james-r-clapper

‘Trust Me’ Doesn’t Cut It on Russian Hacking: This one-sided report smells like a political hatchet job

Here’s the real problem with the joint intelligence report on alleged Russian hacking: without the classified details, we ordinary citizens are supposed to take the breathless allegations, presented as “high confidence” intelligence judgments, on faith.

Director of National Intelligence James Clapper and CIA Director John Brennan are crossing their fingers and saying, “Trust us.”

Since both are political appointees – Brennan in particular came directly out of the Obama White House, where he is believed to have orchestrated secret arms smuggling through Libya to Syrian rebels that led directly to the Benghazi disaster – excuse me if I remain skeptical.

Has Russia been engaged in sophisticated disinformation operations in the United States? Well, duh. That’s been going on for decades. During the Cold War, as General Clapper reminded the Senate Armed Services Committee on Thursday, we had a separate United States Information Agency (USIA) at the State Department to combat Soviet intelligence desinformatziya and, to a lesser degree, maskirovka.

The USIA regularly issued bulletins on Soviet deception operations, and traced how they were laundered through predominantly Third World media (India was a big favorite in the 1980s) until they made it into the United States, generally as part of left-wing conspiracy outlets.

A few examples were fabricated stories that the CIA had invented AIDS, or that Korean Air Lines Flight 007, which was shot down by Soviet fighters in 1983, had been flying a covert U.S. intelligence mission. The KGB also planted forged documents to smear American politicians and then “leaked” them to (usually) unwitting journalists.

But that’s not what happened here. If we are to believe the unclassified Russian hacking report, released on Friday, Russian intelligence agents hacked into the DNC and into the Hillary Clinton campaign servers and then turned over emails it exfiltrated to DCleaks.com and to Wikileaks.

“Moscow most likely chose WikiLeaks because of its self- proclaimed reputation for authenticity. Disclosures through WikiLeaks did not contain any evident forgeries,” the report stated.

Note that statement: the Russians didn’t spread obvious falsehoods or sophisticated disinformation. They disseminated the truth – stolen documents, yes. But true.

That is one reason why many Americans are having a hard time getting steamed at the Russians for exploiting the stupidity of John Podesta, who responded to a spearphishing attack by emailing his password, which was the word “password.”

Dumber than that, you die… of ridicule.

RNC Chairman Reince Priebus told FoxNews that the RNC reported similar attempts to penetrate its email to the FBI, and was never successfully penetrated. Why? Because they already had common sense security protocols in place.

Nations spy on each other. Democrat operatives need to get over it – or perhaps, just set aside the roach and revive their collective memories. After all, it was just two years ago that President Obama sent his 2012 campaign field director, Jeremy Bird, and four other political operatives to Israel, with orders to help defeat Israeli Prime Minister Bibi Netanyahu in his March 2015 re-election effort.

That was direct, overt, U.S. government interference in the election of a U.S. ally. But because it was Obama and Netanyahu, Democrats just didn’t get steamed.

By the way, if the Russians could penetrate the Clinton campaign server, what’s to say they didn’t also penetrate the private email server Mrs. Clinton set up to mask her “private” dealings while she was Secretary of State? And yet, the U.S. hacking report never alleges that this happened, nor does it allege that the Russians disclosed classified U.S. documents.

Perhaps that was a red line the Russians didn’t want to cross? Leaking unclassified emails that revealed the hypocrisy of the Clinton team and the Democrat party could arguably be construed as doing the work the U.S. news media failed to do. Leaking classified documents is another matter entirely.

Fully half of the unclassified U.S. report details the activities of RT television, formerly known as Russia Today.

It’s hard to believe that anyone watching RT is not aware of its strong Russia connection. The U.S. report accurately describes how RT unsurprisingly coordinated its propaganda with the Russian state.

What about MSNBC and CNN coordinating their propaganda with a political party, the DNC?

The U.S. report criticizes Russia because “RT coverage of Secretary Clinton throughout the US presidential campaign was consistently negative.” Somehow I missed the report’s criticism of MSNBC, CNN, the New York Times and the Washington Post for their “consistently negative” coverage of Donald Trump.

But I get it: that’s because RT is controlled by a foreign state, and those U.S. media organizations are privately owned.

So why doesn’t the U.S. intelligence report criticize other foreign state-owned media organizations, such as the BBC, or TF1 and France 2 in France, that not only broadcast coverage of Donald Trump that was “consistently negative,” but portrayed him as “emotionally unbalanced,” “unhinged,” “incompetent,” “unqualified to be President,” “racist,” “misogynist,” etc.?

The U.S. report announces on page 1 that it “covers the motivation and scope of Moscow’s intentions regarding US elections and Moscow’s use of cyber tools and media campaigns to influence US public opinion.” Perhaps it’s just me, but I find it odd that U.S. intelligence analysts would put their analysis of Russian motivation before the facts. But that’s the way it reads throughout.

One curious omission: the report contains no assessment of the impact that Russian activities had on the outcome of the 2016 election. While the report claims this is because it’s not the job of the intelligence community to “analyze US political processes or US public opinion,” I can guarantee you that if they had detected a clear impact of the Russian hacking, they would have spread it like butter on toast.

Michael Moore may have influenced more voters in a YouTube clip from his one-man show in Michigan, than RT did in all of its election coverage. The five-minute segment went viral when it was first released; many people thought they were actually watching left-wing ideologue Moore endorse Donald Trump.

Moore of course had no intention of endorsing Trump, but wanted to show his audience that he “understood” the motivation of Trump voters, and that they were “good” people. From the astonished look on the faces of people in the audience, it’s easy to imagine many of these Michigan voters suddenly realizing it was “okay” for them to vote for Trump, even if they traditionally had identified with Democrats.

The omission of any context in the unclassified version of this report, coupled to the breathless tone of its “high-confidence” conclusions and total lack of factual evidence in the public version, makes it appear like a political hatchet job. That in itself does a disservice to the honest, hard-working intelligence gatherers and analysts of the U.S. intelligence community.

EDITORS NOTE: This column first appeared on FrontPage Magazine.

trump-putin

Trump: Only ‘stupid people’ are against a ‘good’ but ‘respectful’ relationship with Russia

President-elect Trump has once again showed the world and his supporters that he does not seek confrontation but rather respect for the United States of America. Americans and Westerners have more in common with Russia than with other nations that hate us, for example Iran. A good but respectful bilateral relationship with Russia can open the door to dealing with a common enemy – radical Islam.

In a series of tweets the President-elect once again made it clear to outgoing President Obama, Democrats and some bellicose Republicans that a good relationship is not a bad thing with Russia.

trump-russia-tweet-1

trump-russia-tweet-2

trump-russia-tweet-3

It is clear that President-elect Trump is not caving into the narrative pushed by the Democrats, Obama, legacy media and Republican Senators John McCain and Lindsey Graham. The President-elect will not be boxed into a position that is reminiscent of the Cold War era “better dead than red” mindset. The Soviet Union has fallen. Economically Russia is a shadow of the former Soviet Union before its collapse.

