Spying on Internet Users

Posted on 23. Feb, 2011 by Raja Mujtaba in US
[Translate]
Beware the government's avatars, especially fear your own
By Wayne Madsen

The Department of Homeland Security is conducting massive spying on Internet users through a program called "Avatar Identity."


The existence of the program was disclosed to WMR by a source who stated that the development of avatars for every user of the Internet had its beginnings with the U.S. Air Force and the Advance Research Projects Agency (ARPANET) at the outset of the fielding of World Wide Web (WWW) technology in the early 1990s.

At the core of Homeland Security's Avatar Identity Program is the reliance on genetic algorithms developed for the analysis of the stock market to come up with prime investment strategies. The program was developed through the aegis of the Homeland Security Advanced Research Projects Agency (HSARPA), which inherited many of the invasive Internet surveillance programs from its Pentagon cousin, the Defense Advanced Research Projects Agency(DARPA), after its programs, including the proposed Total Information Awareness program, were defunded by Congress

The Avatar Identity Program appears to coincide with another Air Force project to solicit "persona management software" to create virtual users on the Internet in order to conduct perception management campaigns to inundate chat rooms, letter to the editor, and on-line polls to sway public opinion on key issues.
It was also recently revealed that the computer security firm HB Gary Federal worked in a program to create and manage "sock puppet" Internet users to infiltrate websites to create confusion and propagate disinformation. The program was to be used to attack WikiLeaks and apparently was linked to the US Chamber of Commerce, the Bank of America, the bank's chief law firm Hunton & Williams, and two other technology firms that later withdrew from participation: Palantir Technologies and Berico Technologies.

More ominous is the report that it was the Department of Justice recommended the use of HB Gary Federal, Palantir, and Berico (known as Team Themis, which would operate a Corporate Information Reconnaissance Cell [CIRC]) to the Chamber, the Bank of America, and Hunton & Williams to engage in the sock puppet management operation. The program matches recommendations from White House Office of Information Regulatory Affairs chief Dr. Cass Sunstein, who has referred to such operations as "cognitive infiltration."

However, Homeland Security's Avatar Identity program involves the creation of an avatar for every Internet user that pulls information from the actual user's Google searches, Twitter messages, Facebook postings, on-line commerce activities, and other web interactions and feeds the transactions to the avatar program. Intelligence analysts then query the avatar for details of the user's activities.

WMR was informed that the Avatar Identity Program was first developed for every known terrorist in the world. However, it has now expanded to include every Internet user and it is being aggressively used to identify and track down members of the hacktivist group "Anonymous," which has attacked the computer systems of HB Gary Federal, Bank of America, and other firms seen as waging a war against Internet freedom.
As an example of its practical use, the Avatar Identity Program records all on-line letters to President Obama sent via the White House web site, as well as any searches for Obama on the Internet.
Our source explained the avatar program by saying, "Every Internet user has a life on the Internet," adding, "but with the avatar, every user has a second life on the web." In the case of the avatar, every Internet user has a virtual "snitch" that reports their every action and movement on the web to the government.
=======
The solicitation for the Air Force's Persona Management program:
Solicitation Number:
RTB220610
Notice Type:
Sources Sought
Synopsis:
Added:
Jun 22, 2010 1:42 pmModified: Jun 22, 2010 2:07 pmTrack Changes 0001- Online Persona Management Service. 50 User Licenses, 10 Personas per user.
Software will allow 10 personas per user, replete with background , history, supporting details, and cyber presences that are technically, culturally and geographacilly consistent. Individual applications will enable an operator to exercise a number of different online persons from the same workstation and without fear of being discovered by sophisticated adversaries. Personas must be able to appear to originate in nearly any part of the world and can interact through conventional online services and social media platforms. The service includes a user friendly application environment to maximize the user's situational awareness by displaying real-time local information.
0002- Secure Virtual Private Network (VPN). 1 each
VPN provides the ability for users to daily and automatically obtain randomly selected IP addresses through which they can access the internet. The daily rotation of the user s IP address prevents compromise during observation of likely or targeted web sites or services, while hiding the existence of the operation. In addition, may provide traffic mixing, blending the user s traffic with traffic from multitudes of users from outside the organization. This traffic blending provides excellent cover and powerful deniability. Anonymizer Enterprise Chameleonor equal

