Tuesday, July 9, 2013

Broward Sheriff's Office taking threats of riots seriously if Zimmerman found not guilty in murder case involving decedent Travyon Martin..... Michael Hasting cover up continues - police and fireman ordered not to speak about Hasting crash..... inexplicable police beating report of the day..... surveillance stories of the day ( which don't make us safer anyway - but which isn't the point really. ) ......... Weaponized drones over Americ - wait until the next " Other Event " , those armed drones will be flying - Predators and Reapers .......

http://www.infowars.com/florida-sheriff-taking-rioting-threats-seriously-as-zimmerman-acquittal-appears-likely/


Florida Sheriff Taking Riot Threats Seriously As Zimmerman Acquittal Appears Likely

  •  The Alex Jones ChannelAlex Jones Show podcastPrison Planet TVInfowars.com TwitterAlex Jones' FacebookInfowars store
Miami-area sheriff’s office talking to federal agencies and asking residents not to riot.
Kit Daniels
Infowars.com
July 9, 2013
The Broward Sheriff’s Office, whose jurisdiction includes a large portion of the Miami metropolitan area, released a video yesterday urging residents not to riot in response to the Travyon Martin shooting trial which now appears to lean heavily in George Zimmerman’s favor.
“Let’s give violence a rest because we could easily end up arrested,” one of the performers in the video said. “Law enforcement has your back.”
“Let’s back up and choose not to act up and deputies are with us so no need to act tough.”
The video’s web site states that the sheriff’s office Strategic Investigation Division has been communicating to not only community leaders but also local, state, and federal agencies.
Could potential federal response be similar to the martial law encountered earlier this year in Boston?
Miami is not taking the threats of riots lightly. The city experienced one of the worst race riots in history after the May 1980 acquittal of four police officers in the death of African-American Arthur McDuffie.
Damages from that riot were estimated at $100 million.
The Miami metropolitan area had a population of around 3.2 million then. It’s over 5.5 million now.
Fox News reports that a forensic expert revealed that the trajectory of the bullet and Martin’s gunshot wound indicates Martin was on top of Zimmerman.
“The medical evidence is consistent with his statement,” Dr. Vincent Di Maio told the court regarding Zimmerman’s account of the shooting.
Discoveries found during Martin’s autopsy, such as abrasions on his clenched hands, could also support Zimmerman’s recollection of the shooting, according to USA Today.
The prosecution rested their case on Friday and the defense is expected to rest their case later this week.
As reported by Paul Joseph Watson yesterday, threats of mass rioting and violence in the aftermath of the Zimmerman trial are intensifying as the key terms “riot” and “Zimmerman” continue to bring higher and higher search results on Twitter.
The Miami Herald even reported that the Miami-Dade Community Relations Board reached out to the Miami Heat, asking them to perform a “unity walk” to try and calm unrest.
“There is unrest in the south. I think it’s a powder keg,” Rev. Al Jackson told the Miami Herald. “People are looking for outlets.”
Zimmerman, 29, pleaded not guilty to the charge of second-degree murder, which could mean life in prison if convicted. Under Florida statute, second-degree murder constitutes having a “depraved mind regardless of human life.”


http://www.infowars.com/police-firefighters-ordered-not-to-speak-about-michael-hastings-crash/

