“The memo discusses how big tech companies like Google, Facebook and Twitter (all of which are openly censoring user accounts today) will be recruited and called upon to collude with the Soros and Brock agenda in order to manipulate the political landscape.”
Social media censorship is here and out in the open, and it has become clear that the major tech companies are working together to shut down and silence members of the free press for political reasons.
It turns out, according to a leaked 49 page document, that this special influence may be none other than George Soros himself, the world’s wealthiest liberal political agitator. Soros has long been known to exert influence, via his immense personal wealth, at the grass-roots level of many political struggles around the world…
New research finds it does reduce public support for law enforcement.
“Curtailing militarized police may be in the interest of both police and citizens”, concludes Jonathan Mummolo, an assistant professor of politics and public affairs at Princeton University. His study is published in the Proceedings of the National Academy of Sciences…
Overall, “the routine use of militarized police tactics by local agencies threatens to increase the historic tensions between marginalized groups and the state, with no detectable public safety benefit”, Mummolo concludes. “While SWAT teams arguably remain a necessary tool for violent emergency situations, restricting their use to those rare events may improve perceptions of police with little or no safety loss…”
‘You may have seen a story this week detailing how Facebook shut down a series of accounts. As noted by Politico, Facebook claimed these accounts “sought to inflame social and political tensions in the United States, and said their activity was similar — and in some cases connected — to that of Russian accounts during the 2016 election.”
Similar? What does “similar” mean?
The death-pit for civil liberties is usually found in a combination of fringe/unpopular people or ideas and a national security emergency …
Politicians are more interested in using than curtailing the power of these companies. The platforms, for their part, will cave rather than be regulated. The endgame here couldn’t be clearer. This is how authoritarian marriages begin, and people should be very worried.’
FILE PHOTO: The National Security Agency (NSA) headquarters is seen in Fort Meade, Maryland, U.S. February 14, 2018. REUTERS/Sait Serkan Gurbuz
The U.S. National Security Agency collected 534 million records of phone calls and text messages of Americans last year, more than triple gathered in 2016, a U.S. intelligence agency report released on Friday said.
The sharp increase from 151 million occurred during the second full year of a new surveillance system established at the spy agency after U.S. lawmakers passed a law in 2015 that sought to limit its ability to collect such records in bulk.
The spike in collection of call records coincided with an increase reported on Friday across other surveillance methods, raising questions from some privacy advocates who are concerned about potential government overreach and intrusion into the lives of U.S. citizens.
The 2017 call records tally remained far less than an estimated billions of records collected per day under the NSA’s old bulk surveillance system, which was exposed by former U.S. intelligence contractor Edward Snowden in 2013.
The records collected by the NSA include the numbers and time of a call or text message, but not their content.
Overall increases in surveillance hauls were both mystifying and alarming coming years after Snowden’s leaks, privacy advocates said.
“The intelligence community’s transparency has yet to extend to explaining dramatic increases in their collection,” said Robyn Greene, policy counsel at the Washington-based Open Technology Institute that focuses on digital issues …
Friday’s report also showed a rise in the number of foreigners living outside the United States who were targeted under a warrantless internet surveillance program, known as Section 702 of the Foreign Intelligence Surveillance Act, that Congress renewed earlier this year.
That figure increased to 129,080 in 2017 from 106,469 in 2016, the report said, and is up from 89,138 targets in 2013, or a cumulative rise over five years of about 45 percent.
U.S. intelligence agencies consider Section 702 a vital tool to protect national security, but privacy advocates say the program incidentally collects an unknown number of communications belonging to Americans.
“Florida authorities went to a funeral home and used a dead man’s finger to try to unlock his cellphone as part of their investigation.
Thirty-year-old Linus Phillip was killed by a Largo police officer last month after authorities say he tried to drive away before an officer could search him.