Russia’s GDP calculated for purchasing power parity was $3.5 trillion, while Italy’s was $2.1 trillion. So in 2013, Russia had a higher level of economic activity than Italy, but because goods and services are more expensive in Italy, the overall value (nominal GDP) ended up the same. In contrast, the United States is the world’s largest national economy in nominal terms and second largest according to purchasing power parity (PPP), representing 22% of nominal global GDP and 17% of gross world product (GWP). The United States’ GDP was estimated to be $17.914 trillion as of Q2 2015.

In order to make America great again President-elect Trump understands that we must grow our economy, our military and unlike the Obama administration, reengage in the global political arena. Respect comes from strength. Economic, moral and military strength.

If there is a battle to be waged is must be between the free world led by a strong America against those who hate freedom and liberty. That is what it means to make America great again.

trump-hillary-russia-hacking

Trump has the Final Word on the Russian Hacking Hysteria

President-elect Trump received the full classified intelligence briefing on Russian “interference” leading up to the November 8th, 2016 general election. Here is a link to the unclassified report by the Director of National Intelligence.

Soon after receiving the briefing the President-elect posted three tweets.

trump-intel-report-1

trump-intel-report-2

trump-intel-report

In a press release President-elect Trump went on to state:

“I had a constructive meeting and conversation with the leads of the Intelligence Community this afternoon. I have tremendous respect for the work and service done by the men and women of this community to our great nation.

While Russia, China, other countries, outside groups and people are consistently trying to break through the cyber infrastructure of our governmental institutions, businesses and organizations including the Democrat National Committee, there was absolutely no effect on the outcome of the election including the fact that there was no tampering whatsoever with voting machines. There were attempts to hack the Republican National Committee, but the RNC had strong hacking defenses and the hackers were unsuccessful.

Whether it is our government, organizations, associations or business we need to aggressively combat and stop cyberattacks. I will appoint a team to give me a plan within 90 days of taking office. The methods, tools and tactics we use to keep America safe should not be a public discussion that will benefit those who seek to do us harm.

Two weeks from today I will take the oath of office and America’s safety and security will be my number one priority.” [Emphasis added]

The real issue is cyberwarfare and the U.S. defensive and offensive strategy and tactics to combat it.

Any questions?

RELATED ARTICLES:

The Russia Hacking Report Is An Indictment of Obama, Not Trump

Was Friday’s declassified report claiming Russian hacking of the 2016 election rigged?

The new narrative: Exposing lies equals sabotage

Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution

Obama’s useful idiocy: A look back

RELATED VIDEO: Former Congressman Pete Hoekstra speaks to Megyn Kelly on the U.S. intelligence report that Russia meddled in election to help Donald Trump.

cyber attack

Cyber Warfare — A Clear and Present Danger

In a January 2014 column titled “The Cyber Attacks are coming, the Cyber Attacks are coming!” I wrote:

According to experts like John Jorgenson, CEO and founding partner of the Sylint Group, our government is woefully behind the times in capability and capacity to deal with the threat of cyber attacks let alone the cyber warfare being conducted on a global scale by nation states such as China, Russia, North Korea and Iran.

[ … ]

“Nothing of substance to protect commercial industry, the countries infrastructure, or the citizen has come out of the [Obama] White House. From the attacks being made on the United States on the Cyber Battlefield our advisories are taking Cyber Warfare seriously while we can’t find a credible Field Marshall let alone decide what needs to be done,” notes Jorgenson.

Read more…

On February 26th, 2016 I was interviewed by Denise Simon on The Denise Simon Experience regarding the issue of cyber warfare. I spoke about the clear and present dangers of enemies, both foreign and domestic, using technology to commit crimes, steal national secrets and impact our way of life.

Denise called cyber attacks “the poor man’s nuclear weapon.”

I talked about the current threat (attacks from nation states, cyber hackers and groups like Anonymous) to the looming future threat of cyborgs, chipping and Internables.

Internables are internal sensors that measure well-being in our bodies may become the new wearables. According to Ericsson’s ConsumerLab eight out of 10 consumers would like to use technology to enhance sensory perceptions and cognitive abilities such as vision, memory and hearing.

Fast forward to December 2016 and the media’s obsession with the successful phishing of the DNC and release of John Podesta’s emails. What they are missing is:

  1. As technology has become ubiquitous, cyber warfare has become the preferred method of attacking one’s enemies.
  2. President Obama turned over control of the Internet to the United Nations in October of 2016, which increases the cyber warfare threat against U.S. public and private entities.
  3. All nation states, with the exception of the U.S., conduct offensive cyber warfare as a matter of public policy including: China, Russia, North Korea, Iran, and ISIS to name a few.
  4. The Obama administration has made neither cyber security nor cyber warfare a priority during the past 8 years.

My greatest concern is that the United States government is only conducting defensive operations against the threat, and not doing that very well. The Obama administration does not conduct effective offensive operations against our enemies which include: China, Russia, Iran, the Islamic State, North Korea and many others.

Our warnings went unheeded by the U.S. House of Representatives, the U.S. Senate and the White House.

So who really is to blame for these unrelenting cyber attacks?

Why its U.S.!

emails-screen

Even if the Russians Did Hack the Emails, So What?

“The Russians hacked the election!” say Democrats trying to discredit Donald Trump’s presidency. Of course, their statement is deceptive, referring only to the theory that the Russians provided WikiLeaks with the campaign season’s revelatory Democrat emails.

Not surprisingly, the Fake (establishment) Media has embraced the theory, which is probably the best argument for its falsity. In addition, Wikileaks founder Julian Assange denies Russian involvement. So does Britain’s former ambassador to Uzbekistan, Craig Murray, who said “I’ve met the person who leaked them [the emails]” and that the individual is an “insider” representing Democrats angry over “the corruption of the Clinton Foundation and the tilting of the primary election playing field against Senator Bernie Sanders.” Moreover, both FBI director James Comey and James Clapper, director of National Intelligence, said there’s “no credible evidence” Russia influenced Nov. 8’s outcome, according to reporter Ed Klein. Yet whatever the truth, the more important matter is that the issue is being used as a distraction and a tool for disruption.

What was actually revealed by WikiLeaks and what effect it had are being conflated with the matter of who revealed it, as if the messenger somehow changes the message. Consider an analogy: Imagine it came to light that a Capitol Hill restaurant’s kitchen was filthy and vermin-infested. Would the health department’s course of action be dictated by whether the information came from a disgruntled employee or an investigative reporter who illegally gained access to the kitchen? If the latter, would Washington Democrats still eat there?