Police, Firefighters Ordered Not To Speak About Michael Hastings Crash

  •  The Alex Jones ChannelAlex Jones Show podcastPrison Planet TVInfowars.com TwitterAlex Jones' FacebookInfowars store
LAPD refuses to release police report to journalists
Paul Joseph Watson
Infowars.com
July 9, 2013
Police and firefighters in Los Angeles have been ordered not to speak to the media about the deadly crash involving Rolling Stone journalist Michael Hastings, fueling speculation that some form of cover-up could be underway.
San Diego 6 journalist Kimberly Dvorak says she was unable to obtain the police report concerning the crash despite the fact that the LAPD already ruled out “foul play” days after the incident.
A gag order has also been placed on cops and firefighters who both responded to and investigated the crash, which occurred in the early hours of June 18 in the Hancock Park neighborhood of Los Angeles.
“When you go to the LA police department and you go to the fire department….they all said they couldn’t comment and some of them said they were told not to comment on this story,” said Dvorak.
The journalist added that she talked to “military personnel” who commented that the inferno which consumed Hastings’ Mercedes was an extremely hot fire that “is not something you normally see with a car like this,” and that Mercedes itself was waiting to hear from the LAPD but has not been contacted.
Dvorak also noted that the engine from Hastings’ vehicle was found 150 feet behind the car, contradicting testimony from two university physics professors who said that “the engine would go with the forward velocity of the (vehicle).”
HIghlighting the absence of skid marks on the road, Dvorak said she was inclined to surmise that the car either malfunctioned or “there was something on the car that allowed that to trigger and blow up,” noting that Mercedes denied their vehicle could have exploded in the manner seen in the incident that killed Hastings.
Dvorak also mentioned two separate academic studies out of the University of Washington and the University of California, San Diego which both detail how modern cars can easily be hacked and remote controlled, a premise also raised by former counter-terror czar Richard Clarke, who told the Huffington Post that the fatal crash of Hastings’ Mercedes C250 Coupe was “consistent with a car cyber attack.”
As we previously reported, questions surrounding Hastings’ untimely death have emerged primarily because the journalist was working on “the biggest story yet” about the CIA before he was killed.
The writer also sent out an email 15 hours before his car crash stating he was “onto a big story” and needed “to go off the rada[r] for a bit.”
According to colleagues, Hastings was “incredibly tense and very worried, and was concerned that the government was looking in on his material,” and also a “nervous wreck” in response to the surveillance of journalists revealed by the AP phone tapping scandal and the NSA PRISM scandal.
After Wikileaks reported that Hastings had contacted them a few hours before his death complaining that he was under FBI investigation, other friends confirmed that the journalist was “very paranoid” about the feds watching him.
Another close friend of Hastings, Staff Sergeant Joseph Biggs, told Fox News that Hastings “drove like a grandma” and that it was totally out of character for him to be speeding in the early hours of the morning.
Hastings had made numerous powerful enemies as a result of his exposure of Gen. Stanley A. McChrystal in 2010, receiving several death threats in the process.




http://www.infowars.com/honor-student-inexplicably-beaten-by-police-i-awoke-spitting-my-teeth-out-on-the-ground/



Honor Student Inexplicably Beaten by Police “I Awoke Spitting My Teeth Out On the Ground”

  •  The Alex Jones ChannelAlex Jones Show podcastPrison Planet TVInfowars.com TwitterAlex Jones' FacebookInfowars store
Yolanda Spivey
yourblackworld.net
July 9, 2013
On June 29th 2013, Gabriella Calhoun’s life changed forever. The night was warm and clear, and after partying with friends, Gabriella and her friends decided to go to their local neighborhood Denny’s to get a late night meal. Gabby is an honor student at Wiley College. She finished high school a year early and went to college a year before the rest of her cohort.
Sitting on the left side of Denny’s so they can have a view of the parking lot, her crew of 17, all high school graduates, witnessed a fight between two girls. As the group of college bound students were ordering their drinks, the cops were called.
When officers arrived on the scene, they entered the Denny’s and approached Gabriella’s table and asked if they had anything to do with the fight. A friend, who shall remain nameless, told the officers that they were not involved with the fight at all at which the cops left and went back outside.
The two girls who were fighting outside were allowed to go into the Denny’s to “clean themselves up.” One girl was previously maced by a police officer in the parking lot for acting unruly. When the two girls saw each other inside of Denny’s, they started to fight again. The cops rushed into the restaurant to break the fight up.
As the cops tried to clear Denny’s, they again approached Gabriella’s table, at which a close friend of hers told the cops they were not involved with the party that was fighting. The cops grabbed the nameless young man, (he wants his name protected out of fear of retaliation), and escorted him out of Denny’s. Gabriella followed them and grabbed his side. As she exited the Denny’s she felt a grip on her neck and arm and says that out of reaction, she tried to pull away.
What happened next was unimaginable. According to her friends, Gabriella was hit in the face with a night stick by a female officer and was knocked unconscious. When Gabriella finally gained consciousness, the Wiley College Student said, “I awoke spitting my teeth out on the ground.”

Read more


http://www.infowars.com/surveillance-society-if-you-drive-you-get-tracked/


Surveillance Society: If You Drive, You Get Tracked

  •  The Alex Jones ChannelAlex Jones Show podcastPrison Planet TVInfowars.com TwitterAlex Jones' FacebookInfowars store
Wolf Richter
testosteronepit.com
July 8, 2013
We’ve been teased for weeks with tantalizing leaks about the NSA, its cohorts in corporate America, and their programs and technologies that capture, store, and mine vast amounts of our personal data obtained from the internet and telecommunications. Data is power. And money. It’s for our own good, we’re told incessantly.
There are also physical aspects, like video surveillance with facial-recognition technologies and smartphone detectors to let your favorite retail store know when you – in true name – are looking at their display. Then there’s a technology that surreptitiously captures practically everyone out on the street, combines that data with other data, and makes it available to government agencies.
Palantir Technologies is the quintessential Silicon Valley startup. Its website is graced with photos of purposefully goofy but smart-looking young people: a guy in shorts and flips flops, feet propped against the conference-room table; a guy cradling a pooch; a guy holding a fixed-gear bike; a girl resting a saddle on a fence…. “We’re all engineers,” it says. They hosted the Girl Geek Dinner #32. The kind of company that makes Silicon Valley great.


