What Exactly Are the Spy Agencies Actually DOING with their Bag of Dirty Tricks?

George Washington's picture

Note: Update below ...

Newly-released documents from Edward Snowden show that the British spy agency GCHQ has developed numerous offensive digital tools.

But what exactly are they doing with these dirty tricks?

We think it’s important to think through the specific possibilities, in order to gain an understanding of how pernicious these manipulations can be.

We quote verbatim (in black) the names and descriptions of some of these tools – some of which Glenn Greenwald didn’t highlight in his report.  We then provide descriptions in blue of potential misuses of such tools.

Then we discuss how likely such misuses really are.


Here are the actual dirty tricks in the British spy agencies toolkit, with hypothetical examples of potential misuses …

CHANGELING: Ability to spoof any email address and send email under that identity. Fake an email from a privacy advocate to make it look like he’s proposing terrorism.

SCRAPHEAP CHALLENGE: Perfect spoofing of emails from Blackberry targets. Fake an email from an opponent of  bailouts to the giant banks to make it look like she’s planning to bomb a bank.

BURLESQUE: The capacity to send spoofed SMS messages. Fake a message from an an anti-war writer to make it look like he’s planning to sabotage a military base.

IMPERIAL BARGE : For connecting two target phone together in a call. Fake a telephone connection to make it look like a critic of the president’s policies spoke with a leader of Al Qaeda.

BADGER : Mass delivery of email messaging to support an Information Operations campaign. Send out a fake, mass email pretending to be from a prominent whistleblower “admitting” that he’s mentally unstable, disgruntled, dishonest, vindictive and a Russian spy.

WARPATH: Mass delivery of SMS messages to support an Information Operations campaign.  Send out a fake, mass message from a targeted group calling for the murder of all Christians and Jews.

SPACE ROCKET: A programme covering insertion of media into target networks. Insert a video of underage girls on a whistleblower website. 

CLEAN SWEEP Masquerade Facebook Wall Posts for individuals or entire countries. Put up a bunch of fake wall posts calling for jihad on the Facebook page of a reporter giving first-hand reports of what’s really happening in a country that the U.S. has targeted for regime change.

HAVOK Real-time website cloning technique allowing on-the-fly alterations. Hack the website of a state politician who insists the government must respect the Constitution,  and post fake demands for a violent march on Washington, D.C.

SILVERLORD: Disruption of video-based websites hosting extremist content through concerted target discovery and content removal. Disrupt websites hosting videos espousing libertarian views.

SUNBLOCK: Ability to deny functionality to send/receive email or view material online. Block emails to reporters and the web functionality of a government insider who is about to go public on wrongdoing.

ANGRY PIRATE: A tool that will permanently disable a target’s account on their computer. Disable the accounts of a leading opponent of genetically modified foods.

PREDATORS FACE: Targeted Denial Of Service against Web Servers. Take down a website which is disclosing hard-hitting information on illegal government actions.

UNDERPASS: Change outcome of online polls. Change the results of an online poll from one showing that the American people overwhelmingly oppose a new war which is unnecessary for the defense of America’s national security to showing support for it.

GATEWAY: Ability to artificially increase traffic to a website. Make a website calling for more surveillance against the American people appear hugely popular.

BOMB BAY: The capacity to increase website hits, rankings. Make it look like a site praising praising Al Qaeda is popular among a targeted local population, when the locals actually despise violent Islamic fundamentalists.

SLIPSTREAM: Ability to inflate page views on websites. Make it appear that an article saying that the Constitution is “outdated” and “unrealistic in the post-9/11 world” is widely popular.

GESTATOR: Amplification of a given message, normally video, on popular multimedia websites (Youtube). Make a propaganda video – saying that Dear Leader will always help and protect us – go viral.


We don’t know which of the above hypothetically forms of misuse are actually occurring. However, as we wrote in February:

We’ve warned since 2009 (and see this) that the government could be launching cyber “false flag attacks” in order to justify a crackdown on the Internet and discredit web activists.


