Due to overwhelming demand, I give you the 2nd instalment of wholesome costume ideas for the ladies this wonderful Halloween season.
Received this by email today. No idea who wrote this fantastic article. If you know please let me know so I can give proper credit.
President Eisenhower was right on point about the military-industrial complex, but he could not have predicted the emergence of the massive surveillance state — combining the government and private sector — that bolsters it.
Sadly, neither President Obama nor his Republican challenger, Mitt Romney, has the desire or moral courage to fight the growing power and influence of the Corporate Security State. We are witnessing the integration of spying on two levels, the government level (federal, state and local) and the corporate level (via telecom providers, web services and credit card companies).
If you are a user of Facebook, Twitter, LinkedIn, YouTube, Craigslist or another popular site, the U.S. security state is watching you. An increasing number of federal agencies are employing sophisticated means to monitor Americans’ use of social networking sites. Federal entities from the National Security Agency (NSA) and the Defense Department to the Department of Homeland Security (DHS) to even the Internal Revenue Service (IRS) are involved in developing programs to track the American public online.
Here is a brief summary of some of the other programs.
1. Justice Department. The Electronic Frontier Foundation (EFF) released a report from the DOJ’s Computer Crime and Intellectual Property section, “Obtaining and Using Evidence from Social Networking Sites,” that describes how evidence from social networking sites can reveal personal communications that might help “establish motives and personal relationships.”
It reports that monitored data from such sites can provide location information and “prove and disprove alibis.” Perhaps most illuminating, it advises agents that “going undercover” on social media sites can enable law enforcement to communicate with suspects and targets, gain access to nonpublic information and map social relationships. The DOJ document notes that Twitter retains the last login IP address, but does not preserve data unless legally required to do so.
2. The IRS uses a variety of social media sites like Facebook, Google, Twitter, MySpace, YouTube and Second Life to investigate taxpayers. It seems to have started this practice in 2009, providing agents with special training on social networking. The EFF posted the IRS’ 38-page training that offers detailed tips to agents on how to conduct searches, locate relevant taxpayer information, narrow down and refine results.
3. The Office of the Director of National Intelligence is seeking a tool that integrates all online information, including web searches, Wikipedia edits and traffic webcams.
4. The Defense Department has solicited proposals through DARPA for a $42 million “Social Media Strategic Communications” (SMISC) program, a tool that tracks social media and weeds out information. It has set four goals for the project: (i) to detect, classify and measure the development of ideas, concepts in hidden social media messages; (ii) specify the structure of the campaign and influence in social media sites and the community they create; (iii) identify the participants and intention in conducting a social media campaign of persuasion and measure its effect; and (iv) develop an effective counter-message to an identified campaign carried out against the enemy.
5. The FBI is soliciting a bid for a program that seems very similar to the DHS social-network monitoring program. Dubbed the “FBI Social Media Application,” the program would have “[the ability] to rapidly assemble critical open source information and intelligence … to quickly vet, identify and geo-locate breaking events, incidents and emerging threats.”
In the FBI’s 12-page solicitation, it requests a program that can quickly identify, display and locate alerts on geo-spatial maps and enable users to summarize the “who, what, when, where and why” of specific threats and incidents. Going further, it seeks to not simply detect “credible threats,” but to identify those organizing and taking part in gatherings and to predict upcoming events. According to the FBI, “Social media will be a valued source of information to the SIOC [i.e., Strategic Information and Operations Center] intelligence analyst in a crisis because it will be both eyewitness and first response to the crisis.”
An FBI spokesperson insisted, “[We] will not focus on specific persons or protected groups, but on words that relate to ‘events’ and ‘crisis’ and activities constituting violations of federal criminal law or threats to national security. Examples of these words will include lockdown, bomb, suspicious package, white powder, active shoot, school lockdown, etc.” Rest assured, much like the assurances voiced by the DHS, the FBI insists that its monitoring won’t be used to focus on specific individuals or groups.
6. Department of Homeland Security. A more aggressive monitoring program was recently revealed by the Electronic Privacy Information Center (EPIC) when it secured from the DHS a list of approximately 380 keywords that the agency tracks. The allegedly threatening terms were found in the DHS’ Analyst Desktop Binder, part of its 2011 Media Monitoring Capability (MMC) program.
These terms are organized into nine categories:
Agencies – 26 terms, including “DHS,” “FBI”, “CIA,” “Air Marshal,” “United Nations” and “Red Cross”;
Domestic security – 52 terms, including “assassination,” “dirty bomb,” “crash,” “first responder,” “screening” and “death.”
