Dee Finney's blog
start date July 20, 2011
today's date October 22, 2013
page 582
TOPIC: SPYING
NOTE FROM DEE: INSTEAD OF JUST ENJOYING WHAT A PERSON CAN DO, ALL THEY THINK OF IS WHAT CAN WE SPY ON????
REMOTE VIEWERS ARE ALSO TAUGHT HOW TO INFLUENCE OTHER PEOPLE MENTALLY. IS THERE NO PRIVACY IN THIS WORLD -
WHY DO GOVERNMENTS NEED TO MAKE PEOPLE DO THINGS OTHER THAN JUST LIVE LIFE AS NORMALLY AS POSSIBLE?
Secret Life:
Joining George Knapp for the entire 4-hour show on
Sunday night,
Uri Geller, one
of the world's most celebrated and investigated paranormalists, discussed how
his proven powers led him to be given a succession of highly classified
espionage roles, known only at the highest levels of the intelligence community.
As early as five years old, he discovered he had the ability to bend spoons in
his hand, and could perform telekinetic tricks like moving the clock ahead at
school to get out early. Geller, an Israeli, said he first met a Mossad agent
around the age of 12, and demonstrated his ESP and mind reading techniques, and
began doing work for them, eventually going on to meet such people as Moshe
Dayan and Golda Meir.
In the early 1970s, the esteemed parapsychological
researcher, medical inventor and author,
Dr. Andrija Puharich
conducted tests and experiments on Geller, who had been performing at nightclubs
in Tel Aviv. Under hypnosis, Geller revealed information about extraterrestrial
sources in nature, and there were strange, unexplained metallic-sounding voices
on Puharich's tape recording of the session. Around this time, Geller also came
to the Stanford Research Institute for secret CIA testing of his skills. As
described in this
film excerpt,
scientists said that Geller was able to telepathically detect objects, change
the weight of a piece of metal, and accurately sketch drawings that were hidden
from his view.
On one of his missions, Geller said he had a secret
meeting with Ambassador Max Kampelman, and was tasked with telepathically
bombarding the mind of a Russian negotiator in Geneva so that he would sign a
nuclear arms reduction treaty. Geller also conducted two experiments on the
air-- one involved fixing broken watches and time pieces, and afterward, a
number of people emailed in to say that their old time pieces were suddenly
working again. In his second experiment, he made a drawing, and sent out a
mental image of it to listeners, inviting them to recreate it. People may email
George Knapp a
photo of their drawing, which will be compared to Geller's, and the results will
be announced next Sunday.
HERE ARE SOME EXAMPLES OF HOW PREVALENT REMOTE INFLUENCING IS:
www.probablefuture.com/remote-influencing.html - Similarto The Complete Remote Influencing Training System
Become A Master At Powerfully Influencing (Manifesting) Your Reality And Have The Life You Desire And Deserve. With The Complete Remote Influencing ...
www.probablefuture.com/ - Similarto Academy of Remote Viewing and Remote Influencing ...
Outstanding information regarding advanced remote viewing and remote influencingtechniques used by intelligence agencies. Learn to read minds and events, ...
www.huna.org/html/remoteview.html - Similarto Remote Viewing & Remote Influencing, by Jim Fallon - Huna Village
Article by Jim Fallon about Remote Viewing & Remote Influencing.
silvaremoteviewing.com/ - Similarto Learn Remote Viewing and Remote Influencing
Online remote viewing test shows your potential to learn remote viewing and remote influencing with Jose Silva's guaranteed Mind Training System.
www.bibliotecapleyades.net/vision_remota/esp_visionremota_9e.htm - Similarto 5.- How Remote Viewing And Remote Influencing Are Taught
How Remote Viewing And Remote Influencing Are Taught. We have seen the amount of time and money which the Soviets and the Americans have invested ...
www.the-remote-influencing-ascension-guide.com/ - Similarto Remote Influencing and Remote Viewing for Ascension
Learn remote influencing and remote viewing and climb back up the ladder of ascension. Enter the portal of delta and unleash your creative power of thought.
www.amazon.com/Remote-Viewing-Methods-Influencing-Buchanan/dp/B... - Similarto Remote Viewing Methods - Remote Viewing and Remote Influencing
Find Remote Viewing Methods - Remote Viewing and Remote Influencing - Lyn Buchanan LIVE 2 DVD Set at Amazon.com Movies & TV, home of thousands of ...
remote-influencing.angelfire.com/ - Similarto REMOTE INFLUENCING
REMOTE INFLUENCING. Thank you for requesting more information on RemoteInfluencing. No, you're not going to be referred to some fancy website, ...
remoteviewinglight.com/ - Similarto Remote Viewing and Remote Influencing
A multifarious site introducing the art of Remote Viewing and Remote Influencing and other tools to develop your psychic powers, increase telepathic abilities ...
NOTE FROM DEE: WE HAVE KNOWN FOR AS LONG AS COMMERCIALS HAVE BEEN ON THE RADIO AND TELEVISION, WE HAVE KNOWN THE ADS ARE THERE TO MAKE YOU THINK YOU HAVE TO HAVE THEIR SOMETHING OR OTHER. AS ANNOYING AS THESE ADS ARE, EVEN I HAVE BEEN ENCOURAGED TO CALL AN 800 NUMBER TO PURCHASE SOMETHIING I THINK I HAVE TO HAVE BECAUSE IT MAKES MY LIFE JUST A FEW MINUTES EASIER OR MORE FUN.
