Jean Lievin & Jon Rappoport: Is Ed Snowden A Stake In Heart of USG-Wall Street Market Rigging? Is an Impeachment Shit-Storm Looming? Will Extratradition of US Bankers Be Demanded?

04 Indonesia, 05 Iran, 08 Wild Cards, Commerce, Corruption, Government, Liberation Technology, Military, Policy, Privacy
Jean Lievens
Jean Lievens

Max Keiser Explains Significance of Edward Snowden’s “Leak”

Twitching, rumpled and passionate, Max Keiser explains the deeper significance of Edward Snowden’s recent intelligence leaks.  It’s not about national security.  Keiser implies that Snowden has revealed evidence of a fascist market-rigging operation that’s ultimately funding America’s secret government–a corporate plutocracy.


Jon Rappoport
Jon Rappoport

Matrix: Who is Edward Snowden?

By Jon Rappoport

This article is a compilation of a number of pieces I’ve written about Ed Snowden and the NSA. It doesn’t replace them, but it hits the high points…


For years ATS [substitute NSA] had been using its technological superiority to conduct massive insider trading. Since the early 1980s, the company had spied on anyone and everyone in the financial world. They listened in on phone calls, intercepted faxes, and evolved right along with the technology, hacking internal computer networks and e-mail accounts. They created mountains of ‘black dollars’ for themselves, which they washed through various programs they were running under secret contract, far from the prying eyes of financial regulators.

Those black dollars were invested into hard assets around the world, as well as in the stock market, through sham, offshore corporations. They also funneled the money into reams of promising R&D projects, which eventually would be turned around and sold to the Pentagon or the CIA.

Read full article.

Continue reading “Jean Lievin & Jon Rappoport: Is Ed Snowden A Stake In Heart of USG-Wall Street Market Rigging? Is an Impeachment Shit-Storm Looming? Will Extratradition of US Bankers Be Demanded?”

Doc Searls on user-driven democracy

07 Other Atrocities, 11 Society, Advanced Cyber/IO, Civil Society, Collective Intelligence, Computer/online security, Corporations, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Cyberscams, malware, spam, Government, InfoOps (IO), IO Sense-Making, Power Behind-the-Scenes/Special Interests, Privacy, Secrecy & Politics of Secrecy, Technologies, Tools
Jon Lebkowsky Bio

Doc Searls on user-driven democracy

by jonl

Speaking at the 2011 Personal Democracy Forum, Doc talks about how power relationships work in markets vs how they should  and could work. Markets are conversations, and they should be symmetrical conversations. Note his bit about how the language of marketing parallels the language of slavery….and the part where all their cookies end up giving them 50% completely wrong information.

Doc is the co-author of the Clue-Train Manifesto.

Direct Link to Personal Democracy Video

See Also:

48 Recordings on Tap from Personal Democracy 2011

Event + Webcast: 24 March, Gov Surveillance in a Digital World (7pm PST/10pm EST)

Civil Society, Commerce, Computer/online security, Corruption, Government, Law Enforcement, Mobile, Privacy, Secrecy & Politics of Secrecy, Technologies

On the evening on March 24, 2011, EFF staff activists will discuss the state of government surveillance and privacy in the United States at “Government Surveillance in a Digital World,” an event hosted by San Francisco Intersection for the Arts, with a live video stream by

One of the many topics to be discussed is the PATRIOT Act. For nearly ten years, EFF has fought to reform or repeal the overbroad authority granted to law enforcement through the PATRIOT Act, and this year, we have a chance to introduce significant reforms. Thanks to bipartisan opposition and the efforts of grassroots activists, Congress rejected a rubber-stamp reauthorization of the PATRIOT Act and instead vowed to spend three months debating reforms to this law. This gives us an incredible opportunity to speak out against the PATRIOT Act and tell Congress that we don’t want any laws that trample on our civil liberties.

Join the EFF activism team in person or online for a a wide-ranging discussion on privacy in the digital world, online free expression, and how we can work together to stop Congress from reauthorizing a PATRIOT Act that enables excessive government surveillance.