A new report from NBC News – based on documents leaked by Edward Snowden – appear to confirm our fears, documenting that Britain’s GCHQ spy agency has carried out cyber false flag attacks:

In another document taken from the NSA by Snowden and obtained by NBC News, a JTRIG official said the unit’s mission included computer network attacks, disruption, “Active Covert Internet Operations,” and “Covert Technical Operations.” Among the methods listed in the document were jamming phones, computers and email accounts and masquerading as an enemy in a “false flag” operation. The same document said GCHQ was increasing its emphasis on using cyber tools to attack adversaries.

Later that month, we noted:

A new report from NBC News shows that the British spy agency used “false flag attacks” and other dirty tricks:

British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”




The agency’s goal was to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications.

Sound familiar? It should:

Between 1956 and 1971, the FBI operated a program known as COINTELPRO, for Counter Intelligence Program. Its purpose was to interfere with the activities of the organizations and individuals who were its targets or, in the words of long-time FBI Director J. Edgar Hoover, to “expose, disrupt, misdirect, discredit or otherwise neutralize” them.

NBC continues:

[The agency] also uses “false flag” operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain’s adversaries.




JTRIG used negative information to attack private companies, sour business relationships and ruin deals.




Changing photos on social media sites and emailing and texting colleagues and neighbors unsavory information.

And reporter Glenn Greenwald noted that Snowden documents showed:

Western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction.




These agencies are attempting to control, infiltrate, manipulate, and warp online discourse …. Among the core self-identified purposes … are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.




The discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.


The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes…. no conceivable connection to terrorism or even national security threats.




Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell”, devoted to “online human intelligence” and “strategic influence and disruption”….***


Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack”, while dissecting how human beings can be manipulated using “leaders”, “trust, “obedience” and “compliance”:

The U.S. government is also spending millions to figure out how to manipulate social media to promote propaganda and stifle dissenting opinions. And see this and this.

And any criticism of government policies is now considered “extremist” and potential terrorism. According to Department of Defense training manuals, all protest is now considered “low-level terrorism”. And see this, this and thisQuestioning war is considered extremism. The government also considers anyone who tries to protect himself from government oppression and to claim his Constitutional rights a "extremist". This is not entirely new ... the CIA director in 1972. Indeed - for 5,000 years straight - mass surveillance of one's own people has always been used to crush dissent.

The NSA is now also collecting and retaining the most intimate personal details of Americans, including nude and suggestive pictures and medical and financial records … even though they admittedly have no conceivable security value.

You may think you have “nothing to hide”, but you’re breaking the law numerous times every day … without even knowing it (update).

Indeed, top NSA whistleblowers say that the NSA is blackmailing and harassing opponents with information that it has gathered – potentially even high-level politicians – just like FBI head J. Edgar Hoover blackmailed presidents and Congressmen.

Moreover, if the NSA takes a dislike to someone, it can frame them. This has been CONFIRMED by top NSA whistleblowers.

And the following facts make it likely that British and U.S. spy agencies are misusing their powers:

Update: NSA whistleblower Russel Tice - a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping, and who used to work in "black ops" - tells Washington's Blog after reading this post:

My biggest fear has been that Black World programs that I specialized in would be turned against the American people. I do not confirm or deny want I see in your piece, but you are now starting to think like a Black World operations officer. I do not know of any case where such capabilities have definitively been used directly against U.S. Citizens, but I have not been privy to their targeting for over ten years now.


But I have to congratulate you on thinking out of the strict technology box and thinking “for what purpose.”