http://www.infowars.com/the-fact-that-mass-surveillance-doesnt-keep-us-safe-goes-mainstream/

The Fact that Mass Surveillance Doesn’t Keep Us Safe Goes Mainstream

  •  The Alex Jones ChannelAlex Jones Show podcastPrison Planet TVInfowars.com TwitterAlex Jones' FacebookInfowars store
Washington’s Blog
July 9, 2013
The fact that mass spying on Americans isn’t necessary to keep us safe is finally going mainstream.
The top counter-terrorism czar under Presidents Clinton and Bush – Richard Clarke – says:
The argument that this sweeping search must be kept secret from the terrorists is laughable. Terrorists already assume this sort of thing is being done. Only law-abiding American citizens were blissfully ignorant of what their government was doing.
***
If the government wanted a particular set of records, it could tell the Foreign Intelligence Surveillance Court why — and then be granted permission to access those records directly from specially maintained company servers. The telephone companies would not have to know what data were being accessed. There are no technical disadvantages to doing it that way, although it might be more expensive.
Would we, as a nation, be willing to pay a little more for a program designed this way, to avoid a situation in which the government keeps on its own computers a record of every time anyone picks up a telephone? That is a question that should have been openly asked and answered in Congress.
William Binney – the head of NSA’s digital communications program – says that he set up the NSA’s system so that all of the information would automatically be encrypted, so that the government had to obtain a search warrant based upon probably cause before a particular suspect’s communications could be decrypted. But the NSA now collects all data in an unencrypted form, so that no probable cause is needed to view any citizen’s information. He says that it is actually cheaper and easier to store the data in an encrypted format: so the government’s current system is being done for political – not practical – purposes. Binney’s statements have been  confirmed by other high-level NSA whistleblowers.
Binney also says:
NSA whistleblower J. Kirk Wiebe has long said that such intrusions on Americans’ privacy were never necessary to protect national security.  NSA whistleblower Thomas Drake agrees. So does NSA whistleblower Russell Tice.
Israeli-American terrorism expert Barry Rubins points out:
What is most important to understand about the revelations of massive message interception by the U.S. government is this:
In counterterrorist terms, it is a farce. Basically the NSA, as one of my readers suggested, is the digital equivalent of the TSA strip-searching an 80 year-old Minnesota grandmothers rather than profiling and focusing on the likely terrorists.
***
And isn’t it absurd that the United States can’t … stop a would-be terrorist in the U.S. army who gives a power point presentation on why he is about to shoot people (Major Nadal Hassan), can’t follow up on Russian intelligence warnings about Chechen terrorist contacts (the Boston bombing), or a dozen similar incidents must now collect every telephone call in the country? A system in which a photo shop clerk has to stop an attack on Fort Dix by overcoming his fear of appearing “racist” to report a cell of terrorists or brave passengers must jump a would-be “underpants bomber” from Nigeria because his own father’s warning that he was a terrorist was insufficient?
And how about a country where terrorists and terrorist supporters visit the White House, hang out with the FBI, advise the U.S. government on counter-terrorist policy (even while, like CAIR) advising Muslims not to cooperate with law enforcement….
***
Or how about the time when the U.S. Consulate in Jerusalem had a (previously jailed) Hamas agent working in their motor pool with direct access to the vehicles and itineraries of all visiting US dignitaries and senior officials.
***
Suppose the U.S. ambassador to Libya warns that the American compound there may be attacked. No response. Then he tells the deputy chief of mission that he is under attack. No response. Then the U.S. military is not allowed to respond. Then the president goes to sleep without making a decision about doing anything because communications break down between the secretaries of defense and state and the president, who goes to sleep because he has a very important fund-raiser the next day. But don’t worry because three billion telephone calls by Americans are daily being intercepted and supposedly analyzed.
In other words, you have a massive counterterrorist project costing $1 trillion but when it comes down to it the thing repeatedly fails. In that case, to quote the former secretary of state, “”What difference does it make?”
If one looks at the great intelligence failures of the past, these two points quickly become obvious. Take for example the Japanese surprise attack on Pearl Harbor on December 7, 1941. U.S. naval intelligence had broken Japanese codes. They had the information needed to conclude the attack would take place. [Background.] Yet a focus on the key to the problem was not achieved. The important messages were not read and interpreted; the strategic mindset of the leadership was not in place.
***
And remember that the number of terrorists caught by the TSA hovers around the zero level. The shoe, underpants, and Times Square bombers weren’t even caught by security at all and many other such cases can be listed. In addition to this, the U.S.-Mexico border is practically open.