Hazardous materials – 34 terms, including “hazmat,” “nuclear,” “leak,” “burn” and “cloud.”
Public health – 47 terms, including “ebola,” “contamination,” “wave,” “pork” and “agriculture.”
Infrastructure security – 35 terms, including “AMTRAK,” “airport,” “subway,” “port,” “electric” and “cancelled.”
Southwest border violence – 65 terms, including “drug cartel,” “decapitated,” “gunfight,” “marijuana,” “heroin,” “border” and “bust.”
Terrorism – 55 terms, including “Jihad,” “biological weapons,” “suicide attack,” “plot” and “pirates.”
Emergencies and weather – 41 terms, including “disaster,” “hurricane,” “power outage,” “ice,” “storm” and “help.”
Cyber security – 25 terms, including “cyber terror,” “malware,” “virus,” “hacker,” “worm,” “China” and “Trojan.”
The DHS has been engaged in monitoring social networking sites like Facebook, Twitter, Flickr, YouTube and LinkedIn as well as blogs since at least 2010. Its effort is run through the Office of Operations Coordination and Planning (OPS), National Operations Center (NOC), and is entitled “Publicly Available Social Media Monitoring and Situational Awareness (Initiative).” Its ostensible purpose is to provide situational awareness and strengthen its common operating picture.
The scope of DHS’ practice of social monitoring was unexpectedly revealed in a special congressional hearing, the House Subcommittee on Counterintelligence and Intelligence, headed by Rep. Patrick Meehan (R-PA), in February. Two DHS officials, Chief Privacy Officer Mary Ellen Callahan and Director of Operations Coordination and Planning Richard Chavez, raised the representatives’ ire by appearing to be deliberately stonewalling on the scope and practice of the agency’s social media surveillance.
Most disturbing, the DHS reps appeared unsure about the monitoring program’s goals, how the gathered information would be used and whether it would be shared with other agencies. In an unusual show of bipartisan unity, Reps. Billy Long (R-MO), Jackie Speier (D-CA) and Bennie Thompson (D-MS) joined Rep. Meehan in chastising the DHS officials.
Under intense congressional probing, DHS reps revealed that the keywords chosen for monitoring were drawn from commercially available, off-the-shelf database programs that were customized to meet its specifications. The agency was particularly interested in determining first witnesses to breaking events like the 2011 Tucson shooting of Gabrielle Giffords and others and the January 2012 bomb threat at an Austin school.
The DHS reps insisted that data gathered was only used to confirm other news reports and that information on private citizens was not being collected. In addition, they claimed that that all personally identifying information was regularly scrubbed from the agency’s servers.
Few should feel comforted by the DHS assurances. At the House hearing, it was also revealed that the agency was involved in what appears to be an ongoing campaign to monitor the actions and beliefs of individual Americans engaged in community-based political activism. It compiled a report, “Residents Voice Opposition Over Possible Plan to Bring Guantanamo Detainees to Local Prison-Standish MI,” that tracked community reactions to the proposed location of Guantánamo detainees in a local Michigan prison.
The House hearing also shed light on the DHS practice of outsourcing keyword tracking of social media through a sole-source contract to the giant defense contractor, General Dynamics. In 2011, General Dynamics had revenues of $5.5 billion of which 84 percent ($4.6 bil) came from government contracts. Earlier this year, it’s Advanced Information Systems division was awarded a $14 million DHS contract to (in the words of a press release) “provide constant and continual watch operations for critical communications to the agency’s National Coordinating Center.” In addition, it will “identify the possible impacts of potentially disruptive events.
In keeping with the prevailing ethos of corporate unaccountability, it turns out if the General Dynamics employees are found to have misused the information garnered from a social network user, including a journalist or public figure, the employee must take a training course or, worst case, lose his/her job. No criminal penalties are specified.
A word to the wise, Big Brother is watching you.
First off Robin, please accept my most sincere thanks for the most annoying song since “Everybody Have Fun Tonight”.
Now for a while I was having difficulty coming up with the proper adjectives for this turd. Thankfully this fugue state did not last very long.
I am still trying to fathom exactly why someone who has done so little, seems to feel so entitled. I’m sure it has something to do with being a child of privledge, and never actually having had a real job or responsibility of any kind. You know how I know this? Only a person with way too much free time on his hands could have possibly come up with something as pointless and irritating as ‘Blurred Lines’.
