Greenwald on Silicon Valley

On Thursday, Parler was the most popular app in the United States. By Monday, three of the four Silicon Valley monopolies united to destroy it.

With virtual unanimity, leading U.S. liberals celebrated this use of Silicon Valley monopoly power to shut down Parler, just as they overwhelmingly cheered the prior two extraordinary assertions of tech power to control U.S. political discourse: censorship of The New York Post’s reporting on the contents of Hunter Biden’s laptop, and the banning of the U.S. President from major platforms. Indeed, one would be hard-pressed to find a single national liberal-left politician even expressing concerns about any of this, let alone opposing it.

Not only did leading left-wing politicians not object but some of them were the ones who pleaded with Silicon Valley to use their power this way. After the internet-policing site Sleeping Giants flagged several Parler posts that called for violence, Rep. Alexandria Ocasio-Cortez asked: “What are @Apple and @GooglePlay doing about this?”

The rest is here. Do read it. (H/t Mark from Placerville)

I haven’t jumped into American domestic politics for a long, long time. It’s nice to see that Glenn Greenwald is still the same ol’ Glenn Greenwald. I saw on Twitter awhile back that some Leftists were savaging him because he refused to take their side on something or other.

The tribal trend is one that is here to stay, I think, at least for the duration of my lifetime. In the old days, in the United States, politics was more polarized. Whole families based part of their identity on a political party. What we are seeing is a return to the norm after 80 years of postwar boom (and bust), when being an American trumped being a Democrat/Republican. Coming to terms with a bug in the democratic system (polarization), is going to be difficult for a lot of Americans.

The problem is not just ignorance with polarization, either. Before the postwar boom, America’s federal government did a lot less than it does now. Our polarized society, which again is a normal feature of democracies that don’t win world wars, is fighting for resources that are now wielded largely by one entity rather than by hundreds of local entities. There are plusses and minuses to this. The federal government is more professional about such things, and graft is harder to commit, but this also means that there will be more losers (for those federal goodies).

In the past, violent riots were the product of racist and Nativist animosities that were not dealt with effectively by local authorities. Basically, black Americans and immigrants were not able to get any public goods from local and “state” governments unless they literally fought for a place at the table. Today, and for the foreseeable future, the animosities are going to be federal in scope rather than local, so violence will not be a product of racist or Nativist abuse. Violent riots will probably flare up more often than they once did, too, but they won’t be as deadly as the racist or Nativist riots of old.

I hope I’m wrong, but I rarely am.

A very illuminating comment over on Reddit.com

User “Three_Letter_Agency” put the current NSA issue in very clear focus today with the following:

We know the NSA and their UK buddy GHCQ can:

  • Collect the domestic meta-data of both parties in a phone-call. Source[1]
  • Set up fake internet cafes to steal data. Source[2]
  • Has intercepted the phone calls of at least 35 world leaders, including allies such as German Chancellor Angela Merkel. Source[3]
  • Can tap into the underwater fiber-optic cables that carry a majority of the world’s internet traffic. Source[4]
  • Tracks communications within media institutions such as Al Jazeera. Source[5]
  • Has ‘bugged’ the United Nations headquarters. Source[6]
  • Has set up a financial database to track international banking and credit card transactions. Source[7]
  • Collects and stores over 200 million domestic and foreign text messages each day. Source[8]
  • Collects and has real-time access to browsing history, email, and social media activity. To gain access, an analyst simply needs to fill out an on-screen form with a broad justification for the search that is not reviewed by any court or NSA personnel. Source[9]

“I, sitting at my desk, could wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”. – Edward Snowden

  • Creates maps of the social networks of United States citizens. Source[10]
  • Has access to smartphone app data. Source[11]
  • Uses spies in embassies to collect data, often by setting up ‘listening stations’ on the roofs of buildings.Source[12]
  • Uses fake LinkedIn profiles and other doctored web pages to secretly install surveillance software in unwitting companies and individuals. Source[13]
  • Tracks reservations at upscale hotels. Source[14]
  • Has intercepted the talking-points of world leaders before meetings with Barack Obama. Source[15]
  • Can crack encryption codes on cellphones. Source[16]
  • Has implanted software on over 100,000 computers worldwide allowing them to hack data without internet connection, using radio waves. Source[17]
  • Has access to computers through fake wireless connections. Source[18]
  • Monitors communications in online games such as World of Warcraft. Source[19]
  • Intercepts shipping deliveries and install back-door devices allowing access. Source[20]
  • Has direct access to the data centers of Google, Yahoo and other major companies. Source[21]
  • Covertly and overtly infiltrate United States and foreign IT industries to weaken or gain access to encryption, often by collaborating with software companies and internet service providers themselves. They are also, according to an internal document, “responsible for identifying, recruiting and running covert agents in the global telecommunications industry.” Source[22]
  • The use of “honey traps”, luring targets into compromising positions using sex. Source[23]
  • The sharing of raw intelligence data with Israel. Only official U.S. communications are affected, and there are no legal limits on the use of the data from Israel. Source[24]
  • Spies on porn habits of activists to discredit them. Source[25]

