Connect with us

Censorship Industrial Complex

Tucker Carlson: Longtime source says porn sites controlled by intelligence agencies for blackmail

Published

6 minute read

From LifeSiteNews

By Emily Mangiaracina

Journalist Glenn Greenwald replied with a story about how U.S. Speaker of the House of Representatives Mike Johnson changed his tune on a dime about the Foreign Intelligence Surveillance Act (FISA), which allows the government to spy on American communications without a warrant. The journalist made the caveat that he is not assuming blackmail was responsible for Johnsonā€™s behavior.

Tucker Carlson shared during an interview released Wednesday that aĀ ā€œlongtime intel officialā€ told him that intelligence agencies control the ā€œbig pornography sitesā€ for blackmail purposes.

Carlson added that he thinks dating websites are controlled as well, presumably referring at least to casual ā€œhook-upā€ sites like Tinder, where conversations are often explicitly sexual.

ā€œOnce you realize that, once you realize that the most embarrassing details of your personal life are known by people who want to control you, then youā€™re controlled,ā€ Carlson said.

He went on to suggest that this type of blackmail may explain some of the strange, inconsistent behavior of well-known figures, ā€œparticularlyā€ members of Congress.

ā€œWe all imagine that itā€™s just donorsā€ influencing their behavior, Carlson said. ā€œI think itā€™s more than donors. Iā€™ve seen politicians turn down donors before.ā€

Journalist Glenn Greenwald replied with a story about how U.S. Speaker of the House of Representatives Mike Johnson changed his tune on a dime about the Foreign Intelligence Surveillance Act (FISA), which allows the government to spy on American communications without a warrant. The journalist made the caveat that he is not assuming blackmail was responsible for Johnsonā€™s behavior.

Greenwald told how he had seen Johnson grill FBI Director Christopher Wray about his agencyā€™s spying and ā€œcould just tell that he felt passionately about (this),ā€ prompting Greenwald to invite Johnson on his show, before anyone had any idea he might become Speaker of the House.

ā€œOne of the things we spent the most time on was (the need for) FISA reform,ā€ Greenwald told Carlson, noting that the expiration of the current iteration of the FISA law was soon approaching. He added that Johnson was ā€œdeterminedā€ to help reform FISA and that it was in fact ā€œhis big issue,ā€ the very reason he was on Greenwaldā€™s show to begin with.

Johnson became House Speaker about two months to three months later, and Greenwald was excited about the FISA reform he thought Johnson would surely help bring about.

ā€œNot only did Mike Johnson say, ā€˜Iā€™m going to allow the FISA renewal to come to the floor with no reforms.ā€™ He himself said, ā€˜It is urgent that we renew FISA without reforms. This is a crucial tool for our intelligence agencies,ā€™ā€ Greenwald reounted.

He noted that Johnson was already getting access to classified information while in Congress, wondering at Johnsonā€™s explanation for his behavior at the time, which was that he was made aware of highly classified information that illuminated the importance of renewing FISA and the spying capabilities it grants, as is.

Greenwald doesnā€™t believe one meeting is enough to change the mind of someone who is as invested in a position as Johnson was on FISA reform.

ā€œI can see someone really dumb being affected by that ā€¦ heā€™s a very smart guy. I donā€™t believe he changed his mind. So the question is, why did he?ā€ Greenwald asked.

ā€œI donā€™t know. I really donā€™t. But I know that the person that was on my show two months ago no longer exists.ā€

Theoretically, there are many ways an intelligence agency could coerce a politician or other person of influence into certain behaviors, including personal threats, threats to family, and committing outright acts of aggression against a person.

A former CIA agent hasĀ testifiedĀ during an interview with Candace Owens that his former employer used the latter tactic against him and his family, indirectly through chemicals that made them sick, when he blew the whistle on certain unethical actions the CIA had committed.

ā€œThis is why you never hear about CIA whistleblowers. They have a perfected system of career destruction if you talk about anything you see that is criminal or illegal,ā€ former CIA officer Kevin Shipp said.

As a form of coercion, sexual blackmail in particular is nothing new, although porn sites make the possibility much easier. In herĀ bookĀ ā€œOne Nation Under Blackmail: The Sordid Union Between Intelligence and Crime That Gave Rise to Jeffrey Epstein,ā€ investigative journalist Whitney Webb discusses not only how the intelligence community uses sexual blackmail through people like Jeffrey Epstein but how it was used by organized crime before U.S. intelligence even existed.