0003- Static IP Address Management. 50 each
Licence protects the identity of government agencies and enterprise organizations. Enables organizations to manage their persistent online personas by assigning static IP addresses to each persona. Individuals can perform static impersonations, which allow them to look like the same person over time. Also allows organizations that frequent same site/service often to easily switch IP addresses to look like ordinary users as opposed to one organization. Anonymizer IP Mapper License or equal

0004- Virtual Private Servers, CONUS. 1 each
Provides CONUS or OCONUS points of presence locations that are setup for each customer based on the geographic area of operations the customer is operating within and which allow a customer?s online persona(s) to appear to originate from. Ability to provide virtual private servers that are procured using commercial hosting centers around the world and which are established anonymously. Once procured, the geosite is incorporated into the network and integrated within the customers environment and ready for use by the customer. Unless specifically designated as shared, locations are dedicated for use by each customer and never shared among other customers. Anonymizer Annual Dedicated CONUS Light Geosite or equal

0005- Virtual Private Servers, OCONUS. 8 Each
Provides CONUS or OCONUS points of presence locations that are setup for each customer based on the geographic area of operations the customer is operating within and which allow a customer?s online persona(s) to appear to originate from. Ability to provide virtual private servers that are procured using commercial hosting centers around the world and which are established anonymously. Once procured, the geosite is incorporated into the network andintegrated within the customers environment and ready for use by the customer. Unless specifically designated as shared, locations are dedicated for use by each customer and never shared among other customers. Anonymizer Annual Dedicated OCONUS Light Geosite or equal

0006- Remote Access Secure Virtual Private Network. 1 each
Secure Operating Environment provides a reliable and protected computing environment from which to stage and conduct operations. Every session uses a clean Virtual Machine (VM) image. The solution is accessed through sets of Virtual Private Network (VPN) devices located at each Customer facility. The fully-managed VDI (Virtual Desktop Infrastructure) is an environment that allows users remote access from their desktop into a VM. Upon session termination,
the VM is deleted and any virus, worm, or malicious software that the user inadvertently downloaded is destroyed. Anonymizer Virtual Desktop Infrastructure (VDI) Solution or equal.
2606 Brown Pelican Ave.
MacDill AFB, Florida 33621-5000
United States
Place of Performance:
Performance will be at MacDIll AFB, Kabul, Afghanistan and Baghdad, Iraq.
MacDill AFB , Florida 33679
United States
Primary Point of Contact.:
Russell Beasley,
Contracting Officer
russell.beasley-02@macdill.af.mil
Phone: (813) 828-4729
Fax: (813) 828-5111
Wayne Madsen is a Washington, DC-based investigative journalist, author and syndicated columnist. He has written for several renowned papers and blogs.
Madsen is a regular contributor on Russia Today. He has been a frequent political and national security commentator on Fox News and has also appeared on ABC, NBC, CBS, PBS, CNN, BBC, Al Jazeera, and MS-NBC. Madsen has taken on Bill O’Reilly and Sean Hannity on their television shows. He has been invited to testifty as a witness before the US House of Representatives, the UN Criminal Tribunal for Rwanda, and an terrorism investigation panel of the French government.
As a U.S. Naval Officer, he managed one of the first computer security programs for the U.S. Navy. He subsequently worked for the National Security Agency, the Naval Data Automation Command, Department of State, RCA Corporation, and Computer Sciences Corporation.
Madsen is a member of the Society of Professional Journalists (SPJ), Association for Intelligence Officers (AFIO), and the National Press Club. He is a regular contributor to Opinion Maker.



(link)http://www.opinion-maker.org/2011/02...nternet-users/

Views: 263

Reply to This

Replies to This Discussion

Yes, they have been a bit more interested lately!!!
So what kind of software do we need to block the man from tracking us?

yes, nice post. it seems as if our actions on the internet are being treated like that's how we live our everyday lives. pretty scary. seems that if you where to google obama getting assassinated just to see if there was any talk about it. you get put into a category of people who want to assassinate obama.

just for the record i have no intentions of assassinating obama and am not trying to encourage anyone else to do so.

I do not care any more...i know they watching ...

I feel them in my tail..so what?...i will tell the Truth any way...

I know they have a program and when you write the word "revolution" for example the computer automatic track what you said about it....and track any where you go..

and they call it... human  right, civil liberty ...freedom...What Freedom it is That?

 

Lord Enlil

As a writer, I am very aware of this program. As a matter of fact, I am well aware of the spying going on. I hope they love me. This program deters me not one iota. The Internet contains no privacy for no one. I remember this always.