Possibly the most shocking revelation was made on February 24, 2014. Internal documents show that the security state is attempting to manipulate and control online discourse with “extreme tactics of deception and reputation-destruction.” The documents revealed a top-secret unit known as the Joint Threat Research Intelligence Unit, or JTRIG. Two of the core self-identified purposes of JTRIG are to inject all sorts of false material onto the internet in an effort to discredit a target, and to use social sciences such as psychology to manipulate online discourse and activism in order to generate a desirable outcome. The unit posts false information on the internet and falsely attributes it to someone else, pretend to be a ‘victim’ of a target they want to discredit, and posts negative information on various forums. In some instances, to discredit a target, JTRIG sends out ‘false flag’ emails to family and friends.

A revealing slide from the JTRIG presentation.[26]  

Read the whole JTRIG presentation by Greenwald, just do it. Here[27]

Now, consider the words of former NSA employee turned whistleblower Russ Tice:

“Okay. They went after–and I know this because I had my hands literally on the paperwork for these sort of things–they went after high-ranking military officers; they went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees and some of the–and judicial.

But they went after other ones, too. They went after lawyers and law firms. All kinds of–heaps of lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court that I had his wiretap information in my hand. Two are former FISA court judges. They went after State Department officials.

They went after people in the executive service that were part of the White House–their own people. They went after antiwar groups. They went after U.S. international–U.S. companies that that do international business, you know, business around the world. They went after U.S. banking firms and financial firms that do international business. They went after NGOs that–like the Red Cross, people like that that go overseas and do humanitarian work. They went after a few antiwar civil rights groups.

So, you know, don’t tell me that there’s no abuse, because I’ve had this stuff in my hand and looked at it. And in some cases, I literally was involved in the technology that was going after this stuff. And you know, when I said to [former MSNBC show host Keith] Olbermann, I said, my particular thing is high tech and you know, what’s going on is the other thing, which is the dragnet. The dragnet is what Mark Klein is talking about, the terrestrial dragnet. Well my specialty is outer space. I deal with satellites, and everything that goes in and out of space. I did my spying via space. So that’s how I found out about this… And remember we talked about that before, that I was worried that the intelligence community now has sway over what is going on.

Now here’s the big one. I haven’t given you any names. This was is summer of 2004. One of the papers that I held in my hand was to wiretap a bunch of numbers associated with, with a 40-something-year-old wannabe senator from Illinois. You wouldn’t happen to know where that guy lives right now, would you? It’s a big white house in Washington, DC. That’s who they went after. And that’s the president of the United States now.” Russ Tice, NSA Whistleblower

Chilling.

Glenn Greenwald on the Hypocrisy of the Left

Writing in the Guardian:

Meanwhile, a large bulk of the Democratic and liberal commentariat – led, as usual, by the highly-paid DNC spokesmen called “MSNBC hosts” and echoed, as usual, by various liberal blogs, which still amusingly fancy themselves as edgy and insurgent checks on political power rather than faithful servants to it – degraded all of the weighty issues raised by this episode by processing it through their stunted, trivial prism of partisan loyalty. They thus dutifully devoted themselves to reading from the only script they know: Democrats Good, GOP Bad.

Greenwald, a Leftist himself, is of course writing about the vitriolic attacks from the Left on Rand Paul’s filibuster the other day. There is more (it’s Greenwald after all):

That phrase – “engaged in combat” – does not only include people who are engaged in violence at the time you detain or kill them. It includes a huge array of people who we would not normally think of, using common language, as being “engaged in combat”.

Indeed, the whole point of the Paul filibuster was to ask whether the Obama administration believes that it has the power to target a US citizen for assassination on US soil the way it did to Anwar Awlaki in Yemen. The Awlaki assassination was justified on the ground that Awlaki was a “combatant”, that he was “engaged in combat”, even though he was killed not while making bombs or shooting at anyone but after he had left a cafe where he had breakfast. If the Obama administration believes that Awlaki was “engaged in combat” at the time he was killed – and it clearly does – then Holder’s letter is meaningless at best, and menacing at worst, because that standard is so broad as to vest the president with exactly the power his supporters now insist he disclaimed.

Read the whole thing.