Postscript: We don’t know whether or not the spy agencies are misusing their bag of tricks in the specific ways discussed above (in blue).  The whole point is that they have been caught lying time and again about what they’re doing, they’re running amok with no oversight, and the fact that they could be targeting government critics in exactly these ways shows how bad things have become.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
amanfromMars's picture

G'day, ZeroHedgers, IT's a Mad, Mad, Mad, Mad World out there. The Super State Secret though, is to Enjoy IT and freely Share what can be easily done, for that which can do IT and anything and everything simply, is worth an Absolutely Fabulous Fabless Fortune which IT be duty bound to spend as fast and as well as is wise and humanly possible ...... for such are the limiting factors/protocols.

This, the following, is a current state of Great IntelAIgent Gamesplay and only the tip of a titanic ICEberg ... a Colossus of an IntelAIgent Community Enterprise mountain to mine. I Kid U  Not :-)

amanfromMars said... replying in a comments thread on http://amanfrommars.blogspot.co.uk/2014/07/140716.html


Here's some old news, CE, ....... https://web.archive.org/web/20111110110017/http://www.buffalonews.com/city/article201702.ece ..... outing early analytical engines which claim to be able to provide third party conclusions/suppositions of first and second party future activity, accurate enough to warrant the expense and bother of system surveillance, presumably to gather and/or plant some sort of  incriminatory evidence in support of a machine led and manufactured view? One imagines that the most modern, and up to the great metadata task of them,  be considerably more sophisticated and accurate nowadays,  although that can only always be just as accurate as a third party can be. 


Indeed, in deed, is IT a crazy mad world .... and easily groomed to present sound and vision pictures which are not necessarily true and complete fictions.


Then are the existences which follow and believe in the content and result of those pictures, simply a complex virtual reality drivered by ......... well, SMARTR Machines and Global Operating Devices or their Programmers?


17 July 2014 06:49


Have a nice day, y'all.

janus's picture

that looks like a question in your post title, GW...and janus has an answer -- of sorts.

but before i do, i want to give some on-the-come rock band a name (if they're lookin for one).  the road before the one off'a which i turn here in nowheresville south carolina is named "Ox Daisy Eye"  what a name for something grand.  take it or leave it, cunts.


actually, there's several things i gotta address before i get going.

first and foremost: TD, where the fuck did all these sanctimonious faggots come from?  WTF?  is this the Hedge or some goddam pussy-panty-party?  i swear by Holy God, i will route you limp-wristed bitches out!  think i won't?  i will find you, groom you, and then fuck you.  you do not belong here.


time for plan B, faggots.

anyway, speaking of grooming, and in the interest of pissing you sanctimonious faggots off, it should interest you all that, across the cove are two teenage hotties.  i've already set to grooming them.  terrible, i know.  wonderous, i expect.  there is no end to the fun we will have.  trouble is, their granny is sittin in her rocking chair, watchin janus....she thinks she knows what i'm up to -- but she hasn't any idea.  i figure i'll saunter on over (swim, as it were), tell her that those girls need a good ole fashion tent revival, and that i aim to take them to a prayer and Bible study -- so that they may be saved.  i want to save em from those vile teenage predators boys that stalk them day and night.  they want to sodomize them; i only want to lift them unto the ethereal realms.  time will tell. they can thank me when they're in they're in their late twenties.


i reckon i'll spend most of tomorrow fishing, checkin out the age o' consent in south carolina and, again, fishin...top-water lures all-the-way.

what else will make you all nervous and anxious?  hmmm?  hard to say; but i'lll do my ever-lovin best.

oh, yes, our intelligence services....strange thing.

let me begin by asking a question (as GW did).  do you sanctimonious faggots really think that these FEMA camps and whatnot are built for good/honest/hard-workin americans?  heavens no!  they're there for the untermensch.  those you see out & about occasionally...those who have the look of inevitable incarceration...with their shorts gathered about their ankles, their mother, their bruthahs, their uncles, their 'daddys', deys sistahs, cousins...etc. 

all that's needed now is the economic 'collapse'...gird thy selves, bitchez!

anywho...data collection is a two-edged sword.  in the grand scope of things, do any of you really reckon that this shit will be turned against good/honest/hard-working americans?  hardly.  this is to destroy those 'public servants' that will soon be lined up against plaster walls and blasted to bits with full autos on live tele.  again, this is the Hedge and all janus-posts will soon disappear.  have you not eyes to see and ears to hear?  for Truth commeth by hearing; and hearing by the word of God. 

fuck you sanctimonious bitchez and your stupidity.  this shit works on several layers.  ebbs and flows, morons.   look about and observe.  once again, this is not the place for you foxnewsers or huffposters...this is mutha fuckin Fight Club. 

did you think this was a joke?  did you think this site was an accident?


