{"id":4861,"date":"2014-09-29T13:19:51","date_gmt":"2014-09-29T20:19:51","guid":{"rendered":"https:\/\/emrabc.ca\/?p=4861"},"modified":"2018-08-03T01:39:31","modified_gmt":"2018-08-03T08:39:31","slug":"is-our-data-safe","status":"publish","type":"post","link":"https:\/\/emrabc.ca\/?p=4861","title":{"rendered":"Is our Data Safe?"},"content":{"rendered":"<p><span style=\"line-height: 1.5em;\">The Smart Grid claims to be secure, but recent articles really make Canadians wonder if all this technology is really a good idea.<\/span><\/p>\n<p>PBS Nova features an interesting documentary about how data is handled, and what could happen to the data, including the <strong>Smart Grid.<\/strong><\/p>\n<p><a href=\"http:\/\/www.pbs.org\/wgbh\/nova\/tech\/rise-of-the-hackers.html\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-4862\" alt=\"pbs_rise\" src=\"https:\/\/emrabc.ca\/wp-content\/uploads\/2014\/09\/pbs_rise.jpg\" width=\"551\" height=\"292\" srcset=\"https:\/\/emrabc.ca\/wp-content\/uploads\/2014\/09\/pbs_rise.jpg 918w, https:\/\/emrabc.ca\/wp-content\/uploads\/2014\/09\/pbs_rise-300x158.jpg 300w\" sizes=\"auto, (max-width: 551px) 100vw, 551px\" \/><\/a><\/p>\n<p><a href=\"http:\/\/www.pbs.org\/wgbh\/nova\/tech\/rise-of-the-hackers.html\" target=\"_blank\">http:\/\/www.pbs.org\/wgbh\/nova\/tech\/rise-of-the-hackers.html<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>https:\/\/www.youtube.com\/watch?v=QmmOFtp-btM<\/p>\n<p>&nbsp;<\/p>\n<h2>PBS Program Description<\/h2>\n<div>\n<p>Our lives are going digital. We shop, bank, and even date online. Computers hold our treasured photographs, private emails, and all of our personal information. This data is precious\u2014and cybercriminals want it. Now, NOVA goes behind the scenes of the fast-paced world of cryptography to meet the scientists battling to keep our data safe. They are experts in extreme physics, math, and a new field called &#8220;ultra-paranoid computing,&#8221; all working to forge unbreakable codes and build ultra-fast computers. From the sleuths who decoded the world&#8217;s most advanced cyber weapon to scientists who believe they can store a password in your unconscious brain, NOVA investigates how a new global geek squad is harnessing cutting-edge science\u2014all to stay one step ahead of the hackers.<\/p>\n<p>&nbsp;<\/p>\n<p>In addition, the security of the internet itself is questioned by many. \u00a0A recent article on &#8220;Internet Trolls&#8221; may be of interest to those with concerns about the safety of the data which is used for the Smart Grid.<\/p>\n<p>&nbsp;<\/p>\n<p><b>INTERNET TROLLING: A WELL-ORCHESTRATED CORPORATIST STRATEGEM<\/b><\/p>\n<p><em>\u00a0&#8220;Re.\u00a0 Internet Trolls:\u00a0 Every time there is an article about problems with wireless devices, including smart meters, there are obviously industry hackers who immediately respond. There are programs that can alert people to certain topics ASAP, and there are people who are paid by industry to respond right away, often taking up all the space for comments. I\u2019m sure we\u2019ve all seen the same names and comments over and over again. This gives some info. about how it\u2019s done, and how often it\u2019s being done.&#8221;<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"color: #000000;\">Internet Trolls May be Trained Government Agents According to Leaked Document<\/span><\/h2>\n<p>Sep 25, 2014<\/p>\n<p><a href=\"http:\/\/drleonardcoldwell.com\/2014\/09\/25\/internet-trolls-may-be-trained-government-agents-according-to-leaked-document\/\">http:\/\/drleonardcoldwell.com\/2014\/09\/25\/internet-trolls-may-be-trained-government-agents-according-to-leaked-document\/<\/a><\/p>\n<p>Health Impact News Editor\u00a0<a href=\"https:\/\/firstlook.org\/theintercept\/staff\/glenn-greenwald\/\">Glenn Greenwald<\/a>,\u00a0a journalist, constitutional lawyer, commentator, and author of three New York Times best-selling books on politics and law, has been working with <i>NBC News<\/i>\u00a0in\u00a0publishing a series of articles on how covert government agents infiltrate the Internet to \u201cmanipulate, deceive, and destroy reputations.