Freedom Box: The Short Pitch as of March 2011

Advanced Cyber/IO, Autonomous Internet, Collective Intelligence, Communities of Practice, Counter-Oppression/Counter-Dictatorship Practices, Ethics, InfoOps (IO), microfinancing, Mobile, Peace Intelligence, Privacy, Real Time, Reform, Technologies

FreedomBox right now as I see it

by James Vasile as posted to HackerVisions, a blog at the intersection of Freedom, Technology, & Community

People have been asking me for a short description of the FreedomBox that doesn’t get too technical but also gets into some details. So here’s my capsule pitch, a short form version of how I see the FreedomBox right now:

The FreedomBox just raised $80K in donations via Kickstarter (the campaign is still going on, if you want to donate) on the strength of positive press in the NYTimes, WSJ, Wired and CBS Evening News. We’re at the very beginning of putting together a team to build this thing. This week we will announce our tech lead, an A+ name with the experience and contacts to lead our architecture design.

Continue reading “Freedom Box: The Short Pitch as of March 2011”

Journal: Corporate Hijacking of Cyber-Space

03 Economy, 07 Other Atrocities, 11 Society, Civil Society, Collective Intelligence, Commerce, Commercial Intelligence, Earth Intelligence, InfoOps (IO), Methods & Process, Mobile, Money, Banks & Concentrated Wealth, Policy, Politics of Science & Science of Politics, Power Behind-the-Scenes/Special Interests, Privacy, Reform, Standards, Strategy, Technologies
Marcus Aurelius Recommends

The Wall Street Journal

The FCC’s Threat to Internet Freedom

‘Net neutrality’ sounds nice, but the Web is working fine now. The new rules will inhibit investment, deter innovation and create a billable-hours bonanza for lawyers.

Tomorrow morning the Federal Communications Commission (FCC) will mark the winter solstice by taking an unprecedented step to expand government’s reach into the Internet by attempting to regulate its inner workings. In doing so, the agency will circumvent Congress and disregard a recent court ruling.

How did the FCC get here?

Read entire article….

Phi Beta Iota: The public is now much more aware that neither of the two political parties can be trusted, and that trust for any given government element, policy, or point of view is contingent on a much deeper examination of bias and motive than many would wish.  There are two sides to this issue, irrespective of the competency and good faith of government: on the one side are the corporations, including Google and Verizon, that wish to hijack cyber-space and claim that they own it.  This will allow them to charge premium prices for access to high-speed services.  On the other are those whose taxes paid for the creation of the Internet in the first place, the US taxpayer–they see the vital importance of open spectrum, open source software, and open source intelligence as the tri-fecta of cyber-freedom.  At OSS ’92 John Perry Barlow said that the Internet interprets censorship as an outage, and routes around it.  Our view is that the corporations will succeed in hijacking cyberspace in the near term, but in the mid-term and beyond OpenBTS and other bottom-up public innovation solutions will restore the noosphere to its rightful owners, the human minds that comprise the World Brain.

Your Apps Are Watching You…AND Reporting Intimate Details Without Your Consent…

Civil Society, Commerce, Commercial Intelligence, Computer/online security, Corruption, InfoOps (IO), IO Secrets, Mobile, Privacy

Your Apps Are Watching You

A WSJ Investigation finds that iPhone and Android apps are breaching the privacy of smartphone users


Wall Street Journal, Sunday, December 18, 2010

Few devices know more personal details about people than the smartphones in their pockets: phone numbers, current location, often the owner’s real name—even a unique ID number that can never be changed or turned off.

These phones don’t keep secrets. They are sharing this personal data widely and regularly, a Wall Street Journal investigation has found.

Continue reading “Your Apps Are Watching You…AND Reporting Intimate Details Without Your Consent…”

Journal: Brooks on Assange, Others on Brooks

04 Education, 07 Other Atrocities, 10 Security, 11 Society, Civil Society, Collective Intelligence, Corporations, Corruption, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Government, IO Sense-Making, Journalism/Free-Press/Censorship, Military, Misinformation & Propaganda, Money, Banks & Concentrated Wealth, Officers Call, Power Behind-the-Scenes/Special Interests, Privacy, Secrecy & Politics of Secrecy

EDIT of 5 Dec 2010 to add commentaries by various others.

David Brooks

Op-Ed Columnist

The Fragile Community


Published: November 29, 2010

Julian Assange, the founder of WikiLeaks, had moved 37 times by the time he reached his 14th birthday. His mother didn’t enroll him in the local schools because, as Raffi Khatchadourian wrote in a New Yorker profile, she feared “that formal education would inculcate an unhealthy respect for authority.”

. . . . . . .

She needn’t have worried. As a young computer hacker, he formed a group called International Subversives. As an adult, he wrote “Conspiracy as Governance,” a pseudo-intellectual online diatribe. He talks of vast “patronage networks” that constrain the human spirit.