DIE, worthless ones.  i won't shed a single tear.

so i'm the bad guy....fine, i'll be it.  in the mean time, i want all who are 'good' to log onto huffpo, vote up/down on the cutest cat videos you can find, encourage all those imbeciles who're slathering these sites with feel-good shit for all the amalgamated hordes, and pretend...just pretend. 


nothing is as it seems, mo-fos.  up is down and down is up -- and vise versa.  but, ignore janus all you want.  although, challenge him you will not!  cause, well, i'll grind you to fuckin powder.  good thing for you morons, i happen to have a soft-spot for you.  you idiots need a buddy; the buddy-system works!  

warnings are over...money, in all its forms, won't soon matter.   best get your houses in order.  the world is entering a period of massive flux.  and your fat asses and your invented morality won't mean shit in the very near.  best you start thinkin like the ancients did.  but, do what the fuck you want...i really don't care.  or maybe i do.  why else would i be here at the Hedge?

best you all figure out how to make yourselves useful -- or else.

and so, without further ado, the janus theme-song of 2014:


drippin with alchemy,







JoJoJo's picture

If you are  friends with the Brit Or US  gubmints you could get Google Page Rank boost. Uncle Sams Search Engine Optimizer Coming Soon.

VWAndy's picture

Identity theft? Like a perk? Or to fund some black project?

 Change the shipping address in email? Just to mess with your business? Censor or block incoming calls/emails to a business?

Son of Captain Nemo's picture

Good question?

Assholes and mouths for the paycheck are interchangeable along with the "integrity"!

VWAndy's picture

I bet thats list is just the nicer stuff.

George Washington's picture

Yes, and the list is evolving:

"And JTRIG urges its GCHQ colleagues to think big when it comes to internet deception:   'Don’t treat this like a catalogue. If you don’t see it here, it doesn’t mean we can’t build it.' ”

Latitude25's picture

I recently responded to an ad on craigslist under "casual encounters".  I was answered by the local police dept that the lady in question is out on bail for assault.

Grouchy Marx's picture

So, was the date a knock out? 

Reaper's picture

"whether or not the spy agencies are misusing their bag of tricks."

"Power corrupts. Absolute power corrupts absolutely." Lord Acton made that quote talking about the Pope. If the Pope cannot be trusted, how can we trust government hacks? The spy agencies have and will in the future use their powers corruptly.

laomei's picture

Next time someone gets arrested for some alleged computer crime, the case needs to be made that such systems exist and are used by the government to target individuals and as such it must be proven that such was not the case in said alleged incident.

failsafe's picture

thanks GW and ...not to triviaiize ... not at all... but I get a kick out these names they come up with...

Angry Pirate .. maybe it is because they trivialize the harm they will be doing

failsafe's picture

Yea I can think of a few names for em' alright.

Tall Tom's picture

Project STEAL


Systematic Theft Email And Letters


Who needs an algo when they've got a brain?

teslaberry's picture

now take all the above shit in you article and apply it to bitcoin and then consider how essential bitcoin is to 'freedom' and 'liberty' .

now think silver coins. bitcoin ; tool of centralized control to be promoted by useful idiots by way of billionaire alley.

GreatUncle's picture

Try these 2.

The ability to utilise a wireless router and through the backdoor from the internet can effecitvely jam / block / do weird and wonderful stuff to any wireless visible connection let alone a hard line.

