Over the last few months I've googled
Numerous Weapon Systems (I have a fascination with WW1, WWII and Cold War history - stuff like Black Arrow etc).
Insurgencies during the British Empire
Electronics (want to get back into and saw a fun project to make on reddit the other day) - http://www.youtube.com/watch?v=movVFYWheGM
Linux stuff (settings, security, the usual stuff a developer/system administrator would look at).
Programming stuff (relating to security, encryption etc)
NSA related material (following the story closely).
Setting up a VPN (so I can access Netflix US because Netflix UK is basically crap).
The US constitution and some case law.
NSA Report: "User noir_lord has an interest in privacy, weapons, insurgencies and excellent technical skills, user noir_lord should be monitored"
Where in reality I'm a 34 year old web developer from the North of England who enjoys history, techy stuff and playing with my cats.
Religion uses this, "don't think naughty thoughts, God will record it and you'll pay for it later". NSA is God except that NSA exists and is real.
Here your search is a bit like your thoughts. Any of those things you listed, possibly could have landed you on the "naughty list". So now you start to really worry about what you search for. If you can't research or find info about, well might as well not think about things at all at some point.
Before you used to go to the library. Except that they can monitor that too and it is terribly inefficient.
I grew up in Soviet Union and I remember being told by my parents not to mention or talk about certain things (criticizing the party, telling jokes about politics around strangers, ..., and so on). But at least you knew, if you are in the country side with your family you could crack jokes at the stupidity of bureaucracy. And then when I came here the big "selling" point of the country was "you have all this freedom, and this is something you really need, want and is the best thing in the world". But just like you, I started in the last 3-5 years to kind of think for a second before searching for things. Or when I write an email to a friend, I am careful if I am a bit too sarcastic or making a joke about the president or whatnot.
Not saying we'll end up in a labor camp anytime soon, but the tragedy is that this kind of control and monitoring so disturbing vis-a-vis propaganda and the expectations of what this country should be. In totalitarian regimes at least it is clear and understandable what is going on and what is expected of people. Here it is "freedom, dreams, realize yourself, pursue your happiness" but effectively what we think about is restricted.
Secret courts, no right to due process, no right to face your accuser, the presumption of guilt on political grounds, secret warrants, an out of control security apparatus, extra judicial killings, curtailing on the right to free protest, right to free speech...
Thanks to our reliance on modern communications and technology the state apparatus can assemble data warehouses that the most optimistic of STASI operatives wouldn't have even dreamed possible and we seem to be sleep walking into a police state more pervasive and insidious than anything we've ever seen.
"If you want a picture of the future, imagine a boot stamping on a human face — forever."
Unless... Snowden is an NSA operation to subtly begin exerting thought control! Brilliant! Now that I think about it, "Snowden" even sounds like a codename for an NSA operation.
http://benjamin.sonntag.fr/Moglen-at-Re-Publica-Freedom-of-t...
We begin therefore where they are determined not to end, with the question whether any form of democratic self-government, anywhere, is consistent with the kind of massive, pervasive, surveillance into which the Unites States government has led not only us but the world.
This should not actually be a complicated inquiry.
http://snowdenandthefuture.info/events.html
Surveillance is not an end toward totalitarianism, it is totalitarianism itself.
Reminds me of: http://youtu.be/-PSeAfSKQe4
The imagery is chill inducingly powerful.
You've got the right profile to be a "collateral damage" in case something goes wrong around you.
I realised afterwards it might look a tad suspicious if NSA/GCHQ/etc. picked up on it. Oh well.
If not then false positives are largely irrelevant.
I have some pretty strange internet searches as well, but the cat is already out of the bag on that one I guess.
And to repeat: the config file available from http://daserste.ndr.de/panorama/xkeyscorerules100.txt says:
/*
These variables define terms and websites relating to the TAILs (The Amnesic
Incognito Live System) software program, a comsec mechanism advocated by
extremists on extremist forums.
*/
Linux Journal is listed there, as a ‘website relating to TAILS’, not as an ‘extremist forum’. // START_DEFINITION
/*
These variables define terms and websites relating to the TAILs (The Amnesic
Incognito Live System) software program, a comsec mechanism advocated by
extremists on extremist forums.
*/
$TAILS_terms=word('tails' or 'Amnesiac Incognito Live System') and word('linux'
or ' USB ' or ' CD ' or 'secure desktop' or ' IRC ' or 'truecrypt' or ' tor ');
$TAILS_websites=('tails.boum.org/') or ('linuxjournal.com/content/linux*');
// END_DEFINITION
... assuming this file is even what it purports to be.I understand Hacker News users aren't likely to think critically when it comes to stories about the NSA but you would expect more of them could actually read code.