And while on the topic of wealthy parents. I think that Alan Thicke owes all Canadians an apology for not having pulled out.
We should all know better. We should be able to recognize when such an attention mongering asshat refuses to fade into obscurity, and force them to go away. But we don’t.
Every time I hear this borderline goober on the radio I find myself trying to knock out my own eardrums with a sharp object. Robin, like his music, is so very intolerable that I wonder if us, the public, aren’t mentally incompetant for allowing him to stay so firmly planted in our conciousness. I guess the real asshole here is us.
Prior to becoming a state of it’s own, Nebraska was referred to as South South Dakota
1. Can’t you go buy your own tampons?
2. Do we have to invite your mother?
3. Did you put on some weight?
4. Oh not baby names again!
5. Your loofa sponge feels really nice on my balls.
6. Is it your time of month?
7. That sounds like something your mother would say.
8. Stop being so over-sensitive!
9. Can I have a sandwich?
11. That’s women’s work!
12. What did you do to your hair?
13. Sorry I got you in the eye.
14. Calm down!
15. Whoa! Would you look at the tits on her!
16. Come help me light this fart.
17. Just the tip?
18. You’re not that old.
19. Would you like my opinion?
It seems whenever and wherever aboriginal radicals seem to want to shake their angry fists at this great country, this terrorist pokes his knarly little head into it.
Now I don’t throw around the word ‘terrorist’ lightly. The word carries a very specific and focused meaning for me. But I am but an individual. Let’s see what the Oxford Dictionary says about the word terrorist.
Halloween is the greatest time of the year, and I realize that it is still a few months away, but there is nothing wrong with planning things out a bit early.
So what follows are some suggestions for the ladies for the upcoming Halloween season. I sincerely hope this helps you girls enjoy the season!
Although it is an incorrect myth that you can see the Great Wall Of China from space with the naked eye, it is very possible to spot Adele from the same altitude.
And the odds are good she will be near an all-you-can-eat buffet.
From our friends at The Weekly World News
By Frank Lake
Three giant alien spaceships are again heading for Earth! Scientists predict the new ships will arrive in December.
UFO encounters continue to increase – as documented on WWN. And today scientists at SETI (Search for Extraterrestrial Intelligence), an independent non-commercial organization, made a major announcement:
“Three giant spaceships are heading toward Earth. The largest one of them is 200 miles wide. Two others are slightly smaller. At present, the objects are just moving past Jupiter. Judging by their speed, they should be on Earth by the October,” said John Malley, the lead extraterrestrial expert at SETI.
Three similar giant ships landed in China and the Indonesia Sea in November, 2011. They were identified as alien spaceships from Planet Gootan. Three more giant Gootan ships are headed here for December.
The new Gootan spaceships have been detected by HAARP search system. The system, based in Alaska, was designed to study the phenomenon of northern lights. According to SETI researchers, the objects are extraterrestrial spaceships. They will be visible in optical telescopes as soon as they reach Mars’s orbit – sometime in October. The US government has been reportedly informed about the event.
SETI researchers have spent fifty years monitoring space. Dr. Malley said that they have conclusively proven that “we are just newcomers in this huge and unexplored world. Many believe that there are many other civilizations in space besides our own civilization.”
Wikileaks recently released many classified documents that prove that NASA and high-level U.S. official are aware of the three spaceships and are making plans to battle the spaceships. They have been concealing information from the U.S. public for decades. Wikileaks also confirms that the UFO sightings over the last three months prove that the alien invasions (long predicted by SETI) has begun. The three spaceships will mark the official beginning of the alien invasion.
Malley said that a Chinese official, Mao Kan, had obtained over than 1,000 secret NASA photographs depicting not only human footprints, but even a human carcass on the surface of the Moon. Some of the bones in the carcass were missing, the official said. The human corpse must have been dropped on the Moon from an alien spaceship, whereas the extraterrestrials kept some tissue samples for research.
Dr. Ken Johnston, former Manager of the Data and Photo Control Department at NASA’s Lunar Receiving Laboratory, said that US astronauts had found and photographed ancient ruins of artificial origin on the Moon. US astronauts had seen large unknown mechanisms on the Moon.
Both Johnston and Mao Kan agree that three more Gootan spaceships are heading for Earth.
Beginning in November the U.N. will begin preparing citizens of the world for the second attack of the three Gootan spaceships and a subsequent alien attack, which they predict will be “a large-scale assault.”