At the funeral home, two detectives held the man’s hands up to the phone’s fingerprint sensor … a professor at Stetson University College of Law, tells the Tampa Bay Times that dead people can’t assert their Fourth Amendment protections because you can’t own property when you’re dead. But those rights could apply to whoever inherits the property…”
Every day, journalists face serious consequences including physical violence, imprisonment and death. A few days ago, the Committee to Protect Journalists launched its annual Free The Press campaign to raise awareness about imprisoned journalists throughout the world. On May 3, UNESCO will once again mark World Press Freedom Day “to inform citizens of violations of press freedom — a reminder that in dozens of countries around the world, publications are censored, fined, suspended and closed down, while journalists, editors and publishers are harassed, attacked, detained and even murdered.”
Meanwhile, the United States government, traditionally one of the bastions of press freedom, is about to compile a list of professional journalists and “top media influencers”, which would seem to include bloggers and podcasters, and monitor what they’re putting out to the public.
What could possibly go wrong? A lot.
DHS’ “Media Monitoring” Plan
As part of its “media monitoring”, the DHS seeks to track more than 290,000 global news sources as well as social media in over 100 languages, including Arabic, Chinese and Russian, for instant translation into English. The successful contracting company will have “24/7 access to a password protected, media influencer database, including journalists, editors, correspondents, social media influencers, bloggers etc.” in order to “identify any and all media coverage related to the Department of Homeland Security or a particular event.”
“Any and all media coverage”, as you might imagine, is quite broad and includes “online, print, broadcast, cable, radio, trade and industry publications, local sources, national/international outlets, traditional news sources, and social media.”
The database will be browseable by “location, beat and type of influencer”, and for each influencer, the chosen contractor should “present contact details and any other information that could be relevant, including publications this influencer writes for, and an overview of the previous coverage published by the media influencer.”
One aspect of the media coverage to be gathered is its “sentiment.”
Why “Media Monitoring” and Why Now?
DHS says the “NPPD/OUS [National Protection and Programs Directorate/Office of the Under Secretary] has a critical need to incorporate these functions into their programs in order to better reach Federal, state, local, tribal and private partners.” Who knows what that means, but the document also states the NPPD’s mission is “to protect and enhance the resilience of the nation’s physical and cyberinfrastructure.”
That line makes it sound as if the creation of this database could be a direct response to the rampant allegations of Russian interference in the 2016 U.S. presidential election — though President Donald Trump, who has normalized the term “fake news”, can’t seem to decide whether that’s even an issue or not.
Facebook CEO Mark Zuckerberg thinks it is. Earlier this week, he announced the social networking site would remove “more than 270 pages and accounts operated by a Russian organization called the Internet Research Agency” in an effort “to protect the integrity of elections around the world”.
Within the context of increasing concerns over “fake news” and foreign interference in elections, an action such as the DHS’ database might seem, at first glance, to be a sensible approach.
Unfortunately, increasing government encroachment on the freedom of the press is the sinister backdrop to all of this. Freedom House, which has monitored the status of the press for nearly 40 years, recently concluded that global media freedom has reached its lowest level in the past 13 years. The independent watchdog organization blames “new threats to journalists and media outlets in major democracies” as well as “further crackdowns on independent media in authoritarian countries like Russia and China.” And then it goes one step further.
“But it is the far-reaching attacks on the news media and their place in a democratic society by Donald Trump, first as a candidate and now as president of the United States, that fuel predictions of further setbacks in the years to come”, the report said.
Could the DHS media database be such a setback?
Possibly, and it’s not even the first time potential regulation of journalists has drifted across the American political scene.
Last October, an Indiana lawmaker proposed that journalists be licensed. Representative Jim Lucas’ bill was mostly a publicity stunt, but could this DHS action be a way for the government to keep track of American and foreign journalists as well as “citizen journalists”, threatening not only the freedom of the press but also individual freedom of speech?
The real question, of course, is what the government plans to do with the information it compiles, and there’s been no comment on that beyond what is in the posting, which, by the way, has interest from at least seven companies. Will those on the DHS media database be questioned more harshly coming in and out of the country? Will they have trouble getting visas to go to certain countries for their own reporting or personal vacations? Worse?
