25, 2014 12:32 am

(stasi)²

User avatar
DiegoSapiens
Posts: 8552
Joined: Wed Jun 01, 2011 10:37 pm
Location: My Body

Re: Hackers now not subject to presumption of innocence

Post by DiegoSapiens » Fri Jul 25, 2014 9:05 pm

test recordings wrote:The thing is, if politicians don't know what's going on, who does?
illuminati
Image
incnic wrote: daddy why u dead and lying in a puddle :(
son i make techno dadydy on drugs
hubb wrote:its what ive been saying for a while

foxes are the mulattos of the cat/dog world

Locked

Who is online

Users browsing this forum: No registered users and 0 guests