BUT, THAT'S JUST THE TIP OF THE ICEBERG WITH ADVERTISING.
NOBODY IS ADVOCATING THAT LIFE SHOULD BE BORING, WITHOUT LOVE, OR THAT YOU SHOULD LIVE LIFE DEPRESSED BECAUSE THEY WANT YOU TO SEE ALL THE WAR, VIOLENCE, AND WHATEVER OTHER NEGATIVE THING WILL INTEREST THE BORED PEOPLE WHO DON'T KNOW WHAT TO DO WITH LIFE.
IF YOU NOTICE, AND PROBABLY HAVE, TELEVISION AND MOVIES ARE ADVOCATING THAT YOU CAN'T LIVE LIFE WITHOUT EXCITING 'OVER THE TOP' SEXUAL LIVES AS WELL. EVERYONE WANTS TO BE LOVED, BUT THAT'S NOT WHAT THEY ARE PUSHING, AND YOU KNOW IT. THEY WANT YOU TO BE EXCITED ABOUT WHAT YOU SEE AND BUY WHATEVER IT IS THEY ARE SELLING YOU.
WE ALL HAVE NOTICED THAT OVER THE YEARS WITH TELEVISION, THE SHOWS HAVE BECOME MORE AND MORE LEANING TOWARD PORNOGRAPHY AS WELL - FIRST THEY CAME OUT WITH CABLE TV AND THAT'S THE ONLY PLACE YOU COULD FIND SOMETHING EXCITING TO WATCH, BUT NOW YOU CAN SEE IT EVERYWHERE, EVEN ON THEIR SO-CALLED FUNNY SHOWS. NOT THAT I FIND THEM FUNNY - MOST OF THEM ARE AS STUPID AS WATCHING ROCKS HAVE SEX OR TRYING TO.
THEY HAVE BIG COMPANIES TRACKING WHAT YOU ARE WATCHING ON TV THESE DAYS, AND EVEN SPY SYSTEMS ARE BUILT INTO YOUR TV IF YOU CAN AFFORD THE BIG FANCY ONES, THAT LISTEN IN ON WHAT YOU ARE SAYING IN THE SAME ROOM AS YOUR TV.
THINK I AM LYING?
For Americans concerned about their privacy, the NSA data grabs are daunting, but what about the data grabs happening inside your own home, perpetrated not by the government, but by your coffee machine?
Consider every appliance and every piece of home electronics that you own. Does it gather data about how you use it? Does it connect to the Internet? If so, it could be used to spy on you. Your mobile devices, your TV, and now various other types of home appliances can be wired into a network that can track you. If those networks are hacked, information about your habits and behaviors could be available to people with nefarious goals. The same technological innovation that empowers us also makes us vulnerable to those who would exploit such advances against us.
Here are nine appliances and other systems inside your house that may be spying on you right now, or used to spy on you in the future.
Your Television |
Ever wonder how your TV remembers what shows you've watched, which ones you plan to watch, and how long you watched last episode of "Homeland" before falling into nightmare-ridden sleep?
It does it all by connecting to the Internet. Therein lies its weakness. Computer Security firm ReVuln proved last year that it could hack Samsung's newest televisions, accessing users' settings, installing malware on the TVs and any connected devices, and harvesting all the personal data stored on the machine. They could even switch on the camera embedded in the TV and watch viewers watching the set.
Samsung says it patched the security flaw. That said, who's to say that Samsung is the only brand to have experienced a security issue?
Your Cable Box |
Companies including Google and Verizon are reportedly developing cable boxes with built-in video cameras and motion sensors. The idea is that if the camera detects two people canoodling on the couch, they might be delivered ads for a new romantic movie, while a roomful of children would see ads for an Air Hogs remote control helicopter.
If that freaks you out, think what government intelligence agencies or hackers could do with such a device.
Your Dishwasher, Clothes Dryer, Toaster, Clock Radio and Remote Control |
This may sound fantastical, but no less an expert on spying than former CIA Director David Petraeus believes that even mundane appliances like your dishwasher could soon be used to gather intelligence about you. Appliances including dishwashers, coffee makers and clothes dryers all now connect to the Internet. This helps the manufacturers troubleshoot performance and improve energy efficiency, and it gives owners the chance to order a fresh cup of coffee or a dry bin of clothes from their phone, computer or tablet.
Can You Really Monitor Your Credit for Free?
Knowing when you make your coffee sounds innocuous enough, but that little piece of data could help snoopers geo-locate you, and learn your habits and schedule for all manner of malfeasance.Petraeus told a group of investors last year that such technology will be "transformational" for spies --could "change our notions of secrecy." I think it could help criminals, too.
Your Lights |
The same technology that enables monitoring of your home appliances also could allow would-be spies to monitor your lights. In addition to tracking your schedule, taking control of your home lighting system could help robbers invade your home by turning off the lights and keeping them off during an invasion.
Your Heat and A/C |
The Nest thermostat tracks homeowners' heat and air-conditioning habits, learns their preferences, and over time tweaks their HVAC systems to reach the desired results with the least electricity. Users also can change the settings via the Internet when they're away from home.
