Patrick Meier: On Rumors, Repression and Digital Disruption in China: Opening Pandora’s Inbox of Truthiness?

Advanced Cyber/IO, IO Impotency
0Shares
Patrick Meier

On Rumors, Repression and Digital Disruption in China: Opening Pandora’s Inbox of Truthiness?

The Economist recently published a brilliant piece on China entitled: “The Power of Microblogs: Zombie Followers and Fake Re-Tweets.” BBC News followed with an equally excellent article: “Damaging Coup Rumors Ricochet Across China.” Combined, these articles reveal just how profound the digital disruption in China is likely to be now that Pandora’s Inbox has been opened.

The Economist article opens with an insightful historical comparison:

“In the year 15AD, during the short-lived Xin dynasty, a rumor spread that a yellow dragon, a symbol of the emperor, had inauspiciously crashed into a temple in the mountains of central China and died. Ten thousand people rushed to the site. The emperor Wang Mang, aggrieved by such seditious gossip, ordered arrests and interrogations to quash the rumor, but never found the source. He was dethroned and killed eight years later, and Han-dynasty rule was restored.”

Click on Image to Enlarge

“The next ruler, Emperor Guangwu, took a different approach, studying rumors as a barometer of public sentiment, according to a recent book Rumors in the Han Dynasty by Lu Zongli, a historian. Guangwu’s government compiled a ‘Rumors Report’, cataloguing people’s complaints about local officials, and making assessments that were passed to the emperor. The early Eastern Han dynasty became known for officials who were less corrupt and more attuned to the people.”

In present day China, a popular pastime among 250+ million Chinese users of microblogging platforms is to “spread news and rumors, both true and false, that challenge the official script of government officials and state-propaganda organs.” In Domination and the Arts of Resistance: Hidden Transcripts, James Scott distinguishes between public and hidden transcripts.

Continue reading “Patrick Meier: On Rumors, Repression and Digital Disruption in China: Opening Pandora’s Inbox of Truthiness?”

Review: Terror on the Tube – Behind the Veil of 7/7

5 Star, 9-11 Truth Books & DVDs, Asymmetric, Cyber, Hacking, Odd War, Crime (Corporate), Crime (Government), Intelligence (Public), Terrorism & Jihad
0Shares
Amazon Page

Nick Kollerstrom

5.0 out of 5 stars Depressing in the Extreme –,April 1, 2012

I received this book as a gift. Although I do not strive to focus on 9/11 and related terror (or false flag terror), because of my extensive reading that includes over 30 (out of 1800) books and DVD's on 9/11, I tend to get offered more free books from the alternative reality community. To access all my reviews of 9/11 and related terror materials, visit Phi Beta Iota the Public Intelligence Blog, and find the category 9/11 under Reviews.

Where my continuing interests intersect with the 9/11 and false flag world is with respect to “integrity” (or lack thereof) among all major institutions in the world today.

This book contains materials on the US 9/11 that I was not aware of, for example that the FEMA emergency response vans arrived in NYC on the night before 9/11.

It is a shame that Look Inside the Book is not available for this book, as that is one of Amazon's best features. This book has 19 chapters as well as an Introduction and Conclusion, and 10 excellent appendices. This is a reference book. It is a fact book. It is a book that represents the very best of citizen investigative journalism.

Here are the chapter titles:

Continue reading “Review: Terror on the Tube – Behind the Veil of 7/7”

Berto Jongman: Overview of Hacktivism and Anonymous as Influence

Advanced Cyber/IO, Commerce, Corruption, Ethics, Government, Hacking
0Shares
Berto Jongman

Anonymous unmasked: The collective's disruptive influence

By CATHERINE SOLYOM

The Gazette, 31 March 2012

Hack the planet – save the world.

That’s become the rallying cry of an army of keyboard warriors known as Anonymous, which in the last 18 months has targeted everyone from the Tunisian government to the Boston police, the Vatican to Sony, Public Safety Minister Vic Toews to PayPal, blocking their websites or retrieving embarrassing files and emails for the world to see.

See and Use Interactive Map of Hacktivist Attacks

MONTREAL – The elusive “hacktivist” collective, identified only by its logo of a headless man in a suit or its Guy Fawkes masks, has hacked into the Syrian defence ministry and Bank of America. It has eavesdropped on Scotland Yard and the FBI. And it has outed alleged white supremacists across Canada, including a couple in Quebec City.