Todayville is a digital media and technology company. We profile unique stories and events in our community. Register and promote your community event for free.

Follow Author

Business

Apple removes security feature in UK after govā€™t demands access to user data worldwide

Published on

From LifeSiteNews

By Emily Mangiaracina

The decision was otherwise roundly condemned on X as ā€œhorrific,ā€ ā€œhorrendous,ā€ the hallmark of a ā€œdictatorship,ā€ and even ā€œthe biggest breach of privacy Western civilization has ever seen.ā€

Apple pulled its highest-level security feature in the U.K. after the government ordered the company to give it access to user data.

The U.K. government demanded ā€œblanket accessā€ to all user accounts around the world rather than to specific ones, a move unprecedented in major democracies, according toĀ TheĀ Washington Post.

The security tool at issue in the U.K. isĀ Advanced Data Protection (ADP), which provides end-to-end encryption so that only owners of particular data ā€“ and reportedly not even Apple ā€“ can access it.

ā€œApple can no longer offer Advanced Data Protection (ADP) in the United Kingdom to new users and current UK users will eventually need to disable this security feature,ā€ an Apple spokesman said.

According to Apple, the removal of ADP will not affect iCloud data types that are end-to-end encrypted by default such as iMessage and FaceTime.

The nine iCloud categories that willĀ reportedlyĀ no longer have ADP protection are iCloud Backup, iCloud Drive, Photos, Notes, Reminders, Safari Bookmarks, Siri Shortcuts, Voice Memos, Wallet Passes, and Freeform.

These types of data will be covered only by standard data protection, the default setting for accounts.

Journalist and Twitter Files whistleblower Michael SchellenbergerĀ slammed the U.K.-initiated move as ā€œtotalitarian.ā€

The decision was otherwise roundly condemned on X as ā€œhorrific,ā€ ā€œhorrendous,ā€ the hallmark of a ā€œdictatorship,ā€ and even ā€œthe biggest breach of privacy Western civilization has ever seen.ā€

Elon MuskĀ declaredĀ Friday that such a privacy breachĀ ā€œwould have happened in Americaā€ if President Donald Trump had not been elected.

 

Jake Moore, global cybersecurity adviser at ESET, commented that the move marks ā€œa huge step backwards in the protection of privacy online.ā€

ā€œCreating a backdoor for ethical reasons means it will inevitably only be a matter of time before threat actors also find a way in,ā€ Moore said.

Britain reportedly made the privacy invasion demand under the authority of the Investigatory Powers Act of 2016.

Continue Reading

Censorship Industrial Complex

Bipartisan US Coalition Finally Tells Europe, and the FBI, to Shove It

Published on

FLICKER OF HOPE? Left, Senator Ron Wyden. Middle, Director of National Intelligence Tulsi Gabbard. Right, Rep. Andy Biggs

Racket NewsĀ  By Matt Taibbi

While J.D. Vance was speaking in Munich, the U.K. was demanding encrypted data from Apple. For the first time in nine years, America may fight back

Last Friday, while leaders around the Western world were up in arms about J.D. Vanceā€™s confrontational address to the Munich Security Council, theĀ Washington PostĀ published a good old-fashioned piece of journalism. From ā€œU.K. orders Apple to let it spy on usersā€™ encrypted accountsā€:

Security officials in the United Kingdom have demanded that Apple create a back door allowing them to retrieve all the content any Apple user worldwide has uploaded to the cloud, people familiar with the matter told The Washington Post.ā€¦

[The] Home Secretary has served Apple withā€¦ a technical capability notice, ordering it to provide access under the sweeping U.K. Investigatory Powers Act of 2016, which authorizes law enforcement to compel assistance from companiesā€¦ The law, known by critics as the Snoopersā€™ Charter, makes it a criminal offense to reveal that the government has even made such a demand.

This rare example of genuine bipartisan cooperation is fascinating for several reasons. Oregonā€™s Ron Wyden teamed up with Arizona Republican Congressman Andy Biggs toĀ ask new Director of National Intelligence Tulsi GabbardĀ for help in beating back the British. While other Democrats likeĀ Michael BennetĀ andĀ Mark WarnerĀ were smearing Gabbard as a Russian proxy in confirmation hearings, Wyden performed an homage to old-school liberalism and asked a few constructive questions, including a request thatĀ Gabbard recommit to her stanceĀ against government snatching of encrypted data. Weeks later, the issue is back on the table, for real.