Speaking of visas — and showing that social media activity is squarely on the radar of this Administration — earlier this week, the State Department placed two notices in the Federal Register seeking comments on its proposal to require that all visa applicants to the U.S. turn over their social media information for the previous five years.
Regarding the DHS media database, we are entering potentially dangerous territory with the government keeping track of the “sentiment” of citizens and foreign nationals. If not legal challenges from organizations that defend press freedom and freedom of speech interests, the government should expect, at the very least, backlash from the public.
And that means you. If you think the idea of the U.S. government’s compiling and monitoring a list of media professionals and “top media influencers” is a potential threat to democracy, now would be the perfect time to call your local and congressional representatives to let them know how much you value a free press and the freedom of speech, just in case they’ve forgotten.
Gold price suppression by the world’s central banks is a well-documented fact, according to Singapore’s BullionStar precious metals expert Ronan Manly. He explained to RT.com why that’s the case.
Central banks have a long and colorful history of manipulating the gold price. This manipulation has taken many shapes and forms over the years. It also shouldn’t be surprising that central banks intervene in the gold market given that they also intervene in all other financial markets. It would be naive to think that the gold market should be any different.
In fact, gold is a special case. Gold to central bankers is like the sun to vampires. They are terrified of it, yet in some ways they are in awe of it. Terrified since gold is an inflation barometer and an indicator of the relative strength of fiat currencies. The gold price influences interest rates and bond prices. But central bankers (who know their job) are also in awe of gold since they respect and understand gold’s value and power within the international monetary system and the importance of gold as a reserve asset.
So central banks are keenly aware of gold, they hold large quantities of it in their vaults as a store of value and as financial insurance, but they are also permanently on guard against allowing a fully free market for gold in which they would not have at least some form of influence over price direction and market sentiment.
The Bank for International Settlements (BIS) crops up frequently in gold price manipulation as the central coordination venue and the guiding hand behind a lot of the gold price suppression plans. This is true in all decades from the 1960s right the way through to the 2000s. If you want to know about central bank gold price manipulation, the BIS is a good place to start. Unfortunately the BIS is a law onto itself and does not answer to anyone, except its central banks members.
In the 1960s, central bank manipulation of the gold price was conducted in the public domain, predominantly through the London Gold Pool. This was in the era of a fixed official gold price of $35 an ounce. Here the US Treasury and a consortium of central banks from Western Europe explicitly kept the gold price near $35 an ounce, coordinating their operation from the Bank for International Settlements (BIS) in Basel, Switzerland, while using the Bank of England in London as a transaction agent. This price manipulation broke down in March 1968 when the US Treasury ran out of good delivery gold, which triggered the move to a “free market” gold price.
Central banks continued to surpress gold prices in the 1970s both through efforts to demonetize gold and also dump physical gold into the market to dampen price action. These sales were unilateral e.g. US Treasury gold sales in 1975 and over 1978-1979, and also coordinated (and orchestrated by the US) e.g. IMF gold sales across 1976-1980.
Collusion to manipulate the price also went underground, for example in late 1979 and early 1980 when the gold price was rocketing higher, the same central banks from the London Gold Pool again met at the opaque BIS in Switzerland at the behest of the US Treasury and Federal Reserve in an attempt to launch a new and secretive Gold Pool to reign in the gold price. This was essentially a revival of the old gold pool, or Gold Pool 2.0.
These meetings, which are not very well known about, were of the G10 central bank governors, i.e. at the highest levels of world finance. All of the discussions are documented in black and white in the Bank of England archives and can be read on the BullionStar website.
The wording in these discussions is very revealing and show the contempt which central bankers feel about a freely functioning gold market.
Phrases used in these meetings include:
“there is a need to break the psychology of the market” and “no question of any permanent stabilisation of the gold price, merely at a critical time holding it within a target area” and “to stabilise the price within a moving band” and “it would be easy and nice for central banks to force the price down hard and quickly“.
And these meetings of top central bankers were in early 1980, 11 years after the London Gold Pool and 8 years after the US Treasury reneged on its commitment in August 1971 to convert foreign holdings of US dollars into gold.