As a reminder, the WikiLeaks emails contained damning information showing direct collusion between the mainstream media and the Hillary Clinton campaign, including evidence that a CNN figure gave Clinton debate questions ahead of time, thus disadvantaging primary-season opponent Sanders. They contained other dirt on the Democrats as well. Is anyone but Clinton and her apologists upset these truths came to light?

Of course, our systems must be made safe from intrusion by foreign actors, but this gets at an important point: It will reflect better on the Democrats if the WikiLeaks source is a leaker. After all, whose systems were supposedly hacked and under whose watch would it have occurred?

Answers: the Democrats’ systems and the Obama administration.

The New York Times recently ran a painfully long article about how “how Russian cyberpower invaded the U.S.,” calling it “The Perfect weapon.” But the piece mainly illustrates how Democrat and administration entities exhibited the perfect storm of incompetence. The Times writes of how its examination “based on interviews with dozens of players targeted in the attack, intelligence officials who investigated it and Obama administration officials who deliberated over the best response — reveals a series of missed signals, slow responses and a continuing underestimation of the seriousness of the cyberattack.”

In contrast, there reportedly was also a hacking attempt by Russia on the Republicans. It apparently didn’t work, however, because they actually secured their systems.

So here’s the Democrat complaint, translated: “We were too incompetent to secure our systems — or react promptly to a perceived threat by a hostile foreign actor — and as a result damning truths about us were revealed. We’re such victims!”

Taking the above together with Hillary Clinton’s use of a “home brew” server to send classified emails, and that the FBI stated there appeared to be hacking attempts on it, a question is raised:

Were these people ever qualified to be at the nation’s helm, in charge of national security?

In the 1997 film Liar Liar, Jim Carrey plays a shyster lawyer who, after a birthday wish made by his son comes true, is suddenly incapable of telling a lie. Objecting to the opposing counsel’s argument in court but robbed of his verbal legerdemain, he responds to the judge’s question as to why he objected by saying, with the only argument he could honestly muster, “Because it’s devastating to my case!”

That is essentially the democrats’ gripe regarding the quite true WikiLeaks revelations. Objection overruled.

Contact Selwyn Duke, follow him on Twitter or log on to SelwynDuke.com.

james-comey

Comey calls Trump states the Russians Didn’t Influence the Election

Frank Gaffney in a NewsMax.com column titled “Comey to Trump: The Russians Didn’t Influence the Election” reports:

In telephone conversations with Donald Trump, FBI Director James Comey assured the president-elect there was no credible evidence that Russia influenced the outcome of the recent U.S. presidential election by hacking the Democratic National Committee and the emails of John Podesta, the chairman of Hillary Clinton’s presidential campaign.

What’s more, Comey told Trump that James Clapper, the director of National Intelligence, agreed with this FBI assessment.

The only member of the U.S. intelligence community who was ready to assert that the Russians sanctioned the hacking was John Brennan, the director of the CIA, according to sources who were briefed on Comey’s conversations with Trump.

“And Brennan takes his marching orders from President Obama,” the sources quoted Comey as saying.

Read more…

Yet another fake news story to help Democrats influence the election.

RELATED ARTICLE: DNC docs were leaked, not hacked, intelligence veterans say

Campaign 2016 Suburban Women

Can we Finally Now Turn the Page?

Every dictatorship needs a devil.  And the dictatorship that is the modern Democrat Party – with several Republican allies – has their devil in Russia.

By Wallace Brushweiler and William Palumbo

When it comes to President-Elect Donald J. Trump and his swift-acting transition team, day-to-day politics are being criminalized.  Every occurrence is another outrage, an unparalleled indignity for the country with no precedent in modern history.*

For example, Trump’s own businesses.  Everybody knew long before Trump ran for President that he was a billionaire with a sprawling, worldwide commercial empire.  But now that he has won the election and in the process of disentangling himself from the Trump Organization, his enemies are already speculating about impeachment over precisely the issue emoluments.  (Just out of curiosity: did these same people consciously overlook the Clinton Foundation during Hillary’s tenure as Secretary of State… yes!)

That’s but only one outrage among the left movement today.  The latest two manufactured, melodramatic and plain silly outrages both predictably cite a common devil shared by the Democrats and many in the Republican establishment: Russia.

Rex Tillerson vs. John Kerry

Mr. Rex Tillerson is the CEO of ExxonMobil, one of, if not the, largest companies in the world.  The company he directs has energy-related projects across the world’s continents and around its oceans, including in Russia.  In 2012, Russian President Vladimir Putin awarded Tillerson the Russian Order of Friendship.

Now you might be thinking: Why is this Russian connection of Tillerson more disqualifying than the Bush family’s close association with Saudi monarchs, or ExxonMobil’s own interests in Qatar, two known sources of terrorist financing?  Excellent question.

Speaking of terror states, let’s get to the source.  John Kerry, who unfortunately is the current Secretary of State, is related by family links to his Iranian counterpart, Javad Zarif.  Iran is the number one sponsor of Islamic terrorism around the world.  Thanks to John Kerry, they also find themselves with more influence, money, and international acceptance than they have since the days of the western friendly Shah Mohammad Reza.

Do you remember hearing the media, the pundits, or Washington establishment complain John “Ketchup” Kerry’s close connections to the regime that chants “Death to America!” each Friday afternoon?  This relationship is more substantial than some government-given honor.  It’s all in the family … and some.

Up until now, nothing negative has been announced about Tillerson.  The same cannot be said about Kerry and his gang.

Russian Hack Attack?  So says Barack Hussein Obama and John Brennan

Ever looking to discredit and cast aspersion on the impending Trump presidency, the CIA has concluded that Russia hacked its way to a Donald Trump victory.  The so-called evidence?  Allegedly, Russia also hacked the Republican National Committee, but did not release the information to WikiLeaks, like they (allegedly) did with DNC information.  Ergo, Vladimir Putin’s government unfairly advantaged Donald Trump.

There’s just one small problem with this manipulative story: RNC Chairman Reince Priebus denies they were ever hacked in the first place.  The “hack” of the DNC was an inside job by some disillusioned Democrats .

One may be tempted to call this Russian fear mongering modern day McCarthyism – seeing “Reds under the Bed.”  Yet, do you recall Putin every calling for world revolution and the destruction of Western civilization, like his predecessors in the U.S.S.R.?  Do they chant this every Sunday morning after mass, like they do in Iran on Friday’s after mosque?

Senators John McCain and Lindsay Graham, predictably soft, joined their Democrat counterparts in the Senate – among them, the poisonous propagandist Chuck Schumer – and issued the following statement:

“Recent reports of Russian interference in our election should alarm every American … Democrats and Republicans must work together, and across the jurisdictional lines of the Congress, to examine these recent incidents thoroughly and devise comprehensive solutions to deter and defend against further cyber-attacks.”