**
The war on al-Qaida has not really been won, since its continued campaigning is undeniable and it has even grown in Syria, partly thanks to U.S. policy.
***
So the problem of growing government spying is three-fold.
–First, it is against the American system and reduces liberty.
–Second, it is a misapplication of resources, in other words money is being spent and liberty sacrificed for no real gain.
–Third, since government decisionmaking and policy about international terrorism is very bad the threat is increasing.
Senators Wyden and Udall – both on the Senate Intelligence Committee, with access to all of the top-secret information about the government’s spying programs – write:
“We are quite familiar with the bulk email records collection program that operated under the USA Patriot Act and has now been confirmed by senior intelligence officials. We were very concerned about this program’s impact on Americans’ civil liberties and privacy rights, and we spent a significant portion of 2011 pressing intelligence officials to provide evidence of its effectiveness. They were unable to do so ….
***
In our judgment it is also important to note that intelligence agencies made statements to both Congress and the Court that significantly exaggerated this program’s effectiveness. This experience demonstrates to us that intelligence agencies’ assessments of the usefulness of particular collection programs – even significant ones – are not always accurate. This experience has also led us to be skeptical of claims about the value of the bulk phone records collection program in particular.
***
Assertions from intelligence agencies about the value and effectiveness of particular programs should not simply be accepted at face value by policymakers or oversight bodies any more than statements about the usefulness of other government programs should be taken at face value when they are made by other government officials. It is up to Congress, the courts and the public to ask the tough questions and press even experienced intelligence officials to back their assertions up with actual evidence, rather than simply deferring to these officials’ conclusions without challenging them.
NBC News reported 2 days ago:
“I’ve never liked the idea of security vs. privacy, because no one feels more secure in a surveillance state,” said Bruce Schneier, security expert and author of Beyond Fear: Thinking Sensibly About Security in an Insecure World. “There’s plenty of examples of security that doesn’t infringe on privacy. They are all around. Door locks. Fences … Firewalls. People are forgetting that quite a lot of security doesn’t affect privacy. The real dichotomy is liberty vs. control.”
Dan Solove, a privacy law expert at George Washington University Law School, said the privacy vs. security framing has interfered with what could be a healthy national debate about using high-tech tools to fight terror.
“You have pollsters and pundits and (National Intelligence Director James) Clapper saying, ‘Do you want us to catch the terrorists or do you want privacy?’ But that’s a false choice. It’s like asking, ‘Do you want the police to exist or not?’” he said. “We already have the most invasive investigative techniques permissible with the right oversight. With probable cause you can search my home. … People want limitations and transparency, so they can make a choice about how much surveillance (they) are willing to tolerate.”
By creating an either/or tension between privacy and security, government officials have invented a heavy weapon to wield against those who raise civil liberties concerns, he said. It’s easy to cast the choice in stark terms: Who wouldn’t trade a little personal data to save even one American life?
An honest, open examination of surveillance programs might show the choice is not so simple, says Ashkan Soltani, an independent security researcher.
“The government feels like they need all this information in order to do its job, that there can’t be security without them having access to everything. Well, that’s a lazy or shortsighted way of seeing things,” he says. “The idea I reject is that you need to violate everyone’s privacy rather than be better at your job of identifying specific (targets).’”
The debate over the U.S. government’s monitoring of digital communications suggests that Americans are willing to allow it as long as it is genuinely targeted at terrorists. What they fail to realize is that the surveillance systems are best suited for gathering information on law-abiding citizens.
***
The infrastructure set up by the National Security Agency, however, may only be good for gathering information on the stupidest, lowest-ranking of terrorists. The Prism surveillance program focuses on access to the servers of America’s largest Internet companies, which support such popular services as Skype, Gmail and iCloud. These are not the services that truly dangerous elements typically use.
In a January 2012 report titled “Jihadism on the Web: A Breeding Ground for Jihad in the Modern Age,” the Dutch General Intelligence and Security Service drew a convincing picture of an Islamist Web underground centered around “core forums.” These websites are part of the Deep Web, or Undernet, the multitude of online resources not indexed by commonly used search engines.
The Netherlands’ security service, which couldn’t find recent data on the size of the Undernet, cited a 2003 study from the University of California at Berkeley as the “latest available scientific assessment.” The study found that just 0.2 percent of the Internet could be searched. The rest remained inscrutable and has probably grown since. In 2010, Google Inc. said it had indexed just 0.004 percent of the information on the Internet.