Whether this new BIS gold pool was rolled out in the 1980s is open to debate, but it was discussed across the board for months by the Governors at the BIS, and may have been introduced in a form which would provide physical gold to the oil producers (gold for oil trades) without putting a rocket under the gold price. Their main worry was to allow the Middle Eastern oil producers to acquire some gold for oil without pushing the gold price up.
The Bank of England was also involved in the 1980s in influencing prices in the London Gold Fix auctions, in what an ex Bank of England staffer described euphemistically as ‘helping the fixes’. And the Bank of England has even at times used terminology in the 1980s such as “smoothing operations” and “stabilisation operations” when referring to coordinated central bank efforts to control the gold price.
Probably two of the most influential changes on the gold market in the modern era are structural changes to the gold market which channel gold demand away from physical gold and into paper gold. These two changes were the introduction of unallocated accounts and fractionally backed gold holdings in the London Gold market from the 1980s onwards, and the introduction of gold futures trading in the US in January 1975.
In unallocated gold trading in the London OTC market, gold trades are cash-settled and there is rarely any physical delivery of gold. The trading positions are merely claims against bullion banks who don’t hold anywhere near the amount of gold to back up the claims. Unallocated bullion is therefore just a synthetic paper gold position that provides exposure to the gold price but doesn’t drive demand for physical gold.
When gold futures were launched in the US in January 1975, the primary reason for their introduction, according to a US State Department cable at the time, was to create an alternative to the physical market that would syphon off demand for gold, creating trading that would dwarf the physical market, and which would also ramp up volatility which in turn would deter investors from investing in physical gold. Gold futures are also fractionally backed and overwhelmingly cash-settled, and their trading volumes are astronomical multiples of actual delivery volumes.
Central banks as regulators of financial markets are therefore ultimately responsible for allowing the emergence of fractional reserve gold trading in London and New York. This trading undermines the demand for physical gold and allows the world gold price to be formed in these synthetic gold trading venues. Price discovery is not happening in physical gold markets. Its is happening in the London OTC (unallocated) and COMEX derivative markets. So this is also a form of gold price manipulation since the central banks know how these markets function, but they do nothing to crack down on what are essentially gold ponzi schemes.
Imagine, for example, that central banks were as tough on paper gold as they seem to be now on crypto currency markets. Now imagine if central banks outlawed fractional gold trading or scare-mongered about it in the same way that they do about crypto currencies? What would happen is that the gold market participants would panic and unwind their paper positions, precipitating a disconnect between paper gold and physical gold markets. So by being lenient on the fractional structure of trading in the gold markets, central banks and their regulators are implicitly encouraging activities that have a dampening effect on the gold price.
The gold lending market, mostly centred in London, is another area in which central banks have the ability to cap the gold price. Here central banks transfer their physical gold holdings to bullion banks and this physical gold then enters the market. These transactions can either be in the form of gold loans or gold swaps. This extra supply of gold through the loans and swaps disturbs the existing supply demand balance, and so has a depressing effect on the gold price.
The gold lending market is totally opaque and secretive with no obligatory or voluntary reporting by either central bank lenders or bullion bank borrowers. The Bank of England has a major role in the gold lending market as the gold used in lending is almost all sourced from the central bank custody holding in the Bank of England’s vaults.
There is therefore zero informational efficiency in gold lending, and that’s the way the central banks like it. furthermore, freedom of information requests about gold lending are almost always shot down by central banks, even sometimes on ‘national security’ grounds.
Many central banks have lent out their gold long ago, and just hold a ‘gold receivable’ on their balance sheet, which is a claim against a bullion bank or bullion banks. These bullion banks roll over the liability to the central bank for years on end and the original gold is long gone. Since central bank gold is never independently audited, there is no independent confirmation of any of the gold that any central banks claim they have.
Gold receivables are another fiction that allows central banks to fly under the radar in the gold lending market, and central banks go to great lengths to make sure the market does not know the size and existence of outstanding gold lending and swapped gold positions.