Far from respecting authority, Assange seems to be an old-fashioned anarchist who believes that all ruling institutions are corrupt and public pronouncements are lies.

Read the rest of this revealing assessment….

Phi Beta Iota: We like David Brooks.  He’s less submissive than David Ignatius, less pretentious than Fareed Zakaria, and generally has something interesting to say.  In this piece, most revealingly, he displays his limitations to the fullest.  We are quite certain that David Brooks means well, but the depth of his naivete in this piece is nothing short of astonishing.  The below lists of lists of book reviews will suffice to demonstrate that David Brooks is not as well-read as he needs to be, not as intellectual as he pretends to be, and not at all accurate in his assessment of Julian Assange.  We share with Steven Aftergood of Federation of American Scientists (FAS) concerns about Assange’s judgment in releasing some materials that are gratuitous invasions of rightful privacy, but we also believe that Assange is finding his groove, and the recent cover story in Forbes captures that essence.  WikiLeaks is an antidote to corporate fascism and elective Empire run amok.  It meets a need.

Other Commentaries on the Same Article:

Continue reading “Journal: Brooks on Assange, Others on Brooks”

Reference: WikiLeaks Interview in Forbes–Promoting Business Ethics

03 Economy, 07 Other Atrocities, 11 Society, About the Idea, Commerce, Commercial Intelligence, Corporations, Cultural Intelligence, Ethics, Historic Contributions, InfoOps (IO), Journalism/Free-Press/Censorship, Money, Banks & Concentrated Wealth, Officers Call, Power Behind-the-Scenes/Special Interests, Privacy, Reform
Andy Greenberg

Nov. 29 2010

Fascinating article, including leaks in the pipeline (banks), whistleblowers, censorship, his story, trying to stop leaks, spying, untrustful competitors, secrecy, war, field of intelligence, etc.  … “our primary defense isn’t law, but technology…courage is contagious” (p.8) —  JAS

Forbes Cover Story . . . Forbes Transcript

Following is an excerpt from page 5 regarding moving in the direction of ethical business — JAS

Forbes Cover Story

What do you think WikiLeaks mean for business? How do businesses need to adjust to a world where WikiLeaks exists?

WikiLeaks means it’s easier to run a good business and harder to run a bad business, and all CEOs should be encouraged by this. I think about the case in China where milk powder companies started cutting the protein in milk powder with plastics. That happened at a number of separate manufacturers.

Let’s say you want to run a good company. It’s nice to have an ethical workplace. Your employees are much less likely to screw you over if they’re not screwing other people over.

Then one company starts cutting their milk powder with melamine, and becomes more profitable. You can follow suit, or slowly go bankrupt and the one that’s cutting its milk powder will take you over. That’s the worst of all possible outcomes.

The other possibility is that the first one to cut its milk powder is exposed. Then you don’t have to cut your milk powder. There’s a threat of regulation that produces self-regulation.

It just means that it’s easier for honest CEOs to run an honest business, if the dishonest businesses are more effected negatively by leaks than honest businesses. That’s the whole idea. In the struggle between open and honest companies and dishonest and closed companies, we’re creating a tremendous reputational tax on the unethical companies.

No one wants to have their own things leaked. It pains us when we have internal leaks. But across any given industry, it is both good for the whole industry to have those leaks and it’s especially good for the good players.

But aside from the market as a whole, how should companies change their behavior understanding that leaks will increase?

Do things to encourage leaks from dishonest competitors. Be as open and honest as possible. Treat your employees well.

I think it’s extremely positive. You end up with a situation where honest companies producing quality products are more competitive than dishonest companies producing bad products. And companies that treat their employees well do better than those that treat them badly.

Would you call yourself a free market proponent?

Absolutely. I have mixed attitudes towards capitalism, but I love markets. Having lived and worked in many countries, I can see the tremendous vibrancy in, say, the Malaysian telecom sector compared to U.S. sector. In the U.S. everything is vertically integrated and sewn up, so you don’t have a free market. In Malaysia, you have a broad spectrum of players, and you can see the benefits for all as a result.

How do your leaks fit into that?

To put it simply, in order for there to be a market, there has to be information. A perfect market requires perfect information.

There’s the famous lemon example in the used car market. It’s hard for buyers to tell lemons from good cars, and sellers can’t get a good price, even when they have a good car.

By making it easier to see where the problems are inside of companies, we identify the lemons. That means there’s a better market for good companies. For a market to be free, people have to know who they’re dealing with.