Reminder: These are the same two Republican Senators who acted as special pleaders, in concert with Barack Hussein Obama, today’s sitting president, for the Muslim Brotherhood’s Mohamed Morsi.  Morsi’s first trip abroad as President of Egypt was to Iran, to visit Kerry’s buddies in the Iranian government.

Luckily for posterity, the FBI conducted a thorough examination of Russian interference into the election and declared there was no evidence to support the claim.

Politicized DOJ, Politicized CIA

The election of 2016 proved that our federal institutions have become discouragingly politicized.  The Department of Justice bent into a pretzel folded like a double helix while attempting to rationalize their reluctance to prosecute of Hillary Clinton.

Obama, while bogged down in swamp of actual scandals in 2014, famously referred to them as “phony scandals.”

Would the CIA under John Brennan, former National Security Advisor to Obama, dare to misinform the American public with a truly phony scandal, and raise the specter of Russian intelligence active measures where there were none?  Is Attorney General Loretta Lynch blind in her pursuit of justice?

To believe the Democrats, some Republicans, and the entire media today, is to believe that Trump going, unannounced, to dinner with his family is not only scandalous, but downright perilous to our democracy.

Speaking of phony, you know what really is?  Obama, and his thoroughly fraudulent administration.  Kindly, we have not covered the Podesta travesty here.

Note to those who are undermining the incoming President – Barack Hussein Obama, Hillary, and the rest of the gang – you are just a bunch of crying baby losers.

* Unless comparable to another so-called devil, the disproportionally maligned Richard Nixon.

antenna-farm

World Patent Marketing Reviews DARPA: Inventions for the Future on a $3 Billion Budget

While we at World Patent Marketing like to think of ourselves as cutting edge when it comes to inventing, I must admit we have a very difficult time keeping up with the folks at DARPA.  Sure we have an impressive group that includes some great patriots like Ambassador Dell Dailey, Navy Admiral Al Konetzni, Former US Attorney Matthew Whitaker, General Nitzan Nuriel of the Israel Defense Forces, Presidential Advisory Council Member Dr. Aileen Marty, War Hero Brian Mast, and so on.  When it comes right down to it,  DARPA’s  $2,973,036,000 annual budget goes a long way.  And that is just what we know about.  Digital communications, jets that are invisible to radar, weather wars, and self-driving cars, all come from one agency. The weird, the scary, the sci fi, the creepy, and the cutting edge, all come from the same source, a United States weapons program. They are all DARPA inventions.

The Defense Advanced Research Projects Agency, commonly known as DARPA, is the super-secret research agency. It is the place where the most advanced weapons and communications systems are developed to keep the United States on top in terms of military technology. If a project feels like it came right out of an episode of Star Trek, it probably came out of DARPA.  DARPA has the luxury of unlimited budget and unlimited brain power.

While DARPA’s mission is to create advanced weapons systems, many of them have found their way into our everyday lives. Most famously, the internet is a DARPA product, something all of us rely upon for everyday communications and business. Many other advanced inventions that have shaped our modern world are DARPA inventions. Read on, to find out how the most secret and controversial agency of the military industrial complex has shaped our modern world.

DARPA Inventions Changed the World

The Internet:  This is a DARPA invention. It was originallyWorld Patent Marketing created as a “fail-safe” communications system. Back in the days when the internet used the landline telephone network, it was designed so that it could never be shut down. The internet used the existing landline phone system, but the address protocols allowed it to use any connection between them. Thus, if the telephone lines between Miami and Washington were down, the internet would find a way to its destination connection, by going through Dallas or Los Angeles, or even going overseas before finally reaching its destination.

It then was adapted to computers, which used the phone system to communicate with each other. Digital communications made it possible for the computers to communicate more easily and accurately. By 1972, the first email had been created and sent.

Eventually, the system which had been developed for military use, was released to the public. Universities and colleges were early adapters, using the internet for campus communications and library systems. Private businesses were given access and developed easy to use consumer-level packages. And it all began as a secret military project.

There are two technologies developed by DARPA that the world couldn’t function without today. One is the internet, and the other is GPS; if either were to be switched off, everything from global commerce to national defence systems would be compromised to the point of potential collapse.The Global Positioning System project dates back to 1973 and was originally very much a military system, funded and created by the US Department of Defense. However, the concept dates back even further to the very early days of DARPA itself.

GPS – The Global Positioning System:  How would we find the nearest Starbuck’s without GPS? This invention idea has changed the way we get around town, as well as logistics for shipping and delivery, airline transportation and defense.GPS didn’t arise solely out of the DARPA invention labs, but they had a hand in it. The final product is the result of research and development from every branch of the military, Navy, Air Force, and the Army, as well as DARPA and a number of independent invention labs.GPS pinpoints your location, by tracking your position in relation to four satellites. Due to the Dopler Effect, the satellites can determine your position on a line. With the information from four satellites, your exact position can be determined within 3.5 meters. GPS uses systems much like those developed in prior generations, such as LORAN, which could pinpoint location based upon radio waves. But, because it is based upon satellite transmissions, it is more reliable and has wider coverage around the world.

A legendary story is told of the inspiration for GPS. Back in 1957, William Guier and George Weiffenbach were following the Sputnik launch. They were both physicists at Johns Hopkins. They realized that the change in frequency of the radio waves from Sputnik, would allow them to track its location. This critical insight is the core of the GPS system. But it took decades to develop, as clocks and satellite technology had to catch up with the basic idea. In addition, GPS was a terrifically expensive project. The cold war with Russia provided the justification for the expense. But, it also kept the project off limits to the public and top secret. It took Korean Air Lines, Flight 007 disaster to change that. The plane was shot down over Russia, as it had lost its way and found itself in Russian airspace. Because of this disaster President Ronald Reagan decided to make GPS available for civilian and private commercial use. The GPS system is free to everyone and still maintained by the United States Government. Since the U.S. system was launched, several others have been launched regionally by other countries, including; Russia, Japan and India. The European Union plan to launch their own system soon.

Google Maps were Born in DARPA:  And you thought the clever guys at Google created the concept. Well, they certainly added to it, made it consumer friendly, and put a vast chunk of the United States up on Google Maps. But the truth is, the concept of street view and a 3D representation of a city came right out of DARPA.

Back in 1979, students from MIT Architecture Machine Group toured Aspen, filmed it, and displayed their project as the Aspen Movie Map. It even allowed viewers to see the buildings evolve in time, with historical views. And it was fully interactive. Some of the buildings could be entered and explored virtually.

Google took the project pretty much exactly as the students left it, including the gyroscopically stabilized cameras for video recording from the car tops, and created Google Maps.

