Chelsea Manning wins free speech award: ‘It’s easy to feel invisible’ – video | US news | The Guardian

Chelsea Manning, currently in a maximum security prison in Kansas, is awarded the Blueprint for Free Speech prize

Fuente: Chelsea Manning wins free speech award: ‘It’s easy to feel invisible’ – video | US news | The Guardian


Mis nueve meses en régimen de aislamiento fueron una tortura “sin contacto”

En 2010, el ejército estadounidense detuvo a una de sus analistas de inteligencia por filtrar documentos clasificados sobre las guerras de Irak y Afganistán a Wikileaks; hoy cumple una condena de 35 años de prisión. “Me llevaron a un solitario agujero negro de confinamiento. Dos semanas después empecé a pensar en suicidarme”, recuerda.

Fuente: Mis nueve meses en régimen de aislamiento fueron una tortura “sin contacto”


The NSA Has An Advice Columnist. Seriously. – The Intercept

The NSA Has An Advice Columnist. Seriously. – The Intercept.

By 433
Featured photo - The NSA Has An Advice Columnist. Seriously.

What if the National Security Agency had its own advice columnist? What would the eavesdroppers ask about?

You don’t need to guess. An NSA official, writing under the pen name “Zelda,” has actually served at the agency as a Dear Abby for spies. Her “Ask Zelda!” columns, distributed on the agency’s intranet and accessible only to those with the proper security clearance, are among the documents leaked by NSA whistleblower Edward Snowden. The columns are often amusing – topics include co-workers falling asleep on the job, sodas being stolen from shared fridges, supervisors not responding to emails, and office-mates who smell bad. But one of the most intriguing involves a letter from an NSA staffer who complains that his (or her) boss is spying on employees.

In the letter, which Zelda published in a column on September 9, 2011, the employee calls himself “Silenced in SID” – referring to the Signals Intelligence Directorate, the heart of the NSA’s surveillance operations. Zelda’s column, headlined “Watching Every Word in Snitch City,” offers an ironic insight into a spy agency where the spies apparently resent being spied upon.

“Dear Zelda,” the letter of complaint begins:

Here’s the scenario: when the boss sees co-workers having a quiet conversation, he wants to know what is being said (it’s mostly work related). He has his designated “snitches” and expects them to keep him apprised of all the office gossip – even calling them at home and expecting a run-down! This puts the “designees” in a really awkward position; plus, we’re all afraid any offhand comment or anything said in confidence might be either repeated or misrepresented.

Needless to say, this creates a certain amount of tension between team members who normally would get along well, and adds stress in an already stressful atmosphere. There is also an unspoken belief that he will move people to different desks to break up what he perceives as people becoming too “chummy.” (It’s been done under the guise of “creating teams.”)

Surveillance tends to sow suspicion and unease among the people who are being surveilled. Is anyone listening? Who might be the spy among us? What trouble might I get into with the things I say? These questions can eat away at the core of human relations – trust. And this is true even at the agency that is conducting the surveillance.

The letter continues:

We used to be able to joke around a little or talk about our favorite “Idol” contestant to break the tension, but now we’re getting more and more skittish about even the most mundane general conversations (“Did you have a good weekend?”). This was once a very open, cooperative group who worked well together. Now we’re more suspicious of each other and teamwork is becoming harder. Do you think this was the goal?

Silenced in SID

Zelda is shocked.

Dear Silenced,

Wow, that takes “intelligence collection” in a whole new – and inappropriate – direction. …. We work in an Agency of secrets, but this kind of secrecy begets more secrecy and it becomes a downward spiral that destroys teamwork. What if you put an end to all the secrecy by bringing it out in the open?


How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations – The Intercept

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations – The Intercept.

By 
Featured photo - How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy ReputationsA page from a GCHQ top secret document prepared by its secretive JTRIG unit

One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.

Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations.”

By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.

Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:

Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”: