Category Archives: Security

Video Review: U.S. Army PSYOPS Recruitment

The 4th PSYOP Group of the U.S. Army has released a short video, which seems to be generating a lot of attention among circles that seem to aspire for more power, more authority, more control.

Hopefully it’s easy to see why so many people have been saying “please recruit me”.

This is entertaining as a conforming exercise yet unfortunately misses the mark. I mean shooting into a barrel doesn’t equate in my mind to catching fresh fish, let alone clever ones.

I’ll drop here the various issues I see as time will allow…

Let me start by saying the video immediately contradicts itself. It begins with a trite quote “pretend to be weak, that your opponent may grow arrogant” yet quickly leaves behind any attempts to appear weak and instead comes across with repeated arrogant displays of power.

In that context then let me point out that the “we are everywhere” message dumped here is hardly pretending to be weak. It’s a kind of raw message very popular among dictatorships and generally considered toxic to democracy.

Privacy, for example, shouldn’t be inconsistent with psyops because if you are actually able to be “everywhere” and destroy privacy then do you really need psyops?

Likewise being a “ghost” could have been a nice play on concepts of transparency (highly desirable in democracy), or even weakness (ghosts allegedly lack physical power so they depend on “soft” measures). Here the message instead seems to be that a group wants to avoid accountability.

Vintage-looking patches sold today pretend to be from The U.S. 23rd Headquarters Special Troops, activated in 1944. Inspired by Britain’s 1942 Operation Bertram it was a secret group only declassified in 1996. The moniker “ghost army” was thus later acquired and such poorly designed patches started selling perhaps as ironic.

Again, by messaging that a sniper or a drone can kill without being targeted the new Army recruitment video pushes down hard on an arrogance of having “untouchable” power, implying ephemeral ghosts are great like rebellious children who slip away from morality of parental authority without accountability.

Maybe I’m splitting hairs on impression and meaning of icons, but this seems to me a giant leap from the byline for “The Ghost Army” PBS documentary of 2003: “Illusion Was Their Ultimate Weapon”.

…talented young men, many recruited from art schools across the country, who used their creativity to ultimately save lives.

Source: PBS

The Army recruitment video might as well have flashed a nails-on-chalkboard sounding “we get away with things” like “we grab’em by the pussy” or “we shoot someone on 5th Ave” to continue the theme of such feckless arrogant power projection. Who aspires to that instead of WWII ghost’s being talented artists who played with illusion?

And where’s the hope in all this? Where’s the positive measures “to ultimately save lives”?

So much of the imagery emphasizes actions for an outsized impact and causing chaos, like a 12 year old boy thinking he’s invincible and can do anything with abandon.

And that reminds me of the “Ghost” Camaro story of Boznia.

Everything is a stage is another way of saying integrity is low such that harms won’t trace back to the actor wearing a costume.

Track-suit wearing kids storm the streets, haul the leader from his family at dinner time and the country falls into disarray and chaos. Is that really the scene we want to close on?

Proper psyops would align with something that compels actors to join to help, do the right things, lift-up, restore, rejuvenate. Find a balance and keep things calm while breaking through log jams.

Freedom from oppression shouldn’t center around the excited moment riots are toppling statues, if they can instead be clarifying who put statues up and why/where they should be removed as a matter of common sense without fanfare.

Someone saying they don’t want credit, or don’t need compensation, is different from saying they want no responsibility or can’t be held accountable. Subtle, I suppose, yet a very important distinction for De Oppresso Liber.

Lara Logan Switched from News Reporter to Extreme Right Propagandist

Way back in January 1946 the American-born William Joyce (known as Lord Haw-Haw, and who infamously started his Nazi propaganda broadcasts with “Germany calling”) was executed by Britain for treason.

…being a person owing allegiance to our Lord the King, and while a war was being carried on by the German Realm against our King, did traitorously adhere to the King’s enemies in Germany, by broadcasting propaganda.

