Bill Blunden

Why the Media's Emphasis on Russian Hacking Distracts from the Value of the Leaks That Exposed Corruption

According to unnamed officials a classified assessment by the Central Intelligence Agency blames the Russian government for, among other things, providing WikiLeaks with all those hacked emails during the run-up to 2016 presidential election. One source referred to this conclusion as the “consensus view” of the intelligence community. Though if that’s the case then someone forgot to tell all those agents at the FBI who, in their desire to obtain proof beyond a reasonable doubt (imagine that), have up to now declined to make a definitive statement.

Keep reading...Show less

Why the 'Apple vs Govt' Storyline Is a Fake Designed to Distract the Public

The media is erupting over the FBI’s demand that Apple help it decrypt an iPhone belonging to Syed Rizwan Farook, one of the attackers involved in the assault in San Bernardino this past December. Originally Apple wanted the FBI to keep things on the down low, asking the Feds to present their application for access under seal. But for whatever reason the FBI decided to go public. Apple then put on a big show of resistance and now there are legislators threatening to change the law in favor of the FBI. Yet concealed amid this unfolding drama is a vital fact that very few outlets are paying attention to.

Keep reading...Show less

Conspiracy Anyone? The NSA’s 9/11 Cover-Up

“All tricksters, other than magicians, depend to a great extent upon the fact that they are not known to be, or even suspected of being, tricksters. Therein lies their great advantage.” — John Mulholland

Keep reading...Show less

How the NSA Is a Servant of Corporate Power

"We are under pressure from the Treasury to justify our budget, and commercial espionage is one way of making a direct contribution to the nation's balance of payments." - Sir Colin McColl, MI6 Chief

Keep reading...Show less

Does Edward Snowden Really Trust Apple to Do the Right Thing?

In the wake of Congress passing the USA Freedom Act, Ed Snowden composed an editorial piece that appeared in the New York Times. Aspects of this article may surprise those who have followed events since Snowden first went public two years back. 

Keep reading...Show less

The Unbelievably Weird Reaction to Europe's Stagnant Jobs Market -- Virtual Workplace Therapy

As the economy in Europe festers the New York Times reports that the ranks of the Eurozone’s unemployed are finding solace in a curious parallel economy populated by thousands of counterfeit businesses known as “practice firms.” This alternate universe doesn’t actually produce tangible goods or services, rather it offers people with unpaid positions that foster a sense of routine, structure, and personal connection. And while participating in this bogus job market may offer some relief on a superficial level the tendrils of social control are visible to those who know where to look.   

Keep reading...Show less

Are We Really Supposed to Believe That Republicans Are Fixing the Govt.'s Mass Surveillance Agenda?

The business records provision of the Patriot Act, known as Section 215, is scheduled to expire on June 1. It’s the legal basis for the NSA’s collection of telephone metadata inside American borders. A few days ago the House Judiciary Committee proudly announced that it had approved a bill, the USA Freedom Act of 2015 (HR 2048/S.1123), which alters the provisions of Section 215. The Judiciary Committee claims that its proposed legislation “ends bulk collection.” At best this is a mischaracterization that flagrantly ignores additional surveillance laws.

Keep reading...Show less

The Latest Outrageous Example of the Pentagon, DEA and Private Companies Conspiring to Track Everything You Do

Yet another report has surfaced describing how tools created by the companies selling software that can damage and hack into people's computers are being deployed by U.S. security services. While the coverage surrounding this story focuses primarily on federal agencies it’s important to step back for a moment and view the big picture. In particular, looking at who builds, operates, and profits from mass surveillance technology offers insight into the nature of the global panopticon.

Keep reading...Show less

Why Obama's Plan to Deter Cyber Attacks With Sanctions Is Useless

The White House has announced a new sanctions program that will authorize the executive branch to penalize malicious cyber “actors” whose behavior endangers “the national security, foreign policy, or economic health or financial stability of the United States.” Sadly the President is opting for theater that creates the perception of security rather than actually making it more difficult for attacks to succeed.

Keep reading...Show less

Why the Idea That a Big Cyber Attack Could Create a Huge Tech Armageddon Is Pure BS

Over the past several years, mainstream news outlets have conveyed a litany of cyber doomsday scenarios on behalf of ostensibly credible public officials. Breathless intimations of the End Times. The stuff of Hollywood screenplays. However a recent statement by the U.S. intelligence community pours a bucket of cold water over all of this.