\u201d<\/p>\n<p>The information is based on documents leaked by National Security Agency (NSA) whistleblower Edward Snowden. Greenwald\u2019s article,\u00a0<a href=\"https:\/\/firstlook.org\/theintercept\/2014\/02\/24\/jtrig-manipulation\/\">How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations<\/a>, is based on four classified documents produced by the British spy agency GCHQ, and presented to the NSA and three other English speaking agencies reportedly part of \u201c<a href=\"http:\/\/www.theatlantic.com\/politics\/archive\/2013\/06\/is-the-five-eyes-alliance-conspiring-to-spy-on-you\/277190\/\">The Five Eyes Alliance<\/a>.\u201d<\/p>\n<p>In this shocking piece, Greenwald publishes a copy of a spy training manual used entitled: \u201c<a href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/02\/24\/art-deception-training-new-generation-online-covert-operations\/\">The Art of Deception: Training for Online Covert Operations<\/a>.\u201d Greenwald writes that agencies like the NSA are \u201cattempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.\u201d Greenwald writes:<\/p>\n<p>Among the core self-identified purposes of JTRIG are two tactics: <b>(1)<\/b> to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and <b>(2)<\/b>to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: \u201cfalse flag operations\u201d (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting \u201cnegative information\u201d on various forums.<\/p>\n<p>While this kind of counter-intelligence activity may not sound surprising given the objectives of spy agencies going after terrorists, what disturbs Greenwald (and many others) is that the discussion regarding these techniques have been greatly expanded to include the general public:<\/p>\n<p>Critically, the \u201ctargets\u201d for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of \u201ctraditional law enforcement\u201d against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, \u201chacktivism\u201d, meaning those who use online protest activity for political ends.<\/p>\n<p>The title page of one of these documents reflects the agency\u2019s own awareness that it is \u201cpushing the boundaries\u201d by using \u201ccyber offensive\u201d techniques against people who have<i>nothing to do with terrorism or national security threats<\/i>, and indeed, centrally involves law enforcement agents who investigate ordinary crimes.<\/p>\n<p>No matter your views on Anonymous, \u201chacktivists\u201d or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want \u2013 <b>who have never been charged with, let alone convicted of,\u00a0any crimes<\/b> \u2013 with these sorts of online, deception-based tactics of reputation destruction and disruption.<\/p>\n<p>And while these leaked documents concern the British spy agency, Greenwald is quick to point out that the Obama administration has actually been open and forward about using such techniques in the U.S.:<\/p>\n<p>Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation.\u00a0Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House\u2019s former head of the Office of Information and Regulatory Affairs, <a href=\"http:\/\/www.salon.com\/2010\/01\/15\/sunstein_2\/\">wrote a controversial paper in 2008<\/a> proposing that the\u00a0US government employ teams of covert agents and pseudo-\u201dindependent\u201d\u00a0advocates to \u201ccognitively infiltrate\u201d online groups and websites, as well as other activist groups.<\/p>\n<p>Sunstein also proposed sending covert agents into \u201cchat rooms, online social networks, or even real-space groups\u201d which spread what he views as false and damaging \u201cconspiracy theories\u201d about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that \u2013 while disputing key NSA claims \u2013 proceeded to propose <a href=\"http:\/\/www.theguardian.com\/world\/2013\/dec\/13\/nsa-review-to-leave-spying-programs-largely-unchanged-reports-say\">many cosmetic reforms<\/a> to the agency\u2019s powers (most of which were ignored by the President who appointed them).<\/p>\n<p>(<a href=\"https:\/\/firstlook.org\/theintercept\/2014\/02\/24\/jtrig-manipulation\/\">Full article here<\/a>.)<\/p>\n<p>Trolls Used by Big Pharma to Attack Vaccine Objectors<\/p>\n<p>Have you ever been on an Internet forum, blog, or Facebook Page where all of a sudden, out of nowhere, several people appear to contradict the main topic being discussed, especially if it is regarding a controversial topic like vaccines? Well it is entirely possible, and even likely, that it is not coincidence, and that it is a well-coordinated attack by \u201ctrolls\u201d. As Greenwald reveals in his recently published article, there are definitely programs in place in government spy agencies to do just that.