A similar fate came to a extreme right “spin” broadcaster in France, Paul Ferdonnet, as I’ve written about here before.

How far have we come? The explanation given by those who worked with Lara Logan is that she used to have editors and producers filtering noise to keep her away from dangerous extremes and conspiracy, but she lost access to them when she pushed harder faster and fell too far off the rails.

One former CBS producer who worked with her, Peter Klein, said in an interview that the structure of a large newsroom was a moderating influence. “There’s a system in place in newsrooms that offer checks and balances,” said Klein, founder of the Global Reporting Centre in British Columbia, a nonprofit. “Most of us need that system — but she really needed that system. And we knew that from the beginning,” he said. “Now she’s just unfiltered,” Klein added.

Now instead of being ignored she found a rapid rise to prominence by abandoning integrity, feeding into paranoia, removing quality and espousing extreme right propaganda.

The switch most likely began soon before she very loudly refused to accept basic truth in 2013, as that same article details.

Sounding more like an advocate for the military than a reporter, Logan told her [2012] audience in Chicago that she hoped the government was getting ready to deploy its “best clandestine warriors” to “exact revenge.” The world should know, she added, that the United States would not be attacked and then “stand by and do nothing about it.” And she accused the Obama administration of playing down the threat from the Taliban, and of lying “about who they really are.” Then, about a year later, she began telling people she was working on a story that “was going to blow the lid off Benghazi,” according to one person’s recollection. The story she came up with was the kind of work known inside “60 Minutes” somewhat dismissively as a “book report” because it was based in part on a forthcoming book. Logan interviewed the author, a security contractor stationed in Libya, who said in a segment that aired on Oct. 27, 2013, that he had helped defend the compound on the night of the attack. He described in harrowing detail how he came face to face with the enemy. The New York Times reported several weeks later that the contractor had, in fact, told the FBI that he was not inside the compound that night. After initially defending Logan and the report, CBS News retracted it and apologized. Logan and her producer were placed on a leave of absence, and she acknowledged having made a “disappointing” mistake. The network’s chief and executive producer of “60 Minutes” at the time, Jeffrey Fager, later called the story “the worst mistake on my 10-year watch.”

She really, really wanted to believe a vulnerability narrative and push a hard-line military perspective, so much that she let it divorce her from even simple facts about actually who was inside a compound being attacked.

Now she has transitioned into false victimization paranoia market, marrying a defense contractor and moving to Texas, where the extreme right operates most dramatically to excite and agitate social conflict.

More to the point, back in 2010 she had been flagged for “misfire” and showing poor judgment. CNN’s former chief military correspondent, Jamie McIntyre, said what General McChrystal and his aides did was so egregious that Logan’s defense of them…

…unfortunately reinforced the worst stereotype of reporters who ’embed’ with senior military officers but are actually ‘in bed’ with them.

Ouch.

Wait, it was even worse for Logan as she gets called out for being a direct threat to real journalism by trying to replace it with militant fetishism.

…Logan implies that somehow military service trumps the journalistic tradition of truth-seeking. If critics, who are already predisposed to believe the worst about the media, are looking for evidence combat reporters are too dazzled by the shiny stars on the commander’s epaulets, this is their smoking gun.

CBS was thus late to send her packing, as they could have avoided “their worst mistake” of a decade.

Ironically after Logan was held to account for highly-politicized positioning in opposition to the U.S. government she decided to become a vocal critic of journalists as propagandists if they didn’t fall in line with her own political views.

And her views have been exposed as becoming more and more preposterous, unhinged conspiracies with no factual basis.

In the below video note how she describes an “aha” moment growing up in South Africa. As a white girl she says she believed Black people are bad, then credits those people for instilling in her a belief anything can be true (she was forced to accept after the end of apartheid that Black people in prison were in fact not bad).

Her victimization views are truly so deranged they’re being promoted in Russian propaganda in an attempt to help invasion of Ukraine.

Let’s be clear. Russia has inherited the mantle of Nazism and Ukraine is defending against it. Logan is upside down and backwards, which I guess is obviously why RT is promoting her.