14 Dangerous Emails That Could Be in Your Inbox
Hackers already have started taking apart the Nest thermostat to customize it. Thieves and snoopers could do the same.
Security Alarms |
For years, home security systems were hardwired to a service provider's operations center. Now they are wirelessly connected to many users' phones and tablets. This allows us to keep tabs on our homes at all times, from all places. But what's the point of having a security system if robbers can hack it?
Insulin Pumps and Pacemakers |
Forget about hacking your house. What about hacking your body? In 2012, White Hat hacker Barnaby Jack, recently deceased, proved he could kill a diabetic person from 300 feet away by ordering an insulin pump to deliver fatal doses of insulin. This summer he announced he could hack pacemakers and implanted defibrillators.
11 Really Dumb Things You Do With Your Email
"These are computers that are just as exploitable as your PC or Mac, but they're not looked at as often," Jack told Bloomberg. "When you actually look at these devices, the security vulnerabilities are quite shocking."
NOTE FROM DEE: IN CASE YOU DIDN'T SEE DICK CHENEY'S RECENT INTERVIEW ABOUT HIS PACEMAKER, THEY TOOK SPECIAL PRECAUTIONS TO MAKE SURE NOBODY COULD KILL HIM REMOTELY BY HACKING INTO THE WIRING SYSTEM THAT KEPT HIM ALIVE.
HOW MANY OTHER PEOPLE COULD BE IN THAT SAME DANGER?
DON'T BOTHER ASKING - WHO WOULD WANT TO KILL YOU OR DICK CHENEY? - LOOK ON THE INTERNET IF YOU WANT TO KNOW - MOST OF THE PRESIDENTS AND VICE PRESIDENTS YOU HAVE KNOWN SINCE GOVERNMENT'S BEGAN HAD MURDER LISTS YOU DON'T KNOW ABOUT! THAT'S HOW THEY GOT TO BE AT THE TOP WHERE THEY ARE HATED BY HALF OF HUMANITY IF NOT MORE!
Smartphones |
Think of every spy gadget dreamt up by Q in James Bond films. Microphone, still and video camera, geo-locating device, and computer software that can steal your personal passwords, hack your bank accounts, hijack your emailand take control of other devices.
Your smartphone has all these things. In addition, the U.S. military disclosed last year it created an app called PlaceRaider that uses a phone's camera, geo-location data and its accelerometer to create a 3D map of the phone's surroundings.
Your Tablet and Computer |
Most tablets and computers have all the same tools as smartphones and some have even more. If your phone can spy on you, they can too. Even more so than our smartphones, we unwittingly stuff them with every imaginable tidbit of sensitive personal information from lists of passwords, to tax and financial information, to geo-tagged photographs, to the innermost secrets that we exchange with our friends.
Our privacy is threatened. Every day our most precious asset (our identity) is put at risk by us and those who wish to track our every movement, word, thought and search. We need a national conversation – where everyone participates – about just how widespread such monitoring has become. General Petraeus is dead on. Such devices could and inevitably will change our notions of secrecy. Let's not simply opt for progress without proper safeguards.
is chairman and cofounder of Credit.com and Identity Theft 911. His experience as former director of the New Jersey Division of Consumer Affairs gives him unique insight into consumer privacy, legislation and financial advocacy. He is a nationally recognized expert on identity theft and credit.
NOTE FROM DEE: ARE YOU FEELING A LITTLE BIT NERVOUS YET? NOBODY WANTS YOU TO PAY ATTENTION TO ALL THIS - JUST GO ABOUT LIFE LIVING IT LIKE NOBODY CARES WHAT YOU ARE DOING AT HOME. LET ME LAUGH! HA HA
YOUR GOVERNMENT CARES ABOUT EVERYTHING YOU DO OR DON'T DO!
THERE ARE LOTS OF THINGS YOUR GOVERNMENT HIDES FROM YOU - SO YOU DON'T PANIC - OR GET TOO EXCITED ABOUT SOMETHING THAT IS GOING TO BE DONE TO YOU IN THE FUTURE, IF YOU LIVE THAT LONG.
BELIEVE ME, THEY HAVE NOT ONLY SHORT RANGE PLANS, THEY HAVE LONG RANGE PLANS - WHICH I WON'T GO INTO RIGHT NOW - JUST LOOK UP NEW WORLD ORDER IF YOU THINK THEY DON'T HAVE THINGS UP THEIR SLEEVES FOR YOU FOR YOUR FUTURE.
BUT, THEY NEED TO KNOW HOW YOU THINK RIGHT NOW, WHICH HELPS THEM CONTROL YOU AND HOW YOU THINK.
New book, lawmaker expose Big Brother
technology in the living room
Interactive TV Spies on Viewers |
Ground-breaking legislation
in California is fighting Microsoft and AOL to stop them creating the machine George Orwell foresaw - the TV set that watches you.At the same time, a new book titled
Spy TV exposes the methods by which digital interactive television will observe and experiment of viewers. It describes how neural network software will be used to create "psychographic profiles" and then "modify the behavior" of individuals.This year broadcasters will celebrate interactive TV in public, using words like "convenience" and "empowerment". AOL TV is rolling out with the TiVo personal video recorder (PVR), that helps viewers find and save programs they might like. Microsoft is launching its own PVR called Ultimate TV, claiming "It puts
you in control!". But while you may be sold on home shopping and chat, broadcasters have been selling advertisers their new power to monitor everything you do with your remote.At industry conferences on interactive TV, Microsoft has been handing out specifications of its new platform. Their Microsoft TV Server, for instance, enables "optimizes revenue opportunities by providing rich personalization and targeting of content and ads to consumers based on their television viewing and Web surfing histories and preferences."
Matthew Timms, of Two Way TV in London, describes this surveillance in the home in plain English:
"..Somehow they feel they're sitting there - it's just them and the television - even though the reality is it's got a wire leading straight back to somebody's computer."
Now in bookstores, Spy TV is the backbone of an effort by White Dot, the anti-television campaign, to educate the public about this invasive technology. Finally his paying customers will get to hear Phil Swain of Cable and Wireless describe the huge amounts of data he will gather:
"Changing channels, selecting certain programs, viewing habits, browsing through interactive sites, purchasing habits, all that kind of stuff we can track. Every click, we can track. We will be recording that information."
In another recent development, Motorola Broadband, ACTV and OpenTV have announced investment in a subsidy called SpotOn, designed to create profiles of over 7 million viewers, without their knowledge. ACTV looks forward to delivering commercials based on "the specific profile of an individual household, which is generated by ACTV's software within the digital set-top in the home."
SpotOn's head of Sales in Dever, Bob Evans is proud of what he sells advertisers:
"That (set-top) box can hold 64,000 bits of information about you!"
Your TV set will know you intimately. Another intereactive TV company, NDS, is owned by Rupert Murdoch's News International. Here they describe a product called XTV that manages the data your television will capture:
"Viewers can be segmented by a host of new demographics, psychographics and qualitative preferences, based on actual viewing behavior, while advertisers can create low cost messages tailored to these new niche markets."
Both SpotOn and XTV will be supported on the set-top boxes used by Liberate (the operating system of AOLTV) and Microsoft TV (the operating system of Ultimate TV)
Every move you make, for half the time you're not sleeping or working, will go into a file with your name on it. That's many times more data than even internet marketers like DoubleClick could dream of. Who gets use of that file? Large companies, government.. the highest bidder. What is it used for? Here's how one consultant put it:
"What we're all trying to do is change or reinforce existing behavior."
Control. That's the buzzword being used to sell interactive television. But who is getting that control? For a year and a half David Burke of the anti-television campaign White Dot, has been talking to broadcasters, marketers, advertisers and IT consultants about their plans for this machine.
What really excites them is the way interactive TV creates experimental conditions in the home. Your TV will be able to show you something, monitor how you respond, and then show you something else based on what you did. It's a cycle of stimulus, measurement and response that will allow your TV set to learn about you, adapt to you and work on you over time. Until it has you doing what it wants.
Your behavior is the video game these men are playing, and they talk about their viewers as if they were lab rats. Here a database analyst working with one of the interactive broadcasters talks the new language of home entertainment:
"You have to create some control group testing, in effect throw people some placebos. So if we're trying to increase their spend, or increase their usage or increase their customer satisfaction scores, we'll take one group and split it down the middle and expose it to two separate batches of data presentation."
Whoever controls your interactive TV will be able to spend years of your life just trying different combinations of programming until they find out what makes you do things. And increasingly, that controller will not be human. It will be a computer running artificial intelligence software, capable of learning and adapting. "The ultimate goal," says one consultant, "is to crack human personality in real time."
And when that goal is reached, even if they just come close, how easy will it be to sell each viewer a bottle of shampoo? A government policy? A new form of government? "There is no limit to this technology," says one excited broadcaster, "The limit is only as far as the mind can imagine!"
David Burke, a computer programmer himself, agrees. That's how he wrote most of the book:
"Every time I thought of some new way interactive TV could work," he says, "to control viewer behavior, I called up the companies involved and found they were already working on it. The unbelievable thing is: we are actually paying them to do this to us!"
Privacy International awarded Spy TV a "Winston" at its 1999 Big Brother Awards and now joins White Dot, Junkbusters, and the Center for Media Education in calling for a guarantee that viewers can "opt in" instead of having to "opt out".
It is just such an approach to personal privacy that California State Senator Debra Bowen is seeking to make into law. California already protects people from being tape recorded or filmed in their homes without their expressed permission. Her bill (SB 1599) simply extended that common sense approach to people's televisions. But lobbyists from AOL and Microsoft managed to kill it last year. Now, as the Senate comes back into session, Bowen is gathering votes to bring it back (SB1090).
We haven't been told the truth about interactive
television.
This "service" is destroying a concept of privacy in the home that dates back 600 years. Spy TV has been written to call off this practical joke. Ask yourself: Who is this particular "digital revolution" overthrowing? Make sure it's not you.
The Facts | A list of Frequently Asked Questions (FAQs) is available here. |
The Book | Order a copy of Spy TV from Amazon.com, Amazon.co.uk, BarnesandNoble.com, BOL, or Borders.com. |
Contact Us
You can email us at spytv@whitedot.org.
This boycott is organised by White Dot, the anti-television campaign, and Privacy International, a network of privacy experts and human rights organizations.