Another one through the internet backbone inject a nasty surprise purely through connecting to the internet and not specific to a website. When you log on you are vunerable to an attack.

Needless to say after those and other experiences I now keep the main compiuter offline now and transfer data across by hand.

A nice little trick is pull the connection for say 10 mins and it used to take 30+ mins to find you again.

Be safe :-) The world is not a nice place and GCHQ / NSA just made it a whole lot more evil.

Burticus's picture

The spy agencies are obviously using their bags of dirt to puppeteer the elephant/jackass sock puppets and their appointees.

One blatant example is the recent majority ruling by the Stupreme Court that the 2,700-page (Orwellian-named) Patient Protection and "Affordable" Care Act ("CONgressCare”) is constitutional as a TAX, even though "sick treatment" or "insurance" cannot be found in Article 1, Section 8 of a certain antiquated relic covered in elephant & jackass $#!+.

Those of us who have read our founding documents immediately recognized that such a tax represents another direct federal tax on individual citizens without apportionment in proportion to the census, which is prohibited by Article 1, Section 9, "No Capitation, or other direct, Tax shall be laid, unless in Proportion to the Census or Enumeration herein before directed to be taken."  The framers' intent clearly was to outlaw the federal government's current practice of directly taxing the citizens of the several states, then making the state legislatures grovel like lapdogs for "federal money" robbed from their own citizens.

These black-robed pussies also seem to have forgotten the provision in Article 1, Section 7, "All Bills for raising Revenue shall originate in the House of Representatives..."  Those paying attention know the CONgressCare TAX bill originated in the U.S. Senate, not the House.

Since it is improbable that a supposedly strict constructionist as Chief Justice Roberts could be so ignorant of the constitution he is sworn to uphold, I can only surmise that the probable explanation is that NSA spies have photos of him **cking his pet goats.  This is what happens when the same court allows other obvious usurpations such as the (also Orwellian named) "Patriot" Act, National Defense Authorization Act, Foreign Intelligence Surveillance Act and Cyber Intelligence Sharing and Protection Act.

Got tyranny?

F em all but 6's picture


Good analsis but you like all the rest do not understand the nature of the sytem put in place. I have 30 years and over 60,000 hours of research involved here so I can offer a different perspective/

Roberts was correct. It is the taxing power. And its not a direct, but an indirect tax. Simplified, this i how it works:


Back in the 30's, the fed created the Social Security Act. Its purpose? Unemployment and Old Age survivor insurance. Later to be added/ Other "entitlements" added under the umbrella of the Act such as medicare, medicade, food stamps. and Obammy Care. From a purely judicial perspective, YOU or your parents had to make "voluntary" application into the system. Once in, you are now eligible for what the courts would classify as extraordinary protections paid for ith money from the Public's treasury. YOU as an individual have NO liberty, property. or contract rights in the Statutory rights (privilege) or the source of the funding for those privileges. Moreover, YOU waived constitutional judicial protections of PROPERTY and CONTRACT in exchange for those protections....that can be modified or taken away at the will of the legislative body that created them.


And now to the issue of direct taxation on property. Your labor is your property and what it is exchanged for is also your property. People recognize this and think this is the end of the argument. Wrong. As for taxation, the government can TAX the privileges it creates. The "PRIVILEGE" has been established. The TAX is an EXCISE that uses the WAGE or whatever else the legislative body wants to use AS A UNIT OF MEASUREMENT TO CALCULATE THE INDIRECT EXCISE. And as the taxing power knows NO LIMITS on that which is a proper object of an EXCISE, the State and Federal governments can take 100 percent of what you earn and leave you ith nothing save a handful of future promises that can be deleted at any time and for any "POLITICAL REASON". NO fundamental rights involved. Constitutional/judicial processes displaced through waivers and now reduced to mere proceduaral processes under administrative law.