Websites aimed at attracting traffic do their best to get noticed, paying to tailor their content to the real or perceived requirements of search engines such as Google. Terrorists have no such ambitions. They prefer to lurk in the dark recesses of the Undernet.
“People who radicalise under the influence of jihadist websites often go through a number of stages,” the Dutch report said. “Their virtual activities increasingly shift to the invisible Web, their security awareness increases and their activities become more conspiratorial.”
***
Communication on the core forums is often encrypted. In 2012, a French court found nuclear physicist Adlene Hicheur guilty of, among other things, conspiring to commit an act of terror for distributing and using software called Asrar al-Mujahideen, or Mujahideen Secrets. The program employed various cutting-edge encryption methods, including variable stealth ciphers and RSA 2,048-bit keys.
***
Even complete access to these servers brings U.S. authorities no closer to the core forums. These must be infiltrated by more traditional intelligence means, such as using agents posing as jihadists or by informants within terrorist organizations.
Similarly, monitoring phone calls is hardly the way to catch terrorists. They’re generally not dumb enough to use Verizon.
***
At best, the recent revelations concerning Prism and telephone surveillance might deter potential recruits to terrorist causes from using the most visible parts of the Internet. Beyond that, the government’s efforts are much more dangerous to civil liberties than they are to al-Qaeda and other organizations like it.
(And see this.)
Mass Spying Actually HURTS – Rather than Helps – Anti-Terror Efforts
Not yet convinced?
Former NSA executive William Binney – who was the head of the NSA’s entire digital spying program –told Daily Caller that the spying dragnet being carried out by the government is less than useless:
Daily Caller: So it seems logical to ask: Why do we need all of this new data collection when they’re not following up obvious leads, such as an intelligence agency calling and saying you need to be aware of this particular terrorist?
Binney: It’s sensible to ask, but that’s exactly what they’re doing. They’re making themselves dysfunctional by collecting all of this data. They’ve got so much collection capability but they can’t do everything.
***
[All this data gathered is] putting an extra burden on all of their analysts. It’s not something that’s going to help them; it’s something that’s burdensome. There are ways to do the analysis properly, but they don’t really want the solution because if they got it, they wouldn’t be able to keep demanding the money to solve it. I call it their business statement, “Keep the problems going so the money keeps flowing.” It’s all about contracts and money.
***
The issue is, can you figure out what’s important in it? And figure out the intentions and capabilities of the people you’re monitoring? And they are in no way prepared to do that, because that takes analysis. That’s what the big data initiative was all about out of the White House last year. It was to try to get algorithms and figure out what’s important and tell the people what’s important so that they can find things. The probability of them finding what’s really there is low.
Indeed, even before 9/11 – when Binney was building the precursor to the NSA’s current digital collection system – there weren’t enough analysts to look through the more modest amount of data being collected at the time:
The danger of the mass collection of data by the NSA is that it “buries” analysts in data, said Binney, who developed a surveillance program called ThinThread intended to allow the NSA to look at data but not collect it. The NSA dumped that program in favor of more extensive data collection.
“The biggest problem was getting data to a manageable level,” he said. “We didn’t have enough people, we couldn’t hire enough people east of the Mississippi to manage all the data we were getting.”
Terrorism expert Barry Rubins writes:
There is a fallacy behind the current intelligence strategy of the United States, the collection of massive amounts of phone calls, emails, and even credit card expenditures, up to 3 billion phone calls a day alone, not to mention the government spying on the mass media. It is this:
The more quantity of intelligence, the better it is for preventing terrorism.
In the real, practical world this is—though it might seem counterintuitive—untrue. You don’t need–to put it in an exaggerated way–an atomic bomb against a flea. The intelligence budget is not unlimited, is it? Where should hiring priorities be put?
***
It is not the quantity of material that counts but the need to locate and correctly understand the most vital material. This requires your security forces to understand the ideological, psychological, and organizational nature of the threat.
***
If the U.S. government can’t even figure out what the Muslim Brotherhood is like or the dangers of supporting Islamists to take over Syria, or the fact that the Turkish regime is an American enemy, or can’t even teach military officers who the enemy is, what’s it going to do with scores of billions of telephone call traffic to overcome terrorism? It isn’t even using the intelligence material it already has!
If, however, the material is almost limitless, that actually weakens a focus on the most needed intelligence regarding the most likely terrorist threats. Imagine, for example, going through billions of telephone calls even with high-speed computers rather than, say, following up a tip from Russian intelligence on a young Chechen man in Boston who is in contact with terrorists or, for instance, the communications between a Yemeni al-Qaida leader and a U.S. army major who is assigned as a psychiatrist to Fort Hood.