Welcome in the club my friend...

For sure they "Love"all of us...in special the Fusion Centers...

They have a "special place "for us in F.E.M.A camps...i will bet on it...

But we will not make them a good day...if we talk like "rebels"...

because you now what they say:'you are not with us ..so you are against us"....

I am afraid they speak like this...and said:"better with the devil... then against him..."

Have a nice day my friend...

 

Lord Enlil

I have a gift for you...see it my friend...

See you..

Lord Enlil

I believe this is why they turned the internet over to the people.  They saw a tool they could use to spy on the masses.  I also knew about this, and posted about it over a year ago.  What it so crazy about the whole situation is that this software is so locked down, so behind the scenes that anyone using the software can email a high political person pretending to be their mother, and it would seem as though it did come from their mother in every way.  As long as they have the speech down pat that is.

It is all about the Matrix my friend...

If someone think ..it is not good for them...and they are not happy with that...

Better be like a sheep with no mind....they say..

To much thinking it will kill you...they say..

In one day this it will be over my friend.....we will stop them...

See you..

Lord Enlil

Another gift....for another friend...

Remember this:"together we will win....separate we will fall.."

Lord Enlil

Cell phones , internet services, youTube, and email are all made to spy. Just remember spies are meant to be spied on.

This it will be over soon...

How far do you think Lucifer it will go with this....?

He has been stop once...i will stop him the second time...

Lord Enlil

RSS

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Less Prone commented on Doc Vega's blog post Was Sabotage or Terrorism used in the Collapse of the Francis Scott Key Bridge?
"Perfect for destroying the supply chain. It could well have been intentional."
11 hours ago
Less Prone favorited Doc Vega's blog post Was Sabotage or Terrorism used in the Collapse of the Francis Scott Key Bridge?
11 hours ago
Doc Vega posted blog posts
12 hours ago
rlionhearted_3 posted photos
15 hours ago
rlionhearted_3 favorited Doc Vega's photo
15 hours ago
tjdavis posted a video

Alabama’s Biggest Secret - Operation Paperclip 🇺🇸

In the north of Alabama is the city of Huntsville. It's here where German scientists built NASA in secrecy after World War II. Operation Paperclip is still s...
19 hours ago
tjdavis posted a photo
20 hours ago
Doc Vega commented on Doc Vega's blog post Americans You’re Being Squeezed Out!
"Cheeki kea always nice to her you chime in and you're damn right! "
yesterday
Doc Vega commented on Doc Vega's blog post Americans You’re Being Squeezed Out!
"Les Prone thanks for your support Dude! "
yesterday
Doc Vega posted a photo

The inconvenient truth

Trump spells it out!
yesterday
Sandy posted a photo
Wednesday
Less Prone favorited Doc Vega's blog post What Made the Founding Fathers of America so Brilliant?
Tuesday
Less Prone commented on Doc Vega's blog post Why didn't the Archeological World Announce Proof that Jesus Lived?
"Motives of Joe, to shit in the well by showing totally irrelevant proof?"
Tuesday
Doc Vega commented on Doc Vega's blog post Why didn't the Archeological World Announce Proof that Jesus Lived?
"Less, Motives of Wyatt or Joe? What archeologist wouldn't want proof of Jesus as part of his…"
Tuesday
Doc Vega commented on Doc Vega's blog post Why didn't the Archeological World Announce Proof that Jesus Lived?
"Less Prone, Considering Joe Rogan to be the gatekeeper of anything is just short of ridiculous the…"
Tuesday
Doc Vega posted a blog post
Tuesday
MAC posted a video

Don't Go To Hong Kong Now (Even on Connecting Flights)

Secure your privacy with Surfshark! Enter coupon code laowhy86 for an extra 3 months free at https://Surfshark.deals/laowhy86Article 23 in Hong Kong is real,...
Tuesday
cheeki kea commented on cheeki kea's video
Thumbnail

Terrorist Attack on Moscow - Ukraine Committing Suicide? | Larry C. Johnson

"...And I guess I'll just park this you tube here also for something to ponder from last year.…"
Tuesday
tjdavis posted photos
Tuesday
Less Prone posted a video

Climate: The Movie (The Cold Truth) NL

Deze nieuwe documentaire van de Britse filmmaker Martin Durkin toont aan dat klimaatalarm een verzonnen doembeeld is zonder enige wetenschappelijke basis. He...
Monday

© 2024   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted