%s1 / %s2
 
NEDERLANDS  |  ENGLISH
  • economy
  • iran
  • e-voting
  • 9/11
  • media
  • top stories
  • read
  • news archive
  • by deepjournal
2 February 2012  |     mail this article   |     print   |    |  Public Intelligence
FBI: Do You Like Online Privacy? You May Be a Terrorist

A flyer designed by the FBI and the Department of Justice to promote suspicious activity reporting in internet cafes lists basic tools used for online privacy as potential signs of terrorist activity.  The document, part of a program called “Communities Against Terrorism”, lists the use of “anonymizers, portals, or other means to shield IP address” as a sign that a person could be engaged in or supporting terrorist activity.  The use of encryption is also listed as a suspicious activity along with steganography, the practice of using “software to hide encrypted data in digital photos” or other media.  In fact, the flyer recommends that anyone “overly concerned about privacy” or attempting to “shield the screen from view of others” should be considered suspicious and potentially engaged in terrorist activities.

Logging into an account associated with a residential internet service provider (such as Comcast or AOL), an activity that could simply indicate that you are on a trip, is also considered a suspicious activity.  Viewing any content related to “military tactics” including manuals or “revolutionary literature” is also considered a potential indicator of terrorist activity.  This would mean that viewing a number of websites, including the one you are on right now, could be construed by a hapless employee as an highly suspicious activity potentially linking you to terrorism.

The “Potential Indicators of Terrorist Activities” contained in the flyer are not to be construed alone as a sign of terrorist activity and the document notes that “just because someone’s speech, actions, beliefs, appearance, or way of life is different; it does not mean that he or she is suspicious.”  However, many of the activities described in the document are basic practices of any individual concerned with security or privacy online.  The use of PGP, VPNs, Tor or any of the many other technologies for anonymity and privacy online are directly targeted by the flyer, which is distributed to businesses in an effort to promote the reporting of these activities.

____________________________________________________________________________

DeepJournal
Sign up for the free mailing list.
12 September 2013  |  
Why is Syria under attack? - Part 4
When you peek below the surface, it becomes clear that Syria is under attack due to the interests of the parties involved. ‘Syria’ is about power, money, influence and energy.
10 September 2013  |  
Why is Syria under attack? - 3
8 September 2013  |  
Why is Syria under attack? - Part 2
In the event of major military conflicts that risk considerable humanitarian and economic consequences, it is useful to examine the interests of all parties involved as well as the role that the media plays in reporting the events.
7 September 2013  |  
Why is Syria under attack? - Part 1
On the surface it’s straightforward: the U.S. wants to liberate Syria from a brutal dictator who is attacking his own people with poison gas. But beneath the surface there is something very different going on.
28 August 2012
Daan de Wit (DeepJournal) interviewt Webster Tarpley op het Magneetfestival
Het Magneetfestival gaat de diepte in met vier interviews. Daan de Wit interviewt Webster Tarpley, Albert Spits, en Mike Donkers.
Contact - About - Donate - RSS Feeds - Copyright © 2006 DeepJournal, All rights reserved