<\/p>\n<p>This tactic of trained trolls can be used by those outside of government also, and Big Pharma seems to be one business sector that employs this tactic as well, especially targeting publishers who report on the dangers of vaccines.<\/p>\n<p>Of course it should also be pointed out that the distinction between the government and the pharmaceutical industry is a very hazy one. As we have pointed out several times in the past, the vaccine industry cannot survive in a free market, but needs the government to prop them up. In the 1980s there were so many \u00a0lawsuits against pharmaceutical companies for vaccine damages, that the vaccine industry blackmailed Congress by threatening to get out of the vaccine business unless they passed legislation protecting them from lawsuits. Congress obliged, and legislation was passed preventing the public from suing pharmaceutical companies for damages due to vaccines, and this law was upheld by the Supreme Court in 2011. The pharmaceutical industry now has a free pass to put as many vaccines into the market place as they want to, regardless of efficacy or dangerous side effects, since there is no accountability left in the judicial system.<\/p>\n<p>Today, the pharmaceutical industry is practically a branch of the government. The government awards grants from your tax dollars to research new vaccines, the FDA approves them, and then government organizations like the CDC and UNICEF purchase the vaccines with your tax dollars. The CDC even holds patents and earns royalties on vaccines, and many of the top scientists work for both the government and the pharmaceutical companies. Julie Gerberding, for example, was the head of the CDC from 2002 to 2009, and then took over as head of the pharmaceutical company Merck\u2019s vaccine division overseeing billions of dollars in sales. The government definitely has a vested interest in protecting the vaccine market.<\/p>\n<p>So it should surprise no one that there are coordinated efforts to infiltrate and discredit those who publish the truth about vaccines, which may lead to fewer people wanting to purchase or receive them.<\/p>\n<p>Consider the following comments appearing on a blog post from a pro-Pharma site discussing how to target sites and Facebook Pages who publish the alternative view of vaccines. Advice is given on how to infiltrate and flood discussions about vaccines by pretending to be victims of diseases because they failed to get vaccinated. I am not going to mention the name of the website and give them publicity, but it has already been established that this site is financed by those with clear ties to the pharmaceutical industry. Here are some comments that appeared in a blog post that was trying to convince readers that outbreaks of diseases were due to \u201canti-vaccinationists\u201d:<\/p>\n<p><i>\u2018Use emotional warfare on anti-vax blogs. Tell emotional stories full of tears and sobbing and unbearable grief and terror, about people in your own family or people you read about, who were sick with or died of terrible diseases. Don\u2019t hold back details about bodily fluids and suchlike: the more gross the better. This stuff has a way of infiltrating the minds of readers and subtly influencing their decisions, in a manner similar to advertising.\u2019<\/i><\/p>\n<p><i>\u2018Go in there and \u201cagree with them\u201d and then say things that appear thoroughly delusional, overtly nuts, blatantly and obviously wrong even to nincompoops, etc. Occasional spelling and grammar errors are also useful but don\u2019t over-do. The point of this exercise is to create an impression that drives away undecideds who may come in to check out these sites. It helps to do this as a group effort and begin gradually, so the sites appear to be \u201cgoing downhill slowly.\u201d\u2018<\/i><\/p>\n<p><i>\u2018But it is useful to have an email address that can\u2019t be traced back, for certain legitimate and ethical uses, just as it is useful to have a mail box at say the UPS store.