The inspiration for funding the project as a DARPA invention, allegedly sprang from the Israeli attack of an airliner in Entebbe, Uganda. The Isrealis were able to raid the aircraft and rescue the hostages. Supposedly, they were so effective because they trained in a replica of the airport. Thus, DARPA believed mapping would be vital to military training and successful military operations.

Maps Made Real, the Urban Photonic Sandtable Display:  This is simply amazing technology, that uses 3D mapping tech combined with holographic displays and a special “sand” to create physical terrain maps. That’s right, this DARPA invention creates physical structures with holographic imagery.

The Urban Phototonic Sandtable Display was recently displayed for the media. In its current stage of development, the Sandtable is a mere 6ft square. The story is that the invention can be used to display battlefields for planning purposes. The “sand” reforms and changes it’s shape as the hologram changes.

Now picture this lifesize. It allows for the creation of buildings and cities, with holographic imagery. It gives a whole new meaning to virtual reality. It offers a way of changing physical reality instantly, with a single touch on a computer keyboard. Pretty awesome.

The Cloud:  It should be no surprise that the guys who invented the internet, also developed the operating systems to use it. DARPA invented the Multiplexed Information and Computing Service for the purpose of “information utility,” known as Multics. Multics eventually morphed into Unix, which is the backbone of OS X, iOS, Android and Linux. The goal was to create a modular operating system, so that the various components could work independently,, but in a coordinated manner. Multics allowed for faster distributed computing. Of course, security was of the utmost importantance. The Unix system allowed documents to be given various levels of security clearance while being stored on the same system. Users could only access areas of the system that they were given access to. The system also had to be resilient, robust, and impervious to attack.The “timeshare” aspect of these systems, is critical to the functioning of cloud computing.

Windows and Video Conferencing:  Love or hate Microsoft, everyone has an opinion, one thing is certain, they didn’t actually create Windows. That’s right, Bill Gates crowning achievement, the Windows operating system, is actually a DARPA invention. The beginnings of Windows date back to 1961, when Douglas Engelbart proposed to the US AIR Force Office of Scientific Research that he could “develop a comprehensive framework for augmenting human intellect.” It was called the oN-Line System, or NLS. NLS gave us many features of the computer that we have come to take for granted. NLS developed the first onscreen cursor/mouse system. It is almost unimaginable to use a computer without the ability to select particular portions of the screen for actions. NLS created it. NLS also created hypertext linking, which is absolutely essential to the functioning of the World Wide Web.

So back in 1969, Engelbart held the first video conference and demonstrated his cool new system. Decades later, Microsoft, Apple, and the rest of the Silicon Valley businesses claimed that they had invented these systems. But none of it would have existed without Engelbart and DARPA.

SIRI:  Of course, if Windows is actually a DARPA invention, and not really a Microsoft product, it should be no surprise that Apple’s SIRI is from DARPA as well. Under DARPA the voice recognition software system was known as CALO. It is a “Cognitive Assistant that Learns and Organizes” and was developed for soldiers in the field. The slightly awkward name derives from the Latin word, calonis, which is a soldier’s servant. SIRI was released into the civilian world as the military wound the project down and moved onto a new iteration. Their new voice recognition program is BOLT, the Broad Operational Language Translation program. BOLT is being designed to provide translation, including contextual translation, to help soldiers in the field.

Arbor Networks Piggybacks on DARPA Research: Distributed Denial of Service attacks are a huge security issue for companies on the internet. But, Arbor Networks created a system that protects websites from DDoS attacks. Their system detects and mitigates the effects of DDoS attacks. the technology was developed at the University of Michigan, under a DARPA contract. Back then it was called the Lighthouse Project. It was demonstrated to work for the first time in 2000.

Internet Privacy:  Of course DARPA would be into privacy and anonymity. Government agencies adore doing things in secret, it is almost a fetish. So DARPA created “onion routing,” now known as Tor. Tor is the best-known system for anonymous internet use at this time. But, onion routing dates back to 1995. The US Navy wanted an anonymous and secure communication system. DARPA joined the project two years later with funding and expertise. Onion routing uses layered encryption codes. As the packet reaches each browser en route to the final destination, a layer of encrypted code is “peeled off.” That encrypted code tells the browser where to send the packet next. The de-encryption destroys the prior information about who sent the packet or where it had been.  This creates a very high level of security and anonymity. Tor markets this system for security and privacy on the web. And it is a DARPA invention.

DARPA Inventions Continue to Shape the Future

And of course, DARPA has been involved in the development of advanced technology for everything from planes to bombs. Stealth technology, which makes planes invisible to radar, was a DARPA project. The agency is in the process of developing the fastest plane in the world, with the goal of being able to strike any target in the world within an hour. Their Falcon HTV-2 flies at 14,000 miles per hour, 20 times the speed of sound. It also flew right into the ocean and crashed. And DARPA continues to push the boundaries of computing. They are working on dramatically reducing processing speeds with hardware that is millions of times faster than current technology. The world is shaped by DARPA inventions. DARPA is building the future of our world.

Submit Your Idea Today

internet_globe

National Security and Cyber Experts: Do Not Surrender the Internet!

Washington, D.C.:  Dozens of experienced national security professionals and experts on cyber threats and warfare joined forces today to urge the Secretary of Defense and Chairman of the Joint Chiefs of Staff to oppose the transfer of the last vestige of U.S. control of the Internet to a non-profit organization in less than a week.

ican-logoAs things stand now, on 1 October, President Obama intends to transfer all responsibilities for naming and numbering domain addresses on the Internet to a non-profit organization known as the Internet Corporation for Assigned Names and Numbers (ICANN).  Should that happen, the United States will no longer have any control over the addresses that serve to make all websites accessible and allow users to connect to the Internet.  Currently, the U.S. Department of Commerce’s National Telecommunications and Information Administration (NTIA) reviews all new addresses and authorizes them to be posted to the authoritative root server (the “A Server”) by Verisign.

In a letter to Defense Secretary Ashton Carter and Joint Chiefs of Staff Chairman Gen. Joseph Dunford, current and former leaders in industry, national security, homeland and cyber security express strong concerns about the likely implications of such a step and seek a one-year delay to allow full consideration of these issues:

The Internet Assigned Numbers Authority function is critical to our nation’s ability to effectively defend our national assets and civilian population and ensure integrity in our cyberwarfare capabilities….DoD is reliant upon private sector critical infrastructure for its operations, and the integrity and security of the IP addresses associated with these assets are equally important to the protection of the American people.

Of…immediate concern to us…is the prospect that the United States might be transferring to future adversaries a capability that could facilitate, particularly in time of conflict, cyberwarfare against us. In the absence of NTIA’s stewardship, we would be unable to be certain about the legitimacy of all IP addresses or whether they have been, in some form or fashion, manipulated, or compromised.  Given the reliance of the U.S. military and critical infrastructure on the Internet, we must not allow it to be put needlessly at risk.