White Dot |
White Dot PO Box 2116 Hove, E Sussex England BN3 3LR Attn: Spy TV |
Privacy International Washington Office 666 Pennsylvania Ave. SE Suite 301 Washington, DC 20003 USA |
Info@whitedot.org | info@whitedot.org | pi@privacy.org |
Although White Dot encourages people to throw their TV sets out the window, we welcome the involvement of people who wish to enjoy TV and privacy at the same time. And it goes without saying that any information you send will be used only to return information about this campaign.
For the latest news, visit the boycott's web site:
http://www.spytv.co.uk
The following sites also contain information about interactive television:
http://www.whitedot.org |
White Dot |
http://www.privacy.org |
Privacy International |
http://www.cme.org | Center for Media Education |
Action: Tell the Truth
Broadcasters are spending millions of dollars to promote and lobby for the interests of interactive television. In minutes, a large company can mobilise its workforce to email and petition legislators, creating their own "astroturf" grass roots activism.
Without millions of dollars to spend, this boycott and any calls for privacy legislation will require ordinary people to do some promoting on their own. Please help us spread the truth about interactive television.
Interactive TV spies on viewers. Join the boycott: http://www.spytv.co.uk
<a href="http:// www.spytv.co.uk"><img border=0 src="http:// www.spytv.co.uk/images/spybannerad.gif"></a>
Action: Self-Regulation is not Enough
Interactive television providers seem to be hoping that no one will think to ask questions about privacy. And many people do not because they assume the law already protects them. But they are mistaken.
Britain, for instance, has no privacy law - only a Data Protection Act. It requires the broadcasters to register what information they are collecting and who is allowed access to it. The Act requires broadcasters to show viewers what is held. But it doesn't stop them collecting anything they want. It doesn't stop them using data to manipulate viewers for unnamed clients, and it doesn't require that the data shown to viewers is translated into a form they can understand. If the data is nothing but computer codes, viewers may be left scratching their heads.
As Caspar Bowden of the Foundation for Information Policy Resarch says, "In Europe, Data Protection principles no longer cut it. We don't just need informed consent, we need the right to not be surveilled - whether or not this is part of a freely offered commercial service."
Meanwhile, the United States, unlike countries all over the world, does not even have a Data Protection Act. In the land of the free, anyone can collect any kind of information about you and not even tell you what they're doing.
Privacy is never about information, it's about power - "the right to be left alone". Take that power back! Help us make privacy the next home electronics "must have".
Office of the Data Protection Registrar
Office of Telecommunications (OFTEL)
Consumer Representation Section
50 Ludgate Hill
London
EC4M 7JJ
0171 634 8888
http://www.oftel.gov.uk
Department of Trade and Industry
Enquiry Unit
1 Victoria Street
London SW1H 0ET
020 7215 5000
http://www.dti.gov.uk
Independent Television Commission
33 Foley Street
London W1P 7LB
0171 255 3000
http://www.itc.org.uk
Write to these people in the US:
National Telecommunications and
Information Administration
Herbert C. Hoover Building
U.S. Department of Commerce / NTIA
14O1 Constitution Ave., N.W.
Washington, D.C. 20230
(202) 482-1840
http://www.ntia.doc.gov
Federal Trade Commission
CRC-240
Washington, D.C. 20580
(877) 382-4357
http://www.ftc.gov
Federal Communications Commission\
445 12th St. SW
Washington DC 20554
(202) 418-0190
http://www.fcc.gov/
Action: Be an Early Rejector!
The makers of interactive television are keen to attract "Early Adopters" - people who like new technology and will create momentum behind their product. Instead of buying, we invite you join our boycott of interactive TV and help us tell the truth about it. Help us create an informed debate about this technology while people are still weighing up the alternatives.
NOTE: IF YOU ARE TOO LAZY TO DO WHAT IS SUGGESTED BY THE PREVIOUS ARTICLE LIKE I AM, WITH TOO MANY OTHER THINGS TO DO, AND YOU LAUGH AT YOUR RELATIVES WHO REFUSE TO SIGN UP FOR FACEBOOK OR OTHER MEDIA SITES THAT YOU ENJOY, I DON'T EVEN KNOW WHY YOU HAVE READ THIS FAR.!
The flaws in Samsung Smart TVs, which have now been patched, enabled hackers to remotely turn on the TVs' built-in cameras without leaving any trace of it on the screen. While you're watching TV, a hacker anywhere around the world could have been watching you. Hackers also could have easily rerouted an unsuspecting user to a malicious website to steal bank account information.
Samsung quickly fixed the problem after security researchers at iSEC Partners informed the company about the bugs. Samsung sent a software update to all affected TVs.
But the glitches speak to a larger problem of gadgets that connect to the Internet but have virtually no security to speak of.
Security cameras, lights, heating control systems and even door locks and windows are now increasingly coming with features that allow users to control them remotely. Without proper security controls, there's little to stop hackers from invading users' privacy, stealing personal information or spying on people.
Related story: The scariest search engine on the Internet
In the case of Samsung Smart TVs, iSEC researchers found that they could tap into the TV's Web browser with ease, according to iSEC security analyst Josh Yavor. That gave hackers access to all the functions controlled by the browser, including the TV's built-in camera.