TAILS_terms=(word('tails')
and word('linux' or ' USB ' or ' CD'
or 'secure desktop' or ' IRC '
or 'truecrypt' or ' tor '))
or word('Amnesiac Incognito Live System');
because (1) you need to disambiguate the common word 'tails' but surely not the specific name 'Amnesiac Incognito Live System', and (2) you don't want to miss [tails CDROM].See how important code review is?
On the other hand, now that this is out, I think the NSA will suddenly have a ton more "extremists" to look at.
Let's say that in NSA's dictionary, extremist means "Anyone with even a small potential to alter the course of society, the economy, or technology."
Those people, plus a comfortable margin, might be 5% of the population. The NSA probably has the resources to examine all the electronic communications and do high-quality transcription of verbal communications of that 5%.
Even trying to make that targeting more selective would be, in the NSA's worldview "counterproductive."
Things have indeed been getting scarier by the minute. Interest in Linux is not treason, yet, but I cannot/dont rule out that it could be, for some value of 'Linux'.
Several trends in political/informatic/economic structures does seem to be headed towards the medieval side.
On a LUG mailing list I belong to we started using the term "command line extremist". I rather like it.
"The SELinux project was merged into the Linux Kernel back in 2003"
It's still listed on the NSA website in several areas: http://www.nsa.gov/research/_files/selinux/papers/x/x.shtml
To be honest though, if someone was downloading tails from region of know terrorist activity and such systems are actively promoted amongst terrorist sites then it obviously makes for a good target. But the Linux Journal ..comon.
We really should stop saying the NSA's targets are considered extremists. They watch everyone.
That's a contradiction. If you believe the latter, you don't think I'm right.
I think you would target high ranking politicians... because the option to blackmail them ensures you an uninterrupted and growing black budget.
You would target communications businesses... because compromising a properly placed employee grants you access to the sum total of customer and peer communications through their networks.
You would target media... because a jump on a popular change in public sentiment is very actionable intelligence, both to multiply funding (through investments prior to predictable market response), and to further control politics.
You would target diplomats... both for tradition's sake, and because borders are the most easily grasped us-and-them (divisive) tool in the post 20th century semantic playground, giving you options for powerful public sentiment manipulation through selective media generation. However, realistically for most embassies worth their salt you'd know these groups are largely not going to do anything remotely surprising that you can pin to them through pervasive communications intelligence gathering.
Probably also, you would target multinationals, because almost all of them are doing something dodgy, somewhere, and that gives you tremendous leeway for behavioral modification.
But in reality, the majority of these can be monitored very effectively on an automated basis with near zero effort once you have full visibility of various domestic financial networks, the SWIFT international financial network, credit and debit card networks, electronic information on intended travel (passenger name records) and border crossing (whoops! I-lost-my ... new passport number, anyone?), and the public switched telephone network.
Email, social network and general web use are cute extras, and probably greatly useful just for delving in to people's character and actions, communicative profiling (grammar, typing style, languages known), interest profiling, waking hour and social network profiling (beyond just phones), etc. But I don't think it's necessary to go to that point most of the time ... the broad metrics are already available and probably extremely reliable unless people are making a concerted effort to bypass dragnet surveillance activity. (eg. By avoiding all of the above networks... damn hard these days, it would seem, for any length of time)
So we don't really know if it's genuine. (Though it doesn't really matter because it's not surprising at all.)
So perhaps their method is to define Normal, and then monitor everybody Abnormal, on the basis that dangerous innovation is more likely to come from the Abnormal.
Enthusiasm for Linux isn't as abnormal as it used to be, but it definitely puts you in the "dangerous 1%".
You don't put a DUI checkpoint outside the library you put it outside the pub.
My point being that they tasked intelligent people with finding "terrorist" and this search pattern is a natural evolution of that task. Policy aside.
The treatment of Jacob Appelbaum[2] and David Miranda[3] suggests that members of US/UK Government may believe that if one provides "incidental help" to the current ideological enemies of the US you are a terrorist/extremist or at the very least targetable under terrorism laws (Miranda was detained under schedule 7 of the Terrorism Act).
[1]: http://georgewbush-whitehouse.archives.gov/news/releases/200...
[2]: http://en.wikipedia.org/wiki/Jacob_Appelbaum#Detention_and_i...
[3]: http://en.wikipedia.org/wiki/Glenn_Greenwald#Detention_of_Da...
Is there a list of other code or rules files that were released?
Is this information legal to search for, store, or link to since it's now public?