In Febuary 1999, the BIS was again the nexus for secretive discussions about the gold market when a number of the large powerful central banks basically ordered the IMF to drop an accounting change that would have split out gold and gold receivables into two separate line items on central bank balance sheets and accounting statements. These discussions are documented in the IMF document which is available to see here.
This accounting change would have shone a light on to the scale of central bank gold lending around the world, information which would have moved gold prices far higher.
However, a group of the large central banks in Europe comprising the Bank of England, the Bundesbank, the Bank de France and the European Central Bank (ECB) applied pressure to torpedo this plan as they said that “information on gold loans and swaps was highly market sensitive” and that the IMF should “not require the separate disclosure of such information but should instead treat all monetary gold assets including gold on loan or subject to swap agreements, as a single data item.”
Central banks also at times sell large quantities of gold, such as the Swiss gold sales in the early the 2000s, and the Bank of England gold sales in the late 1990s.While the details of such gold sales are always shrouded in secrecy, and the motivations may be varied, such as bullion bank bailouts or redistribution of holdings to other central banks, the impact of these gold sales announcements usually has a negative impact on the gold price. So gold sales announcements are another tactic that central banks use to at times keep the pressure on the price.
There are many examples of central bankers discussing interventions in the gold market. In July 1998, former Federal Reserve chairman Alan Greenspan testified before the US Congress saying that “central banks stand ready to lease gold in increasing quantities should the price rise.”
In June 2005, William R. White of the BIS in Switzerland, said that one of the aims of central bank cooperation was to “joint efforts to influence asset prices (especially gold and foreign exchange) in circumstances where this might be thought useful.”
In 2008, the BIS at its headquarters in Switzerland even stated in a presentation to central bankers that one of the services it offers is interventions in the gold market.
In 2011, one of the gold traders from the BIS even stated on his LinkedIn profile that one of his responsibilities was managing the liquidity for interventions. After this was published, he quickly changed his LinkedIn profile.
Ronan Manly is a precious metals expert at BullionStar based in Singapore
Legitimate downloads of popular software including WhatsApp, Skype and VLC Player are allegedly being hacked at an internet service provider (ISP) level to spread an advanced form of surveillance software known as “FinFisher”, cybersecurity researchers warn.
FinFisher is sold to global governments and intelligence agencies and can be used to snoop on webcam feeds, keystrokes, microphones and web browsing. Documents, previously published by WikiLeaks, indicate that one tool called “FinFly ISP” may be linked to the case.
The digital surveillance tools are peddled by an international firm called Gamma Group and have in the past been sold to repressive regimes including Bahrain, Egypt and the United Arab Emirates (UAE).
In March this year, the company attended a security conference sponsored by the UK Home Office.
This week (21 September), experts from cybersecurity firm Eset claimed that new FinFisher variants had been discovered in seven countries, two of which were being targeted by “man in the middle” (MitM) attacks at an ISPlevel – packaging real downloads with spyware.
Companies hit included WhatsApp, Skype, Avast, VLCPlayer and WinRAR, it said, adding that “virtually any application could be misused in this way.”
When a target of surveillance was downloading the software, they would be silently redirected to a version infected with FinFisher, research found.
When downloaded, the software would install as normal – but Eset found it would also be covertly bundled with the surveillance tool.
The stealthy infection process was described as being “invisible to the naked eye.”
The seven countries were not named for security reasons, Eset said. WhatsApp and VLC Player did not respond to request for comment by the time of publication.
A Microsoft spokesperson, referencing the Skype infections, told IBTimes UK: “Windows Defender antivirus cloud protection already automatically identifies and blocks the malware.
“For non-cloud customers, we’ve deployed signatures to protect against this in our free antivirus software”, the statement added.
An Avast spokesperson said: “Attackers will always focus on the most prominent targets.
“Wrapping official installers of legitimate apps with malware is not a new concept and we aren’t surprised to see the PC apps mentioned in this report.”
“What’s new is that this seems to be happening at a higher level.”
“We don’t know if the ISPs are in cooperation with the malware distributors or whether the ISPs’ infrastructure has been hijacked.”