With over 15 million page views on its main news website and more than 560,000 Twitter followers, it’s clear the world is paying attention to this nascent form of politics – and for good cause.

Continue reading “Berto Jongman: Overview of Hacktivism and Anonymous as Influence”

Marcus Aurelius: Your Garbage Man is Watching You – Do Not Yawn

Civil Society, Commerce, Commercial Intelligence, Law Enforcement
0Shares
Marcus Aurelius

Sounds like good idea as long as everybody knows the rules of game.

Garbage Collectors Around the U.S. Trained to Report Suspicious Activity

Public Intelligence

Several newspapers in southern Florida are reporting that trash collectors are receiving training from their employer Waste Management to work with local law enforcement to report crimes and other suspicious activities. The training is part of a program called Waste Watch that is designed to leverage the fact that “drivers are familiar with their routes and are in the same neighborhoods every day” which “puts them in the unique position to spot unusual activity and anything out of the ordinary.” Press releases from Waste Management describe the program as a way of opening “channels of communication with the authorities to help keep them informed and alert of what’s happening in their city’s streets and alleys.”

Continue reading “Marcus Aurelius: Your Garbage Man is Watching You – Do Not Yawn”

DefDog: Cell Phone is Your Leash – Police Own You

Corruption, IO Impotency, Law Enforcement
0Shares
DefDog

Who needs NSA when the phone companies are doing it for revenue streams?

Police Are Using Phone Tracking as a Routine Tool

Eric Lichtbau

New York Times, 31 March 2012

WASHINGTON — Law enforcement tracking of cellphones, once the province mainly of federal agents, has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight, documents show.

The practice has become big business for cellphone companies, too, with a handful of carriers marketing a catalog of “surveillance fees” to police departments to determine a suspect’s location, trace phone calls and texts or provide other services. Some departments log dozens of traces a month for both emergencies and routine investigations.

With cellphones ubiquitous, the police call phone tracing a valuable weapon in emergencies like child abductions and suicide calls and investigations in drug cases and murders. One police training manual describes cellphones as “the virtual biographer of our daily activities,” providing a hunting ground for learning contacts and travels.

Read rest of article.

DefDog: Verizon 2012 Report on Hactivism & Data Breaches

Commercial Intelligence, Corruption, Government, Military
0Shares
DefDog

A useful report that ignores the obvious: the internal errors and omissions as well as the “legal” penetrations and outside-of-legal warrant exploitation.

Talking to some IC insiders who simply do not get it, am forced to conclude that there is regressive de-evolution, and the US IC is the poster child for going backwards.

2012-03-31 Verizon Data Breach Report

Phi Beta Iota:  The National Security Agency (NSA) was directed by the President many many years ago to be responsible for commercial security.  NSA chose to leave commercial security exposed for its own convenience–NSA, in other words, has been criminally irresponsible with respect to the public interest, for decades.

Chuck Spinney: Cancer of Careerism – Final Word on Colin Powell’s Moral Suicide

07 Other Atrocities, Corruption, Government, Military
0Shares
Chuck Spinney

There is not much new here, other than Curveball's public admission, but note Colonel Wilkerson’s comment below.  One the one hand, Wilkerson admits he was a party to the “sexed up” intelligence; on the other, he wants us to believe Powell (and by extension himself) was being used.  Given that “Curveball” was suspected of being a liar by the German intelligence (BND) as well as the CIA, the most charitable interpretation of Powell’s enthusiastic imitation of Adlai Stevenson's speech to the UN during the Cuban Missile Crisis is that once the decision to attack Iraq was made, neither Powell nor Wilkerson had the courage to resign on principle, and both chose instead to be a party to the fabrication — or as we used to say in the Pentagon he chose to be “used” by going along to get along.

CS

 Defector tells how US officials ‘sexed up' his fictions to make the case for 2003 invasion

JONATHAN OWEN, Independent, 1 APRIL 2012

A man whose lies helped to make the case for invading Iraq – starting a nine-year war costing more than 100,000 lives and hundreds of billions of pounds – will come clean in his first British television interview tomorrow.

“Curveball”, the Iraqi defector who fabricated claims about Iraq's weapons of mass destruction, smiles as he confirms how he made the whole thing up. It was a confidence trick that changed the course of history, with Rafid Ahmed Alwan al-Janabi's lies used to justify the Iraq war.

Continue reading “Chuck Spinney: Cancer of Careerism – Final Word on Colin Powell's Moral Suicide”