"If there's a vulnerability in any application, there's a vulnerability in the entire TV," said Aaron Grattafiori, also an analyst at iSEC.
Yavor and Grattafiori were also able to hack the browser in such a way that users would be sent to any website of the hacker's choosing. While the hack would have been obvious if the website on the screen didn't match the desired address, Yavor says there could be serious implications if a bad actor sent a user to a lookalike banking page and retrieved a user's credentials.
Related story: NSA chief recruits hackers
The research was conducted on different models of 2012 Samsung Smart TVs and was presented this week at the Black Hat cybersecurity conference in Las Vegas.
In a statement to CNNMoney, Samsung said it takes user safety very seriously. Addressing the camera flaw, a company spokesperson said, "The camera can be turned into a bezel of the TV so that the lens is covered, or disabled by pushing the camera inside the bezel. The TV owner can also unplug the TV from the home network when the Smart TV features are not in use."
Samsung also recommends that customers use encrypted wireless access points.
The iSEC crew said they remain skeptical that the technology is perfectly secure, even after Samsung patched the bugs.
"We know that the way we were able to do this has been fixed; it doesn't mean that there aren't other ways that could be discovered in the future, " Yavor said.
Companies like Samsung pay hackers when they report security vulnerabilities like the ones iSEC found. The researchers are iSEC confident that there are more undetected flaws in these devices that they are running a fund-raiser off of finding bugs in Smart TVs at technology conference Def Con later this week.
Yavor and Grattafiori say users should run regular updates from vendors like they would for anti-virus definitions or system updates on the smartphone.
And when all else fails, users can always put tape over their cameras.
YOUR GOVERNMENT AT WORK !
More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them.
Earlier this month, Petraeus mused about the emergence of an “Internet of Things” — that is, wired devices — at a summit for In-Q-Tel, the CIA’s venture capital firm. “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,” Petraeus enthused, “particularly to their effect on clandestine tradecraft.”
All those new online devices are a treasure trove of data if you’re a “person of interest” to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the “smart home,” you’d be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room’s ambiance.
“Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing,” Petraeus said, “the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing.”
Petraeus allowed that these household spy devices “change our notions of secrecy” and prompt a rethink of “our notions of identity and secrecy.” All of which is true — if convenient for a CIA director.
The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation.
That’s not the only data exploit intriguing Petraeus. He’s interested in creating new online identities for his undercover spies — and sweeping away the “digital footprints” of agents who suddenly need to vanish.
“Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come,” Petraeus observed. “Moreover, we have to figure out how to create the digital footprint for new identities for some officers.”
It’s hard to argue with that. Online cache is not a spy’s friend. But Petraeus has an inadvertent pal in Facebook.
Why? With the arrival of Timeline, Facebook made it super-easy to backdate your online history. Barack Obama, for instance, hasn’t been on Facebook since his birth in 1961. Creating new identities for CIA non-official cover operatives has arguably never been easier. Thank Zuck, spies. Thank Zuck
NOTE FROM DEE: NOTICE WHERE THE ARTICLE SAYS: "THE CIA HAS A LOT OF LEGAL RESTRICTIONS AGAINST SPYING ON AMERICAN CITIZENS? LET ME LAUGH AGAIN HERE : HA HA
WHEN DID LEGAL RESTRICTIONS EVER STOP THE GOVERNMENT FROM DOING ANYTHING IT WANTS TO DO - AT LEAST UNTIL THEY ARE CAUGHT, AND THEN THEY ' DENY, DENY, DENY, UNTIL THEY ARE BLUE IN THE FACE. THEY DO WHATEVER THEY WANT WHETHER THE CITIZENS LIKE IT OR NOT.
EVER WATCH AN OLD MOVIE ABOUT HOW COUNTRY OR RELIGIOUS LEADERS KILLED ANYONE THAT DIDN'T THINK EXACTLY LIKE THEY DID? GOVERNMENTS ARE A BIT MORE SUBTLE THESE DAYS, BUT SINCE THE WORLD OF MIND CONTROL HAS BECOME SO EASY, THEY DON'T NEED TO KILL EVERYONE WHO DOESN'T THINK LIKE THEY DO, THEY JUST CHANGE HOW YOU THINK!
DON'T KID YOURSELF. YOU ARE CONTROLLED BY 'THEM' EVERY MINUTE YOU ARE AWAKE, AND EVEN WHEN YOU AREN'T!
It started out with a leggy, bikini-clad avatar. She said she was a missile expert — the “1st Lady of Missiles,” in fact — but sometimes suggested she worked with the CIA. With multiple Twitter and Facebook accounts, she earned a following of social media-crazed security wonks. Then came the accusations of using sex appeal for espionage.
Now everyone involved in this weird network is adjusting their story in one way or another, demonstrating that even people in the national security world have trouble remembering one of the basic rules of the internet: Not everyone is who they say they are.
“I think anyone puts pictures out online to lure someone in,” the woman at the center of the controversy insists. “But it’s not to lure men in to give me any information at all… I liked them. They’re pretty. Apparently everyone else thought so too.”
This is a strange, Twitter-borne tale of flirting, cutouts, and lack of online caution in the intelligence and defense worlds. Professionals who should’ve known better casually disclosed their personal details (a big no-no in spook circles) and lobbed allegations they later couldn’t or wouldn’t support (a big no-no in all circles). It led to a Pentagon investigation. And it starts with a Twitter account that no longer existscalled @PrimorisEra.