That is why the old system of getting warrants, focusing on individual email addresses, or sites, or telephones makes sense, at least if it is only used properly. Then those people who are communicating with known terrorists can be traced further. There are no technological magic spells. If analysts are incompetent … and leaders unwilling to take proper action, who cares how much data was collected?
***
Decision-makers and intelligence analysts only have so many hours in the day. There can only be so many meetings; only so many priorities. And the policymaking pyramid narrows rapidly toward the top. There is a point of diminishing returns for the size of an intelligence bureaucracy. Lower-priority tasks proliferate; too much paper is generated and meetings are held; the system clogs when it has too much data.
PC World reports:
“In knowing a lot about a lot of different people [the data collection] is great for that,” said Mike German, a former Federal Bureau of Investigation special agent whose policy counsel for national security at the American Civil Liberties Union. “In actually finding the very few bad actors that are out there, not so good.”
The mass collection of data from innocent people “won’t tell you how guilty people act,” German added. The problem with catching terrorism suspects has never been the inability to collect information, but to analyze the “oceans” of information collected, he said.
Mass data collection is “like trying to look for needles by building bigger haystacks,” added Wendy Grossman, a freelance technology writer who helped organize the conference.
New Republic notes:
This kind of dragnet-style data capture simply doesn’t keep us safe.
First, intelligence and law enforcement agencies are increasingly drowning in data; the more that comes in, the harder it is to stay afloat. Most recently, the failure of the intelligence community to intercept the 2009 “underwear bomber” was blamed in large part on a surfeit of information: according to an official White House review, a significant amount of critical information was “embedded in a large volume of other data.” Similarly, the independent investigation of the alleged shootings by U.S. Army Major Nidal Hasan at Fort Hood concluded that the “crushing volume” of information was one of the factors that hampered the FBI’s analysis before the attack.
Multiple security officials have echoed this assessment. As one veteran CIA agenttold The Washington Post in 2010, “The problem is that the system is clogged with information. Most of it isn’t of interest, but people are afraid not to put it in.” A former Department of Homeland Security official told a Senate subcommittee that there was “a lot of data clogging the system with no value.” Even former Defense Secretary Robert Gates acknowledged that “we’ve built tremendous capability, but do we have more than we need?” And the NSA itself was brought to a grinding halt before 9/11 by the “torrent of data” pouring into the system, leaving the agency “brain-dead” for half a week and “[unable] to process information,” as its then-director Gen. Michael Hayden publiclyacknowledged.
National security hawks say there’s a simple answer to this glut: data mining. The NSA has apparently described its computer systems as having the ability to “manipulate and analyze huge volumes of data at mind-boggling speeds.” Could those systems pore through this information trove to come up with unassailable patterns of terrorist activity? The Department of Defense and security experts have concluded that the answer is no: There is simply no known way to effectively anticipate terrorist threats.
***
The FBI’s and NSA’s scheme is an affront to democratic values. Let’s also not pretend it’s an effective and efficient way of keeping us safe.
The evidence for big data is scant at best. To date, large fields of data have generated meaningful insights at times, but not on the scale many have promised. This disappointment has been documented in the Wall Street JournalInformation Week, andSmartData Collective.
***
According to my firm’s research, local farmers in India with tiny fields frequently outperform — in productivity and sustainability — a predictive global model developed by one of the world’s leading agrochemical companies. Why? Because they develop unique planting, fertilizing, or harvesting practices linked to the uniqueness of their soil, their weather pattern, or the rare utilization of some compost. There is more to learn from a local Indian outlier than from building a giant multivariate yield prediction model of all farms in the world. The same is true for terrorism. Don’t look for a needle in a giant haystack. Find one needle in a small clump of hay and see whether similar clumps of hay also contain needles.
You need local knowledge to glean insights from any data. I once ran a data-mining project with Wal-Mart (WMT) where we tried to figure out sales patterns in New England. One of the questions was, “Why are our gun sales lower in Massachusetts than in other states, even accounting for the liberal bias of the state?” The answer: There were city ordinances prohibiting the sale of guns in many towns. I still remember the disappointed look of my client when he realized the answer had come from a few phone calls to store managers rather than from a multivariate regression model.
