We’ve suspected it all along—that Skynet, the massive program that brings about world destruction in the Terminator movies, was just a fictionalization of a real program in the hands of the US government. And now it’s confirmed—at least in name.
RT @Gizmodo: The NSA actually named a program “Skynet”
In the Terminator franchise, Skynet is an evil military computer system that launches war on humanity. And at some point, someone in the National Security Agency sat down and thought, “Damn, that’s a sick thing to name a secret system!” Malevolent undertones of aspirations to unchecked aggression be damned, I guess, because Skynet is real.
RT @csoghoian: Those cool OPSEC tricks you think are letting you hide will actually flag you in NSA’s SKYNET
The document cites Zaidan as an example to demonstrate the powers of SKYNET, a program that analyzes location and communication data (or “metadata”) from bulk call records in order to detect suspicious patterns. In the Terminator movies, SKYNET is a self-aware military computer system that launches a nuclear war to exterminate the human race, and then systematically kills the survivors. According to the presentation, the NSA uses its version of SKYNET to identify people that it believes move like couriers used by Al Qaeda’s senior leadership. The program assessed Zaidan as a likely match, which raises troubling questions about the U.S. government’s method of identifying terrorist targets based on metadata.
RT @coracurrier: NSA’s SKYNET looks for suspect behaviors in millions of Pakistani cell records
RT @coracurrier: NSA's SKYNET looks for suspect behaviors in millions of Pakistani cell records
RT @adamhrv: NSA’s use of Google’s PittPatt mentioned here in 2014
The National Security Agency is harvesting huge numbers of images of people from communications that it intercepts through its global surveillance operations for use in sophisticated facial recognition programs, according to top-secret documents. The spy agency’s reliance on facial recognition technology has grown significantly over the last four years as the agency has turned to new software to exploit the flood of images included in emails, text messages, social media, videoconferences and other communications, the N.S.A. documents reveal. Agency officials believe that technological advances could revolutionize the way that the N.S.A. finds intelligence targets around the world, the documents show. The agency’s ambitions for this highly sensitive ability and the scale of its effort have not previously been disclosed.
RT @extinctsymbol: Monsanto’s Roundup pesticide is “a butterfly killer, a frog killer and potentially an infant and adult human killer” htt…
RT @extinctsymbol: Monsanto's Roundup pesticide is "a butterfly killer, a frog killer and potentially an infant and adult human killer" htt…
RT @thehill: Manhattan DA: Terrorists love using Apple, Google phones
President Obama said he would support measures opening backdoors in communications and social media technologies last January. Such measures would force companies like Apple and Google to create holes in their programming that would let the government track suspected criminals or terrorists. “Social media and the Internet is the primary way in which these terrorist organizations are communicating,” Obama said in a Jan. 16 press conference with British Prime Minister David Cameron on cybersecurity.
RT @wikileaks: RELEASE: Sony Pictures worked with RAND Corp who advised pulling in NSA over “The Interview”
RT @wikileaks: RELEASE: Sony Pictures worked with RAND Corp who advised pulling in NSA over "The Interview"
Why Mass Surveillance Can’t, Won’t, And Never Has Stopped A Terrorist
Humans are natural storytellers, and the world of stories is much more tidy, predictable, and coherent than reality. Millions of people behave strangely enough to attract the FBI’s notice, and almost all of them are harmless.