The latest version of FinFisher was spotted with new customized code which kept it from being discovered, what Eset described as “tactical improvements”. Some tricks, it added, were aimed at compromising end-to-end (E2E) encryption software and known privacy tools.
One such application was Threema, a secure messaging service.
“The geographical dispersion of Eset’s detections of FinFisher variants suggests the MitM attack is happening at a higher level—an ISP arises as the most probable option”, the team said.
“One of the main implications of the discovery is that they decided to use the most effective infection method and that it actually isn’t hard to implement from a technical perspective”, FilipKafka, a malware researcher at Eset, told IBTimes UK.
“Since we see have seen more infections than in the past surveillance campaigns, it seems that FinFisher is now more widely utilized in the monitoring of citizens in the affected countries.”
Breaking encryption has become a major talking point of governments around the world, many of which conduct bulk communications collection. Politicians argue, often without evidence, that software from companies such as WhatsApp has become a burden on terror probes.
The software’s brochure boasted: “FinFly ISP is able to patch files that are downloaded by the target on-the-fly or send fake software updates for popular software.”
It added that it “can be installed on an internet service provider’s network” and listed one use case when it was previously deployed by an unnamed intelligence agency.
Eset found that all affected targets within one of the countries were using the same ISP.
“The deployment of the ISP-level MitM attack technique mentioned in the leaked documents has never been revealed – until now”, the researchers said in their analysis.
“If confirmed, these FinFisher campaigns would represent a sophisticated and stealthy surveillance project unprecedented in its combination of methods and reach.”
It remains unknown who was behind the fresh hacking campaigns, but FinFisher is almost exclusively tailored to government, police or intelligence agency use.
“We cannot say for sure who is behind the campaign but the ISP re-direction could be a service ordered from FinFisher”, Kafka said.
“This question should be addressed to FinFisher.”
“We [have] very limited information on this, who specifically was targeted, but generally the targets were catered to what FinFisher is generally used for”, he added.
Gamma Group did not immediately respond to a request for comment from IBTimes UK.
This is not the first time that the company, which has offices in Europe, has been linked to questionable business practices.
In 2013, tech firm Mozilla sent it a cease and desist letter after its software was caught posing as a version of its Firefox browser.
“We cannot abide a software company using our name to disguise online surveillance tools that can be – and in several cases actually have been – used by Gamma’s customers to violate citizens’ human rights and online privacy”, it complained in a blog post.
The same year, Reporters without Borders branded Gamma Group as one of the “Corporate Enemies of the Internet” in an annual report. The creepy and invasive spyware can also be spread via more traditional means – malicious email attachments, for example.
Back in 2011, it emerged that Gamma International, a UK subsidiary, was selling a malware Trojan disguised as an update for Apple’s iTunes media player.
Before being patched, the gaping vulnerability had been exploited for approximately three years, found security journalist Brian Krebs at the time.
Simply depositing cash in sums of less than $10,000 was all that it took to arouse agents’ suspicions, leading to the eventual seizure and forfeiture of millions of dollars in cash from people not otherwise suspected of criminal activity …
The report found that in 91 percent of those cases, the individuals and business had obtained their money legally.”
“FOR ALMOST FOUR years, a cottage industry of media conspiracists has devoted itself to accusing Edward Snowden of being a spy for either Russia and/or China at the time he took and then leaked documents from the National Security Agency. There has never been any evidence presented to substantiate this accusation…
…Newly obtained documents conclusively prove that the central tale invented by these Snowden-accusing commentators is a wholesale fabrication. These documents negate the edifice on which this entire fiction has been based from the start…”
The TSA is introducing “more rigorous” and “comprehensive” physical inspections at airports around the country, according to Bloomberg. The security agency, which until now had the option of using five different types of physical pat-downs in the screening line, is eliminating the “options” and replacing them with a single, universal method which would involve heavier groping.
The Transportation Security Administration made the announcement to its agents this week, and in the case of Denver International Airport employees, advised employees and flight crews on Thursday that the “more rigorous” searches “will be more thorough and may involve an officer making more intimate contact than before.”