Keep reading...Show less

Cyber Arms Control Pipedreams: Why Attempts to Limit Malware Development Are Destined to Fail

As the extent of the NSA’s offensive programs becomes public knowledge, the editorial board at the New York Times has recommended that the United States government try to jam the lid back on Pandora's Box by engaging in “international efforts to negotiate limits on the cyberarms race.” The editorial board then references Cold War arms-control treaties as a model for future efforts. Yet the history of the Cold War demonstrates that arms-control treaties don’t always pan out. Moreover the inherent nature of malware engineering makes the detection of treaty violations nearly impossible.

Keep reading...Show less

Don't Believe the Hype: Encryption Isn't Enough to Protect Our Privacy

In the aftermath of Edward Snowden's disclosures, the American public has been deluged with talking points that advocate strong encryption as a universal solution for protecting our privacy. Unfortunately the perception of strong encryption as a panacea is flawed. In this report I’ll explain why strong encryption isn’t enough and then present some operational guidelines which can be used to enhance your online privacy. Nothing worthwhile is easy. Especially sidestepping the Internet’s global Eye of Providence.

Keep reading...Show less

Latest Cyber Bank Robbery Demonstrates That Govt Prefers Crappy Tech Security for Its Own Benefit

“Software flaws account for a majority of the compromises organizations around the world experience." Shon Harris, CISSP Exam Guide, Sixth Edition 

Keep reading...Show less

Clear Proof Obama's Surveillance Oversight Board Is a Pathetic Sideshow

In the aftermath of the Snowden revelations President Obama made a big show of ordering changes to how American spies operate. Sadly, the reforms implemented by the U.S. intelligence community reveal that White House officials have opted for a bunch of cosmetic gestures as the NSA adds 2,880,000 square feet of real estate and Obama openly boasts to Chinese leaders about tripling American cyber forces to 6,000 by 2016. On the whole not much has changed. Government spies are still bulk collecting telephone metadata and international communiqués.

Keep reading...Show less

Why Are Rational Critics of the Govt's Official Story on the Great Sony Hack Smeared as Conspiracy Theorists?

This past week FBI director James Comey presented additional evidence to support his assertion that North Korea is behind the recent cyberattack on Sony. Specifically Comey explained that the attackers were using a set of proxy servers to conceal the origin of their online campaign. He also stated that there were isolated instances in which the attackers somehow neglected to use these proxies, thus revealing their actual location:

Keep reading...Show less

Blaming Government Surveillance on the Government Ignores the Plutocrats Behind the Curtain

Both the Obama and Bush administrations have displayed astonishing continuity with regard to national security policies that sanction measures like mass surveillance, pervasive secrecy and covert operations. According to Tufts professor Michael J. Glennon, a leading critic on these matters, this is the result of government bureaucracies like the Department of Defense consolidating so much clout and autonomy that they essentially answer to no one, not even the President.

Yet careful scrutiny of the public record reveals the exact opposite. Far from being out of control, the apparatchiki of the military-industrial complex dutifully follow mandates transmitted on behalf of profound sources of influence outside of government. What ostensibly appears to be a conspiracy of government officials is actually the broader systemic problem of state capture by a Deep State. The United States government is beholden to a corporate ruling class and the national security apparatus is a logical expression of their power.

Keep reading...Show less

Tech Companies Are Peddling a Phony Version of Security, Using the Govt. as the Bogeyman

This week the USA Freedom Act was blocked in the Senate as it failed to garner the 60 votes required to move forward. Presumably the bill would have imposed limits on NSA surveillance. Careful scrutiny of the bill’s text however reveals yet another mere gesture of reform, one that would codify and entrench existing surveillance capabilities rather than eliminate them.

Keep reading...Show less

Are Apple and Google Really on Your Side Against the NSA?

In the past couple of days both Google[i] and Apple[ii] have announced that they’re enabling default encryption on their mobile devices so that only the user possessing a device’s password can access its local files. The public relations team at Apple makes the following claim:

Keep reading...Show less
BRAND NEW STORIES
@2025 - AlterNet Media Inc. All Rights Reserved. - "Poynter" fonts provided by fontsempire.com.