The InterviewYou’ve developed a reputation as anti-establishment and anti-institution.

Not at all. Creating a well-run establishment is a difficult thing to do, and I’ve been in countries where institutions are in a state of collapse, so I understand the difficulty of running a company. Institutions don’t come from nowhere.

It’s not correct to put me in any one philosophical or economic camp, because I’ve learned from many. But one is American libertarianism, market libertarianism. So as far as markets are concerned I’m a libertarian, but I have enough expertise in politics and history to understand that a free market ends up as monopoly unless you force them to be free.

WikiLeaks is designed to make capitalism more free and ethical.

But in the meantime, there could be a lot of pain from these scandals, obviously.

Pain for the guilty.

Do you derive pleasure from these scandals that you expose and the companies you shame?

It’s tremendously satisfying work to see reforms being engaged in and stimulating those reforms. To see opportunists and abusers brought to account.


Thanks to: Dan Drasin via John Steiner.

Malware Intelligence of Modern Crimeware

Computer/online security, Cyberscams, malware, spam, Methods & Process, Privacy, Technologies

MalwareIntelligence is a site dedicated to the investigation of crimes committed using the Internet as the main channel of attack. Also, anything that involves maneuvering and criminal activities in this area, covering a wide spectrum in the field of computer criminology.

The mission is to work in a completely disinterested in the continuous improvement in prevention to security incidents that allow for timely contingency threats.

Thus MalwareIntelligence behind is a group of professionals in research, intelligence and information security, which fuse the various processes involved in these disciplines to offer exclusive content, quality and high value for the resolution of computer crime.

MalwareIntelligence currently has two divisions:

MalwareDisasters is devoted to analyzing malicious code from a purely involved in intelligence processes. The content expressed in this division refers mainly to activities “visual” of malware.

SecurityIntelligence channels information on information security, also from the standpoint of intelligence processes, resulting in a high-value content to understand the need to merge Intelligence in Information Security.

Thanks to Alexander Heid’s talk at the Next Hope called “Modern CrimeWare Tools and Techniques: An Analysis of Underground Resources– Download Audio: 16kbps or 64kbps

Worth a Look: Ric Merrifield Blog, Extract on Privacy

Privacy, Worth A Look
Home Page






. . .even Zillow

Not familiar with these companies?  You should be, because they are plotting the course for the future of internet privacy and how we interact with people and merchants.

Bynamite is just the latest and there is a very good article about them here.  In short, Bynamite has (correctly, in my opinion) seen that each time we conduct a search on the internet, the search itself is a transaction because it gives merchants and the search engines more information about our interests, tastes, and needs.  Bynamite also thinks that this sort of profile information will in short order play a very real role in the prices we pay for goods and the kinds of coupons we get.  I think they are right about that as well – and this by itself is one of the most fundamental changes in the world of commerce to come along in a very long time – a set of one, or many, micro transactions prior to the primary transaction(s) that then inform the price we pay for future transactions – in essence context-rich transactions.

Read Rest of Post

Blog Home Page

Google: Post-Geographical, Post-National Super-State (Distorted Multi-Plex Eye)

Civil Society, Commerce, Corporations, Privacy, Technologies

Google’s Earth

August 31, 2010

“I ACTUALLY think most people don’t want Google to answer their questions,” said the search giant’s chief executive, Eric Schmidt, in a recent and controversial interview. “They want Google to tell them what they should be doing next.” Do we really desire Google to tell us what we should be doing next? I believe that we do, though with some rather complicated qualifiers.

Science fiction never imagined Google, but it certainly imagined computers that would advise us what to do. HAL 9000, in “2001: A Space Odyssey,” will forever come to mind, his advice, we assume, eminently reliable — before his malfunction. But HAL was a discrete entity, a genie in a bottle, something we imagined owning or being assigned. Google is a distributed entity, a two-way membrane, a game-changing tool on the order of the equally handy flint hand ax, with which we chop our way through the very densest thickets of information. Google is all of those things, and a very large and powerful corporation to boot.

We have yet to take Google’s measure. We’ve seen nothing like it before, and we already perceive much of our world through it. We would all very much like to be sagely and reliably advised by our own private genie; we would like the genie to make the world more transparent, more easily navigable. Google does that for us: it makes everything in the world accessible to everyone, and everyone accessible to the world. But we see everyone looking in, and blame Google.