The signatories, headed by storied leaders of the defense industrial sector and cyberspace, CACI International’s Executive Chairman, J.P. “Jack” London, and the former Chairman of Network Solutions, Michael A. Daniels, represent several centuries’ worth of experience in safeguarding America and its computer systems.

They conclude with the bottom line:

“There is, to our knowledge, no compelling reason for exposing the national security to such a risk by transferring our remaining control of the Internet in this way at this time.”

RELATED ARTICLES:

It’s Now or Never to Save the Internet

John Bolton: Hostile Foreign Governments Will Use Obama’s Internet Surrender to Their Advantage – Breitbart

EDITORS NOTE: To learn more about what is at stake and the necessity of the executive branch and/or the Congress preventing this needless and avoidable disaster, contact Jody Westby, CEO of Global Cyber Risk LLC, at 202-255-2700 or westby@globalcyberrisk.com.

facebook spy eye

Florida: 9/11 Commemoration Facebook Page Hacked – Was it the Islamic State?

sarasota-ministerial-associationA malicious attack occurred against the Sarasota Ministerial Association’s Facebook page announcing their “Standing With the Fallen” 9/11 commemoration at the Sarasota National Cemetery. The hacker obtained administrative privileges and posted that the event was cancelled.

Additionally, the hacker sent out notifications to those who had “friended” the association’s Facebook page saying the commemoration was cancelled.

Why is this attack significant?

Because it was in Sarasota that Mohammed Atta, the leader of the attack on 9/11/2001, and two of the other pilots lived, planned the attack and trained to fly their deadly missiles into the World Trade Center and the Pentagon.

Is picking this Sarasota commemoration to hack happenstance or something more nefarious?

The following graphic replaced the one the hacker posted announcing the event was cancelled:

9-11-event-not-cancelled

In an email to supporters and attendees, Chaplain Tom Pfaff, the event organizer, wrote:

Greetings,

Today [September 10,2016] the Sarasota Ministerial Association Facebook was hacked.

A false posting said that the 9/11 Commemoration was cancelled and sent e-mails out also saying the event was cancelled.

Let’s fight back, by everyone e-mailing saying the 9 / 11 Fifteen Year Commemoration at the Sarasota National Cemetery, 6 PM HAS NOT BEEN CANCELLED but hacked.

And please share the newly, redone event posting with your Friends publicly.

Evil shall not triumph, but will be then used for the good…

This kind of cyber attack using Facebook is unusual in that it targets a specific event commemorating the fifteenth anniversary of 9/11 that has historic significance. President George W. Bush was in Sarasota at Booker Elementary School when he was notified that a plane has struck the World Trade Center. Shortly after the second plane hit and the U.S. Great War on Terrorism began.

 from Heavy in an article titled “Is There an ISIS Terrorist Attack Threat for September 11, 2016?” reports:

15 years after 9/11 was committed by al-Qaeda and Osama bin Laden, the United States is now at war with the Islamic State. Is there a credible terrorist threat for the 15th anniversary of September 11?

According to the White House’s top counterterrorism official, Counterterrorism Center chief Nick Rasmussen, the answer is “yes.” The Washington Post reports that on Wednesday, Rasmussen said that the “terrorist threat facing the U.S. and its European allies is ‘bigger, wider and deeper’ than at any point since the Sept. 11 attacks 15 years ago.”

However, no specifics were given.

Last year, Twitter accounts affiliated with the Islamic State threatened a September 11, 2015 hacking attack against the United States. No cyber attacks took place.

But without a doubt, ISIS is planning to capitalize on American fears of a repeated attack on September 11. [Emphasis added]

Did the Islamic State hack the Sarasota Ministerial Association’s Facebook page in remembrance of Mohammed Atta? Is there something more the hacker(s) might do?

The incident according to sources has been reported to Facebook and local law enforcement. Let’s hope this and the thousands of other commemorations go off without a hitch.

EDITORS NOTE: The 9/11 event will take place as scheduled. We will have staff at the event. Stay tuned for updates.

dnc logo cracked convention

Is the DNC Convention over even before it gets started?

There are clear fissures within the Democratic Party. The burning question: Is the DNC Convention over before it gets started?

On Friday, July 22nd, Wikileaks did a DNC Document Dump of nearly 20,000 hacked emails.

Bernie Sanders supports analysed these emails and published a detailed list of findings, which may be read here.  The first causalities of this document dump are Bernie Sanders supporters and DNC Chair Debbie Wasserman-Schultz.

Jeff Zeleny, Eric Bradner and John King, in a CNN Politics article titled “Wasserman Schultz resigning as party leader” write:

Debbie Wasserman Schultz announced Sunday she is stepping down as chairwoman of the Democratic National Committee at the end of the party’s convention, which is set to begin here Monday.

The Florida congresswoman’s resignation — under heavy pressure from top Democrats — comes amid the release of thousand of leaked emails showing DNC staffers favoring Hillary Clinton over Bernie Sanders in the party’s 2016 primary contest.

Her announcement that she was leaving had pro-Sanders supporters cheering during a demonstration in Philadelphia and Donald Trump and other Republicans crowing about the disarray among the Democrats.

How will the Democrats and media spin this political Armageddon?

Jeff McAdam in a Fox New 13 article states:

hillary rigged primaryDozens of Salt Lake City residents came together at West High School to protest recent developments within the Democratic Party.

“WikiLeaks? WikiLeaks? That’s exactly what we thought the whole time,” said Wesley Randall, a Bernie Sanders supporter.

Emails from DNC staffers released by Wikileaks appear to show the Democratic National Committee favoring Hillary Clinton over Bernie Sanders during the primary process. Chairwoman Debbie Wasserman Schultz announced Sunday she will resign at the end of the party’s convention, which begins Monday.

“It’s not okay to rig the primary, and that’s essentially what they’ve done here,” said Felicia Taylor, one of the two organizers of Sunday’s rally.

The rally started at West High School, where Sanders gave his second speech in Utah, and ended at Liberty Park, some 3.4 miles later.

“We even had one Hillary supporter come up to us and join us saying, ‘I used to be a Hillary supporter up until a couple days ago, but I’m with you now,'” Taylor said. “Then she walked with us the rest of the way.”

Read more.

Donald Trump made the following remarks about Bernie Sanders and the DNC Convention during his acceptance speech:

[I]f you want to hear the corporate spin, the carefully-crafted lies, and the media myths — the Democrats are holding their convention next week. Go there.

[ … ]

Nobody knows the system better than me, which is why I alone can fix it. I have seen firsthand how the system is rigged against our citizens, just like it was rigged against Bernie Sanders. He never had a chance.