So, please, Mr. President, stop building your giant database in the sky and quit hoping that algorithm experts will generate a terrorist prevention strategy from that data. Instead, rely on your people in the field to detect suspicious local patterns of behavior, communication, or spending, then aggregate data for the folks involved and let your data hounds loose on these focused samples. You and I will both sleep better. And I won’t have to worry about who is lurking in the shadows of my business or bedroom.
Security expert Bruce Schneier explained in 2005:
Many believe data mining is the crystal ball that will enable us to uncover future terrorist plots. But even in the most wildly optimistic projections, data mining isn’t tenable for that purpose. We’re not trading privacy for security; we’re giving up privacy and getting no security in return.
***
The promise of data mining is compelling, and convinces many. But it’s wrong. We’re not going to find terrorist plots through systems like this, and we’re going to waste valuable resources chasing down false alarms.
***
Data-mining systems won’t uncover any terrorist plots until they are very accurate, and that even very accurate systems will be so flooded with false alarms that they will be useless.
All data-mining systems fail in two different ways: false positives and false negatives.
***
Data mining for terrorist plots will be sloppy, and it’ll be hard to find anything useful.
***
When it comes to terrorism, however, trillions of connections exist between people and events — things that the data-mining system will have to “look at” — and very few plots. This rarity makes even accurate identification systems useless.
Let’s look at some numbers. We’ll be optimistic — we’ll assume the system has a one in 100 false-positive rate (99 percent accurate), and a one in 1,000 false-negative rate (99.9 percent accurate). Assume 1 trillion possible indicators to sift through: that’s about 10 events — e-mails, phone calls, purchases, web destinations, whatever — per person in the United States per day. Also assume that 10 of them are actually terrorists plotting.
This unrealistically accurate system will generate 1 billion false alarms for every real terrorist plot it uncovers. Every day of every year, the police will have to investigate 27 million potential plots in order to find the one real terrorist plot per month. Raise that false-positive accuracy to an absurd 99.9999 percent and you’re still chasing 2,750 false alarms per day — but that will inevitably raise your false negatives, and you’re going to miss some of those 10 real plots.
This isn’t anything new. In statistics, it’s called the “base rate fallacy,” and it applies in other domains as well. For example, even highly accurate medical tests are useless as diagnostic tools if the incidence of the disease is rare in the general population. Terrorist attacks are also rare, any “test” is going to result in an endless stream of false alarms.
This is exactly the sort of thing we saw with the NSA’s eavesdropping program: the New York Times reported that the computers spat out thousands of tips per month. Every one of them turned out to be a false alarm.
And the cost was enormous — not just for the FBI agents running around chasing dead-end leads instead of doing things that might actually make us safer, but also the cost in civil liberties.
***
Finding terrorism plots is not a problem that lends itself to data mining. It’s a needle-in-a-haystack problem, and throwing more hay on the pile doesn’t make that problem any easier. We’d be far better off putting people in charge of investigating potential plots and letting them direct the computers, instead of putting the computers in charge and letting them decide who should be investigated.
Schneier noted in 2008:
According to a massive report from the National Research Council, data mining for terrorists doesn’t work.
NBC News reports:
Casting such wide nets is also ineffective, [security researcher Ashkan Soltani] argues. Collecting mountains and mountains of data simply means that when the time comes to find that proverbial needle in a haystack, you’ve simply created a bigger haystack.”Law enforcement is being sold bill of goods that the more data you get, the better your security is. We find that is not true,” Soltani said.
Collecting data is a hard habit to break, as many U.S. corporations have discovered after years of expensive data breaches. The NSA’s data hoard may be useful in future investigations, helping agents in the future in unpredictable ways, some argue. Schneier doesn’t buy it.
“The NSA has this fetish for data, and will get it any way they can, and get as much as they can,” he said. “But old ladies who hoard newspapers say the same thing, that someday, this might be useful.”
Even worse, an overreliance on Big Data surveillance will shift focus from other security techniques that are both less invasive and potentially more effective, like old-fashioned “spycraft,” Soltani says.
Nassim Taleb writes:
Big data may mean more information, but it also means more false information.
***
Because of excess data as compared to real signals, someone looking at history from the vantage point of a library will necessarily find many more spurious relationships than one who sees matters in the making; he will be duped by more epiphenomena. Even experiments can be marred with bias, especially when researchers hide failed attempts or formulate a hypothesis after the results — thus fitting the hypothesis to the experiment (though the bias is smaller there).
If big data leads to more false correlations, then mass surveillance may lead to more false accusations of terrorism.


