Seven questions for reporters, lawmakers, and the public to demand answers.
Christopher Wylie goes on the record to discuss his role in hijacking the profiles of millions of Facebook users in order to target the US electorate
In this second post in our series about Canada’s national security law reform, we begin a discussion of changes proposed for the Communications Security Establishment (CSE), Canada’s primary signals intelligence and cybersecurity agency. We focus specifically on how Canada will address an issue that has also arisen in allied states: oversight of bulk collection that may incidentally include communications involving nationals.
It is about disrupting and holding accountable entrenched actors and conduct that have reared their ugly heads again and again over the years continuing to present.
The following have been updated and added to the integrated slides:
Never Too Late
Focusing on Relevant Stuff
Title 26, 18, 50 and 10 Confusion
Federal Investigations Primer:
Added compartmentalization & Need to Know
Cross-Border Law Enforcement Primer:
Added Canadian “Agent” Role
Added Stings, Ethnic Communities and Foreign Personas
Updated Factual Instances: Corruption
Updated Impacts of Off-the-Books or Regional Independence Alliances
Sources, Operatives & Organizations Digest:
Added Criminal Organization Structure
Added Criminal Organization Communication Structure
Added Matchmakers & Rainmakers
Seattle Federal Corruption Slides Integrated:
Added Selected Linkages Slide Set
This post is the 2nd addendum to (previous limited information 9 posts) and integrated post for documentation and reference purposes. Information, context and statements were previously and contemporaneously documented and independently verifiable. Conclusions and assessments are self-evident or clearly marked and separately identified. Related efforts are not recent and have been ongoing for a significant period.
A few years ago, shortly after stepping down as Assistant Attorney General for National Security, I published a long article called Law Enforcement as a Counterterrorism Tool. As its title suggests, the article’s central thesis was that law enforcement methods are useful in combating international terrorism. I did not try to make the case that law enforcement is the only, or even necessarily the best, way of combating terrorism.
The benefits of secure encryption redound to both law enforcement and citizens’ rights.
The EU data law is scheduled to take effect May 25.
But then so many people on FB are legends in their own minds and curate their profile to scream so.
From the information coherence perspective, the requirement of longer running, more consistent public information with independent public validations (interactions, relationships, location presence, etc.) makes the personas not concurrently replicable, transferable or reusable. (Not taking into account creating fake social media cross referenced identities on the fly which is done for law enforcement and undercover purposes but not for deep cover.)
The required exposure and public undercover networks are also mutual damage multipliers. Once burnt they are operationally finished with cascading affects. Add instant facial recognition, biometrics and a whole network can get nuked before they know. The technology is not future, it is operational now.
In the age of social media, where the complete absence of a detailed social media presence can be a red flag, how do spies conceal their identity?
On May and June 2013, when New Orleans’ murder rate was the sixth-highest in the United States, the Orleans Parish district attorney handed down two landmark racketeering indictments against dozens of men accused of membership in two violent Central City drug trafficking gangs, 3NG and the 110ers. Members of both gangs stood accused of committing 25 murders as well as several attempted killings and armed robberies.
The Defense Advanced Research Projects Agency is launching the Persistent Aquatic Living Sensors program.