How prophetic.

wikileaks logo cracked dnc logo

Wikileaks DNC Document Dump: Detailed List of Findings

Wikileaks released nearly 20,000 hacked emails from the accounts of Democratic National Committee officials. Gateway Pundit posted a detailed list of findings from the Wikileaks document dump.

The list was compiled thanks to the work of Reddit Bernie Sander supporters and Donald Trump supporters: Hat Tip Steve A.

Here is their list of findings:

DNC member killing horses for insurance money.
https://wikileaks.org/dnc-emails/emailid/578
DNC making fun of black woman’s name.
https://wikileaks.org/dnc-emails/emailid/17942
DNC telling each other, “I love you too. no homo.”
https://wikileaks.org/dnc-emails/emailid/425
DNC requesting a pull an MSNBC commentary segment.
https://wikileaks.org/dnc-emails/emailid/6107
DNC controlling the narrative with time released stories.
https://wikileaks.org/dnc-emails/emailid/12450
DNC conspiring to create false Trump information and release with Reuters.
https://wikileaks.org/dnc-emails/emailid/7102
DNC Hillary supporters infiltrated Sanders campaign.
https://wikileaks.org/dnc-emails/emailid/4776
DNC members going to complain to Morning Joe producers about his mentioning of a “rigged system.”
https://wikileaks.org/dnc-emails/emailid/8806
DNC discussing their relationship with NBC/MSNBC/CNN and how to get better treatment.
https://wikileaks.org/dnc-emails/emailid/13762
Super PAC paying young voters to push back online Sanders supporters. Paid shills.
https://wikileaks.org/dnc-emails/emailid/8351
DNC Chair Debbie Wasserman Schultz having an off the record meeting in MSNBC President Phil Griffin’s office.
https://wikileaks.org/dnc-emails/emailid/8867
DNC being messed with by the Washington Examiner.
https://wikileaks.org/dnc-emails/emailid/5304
DNC discussing Hillary’s policies as unfeasible.
https://wikileaks.org/dnc-emails/emailid/519
$200k for a private dinner with Hillary.
https://wikileaks.org/dnc-emails/emailid/17287
Offering to send interns out to fake a protest against the RNC.
https://wikileaks.org/dnc-emails/emailid/13366
Faking outrage and pasting in a video later.
https://wikileaks.org/dnc-emails/emailid/7102
A mole working inside of the Sanders campaign.
https://wikileaks.org/dnc-emails/emailid/7793
Bringing up Sanders religion to scare the southern voters.
https://wikileaks.org/dnc-emails/emailid/11508
Possible money laundering by moving money back and forth to bypass legal limits.
https://wikileaks.org/dnc-emails/emailid/6230
Politico writer sending his stories to the DNC before he sends them to his editor.
https://wikileaks.org/dnc-emails/emailid/10808
DNC feeding CNN the questions they want to be asked in interviews.
https://wikileaks.org/dnc-emails/emailid/4077
Creating a fake job ad for a Trump business to paint him as a sexist.
https://wikileaks.org/dnc-emails/emailid/12803
Hillary funding 2 million dollars in a coordinated campaign in battleground states to win back the Senate.
https://wikileaks.org/dnc-emails/emailid/7784
DNC is upset that their “allies” didn’t send in protestors so they sent out interns.
https://wikileaks.org/dnc-emails/emailid/13366
“Clinton Foundation quid-pro-quo worries are lingering, will be exploited in general.”
https://wikileaks.org/dnc-emails/emailid/8351
$50,000 – Lawrence Benenson.
https://wikileaks.org/dnc-emails/emailid/14700
Daily Fundraising Report for the DNC.
https://wikileaks.org/dnc-emails/emailid/2875
Content & Social Strategy Discussion.
https://wikileaks.org/dnc-emails/emailid/7512
Re: BuzzFeed and DNC connection.
https://wikileaks.org/dnc-emails/emailid/10933
Draft linking news articles about trump to use as negative press.
https://wikileaks.org/dnc-emails/emailid/7586
Fwd: State Dinner Countdown.
https://wikileaks.org/dnc-emails/emailid/1901
Some chick is angry she hasn’t been given more stuff from the Obama administration…might be interesting to follow up.
Re: State Dinner Countdown.
https://wikileaks.org/dnc-emails/emailid/2946
Tim O’Brien: Trump’s Fixation on Inflating his Net Worth is a Cause for Concern.
https://wikileaks.org/dnc-emails/emailid/4496
RE: May Fundraising Numbers.
https://wikileaks.org/dnc-emails/emailid/5615
https://wikileaks.org/dnc-emails/emailid/7720
Hillary for America Raised $26.4 Million in April, Began May with More than $30 Million Cash on Hand.
https://wikileaks.org/dnc-emails/emailid/13986
Re: For approval: Trump supporter graphics.
https://www.wikileaks.org/dnc-emails/emailid/788
Press talking points, states Hillary is their candidate, dated May 5, 2016. More of a smoking gun than the ambiguous talk in the emails themselves.
https://wikileaks.org/dnc-emails/fileid/5254/2728
Consultant calling megyn kelly a bimbo. Has PDF attached that says the same.
https://wikileaks.org/dnc-emails/emailid/6087
DNC trying to get away with violating the Hatch Act.
https://wikileaks.org/dnc-emails/emailid/20148
Democrats using interns to organize fake “protests.”
https://wikileaks.org/dnc-emails/emailid/13830
RE: Action on DNC tomorrow (Immigration Raids).
https://www.wikileaks.org/dnc-emails/emailid/9736

The Democratic National Convention may be over before it even starts.

facebook spy eye

VIDEO: Facebook Using a ‘Blacklist’ to Block Freedom of Speech?

According to the Frequently Asked Questions on the Facebook (FB) website, “Founded in 2004, Facebook’s mission is to give people the power to share and make the world more open and connected. People use Facebook to stay connected with friends and family, to discover what’s going on in the world, and to share and express what matters to them.”

Is Facebook living by its mission statement?

Gizmodo posted a YouTube video stating, “Facebook workers routinely suppressed news stories of interest to conservative readers from the social network’s influential ‘trending’ news section, according to a former journalist who worked on the project.” Watch the Gizmodo video expose to learn more:

I recently posted a column titled FACEBOOK: You have been temporarily blocked from performing this action! Since the beginning of the presidential primary season Facebook has repeatedly blocked me from posting on pages that have given me permission to do so. I wrote, “Facebook and/or some individuals are using this administrative tool to block conservative citizen journalists, like myself, from posting links to articles they disagree with.” It appears my fears are true.

Gizmodo’s Michael Nunez reports:

Facebook workers routinely suppressed news stories of interest to conservative readers from the social network’s influential “trending” news section, according to a former journalist who worked on the project.

