End the Lie

The end of freedom, sovereignty, and privacy in the age of the internet

Decrease Font Size Increase Font Size Text Size Print This Page

By End the Lie

Technology is a wonderful gift and undoubtedly makes our lives easier and more convenient, but is there a darker side to the internet? With recent numerous “hacktivist” groups targeting high profile targets and declaring all-out war on the government, the leadership of the world has gained support in their efforts to complete the total lockdown and monitoring of the internet.

Not only is the future of the internet threatening our right to privacy and our Constitutional rights, especially the First and Fourth Amendments, it is also eroding national sovereignty. This is nothing new, and as I have covered in previous articles, global governance is already here. However, internet crimes seem to provide a popular platform for these egregious violations of sovereignty that go on uncontested.

Ryan Cleary, the 19-year-old from Britain accused of assisting LulzSec in their hacks of the CIA and SOCA (Britain’s Serious and Organized Crime Agency), is likely going to be charged in British courts and then extradited to the United States to face further charges as well. Currently, Cleary could be sentenced for up to 10 years, but as I reported in my article about how LulzSec is building support for draconian internet legislation, the Obama administration is attempting to double this maximum sentence.

These practices will almost definitely be leveraged to send hackers around the world to various “kangaroo courts” in order to build up lifetime sentences for all of the countries in which they committed a crime. One might also be concerned about the ease with which data can be remotely planted on a computer or how IPs and other computer-fingerprints could be modified after the fact. Police currently have no problem planting evidence; I would be surprised if the government did not take advantage of their ability to frame “hacktivists” who do not play along.

There are already visible rifts in the LulzSec group, with private chat logs and personal information being revealed en masse. The unverified report of military counter intelligence operatives in their ranks does not help this infighting either.

As the days go by this situation just get murkier, now an exclusive report to Fox News claims that TeaMp0isoN (Team Poison), which is “a group of professional hackers,” is attempting to expose the members of LulzSec before international law enforcement agencies do. Team Poison is allegedly associated with the “Mujahideen Hacking Unit,” a “Palestinian-friendly” (something which only the Western mainstream media would find worth emphasizing) group who is also associated with the “Pakistan Cyber Army.”

Apparently the main motivation for this “anti-U.S., anti-Israel and anti-India” group of hackers is their anger over the childish, basic tactics employed by the LulzSec group. This is one factor that has stopped me short of declaring that LulzSec is undoubtedly a red team or a government sponsored operation. They are mostly utilizing simple hacking scripts coded by skilled hackers and programmers to carry out Denial of Service attacks to just knock down a website for a short amount of time as they did with CIA.gov.

Within the hacking world these individuals are often referred to as script-kiddies or “skiddies” due to the fact that they are often teenagers with no real hacking experience who just use pre-compiled scripts created by much persons with significantly more knowledge and experience. It seems that Team Poison has taken great issue with this and is seeking to reveal these skiddies’ identities before the government does. This would be a major success, especially given that it shows they are smarter, better and faster than the international cybercrime agencies that are funded with billions in taxpayer money.

However, LulzSec also seems capable of carrying out more sophisticated operations, evidenced by their breach of the FBI affiliate InfraGard’s Atlanta branch. While this isn’t comparable to, say, the Agent.btz breach of interior Pentagon secured military networks; it is still unlikely that teenagers with no real hacking skills could cleanly pull it off.

So what is the impact for everyday people like you and me who do not participate in hacking or any other illegal activities but simply appreciate our privacy and right to be safe in our persons and belongings?

For starters, there is the recently revealed immense classified surveillance program codenamed Romas/COIN (which will soon be replaced by the Odyssey program) which monitors massive amounts of data and stores highly sensitive private information. This program was revealed through the leak of 70,000 e-mails sent by the government cybersecurity contracting firm, HBGary Federal.

The above linked article breaks down the implications and details of the Counter Intelligence (COIN) program, and I highly recommend that you read it in full. We know that the globalist Big Brother search engine Google and Apple were allied with this effort and there are indications that the telecom giant AT&T was as well. The further you travel down this rabbit hole of secret intelligence programs funded by American taxpayers which, as the article points out are “in some cases […] used against that very same public,” the more insane it gets.

This operation was so far-reaching that it is almost unbelievable; if this were not heavily documented then even I might relegate this one to improbable conspiracy theory territory. The program was program was investigating the hiring of a “gaming developer” to utilize social gaming platforms for surveillance and data collation on top of the monitoring of every other form of communication. It is clear through the mentions of “linguistic services” that this program is going to be, or already is, heavily used in the Middle East and elsewhere throughout the world where Western intelligence agencies and their unaccountable corporate partners desire to stick their grubby paws.

The list of corporations and groups involved in this program is nothing short of staggering, here are some of the parties involved, not including U.S. military personnel (note: PMO stands for Project Management Office, I have also added the relevant links for your convenience if you want to pursue more in-depth research on these corporations):

–          TASC (PMO, creative services) http://www.tasc.com/

–          HB Gary (Strategy, planning, PMO) http://www.hbgary.com/

–          Akamai (infrastructure) http://www.akamai.com/

–          Archimedes Global (Specialized linguistics, strategy, planning) http://www.archimedesglobal.com/

–          Acclaim Technical Services (specialized linguistics) http://www.acclaimtechnical.com/

–          Mission Essential Personnel (linguistic services) http://www.missionep.com/

–          Cipher (strategy, planning operations) http://www.cipher-sys.com/

–          PointAbout (rapid mobile application development, list of strategic partners) http://www.pointabout.com/

–          Google (strategy, mobile application and platform development – long list of strategic partners) http://www.google.com/

–          Apple (mobile and desktop platform, application assistance -long list of strategic partners) http://www.apple.com/

–          Possibly AT&T, unconfirmed at time of writing http://att.com/

It is very likely that there are other agencies and groups involved that were not revealed in the e-mail leak.

So what do you think? Are you worried that the internet is becoming a tool for invasions of privacy, the destruction of national sovereignty, and total surveillance? Or do you think that this just much ado about nothing? Let us know what you think below!

Leave a Reply

Your email address will not be published.

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>