The real questions of law lie not in direct v indirect tax, but the structural methods used to obtain the end result. The passage of the SS Act required State/ federal cooperation via the federal compact clause. WHY?? Because the federal ACT involved STATE POLICE POWERS. Unemployment insurance and POOR LAWS are NOT within the realm of federal legislative jurisdiction. BUT, once the States seek federal permision to join the other States in the ACT, the States and their Police Powers are now PREEMPTED for purposes of TAXATION and ADMINISTRATIVE CONTROL.  In other words, the corrupt States handed the feds the power to BYPASS the apportionment clause....AND in addition handed the feds the power to do that which the States themselves are CONSTITUTIONALLY FORBIDDEN to do themselves. That is, INTERFERE WITH THE OBLIGATION OF CONTRACTS.

 Look to witholding of State/ fed excises under your SS number. Its an excise that knows NO limits. So I contract with you to do some work. I owe you a $100 as an obligation to fulfill the contract. Upon completion, the law requires me to hand the entire amount over to the government. Could there ever be a greater interference with the obligation? How would you ever feed or house yourself if you could not aquire proerty through contracts and then exchange that property for food? irrelevent!! You exchanged those rights for the privilege. Thats how the courts view it. But it still begs the greater question. Would all of this even be posible if the States had not handed the Feds the power to bypass the apportionment clause AND obliterate the obligation of contracts?


Can the States do this ??? Under existing USSC case law involving other relevent subject matters, the USSC has said in NO UNCERTAIN TERMS>>>>NO!!!!!! But here it is. Unchallenged

Tall Tom's picture

Very well written. Thank you.


Maybe we need to call it for that which it is...CONCare. That removes any of the Red Team/Blue Team bullshit.


For Liberty and Freedom. Thanks.

Grouchy Marx's picture

You know, I have noticed for awhile that anytime law enforcement barges into a business or residence, oft without a search warrant, the first thing they walk away with is the computer equipment. Then they claim to find some incriminating files of one type or another. And the thought has occurred to me, how would I believe that, if I was on a jury? They could copy anything onto that computer, in seconds. Seems to me that there must be a higher level of evidence required, such as recorded phone conversations or multiple credible witnesses or the like. There is just way too much power to destroy the life of the average citizen in the hands of a few individuals. 

I realize I am dating myself by using the antiquated term "citizen". It doesn't seem to have retained much meaning.

OldPhart's picture

How many juries have you actually sat on?

My experience of this bullshit has been, 'yes I know that lady she's a customer of mine.  She told me she ran over that man and that she'd been drinking.  I was the volunteer ambulance Paramedic that responded to the call'...Judge:  "You are excused".

Now, I go in to the review, what do the call it 'voirdour' or some shit.  Me: "I consider this whole business complete horseshit and will vote to acquit on every charge.  I don't belive in your bullshit and refuse to participate.  I think everyone in the room should be summarily executed."

Judge:  "You are excused."


Reaper's picture

Testilying is a well known police practice. All evidence of whatever was found, whether fingerprints, computer files or whatever is verified by a testfying witness, employed by the government. The problem is that juries have delusions about police honesty and/or government expert forensic witnesses. The reality is that prosecutors only call government witnesses which help their case. You don't stay long employed, if your testimony cannot be used to convict. I.E. http://en.wikipedia.org/wiki/New_York_State_Police_Troop_C_scandal Most likely he was rejected by the CIA, because he couldn't be trusted to keep his mouth shut.

windcatcher's picture


What is the use of having a billion dollar NSA spy facility in Utah if you can't spy on everyone?


Pee Wee's picture


Unfortunately, the people know better and what is all too often perceived as the potential for misuse turns out to be systemic abuse.

Targeted mis/disinformation and fabricated evidence is a slam dunk in the secret Kangaroo Kourts of the executive in chief.

Interestingly, no one has talked about the collusion between government and big banks.  How easy it would be to take a position in a business transiaction from insider info learned through USA spy agencies.   This is beyond more than likely and there should be a shitstorm investigation to rule this out.