[ … ]

In other words, Facebook’s news section operates like a traditional newsroom, reflecting the biases of its workers and the institutional imperatives of the corporation. Imposing human editorial values onto the lists of topics an algorithm spits out is by no means a bad thing—but it is in stark contrast to the company’s claims that the trending module simply lists “topics that have recently become popular on Facebook.”

[ … ]

“Depending on who was on shift, things would be blacklisted or trending,” said the former curator.

Facebook is using all of its tools to stop those who post news stories that it disagrees with. From using the temporary blocking tool to actually blacklisting certain news stories of a conservative nature.

Perhaps the Facebook founders, senior leaders and workers need to read their own mission statement. To discover what’s going on in the world, and to share and express what matters to us requires an open platform. One based upon the ideal of freedom of expression.

Time to return the power “to share and make the world more open” to the people, who are Facebook.

happy face sunglasses military cap

The War on Emojis by Gary McGath

Emoji are little picture symbols seen in text messages or social-media posts. Cute as they are, they’re often a center of controversy, and the Indonesian government has banned some of them, threatening to block access to websites that don’t cooperate.

Emoji is a Japanese word meaning “picture characters.” The word isn’t related to “emoticon,” a punctuation sequence used for expressing feelings, even though they sound similar.

There are emoji for all kinds of situations, and the Unicode standard for international text encoding has adopted many of them. Unicode includes modifier codes that allow the creation of composite emoji, so there’s a lot of room for creativity. Services can define their own emoji as well.

Inevitably, people have devised emoji representing same-sex relationships. Some of these, such as “two men holding hands” (👬), are part of the Unicode standard. Others, such as “man kissing man” (👨‍❤️‍💋‍👨), are composites.

This has drawn the ire of Indonesia’s Ministry of Communication and Informatics. It pressured Line, a major Japanese social network, to block these emoji, and it is now “asking” Facebook to do the same. If it doesn’t comply, the Negative Content Management Panel may block all access to Facebook in Indonesia. Because emoji use specific character codes, software can selectively block forbidden ones.

Indonesia has couched its censorship demands in terms of the “right” not to be offended. A government spokesperson has said that “such contents are not allowed in Indonesia based on our cultural law and the religious norms and the operators must respect that.”

Line has responded in kind, saying it “regrets the incidents of some stickers which are considered sensitive by many people … We ask for your understanding because at the moment we are working on this issue to remove the stickers.” (In this context, “stickers” means emoji.)

The Russian government recently considered legal action against Apple for including gay-oriented emoji in its iOS devices, but ironically decided against it because the symbols can be used with negative connotations as well as positive ones. Russian law prohibits “propaganda” for nontraditional sexual relationships where minors can see it — essentially, everywhere. The Russian investigation also covered emoji depicting cigarettes and alcoholic drinks, though it didn’t suggest banning the words for these things.

While things aren’t nearly this bad in the United States, authorities here sometimes crack down on emoji. The Washington Post reports that the Fairfax, Virginia police brought charges of harassment and threatening a school against a 12-year-old girl who made an Instagram post with gun (🔫), knife (🔪), and bomb (💣) emoji. Time mentions a case in which a teenager was charged with a terrorist threat for a Facebook post with gun emoji pointing at a police officer emoji (👮).

It’s become routine for governments to censor the Internet by blocking, or threatening to block, websites that don’t comply with their demands. The European Union has decreed a “right to be forgotten,” under which search engines can be forbidden to return links to factually correct information that an EU resident doesn’t want seen. Recently, Google agreed to block all results linking to forbidden information when accessed from an EU country.

Banning Unicode emoji seems petty in comparison, but it’s consistent with the idea that people should be shielded from seeing anything they find offensive. People who try to censor “offensive” content imagine that they’ll always be the arbiters of what’s offensive, but their own ideas will undoubtedly offend other people, and which expressions are banned depends only on who holds the power.

Gary McGathGary McGath

Gary McGath is a freelance software engineer living in Nashua, New Hampshire.

Islamic-State-Caliphate-Cyber-Army-1-HP

Islamic State ‘Caliphate Cyber Army’ Posts ‘Hit List’ of Minnesota Cops

The Islamic State’s Caliphate Cyber Army posted a “kill list” of names, addresses and other personal details of 36 policemen in Minnesota.

The FBI confirmed the list included full names, phone numbers, home and email addresses. The agency is investigating how the information came to be posted online.

The website Vocativ, which conducts investigations on the “Deep Web,” says individual cards with the information on them were shared through the mobile phone app Telegram, an encrypted messaging service (similar to Whats App).

“It is troubling to have that type of information online for the public to see,” FBI spokesperson Kyle Loven said.

Officer safety is the agency’s first concern, Loven added.

“We’re not going to look into whether or not this is a legitimate threat or an illegitimate threat,” he continued. “We’re going to take it and move forward with respect to what it is that we have to do in addressing this matter.”

Minnesota police officers confirmed their site had been hacked and the officers listed were those employers who had requested a quote for auto insurance,CBS local news in Minnesota reported.

The FBI advised officers on the list to maintain a heightened state of awareness “in case there would be someone who, unfortunately, would be inspired by this type of information being available,” Loven said.

The fact that Islamic extremists in Minnesota have successfully recruited and trained terrorists in the past is being taken into consideration by the FBI.

Most of the officers on the list live in or around the Twin Cities (Minneapolis and St. Paul). The area’s Cedar Riverside neighborhood is home to the largest Somali community in the U.S. Since 2007, 24 men from Cedar Riverside have left the community to join extremist groups.

According to a congressional report released last November, one in four Americans who have attempted to joined the Islamic State are from Minnesota.

The Caliphate Cyber Army (CCA) has previously hacked into sensitive material on a number of occasions:

  • Last week, the CCA published a file containing information on 55 New Jersey police officers. The file was downloaded 300 times in 24 hours.
  • Also last week, the CCA posted a threat to financial institutions, saying they would target “banks, money transfer services, stocks and so on.” The threat, made on the group’s Telegram channel, continued, “Beware of us, economical war has just started.”
  • In November, a group called the Islamic State Cyber Army posted names and addresses of a number of people who have worked for American security agencies (although some of the details were already public).
  • In October, a UK citizen connected with the Islamic State published the home address of Robert O’Neill, the Navy Seal who killed Osama Bin Laden.
  • In January, 2015, ISIS hackers were able to command the YouTube and Twitter accounts of the U.S. Army’s Central Command.

RELATED ARTICLES:

Social Media Emerges as a Valuable Terrorist Fundraising Tool by Abha Shankar

Guidelines for a National Cyber Strategy

Kerry: Not Enough Information to Call ISIS Attacks Genocide

VIDEO: ISIS Orphans – A Next-Gen Recruiting Ground?

ISIS Releases Video of Burning Christian Books

Women in Raqqa Make Secret Film: Life Under ISIS