http://www.activistpost.com/2013/07/weaponized-drones-on-american-soil.html


Weaponized Drones on American Soil?

image source
Nicholas West
Activist Post

People were shocked in 2007 when Texas news KPRC revealed that local police were conducting drone tests on American soil. Some cried "conspiracy theory" even as further revelations quickly showed that a full program had been established with Customs and Border Protection as far back as 2004. Drone flights took advantage of the 100-mile-wide "Constitution-free Zone" around the perimeter of the United States within which drones were permitted to operate for border security -- two-thirds of the U.S. population happens to reside within this area.

The targeted killing of American citizens abroad jarred people enough to consider the "mission creep" taking place, finally wondering when strikes might land on American soil. Rand Paul pushed this "debate" into the mainstream with his much-publicized filibuster, though he later backed down by hedging his words within the definition of "imminent threat." Paul's comments drew severe criticism even from libertarians, prompting him to explain further. It's an important distinction to make clear, and is the same one left unresolved by the amendment to ban drone strikes on U.S. citizens in the 2014 National Defense Authorization Act.

So while it seems like a fierce debate is taking place, and plans to subvert the Constitution are being thwarted, every new stone overturned continues to reveal more. Rather than true debate, there has been a scramble for the public to catch up to what already has been done, much in the same way as the NSA spying story. So, what will the future bring?

For those who have been following this steady progression of drone use, as well as the continued development in high-tech "non-lethal" weapons, one might already have wondered when the two would officially merge over America. It appears that Homeland Security has also been considering this aspect behind closed doors for quite some time.

Congress already has given the FAA permission to establish safe flying rules for drones in civilian airspace throughout the U.S. by 2015.

The Electronic Frontier Foundation has been at the forefront of attempting to obtain documents under the Freedom of Information Act and through lawsuits that will show the full scope of what the military-industrial complex has in store for America. What they have found so far is quite disturbing.


So far, documents obtained by EFF have shown a massive ramp-up of drone surveillance across an array of agencies and "entities," which includes facial recognition and data collection. In their words,
According to the documents, CBP already appears to be flying drones well within the Southern and Northern US borders, and for a wide variety of non-border patrol reasons. What’s more — the agency is planning to increase its Predator drone fleet to 24 and its drone surveillance to 24 hours per day / 7 days per week by 2016. 
As the Concept of Operations report notes, CBP’s goal is that its drone data will be “persistently available” (p. 21) and interoperable (p. 29) — not just within CBP, but to other agencies, and also possibly to other countries. CBP plans that its “UAS will provide assured monitoring of entities along land borders, inland seas, littorals and high seas with sufficient frequency, continuity, accuracy, spectral diversity, and data content to produce actionable information. (p. 29) [emphasis added, source]
The new documents that EFF has obtained show a desire for that "actionable information" to translate into Predator drones equipped with "non-lethal weapons designed to immobilize targets of interest." And the documents are dated 2010. But even this is most likely the tip of the iceberg.

It was highlighted in 2011 that Homeland Security awarded a $300,00 grant to Texas law enforcement for Shadowhawk micro drones that could be equipped with, "taser batons, 37mm or 40mm grenade launchers or with 12 gauge shotgun rounds. Precision mini munitions could be added later to its threatening arsenal." So it's doubtful that non-lethal weapons are all there is to be concerned about. In fact, directed energy weapons can be deployed from the air via the Vigilant Eagle system developed by Raytheon among others.

Nevertheless, most Americans look at the drones-in-America debate as something entirely separate from what occurs overseas, and politicians are only too happy to make us forget. It has been repeatedly shown that more more innocent people are killed in the various undeclared wars and military actions than are those identified as enemies of the United States. Let's keep this in mind when we hear the term, "targets of interest."

The military apparatus has been busy studying ways to turn real human beings into unthinking automatons, while further increasing the distance between cause and effect. This is where the greatest danger really lies. It was perfectly shown in the horror revealed by the WikiLeaks"Collateral Murder" video.

As admitted by a drone operator below, it is a system that potentially creates a whole new generation of sociopaths. For him, he realized it too late -- 1,626 people too late.


As we move two steps forward and one step back in this so-called debate over how and where drones should be used, politicians seem to be serving only to maintain the pot at the right temperature to keep citizens from realizing the pot is heading to the boiling point. The powers-that-be are desperately hoping that we forget the central argument: remote-controlled machines of surveillance and war have no place in a supposedly civilized world. 

Unfortunately, most Americans have been trained through the inherent distance of media that these tools are needed to bring civilization to barbarous sections of the world. Sadly, those who have had their empathy removed might have a different perspective as the barbarity of Empire America is beginning to boomerang upon itself.


No comments:

Post a Comment