The subject of much confusion and even more speculation, @PrimorisEra purports to be a woman in her late 20s named Shawn Elizabeth Gorman. Many have corresponded with her through Google Chat, IM, Facebook, and Twitter. Very few of them have met her in person. She claims to hold a security clearance and work for a Defense Department contractor that she won’t identify. According to Johns Hopkins University, a woman with that name is pursuing a masters’ degree in government and business.
That is not how she has presented herself on the Internet.
Sometimes Shawn Elizabeth Gorman is Shawn Elizabeth Gorman. Sometimes she’s Shawna Gorman. Sometimes she’s Shawna Felchner. Sometimes she’s @PrimorisEra. Sometimes she’s @shawna1814. Sometimes she’s @ladycaesar. There may be more. Among the details she offered about herself: she was indeed part of the Johns Hopkins network, but was also a missile specialist living in Brussels.
True confession time: Earlier this month, I accepted a Facebook friend request from Shawna Gorman. Why? I saw several friends of mine from the national security and journalism worlds were already friends with her. Even NATO’s Supreme Allied Commander, Adm. James Stavridis, was a mutual Facebook friend. I clicked Accept after lazily scanning those credentials, because that’s what you do in this day and age.
Over the last several months, some in the world of national security learned about @PrimorisEra through her prolific tweets about various missile programs and efforts. Like everyone on Twitter, she liked to have fun. She winked at friend @SexyRavenUAV, one of several joke accounts ostensibly written by killer drones: “@SexyRavenUAV women are dangerous creatures… you & I know this prolly better than most men.”
She also liked to tweet about her familiarity with the dark world of spies and special operators. A since-deleted tweet from April 4, apparently about the Libya war, read, “‘No troops on the ground’…. OGA don’t wear uniforms, its the anonymous that get the proverbial middle finger.” OGA, or Other Government Agency, is a euphemism for the CIA.
Rarely, if ever, did @PrimorisEra’s avatar show her face. But sometimes it showed a woman’s legs, or a bare shoulder with a sheer sweater. Or a woman in a bikini. That had the effect of attracting attention from dudes in the military and intel worlds, shielded by the pseudonymity of Twitter.
Identifying himself as having “expertise in asymmetrical engagement and counter-terrorism,” @Shad0wSpear tweeted on March 15 that if he had ever got assigned a World War II era Boeing “Flying Fortress,” he’d “plaster your beautiful image all over it.” Telling people to follow her, @BunduBoots called her “far more informative & way more attractive than a Jane’s annual.”
Which is par for the course online. People try to look sexy. They flirt. Others flirt with them. Harmlessly.
To some people she direct messaged, it crossed a line. One male tweeter on active duty she contacted through DM and chat thought most of her banter was harmless. But some of it struck him as “creepy,” he tells Danger Room: “Where I was stationed, where I was deploying, pressing me for details… A lot that we shouldn’t be talking about.” He thought she should know better not to ask for sensitive specifics like that, especially on unclassified forums, since @PrimorisEra “presented herself as a DoD [Department of Defense] employee.”
But @PrimorisEra didn’t always present herself as a Pentagon worker. According to a chat log acquired by Danger Room, she told someone in an unsecured GoogleChat, “you do know I do wrk w/ WINPAC.” That’s the acronym for the CIA’s arm for weapons and arms control intelligence.
She offered to help her interlocutor get a job with the CIA, prompting him to offer to send her his resume. He began to talk about an individual “known around Langley” by first name only. Asking for her last name, @PrimorisEra wanted to know what his connection to her was.
Several women national security experts on Twitter rolled their eyes at @PrimorisEra, thinking she was acting out for male attention and not as much of an expert as she conveyed. During a happy hour at the D.C. bar Science Club last week, some of them got to talking about how they thought her account was either fake or a big inflation of her national security credentials.
Finally, one of them, a Defense Department contractor tweeting as @FrostinaDC — who asked Danger Room to keep her real name out of this piece — called her out on Friday.
“A bikini perpetuates your fake persona & makes the boys want to screw you,” @FrostinaDC tweeted, the first of a fusillade of tweets that quickly drew in the national-security twittersphere, eager to watch a trainwreck in progress. Questioning “the validity of that account,” @FrostinaDC followed up. She tweeted URLs for pictures that @PrimorisEra used for her avatar, as @PrimorisEra had said her “management” helped select profile pictures of herself. In a since-deleted tweet, @PrimorisEra replied that @FrostinaDC should be careful, because @PrimorisEra “knew all the right people.”
That set @FrostinaDC off for the coup de grace — something that she assembled after what she says is ferocious open source online sleuthing and conversations with those who talked to @PrimorisEra.
“Just to be clear,” she tweeted on Saturday, “I have intel that @PrimorisEra is a Honey Pot & if you’re in my field you know what that means.”
What it means is someone who uses sex appeal to get someone to divulge their secrets. It implies that @PrimorisEra is the agent of a foreign power. That was an accusation no one had heard before. It’s also about the most serious charge that someone can levy.