This is a repeat of years ago when Logan attempted to undermine science and promote baseless paranoia when (during Hanukkah no less) she falsely tried to equate a modern U.S. government officials’ expertise with disease eradication to… Nazism.

Lara Logan, a host on Fox News Media’s streaming service, compared Anthony Fauci, the nation’s leading infectious disease expert, to the infamous Nazi doctor Josef Mengele, who worked at Auschwitz during the Holocaust.

These absurd and shrill comments make her whole career seem like it has been a slow-moving attempt to restore white power after being confused by the fall of apartheid.

She brings to mind a bigger issue in America.

Why are white South Africans of her particular age becoming such large-scale proxies for right wing extremism in the U.S. trying to amass power through military, financial markets and media (e.g. Thiel, Musk, Logan…)?

Strava-cide? Top California Cyclist Allegedly Murdered by Jealous Texan

A woman cyclist, arguably the best in history yet still early in her career at just 25, was ruthlessly murdered in Texas.

The details of this premeditated act are chilling albeit complex.

Shortly before her body was found, Moriah [Wilson] had flown into Texas to participate in the Gravel Locos, a 150-mile bike race. While in town, she and Colin [Strickland, who had been in a romantic relationship with her] agreed to meet up and hang out. Police believe Kaitlin [Armstrong, who lives with Colin and runs a business with him] may have located the two via a cycling app known as Strava, where locations are enabled. According to police, Kaitlin allegedly followed Moriah to the apartment she was staying in and may have fired a 9mm handgun – the same gun Colin told authorities [he had given to Kaitlin].

To recap, Strickland pulled Wilson into what easily could be described as a romantic evening (despite his claims otherwise) when she traveled to Texas to compete in a race. Armstrong — his business partner and girlfriend — is now accused of murdering Wilson.

Surveillance video showed Armstrong suddenly appeared at Wilson’s residence (black Jeep Cherokee, Texas plate LDZ5608) after Wilson was delivered there by Strickland. Ballistics tie the gun Strickland purchased for Armstrong to the crime.

Authorities in fact took Armstrong for questioning (based on an unrelated warrant) yet also allowed her to walk free as she balked at details about the murder (e.g. her Jeep and the gun Strickland gave her).

When detectives suggested “maybe you were upset and just in the area,” she allegedly nodded in agreement. Police said that she became angry when asked about Mr Strickland meeting with Ms Wilson. “I didn’t have any idea that he saw or even went out with this girl… as of recently,” she allegedly told investigators. Investigators then “confronted Armstrong on how seeing her vehicle in the area, coupled with the statements made by Strickland, made things not look too good,” according to the warrant.

Armstrong simply walked away from investigators once she was informed she had a right to leave; went and deleted her social media then disappeared.

Authorities say she is now a wanted fugitive.

Strickland frames his role as a poor liar, not an accessory to murder, during his long-term relationship with Wilson.

Strickland told detectives Armstrong did not know where Wilson was staying. But Wilson’s Strava account might have provided a clue: On the day she was killed, she uploaded a ride that began and ended at the home where she was staying. At just before 10 p.m., a woman who rents the home where Wilson was staying called police after arriving and finding Wilson lying in the bathroom. She told police that nothing was missing in the home except for Wilson’s bicycle, which investigators later found in thick bamboo more than 60 feet from the house.

Strickland said he had erased Wilson’s text messages and altered Wilson’s name on his phone as a means to keep his relationship going while Armstrong vigorously tracked them and tried to intervene multiple times. His statement Armstrong did not know where Wilson was staying, the source of speculation about the role of Strava in the murder, seems willfully ignorant at best.

Strickland released a statement he wants people to believe his “romantic” time with Wilson was just one week in October when he was single, despite Armstrong at that time “called Wilson on the phone, telling Wilson she was the one who was dating Strickland”.