The original UK demand is apparently nearly a year old, and Apple has reportedly been resisting internally. But this show of political opposition is new. There has been no real pushback on foreign demands for data (encrypted or otherwise) for almost nine years, for an obvious reason. Europe, the FBI, and the rest of the American national security apparatus have until now mostly presented a unified front on this issue. In the Trump era especially, there has not been much political room to take a stand like the one Wyden, Biggs, and perhaps Gabbard will be making.

The encryption saga goes back at least ten years. On December 2, 2015, two menĀ opened fire at the Inland Center in San Bernardino, killing 14 and injuring 22. About two months later,Ā word got out that the FBI was trying to force AppleĀ to undo its encryption safeguards, ostensibly to unlock the iPhone of accused San Bernardino shooter Syed Rizwan Farook. The FBIā€™s legal battle was led by its General Counsel Jim Baker, who later went to work at Twitter.

One flank of FBI strategy involved overhaulingĀ Rule 41Ā of the Rules of Criminal Procedure. The FBIā€™s idea was that if it received a legal search warrant, it should be granted power to use hacking techniques, if the target is ā€œconcealed through technological means.ā€ The Department of Justice by way of the Supreme Court a decade ago issued this recommendation to Congress, which under a law called the Rules Enabling Act would go into force automatically if legislation was not passed to stop it. In 2016,Ā Wyden joined up with Republican congressman Ted PoeĀ to oppose the change, via a bill called the Stopping Mass Hacking Act.

Two factors conspired to kill the effort. First, the FBI had already won its confrontation with Apple, obtaining anĀ order requiring the firmĀ (which said it had no way to break encryption) to write software allowing the Bureau to use ā€œbrute forceā€ methods to crack the suspectā€™s password. While Apple was contesting, the FBI busted the iPhone anyway by hiring a ā€œpublicity-shyā€ Australian firm called Azimuth, which hacked the phone a few months after the attack. TheĀ Post,Ā citing another set of ā€œpeople familiar with the matter,ā€Ā outed the companyā€™s nameĀ years later, in 2021.

The broader issue of whether government should be allowed to use such authority in all cases was at stake with the ā€œStopping Mass Hackingā€ bill. It was a problem for the members that the FBI called its own shot in the San Bernardino case, but the fatal blow came on November 29, 2016, when the UK passed the bill invoked last week, called theĀ Investigatory Powers Act. This legal cheat code gave agencies like Britainā€™s GHCQ power to use hacking techniques (called ā€œequipment interferenceā€) and to employ ā€œbulkā€ searches using ā€œgeneralā€ warrants. Instead of concrete individuals, the UK can target a location or a group of people who ā€œshare a common purposeā€:

THE IPA: Bulk warrants, warrants by location, warrants on groups with ā€œcommon purposeā€

The law was and is broad in a darkly humorous way. It mandates that companies turn over even encrypted data for any of three reasons: to protect national security, to protect the ā€œeconomic well-being of the UK,ā€ and for the ā€œprevention or detection of serious crime.ā€

Once the Act passed, American opposition turtled. How to make a stand against FBI hacking when the Bureauā€™s close partners in England could now make such requests legally and without restriction? The Wyden-Poe gambits were wiped out, andĀ just two days after the IPA went into effect, changes to Rule 41 in AmericaĀ did as well. These granted American authorities wide latitude to break into anything they wanted, provided they had a warrant. As one Senate aide told me this week, ā€œThat was a game-over moment.ā€

Once the British got their shiny new tool, they werenā€™t shy about using it. The Twitter Files were full of loony ā€œIPAā€ dramas that underscored just how terrifying these laws can be. In one bizarre episode in August of 2021, Twitter was asked to turn over data on soccer fans to a collection of alphabet soup agencies, including the Home Office and the ā€œFootball Policing Unit.ā€ The Football Police informed Twitter that ā€œin the UKā€¦ using the ā€˜N wordā€™ is a criminal offence ā€” not a freedom of speech issue.ā€

Twitter executives scrambled to explain to footballā€™s cyber-bobbies that many of their suspects were black themselves, and tweets like ā€œRAHEEM STERLING IS DAT NIGGAā€ were not, in fact, ā€œhateful conduct.ā€ (The idea that British police needed American executives to interpret sports slang is a horror movie in itself.) Accounts like @Itsknockzz and @Wavyboomin never knew how close they came to arrest:

N**** PLEASE: British police invoked the Investigatory Powers Act to get user information about nonwhite football fans

British overuse was obvious, but Twitter elected not to complain. They also kept quiet when American authorities began pushing for the same power. Though the Apple standoff aroused controversy,Ā 50% of AmericansĀ still supported the FBIā€™s original stance against encryption, which seemed to embolden the Bureau. Senior officials began asking for the same virtually unlimited authority their friends in the UK (and soon after,Ā Australia) were asserting. Donald Trumpā€™s Attorney General, William Barr, seethed about encryption in aĀ keynote speechĀ at an International Cybersecurity Conference on July 23rd, 2019. The Justice Department was tiring of negotiations with tech companies on the issue, Barr said:

While we remain open to a cooperative approach, the time to achieve that may be limited. Key countries,Ā including important allies, have been moving toward legislative and regulatory solutions. I think it is prudent to anticipate thatĀ a major incident may well occur at any timeĀ that will galvanize public opinion on these issues.

God knows what he meant about a ā€œmajor incidentā€ that ā€œmay well occur at any time,ā€ but Barr was referring to theĀ Investigatory Powers ActĀ and imitator bills that by 2019 were being drafted by most U.S. intelligence partners.

Even without a central ā€œincident,ā€ European officials have been pursuing the dream of full ā€œtransparencyā€ into user data ever since, often with support from American politicians and pundits. It was not long ago that Taylor Lorenz was writingĀ outrage pornĀ in theĀ New York TimesĀ about the ā€œunconstrainedā€ and ā€œunfettered conversationsā€ on the Clubhouse App. As Lorenz noted, Clubhouse simply by being hard to track aroused the hostility of German authorities, who wrote to remind the firm about European citizensā€™ ā€œright to erasureā€ and ā€œtransparent informationā€:

Providers offering services to European users must respect their rights to transparent information, the right of access, the right to erasure and the right to object.

Eventually, the EU tried to submarine end-to-end encryption through dystopian bills like ā€œChat Control,ā€ which would have required platforms to actively scan user activity for prohibited behavior. This concept was widely criticized even in Europe, and in the States, which was mostly still in the grip of ā€œfreedom causes Trumpā€ mania,Ā TechCrunchĀ called it ā€œHella Scary.ā€

Chat Control just barely stalled out in October, thanksĀ to the Dutch, but Europeā€™s feelings about encryption were still more than made clear with this past summerā€™sĀ arrest of Telegram founder Pavel Durov. That event was largely cheered in the U.S. press, where Durov was accused of actively ā€œhiding illegal behavior,ā€ and turning his platform into a ā€œmisinformation hot spotā€ used by ā€œfar right groups,ā€ ā€œneo-Nazis,ā€ and ā€œProud Boys and QAnon conspiracy theorists.ā€ The consensus was Durov himself was helping sink the concept of encryption.

ā€œIf we assume this becomes a fight about encryption, it is kind of bad to have a defendant who looks irresponsible,ā€ was how Stanford Cyber Policy Analyst Daphne KellerĀ described Durov to theĀ New York TimesĀ after his arrest.

The Durov arrest may have marked the moment of peak influence for the cyber-spook movement. Though the Investigatory Powers Act was a major political surveillance tool, it was far from the only important law of its type, or the most powerful. The IPA was in fact just one of a long list of acronyms mostly unfamiliar to American news consumers, from Franceā€™sĀ LCENĀ to Germanyā€™sĀ NetzDGĀ to the EUā€™sĀ TERREGĀ as well as itsĀ Code of Practice on DisinformationĀ andĀ Code of Conduct on Countering Illegal Hate Speech Online, among many others. American authorities usually followed the pattern in the case of encryption and the IPA, doing informally what European counterparts were able to effect openly and with the force of law.

Now however it looks like efforts by government officials to completely wipe out encryption have failed, and events have taken a new turn. ā€œWild,ā€ is how the Senate aide characterized the Wyden-Biggs letter, resuming another bipartisan fight put on hold nine years ago. ā€œIā€™d forgotten what this looks like.ā€

IRONY ALERT: Germans protesting FBI efforts to break iPhone encryption, 2016

Subscribe to Racket News.Ā 

For the full experience, become a paying subscriber.

Continue Reading

Trending

X