Gorman responded by culling the social media accounts that got her so much attention. By Sunday, @PrimorisEra was no longer an active account. Her Facebook profiles either got locked or deleted. Other accounts were shut down. “WIN!!!!!” was @FrostinaDC’s reaction.
A different Twitter account believed to be used by Shawna Gorman, aka @PrimorisEra.
On Monday, @FrostinaDC turned in her tranche of documents on @PrimorisEra to the Pentagon, to begin an investigation into whether @PrimorisEra or anyone interacting with her violated security protocols.
Gorman denies any wrongdoing. In a series of Facebook messages to Danger Room, she says, “I have NEVER threatened @FrostinaDC and I have NEVER given out classified or sensitive information nor have I EVER asked for it.” She says that her employer has asked her not to talk to the press, and won’t say who she works for.
But she’s appointed a liaison, the author, journalist and military-affairs commentator John D. Gresham, to speak for her. Gorman Facebooked me a “verification” code — “Tabasco” — and hours later, Gresham called me without solicitation, read it to me, and said that he could speak on her behalf.
We met at a northern Virginia Starbucks on Thursday — after he swore he isn’t Gorman or any of her online personae.
Gresham maintains Gorman’s innocence. “The people saying, ‘she asked me this, she asked me that’ — did she ask or did they offer?” Gresham asks.
It goes on like this for nearly an hour. Then, Gresham makes a phone call and asks for my cellphone number. I get a call moments later. “This is Shawna,” my caller answers.
She reiterates that @PrimorisEra is no spy. She tells me that she’s “never solicited classified or sensitive information.” Did she tell people that she worked with WINPAC? First she says no. Then she says, “There might have been things, terms used sarcastically, in terms of employment.” She lives in the D.C. area, not Brussels, she says, and used that city as her home because it’s the “big hubs of politics and diplomacy,” her interests.
Does she understand why national security professionals might think she was gathering information on them? “I understand. I completely understand. I’ve never done it,” @PrimorisEra says. “If I ever asked anything like, ‘Oh, where do you work,’ one of those things, it’s friendly. I understand how that can be skewed.”
How did she react to being called a honeypot? “I laughed, in terms of how asinine it was,” @PrimorisEra says. “I put out information. I have no need to gather it, I don’t want to gather it.”
She’s not putting out information now. Gorman’s social media profiles are down, at the behest of her still-unnamed employer. Only @LadyCaesar survives and she’s not tweeting right now. She says she hasn’t been contacted by any government investigators — and that she wants this “nonstory” to go away.
Additionally, @FrostinaDC has no regrets about calling Gorman out. From her perspective, she wanted to call attention to @PrimorisEra to warn people in the national security world to be extremely cautious about what they say on social media under the mistaken assumption that it’s either private or anonymous.
But @FrostinaDC says she should have clarified what she meant by using the terms “honey pot” and “honey trap,” saying she has no evidence that @PrimorisEra works for any foreign power. She claims to have provided additional evidence to Pentagon investigators of @PrimorisEra’s questionable online interactions with security professionals, but she wouldn’t provide it to Danger Room.
She meant the term in the sense of someone who uses sex appeal to gain access to sensitive material, @FrostinaDC says, which she absolutely stands behind.
It’s an apt reminder, given that the Pentagon swears it’s not going to take away troops’ access to social media, something that Joshua Foust of the American Security Project blogged that he feared would be the legacy of the contretemps. And it’s an area of common ground with @PrimorisEra’s camp. “Everyone needs to be a little more cautious,” says Gresham.
Among the community of national security tweeters, theories abound about what @PrimorisEra was really up to. None consider her a twitter-born Anna Chapman — one of the Russian sleeper agents planted, and then discovered, in the United States.
Some wonder if her multiple layers of internet personae mean she’s part of an effort by a private firm to see if Pentagon or intelligence employees and contractors are spilling the beans to anyone who pokes them. Far more think she’s a wannabe who puffed up her bona fides on the internet to security professionals to fit in.
Whether they meant to or not, though, they also ganged up on someone. They speculated publicly about her identity and loyalty. They attacked her avatars as evidence of misrepresentation, as if not using your real face on Twitter is suspicious. (My avatar is a photoshopped Black Flag record cover.)
Ironically, for all the concern about the blitheness of dishing on Twitter, the volley of tweets bashing @PrimorisEra outpace the amount of proof of actual wrongdoing. Naval analyst Raymond Pritchett tweeted that it strikes him as a “factless high school lynching.”
If the investigation clears Gorman, the warnings about not talking recklessly on Twitter will be woefully ironic.
It’s unknown how long that inquiry will last. Until it’s complete, it’s hard not to focus on one of @PrimorisEra’s tweets, now lost but for Googlecache. “A woman in my place has two faces;” she tweeted on March 24, “one for the world, and one which she wears in private.”
NOTE FROM DEE: OKAY! MOST PEOPLE DON'T CARE ABOUT THIS CRAP, BUT YOU WILL IF YOU VALUE YOUR PRIVACY - BECAUSE IF YOU ARE ON THE INTERNET, ANYONE CAN FIND OUT ABOUT YOU, WHETHER YOU ARE AWARE OF IT OR NOT - BECAUSE EVERYTHING YOU DO IS DOCUMENTED, RIGHT DOWN TO WHETHER YOU PAINT YOUR TOENAILS OR NOT!
COUNT ON IT!