Continue reading “Google: Post-Geographical, Post-National Super-State (Distorted Multi-Plex Eye)”

Google Watch: Google is the only source, “Do Not Track Me” List, WSJ “What They Know” Series

Civil Society, Commerce, Counter-Oppression/Counter-Dictatorship Practices, Government, Mobile, Power Behind-the-Scenes/Special Interests, Privacy, Technologies

The National Geospatial-Intelligence Agency (NGA) has a requirement to provide a secured, hosted environment that provides web-based access to geospatial visualization services and Open Geospatial Consortium complaint web service interfaces. The Schedule of Supplies/Services provides for the period of performance from 20 September 2010 through 19 September 2011 and two 12-month option years.

This acquisition is for Commercial Geospatial Visualization Services for NGA. Google is the only source that can meet the Government’s requirement for worldwide access, unlimited processing, and Open Geospatial Consortium complaint web service interfaces. See Full National Geospatial-Intelligence Agency Release

“Do Not Track Me” gains traction in Washington

by John M. Simpson (Aug 15, 2010)

"What They Know" Series

“What They Know” Series by the Wall Street Journal

A comment on the Google wi-fi/wi-spy issue:

“Most of my sources say that Google and Facebook have been bankrolled by the NSA and CIA vendors and they are in complete collusion with each other. I believe Americans will live to regret their participation with Facebook and Google.”  –Glen Woodfin (source)


+ 2009 Arnold Google: The Digital Gutenberg (also: The Google Legacy, Google 2.0: The Calculating Predator)
+ Inside Google
+ Google = King of Malware
+ Journal: Google, CIA Invest in ‘Future’ of Web Monitoring
+ Street views privacy issue
+ Time For Google to Grow Up: Open Wi-Fi Privacy Mistake Must Be The Last (
+ Seriously? Eric Schmidt Thinks There Should Be No Anonymity Online? (Forbes – Aug 11, 2010)
+ EFF Warns of Untrustworthy SSL, Undetectable Surveillance (Aug 16, 2010)
+ Google CEO: Young web users will need to escape online posts (Aug 20, 2010)

Journal: Google Wants You….In Every Way, Forever

07 Other Atrocities, 10 Transnational Crime, Computer/online security, Corporations, Corruption, Cyberscams, malware, spam, InfoOps (IO), Misinformation & Propaganda, Mobile, Power Behind-the-Scenes/Special Interests, Privacy, Real Time, Secrecy & Politics of Secrecy, Technologies, Tools

Prevent web malware and enforce policies for all users

Google Web Security for Enterprise, protects organizations of all sizes against web malware attacks and enables the safe, productive use of the web, without incurring hardware, upfront capital, or IT management costs.

Simple to deploy, effortless to maintain, scalable and secure

  • No hardware to install or maintain, just a simple change to your firewall or proxy
  • Proactively blocks web malware before it reaches your network
  • Integrates easily with directory services for granular enforcement and reporting
  • Extends to all employees wherever they are working – at home, in a hotel room, café, client premises, or Wi-Fi spot

Interested in learning more? Download these resources

Comment:  You were right. I’ve just learned about Google’s Endgame. I’m sure it’s been out a while, but when I saw this, I immediately thought of your statement about Google wanting to BECOME the Internet. The short video tells all.  REDACTED

Phi Beta Iota:  see also these posts.

(Audio) 300-700 Vietnam MIA’s & POW’s left behind + Skiptracing & Personal Data Access

Audio, Communities of Practice, Government, Journalism/Free-Press/Censorship, Media, Military, Privacy, Topics (All Other)
click to listen to the audio

Radio Netherlands show “The State We’re In” segments about 300-700 Vietnam MIA’s & POW’s left behind + Skiptracing & Personal Data Access.


: In regards to personal data, of interest here would be campaigns promoting the idea and legal process of “owning” our data, or, “owning our own data” while redefining “ownership.” We may see a day (hopefully not) when everyone has an i.d. webpage showing profile info and other data that can be brought up by anyone. Your URL will be asked for along with your social security number. Yes, researchers/investigators can cultivate information on people but having a mandate for webpage profiles is another matter.

Wall Street Journal’s “Privacy isn’t everything on the web”

CIA retired Carmen Medina on Info-tech & Openness

Government, Intelligence (government), Open Government, Privacy

read the interview

Interview where she responds to the following questions/issues:

+ Social media and extreme views
+ How our ideas about privacy have to change
+ How failure to share information leads to more failure
+ Why previous attempts to share intelligence have failed
+ The way government adopts technology is broken
+ Can we crowdsource intelligence gathering?