The affidavit and Strickland’s phone history suggest it was months later in January when Armstrong objected more violently to what was perceived to be an ongoing romantic relationship with Wilson.

Perhaps the most Texas moment of all was around that time, and in that context of anger, Strickland purchased Armstrong the gun that was just used to kill Wilson.

Strickland not only gave Armstrong the weapon, he also may have brazenly led her to the scene and triggered her.

The affidavit points out that while Strickland claimed Armstrong didn’t know where Wilson was staying (and he only engaged with her in a “platonic” relationship) in fact he went to pick Wilson up at 5:45 pm directly from where she was staying to ride on his motorcycle for a swim and private dinner.

Strickland returned Wilson by motorcycle again directly to where she was staying. At 8:36 pm he sent a text message to Armstrong saying he “went to drop some flowers…and my phone died”.

Wilson entered the residence at the same time as that text message, according to the unique code and timestamp on the door lock.

Armstrong’s SUV one minute later was captured on video stopping outside Wilson’s residence, perhaps not needing Strava because simply observing Strickland and Wilson riding his motorcycle, and perhaps treating that text message as a signal.

DOJ Clarifies Security Research Protected Under CFAA

Interesting to read the sensible conclusions being reached by the U.S. department established by President Grant.

Justice Department urges prosecutors not to bring cases against legitimate cybersecurity researchers under main U.S. anti-hacking law, enacted in 1986

The reporter uses a powerful method called the “sandwich” to push the message here.

The policy change is a victory for the many cyber professionals and academics who have criticized the Computer Fraud and Abuse Act for potentially criminalizing research that security experts see as key to protecting computer systems from cyberattacks.

“The department has never been interested in prosecuting good-faith computer security research as a crime, and today’s announcement promotes cybersecurity by providing clarity for good-faith security researchers who root out vulnerabilities for the common good,” Deputy Attorney General Lisa Monaco said in a statement.

The revised policy directs federal prosecutors to avoid bringing cases if individuals accessed computers to test, investigate or correct vulnerabilities “in a manner designed to avoid any harm to individuals or the public.”

See what just happened?

1) The policy change
2) DoJ says “never been interested”
3) The revised policy

Next comes the reporter trying to explain why a new policy is really just clarification of overly broad computer language from 1980s.

Critics in the cybersecurity industry say the language is ambiguous and could be used to prosecute routine activity…

Updating vague language from the dinosaur days of computers arguably doesn’t rise to the level of changing a policy, but the DoJ themselves want it to be seen as a clean break because the prior policy didn’t accurately represent their intentions.

The official DoJ announcement text ends with this:

All federal prosecutors who wish to charge cases under the Computer Fraud and Abuse Act are required to follow the new policy, and to consult with CCIPS before bringing any charges. Prosecutors must inform the Deputy Attorney General (DAG), and in some cases receive approval from the DAG, before charging a CFAA case if CCIPS recommends against it. The new policy replaces an earlier policy that was issued in 2014, and takes effect immediately.

And that follows the reasonable doctrines of accuracy and efficiency in justice.

The new policy states explicitly the longstanding practice that “the department’s goals for CFAA enforcement are to promote privacy and cybersecurity by upholding the legal right of individuals, network owners, operators, and other persons to ensure the confidentiality, integrity, and availability of information stored in their information systems.” Accordingly, the policy clarifies that hypothetical CFAA violations that have concerned some courts and commentators are not to be charged. […] The policy focuses the department’s resources on cases where a defendant is either not authorized at all to access a computer or was authorized to access one part of a computer — such as one email account — and, despite knowing about that restriction, accessed a part of the computer to which his authorized access did not extend, such as other users’ emails.

In related news, some people have all the fun.

Former special forces operative Guillaume runs a company called Golem Protection that tests the defences of high profile business people or wealthy VIPs from all over the world. His team “breaks into” well-guarded homes, using paintball guns and marker pen “knives” to demonstrate just how terrifyingly close they can get to their targets. […] “Obviously, we simulate the killing part,” he jokes.