\u2019<\/i><\/p>\n<p>As you can see from this advice, trying to reason or debate on the merits or lack of merits regarding vaccines does not work, so they have to resort to manipulative and deceptive tactics, much the same as what Greenwald was reporting about above in regards to government spy agencies. Here is a comment showing how they also try to out number those who are not trolls:<\/p>\n<p><i>12 is right on target: post that kind of schizophrenic word-salad on the anti-vax sites in large quantities, under various pseudonyms, and clog up the sites with it until it appears that a large fraction of the members are downright wacko. This will seriously turn off undecideds who check out those sites. P2\u2019s comment is an excellent template for this tactic, but you can easily make up your own by inserting random words into sentences and then going on digressive riffs about the random words. Be sure to Capitalize occasional Nouns and Verbs as well.<\/i><\/p>\n<p><i>Really: listen up folks, the way to fight this crap is NOT by \u201cpatiently explaining\u201d to people who are already way past being persuaded that the Earth isn\u2019t flat. You may as well be talking to rocks (healing crystals?:-). The way to fight it is by sabotaging the anti-vaxers with crazy stuff that drives away undecideds. The way to fight it is with emotional narratives that undermine the ones that the anti-vaxers are pushing.<\/i><\/p>\n<p>These trolls are also adept in creating fake personalities with fake email addresses so that they can continue to infiltrate those who publish the other side of the vaccine debate:<\/p>\n<p><i>76: The way to do it is to set up a fictitious email address. Speaking from experience working on research on extremist groups:<\/i><\/p>\n<p><i>Start by setting one up on your existing broadband provider: AT&amp;T, Comcast, and the rest of \u2018em give you five or more email addresses of your choice. Create a totally fictitious name and then an address that reflects that name e.g. John Doe and JDoe1234@.<\/i><\/p>\n<p><i>Next, get an address on a free service provider such as Yahoo or Hotmail or whatever. Since most of these ask for your \u201cother\u201d email address as proof of identity, give them the one on your broadband provider. They will send a confirmation email to that address giving you your starting password.<\/i><\/p>\n<p><i>Third, after about a week of using your new fictitious address in various places that let you sign up for comments, you can be sure it\u2019s working, so then go in and delete the address you created on your broadband service. Typically they deactivate the address immediately and then take a month to free up that slot for re-use. This step ensures that your Yahoo or Hotmail address becomes un-traceable back to your broadband provider.<\/i><\/p>\n<p><i>Fourth, wait a month for the original fictitious name to completely purge from your broadband provider.<\/i><\/p>\n<p><i>Fifth: Now you\u2019re home free to get onto the anti-vax boards and any other objectionable boards you want to go after, and make all manner of noise to make them look ridiculous and drive away the undecideds. Yeee-hawww, round \u2018em up!<\/i><\/p>\n<p><i>Speaking of rounding \u2018em up, you now have an untraceable email address \u2026<\/i><\/p>\n<p><i>That said, the option of simply going forth and making noise on anti-vax boards makes it all worthwhile. Every undecided you scare away from those boards, is one more family that will probably get their kids vaccinated.\u00a0<\/i><\/p>\n<p>The \u201cCENSORSHIP\u201d Accusation: Don\u2019t fall for it<\/p>\n<p>Trolls and Internet dissenters love to level the accusation of \u201cCENSORSHIP!\u201d as soon as they are restricted from carrying out their often highly orchestrated opposition to information they would love to suppress from being propagated on the Internet. Don\u2019t fall for this ploy.<\/p>\n<p>First, there is a huge difference between \u201cmoderating\u201d and \u201ccensorship.\u201d A blog or Facebook Page that allows for interaction of opposing viewpoints, for example, may still moderate the discussion and prevent trolling. As we have shown above, manipulative deception is common on the Internet, and allowing this kind of activity in one\u2019s own private space is actually allowing the opposing view to get away with their own form of \u201ccensorship\u201d by means of deception.<\/p>\n<p>Secondly, \u201ccensorship\u201d is a neutral term, not a negative one. 100% uncensored speech is both dangerous and illegal. You can be prosecuted in a court of law for many forms of speech, such as slander, child pornography, threats of intent to harm, and many others.