Feeds

Total Poindexter Awareness tech spooks – a Who's Who

Weren't we not supposed to know this?

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

INSECURITY LEVEL: PINK

One of the great post-War technology trends has been reversed since 9/11, almost without any noticing.

For many years now technology that was developed for military use, or with the help of military funding, has found a commercial civilian use. Think of the Internet, or CDMA.

But what we're seeing now - and this mirrors the militarization of so much of civilian life - is the reverse. Apparently civilian technologies such as Groove's Peer to Peer system are being repurposed as surveillance technologies. And as the spooks welcome the technology companies, the technology companies reciprocate: welcoming them onto their boards.

What can foreign policy maven Richard Perle [bio - lives on in Google cache] add to Autonomy? A hitherto unnoted expertise on Bayesian modelling? Somehow, I think not.

This cosy relationship doesn't always help the vendor.

The presence of veteran spook Brent Scowcroft on the Qualcomm board can't help too much when your staff are being arrested overseas on espionage charges. (Qualcomm denied the charge, and adding to the murk, the founder's own laptop was subsequently mysteriously swiped, prompting a hilarious apology from the Wall Street Journal about failing to protect information. However, we digress.

The Electronic Information Privacy Center has obtained a list of contractors and what they're working on. You can read a summary here and EPIC's more detailed correspondence here. And fascinating it is too.

One thought that occurred to us as we were watching these shadowy organisations blinking in daylight was they really would rather we didn't know precisely what they're up to.

We shall be ringing Ms. Michelle Tavares of Hicks & Assoc. Inc. of Arlington, VA in an attempt to understand what Threat-based Adaptive Red Teaming and Experimentation really is.

That's the trouble with Total Poindexter Awareness.

It's bi-directional. ®

Many thanks to Jorn Barger for drawing our attention to so many of these connections.

Choosing a cloud hosting partner with confidence

More from The Register

next story
Microsoft on the Threshold of a new name for Windows next week
Rebranded OS reportedly set to be flung open by Redmond
'In... 15 feet... you will be HIT BY A TRAIN' Google patents the SPLAT-NAV
Alert system tips oblivious phone junkies to oncoming traffic
Apple: SO sorry for the iOS 8.0.1 UPDATE BUNGLE HORROR
Apple kills 'upgrade'. Hey, Microsoft. You sure you want to be like these guys?
SMASH the Bash bug! Red Hat, Apple scramble for patch batches
'Applying multiple security updates is extremely difficult'
'Google is NOT the gatekeeper to the web, as some claim'
Plus: 'Pretty sure iOS 8.0.2 will just turn the iPhone into a fax machine'
ARM gives Internet of Things a piece of its mind – the Cortex-M7
32-bit core packs some DSP for VIP IoT CPU LOL
'People have forgotten just how late the first iPhone arrived ...'
Plus: 'Google's IDEALISM is an injudicious justification for inappropriate biz practices'
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.