Its no accident every 18 year old male is sent a razor after registering with selective service.  Profiteering off citizens by government is A-OKAY!

PT's picture

So can we now go back to having the contents of one's hard drive being inadmissable as evidence in a court of law?  The average yob could have incriminating files on his brand new computer straight from the factory.  Most people wouldn't know how to check whether it was there or not.  99% of the population cannot prove whether or not their "Windows updates" or their "Anti-virus updates" are legitimate.  And 99% of the population has no way of proving whether or not any encryption actually works as advertised.  Errr, except that you have provided evidence that encryption has been compromised.

It's like leaving your keys in your car 24/7.  Someone could have used your car in a murder / armed robbery and returned it to your drive way.  Ummmm, coming to think of it, what were they planning to install in "smart cars" again???

Likedeeler's picture

If I was the owner of the big big black business I'd have my personal Mr. Blackden aka Dr. Henry Jekyll (or should I call him Edward Hyde?) at the right place to ensure my lasting exceptional performance.

Son of Captain Nemo's picture

To summarize in a nutshell what the NSA both “can” and “will” try to do to you courtesy of Microsoft, Apple, Google, Twitter, Facebook, Verizon, AT&T and Qwest?....

Whatever the fuck they want to as long as your IP/MAC address pops up in there improvised “scanning/lottery” system…

It doesn’t matter what you’ve done or haven’t done.  They can and will make up anything they wish about you just as long as their “system” labels you a threat.  And with the farce that is the DOJ with FISA as the guard dog it won’t matter.

If “9/11” and the Patriot Act(s), NDAA, Afghanistan, Iraq, Libya, Syria and now Ukraine didn’t help you to understand what has been unfolding -then nothing will.

Congratulations the 99% of you are THE ENEMY!

BuddyEffed's picture

How about a BUDDY FUCKING category where you keep your friends close but your frenemies even closer?

ZerOhead's picture

GW... I think you are going to want to take a look at this video.


While the #4 SFP was not entirely compromised there is evidence that fuel rods were also in the Unit 4 Equipment pool which burnt, ablated the pool containment and appears to have ended up visibly outside of the Unit 4 structure.

Jim in MN's picture

I have ALMOST stopped posting about Fukushima Daiichi.  I still read and analyze everything that's available.  And who among ye checks the ISIS Seismic Monitor daily, just to be in the know should a new large quake strike?  Ditto the Japan Meteorological Agency for typhoons.

In the rubble of Fukushima, one can glimpse exactly how much the global elite cares about you, your babies, or anyone's future:  a value indistinguishable from zero.

Where is the G-20 meeting about getting this little catastrophe under control?  The question answers itself. 


failsafe's picture

Oh excellent.That just makes it all btter lol.  Forgive me while use my apparently endless capacity to be disgusted with what people will do to fuck up everything.

Government Agency Pretending to Care: Everybody who lied raise your hand, please.

Greedy Liars Pretending to Care:

Government Agency Pretending to Care: Oh! Good, what a relief. You are all innocent.

ncdirtdigger's picture

"I hope everyone enjoyed their train ride"

Sedaeng's picture

Did everyone spoof their IP/MAC address before posting a response?  ;)

Buck Johnson's picture

All those techniques that where listed doesn't seem that it would be used against terrorists that are in remote areas and/or don't care.  All those techniques look like they are used against a person or persons who are already established online and have a presence.  That means bloggers, individuals, and others.

BigJim's picture

I always piggyback off a neighbour's wireless router. I'm close enough to get signal, but hopefully far enough to be outside of blast radius when they finally drone us all.

Grouchy Marx's picture

Remind me to not move within wifi distance of your place. 

To paraphrase Robert Frost: good wifi encryption makes good neighbors.

DarthVaderMentor's picture

Better yet, don't use Wi-Fi......

Seize Mars's picture

No, dude you want it wide open so you can disavow your FUCKED UP internet traffic.