<\/p>\n<p>I am always amused when moderating Internet discussions on content owned by myself or others we are publishing, and having to delete comments that are either derogatory, offensive, or anything else opposing the purpose of our communication, that we are accused of \u201ccensorship\u201d as if we are the ones doing something wrong for suppressing such speech. There seems to be a misguided assumption that anything published on the Internet is owned by the public. Businesses, especially, fall for this common misconception all the time, by allowing unmoderated discussions to occur on their own Internet content.<\/p>\n<p>But back when there was only print media, everything that was sent into a media source was censored and filtered, with only the opinions judged by the editors to be worthy of publishing to their readers being accepted and printed. And if businesses published information about their products, they certainly did not allow competitors and adversaries to come into their place of business to attack them and voice their opinions! And if they purchased advertising space in any media, either print, radio, or TV, the voices of those who did not like it were certainly not heard in the advertising space of media it was appearing in. They had to purchase their own space, or try to get a \u201cletter to the editor\u201d published.<\/p>\n<p>Yet, when you publish something on the Internet, you own that content! If it is a blog, you can either turn off comments altogether, or you can allow certain comments to be published, according to any standards you see fit!<\/p>\n<p>As far as social media, the social media company might provide the platform, but you still own the content. You are under no obligation to allow trolls and others to voice their contrary opinions on your content just because it is published on the Internet. People are free to publish their own content in their own space \u2013 they have no right to do it in yours.<\/p>\n<p>Of course the owner of the social media platform might engage in their own form of censorship or restrictions, but that is a topic of another article to follow. For now, if you are a publisher of content on the Internet today (as almost everyone is), just be aware that as you grow in popularity, you may very well start attracting trolls trying to discredit you or your message. Be aware of their tactics, and take action accordingly to protect your freedom of speech.<\/p>\n<p>Source:\u00a0<a href=\"http:\/\/healthimpactnews.com\/2014\/internet-trolls-may-be-trained-government-agents-according-to-leaked-document\/\">http:\/\/healthimpactnews.com\/2014\/internet-trolls-may-be-trained-government-agents-according-to-leaked-document\/<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Smart Grid claims to be secure, but recent articles really make Canadians wonder if all this technology is really a good idea. PBS Nova features an interesting documentary about how data is handled, and what could happen to the data, including the Smart Grid. http:\/\/www.pbs.org\/wgbh\/nova\/tech\/rise-of-the-hackers.html &nbsp; https:\/\/www.youtube.com\/watch?v=QmmOFtp-btM &nbsp; PBS Program Description Our lives are [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[592,147,146,18],"tags":[],"class_list":["post-4861","post","type-post","status-publish","format-standard","hentry","category-energy-use-data","category-hacking","category-security","category-smart-meter"],"_links":{"self":[{"href":"https:\/\/emrabc.ca\/index.php?rest_route=\/wp\/v2\/posts\/4861","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/emrabc.ca\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/emrabc.ca\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/emrabc.ca\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/emrabc.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4861"}],"version-history":[{"count":3,"href":"https:\/\/emrabc.ca\/index.php?rest_route=\/wp\/v2\/posts\/4861\/revisions"}],"predecessor-version":[{"id":6503,"href":"https:\/\/emrabc.ca\/index.php?rest_route=\/wp\/v2\/posts\/4861\/revisions\/6503"}],"wp:attachment":[{"href":"https:\/\/emrabc.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4861"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/emrabc.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4861"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/emrabc.ca\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4861"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}