Feeds

Total Poindexter Awareness tech spooks – a Who's Who

Weren't we not supposed to know this?

  • alert
  • submit to reddit

Remote control for virtualized desktops

INSECURITY LEVEL: PINK

One of the great post-War technology trends has been reversed since 9/11, almost without any noticing.

For many years now technology that was developed for military use, or with the help of military funding, has found a commercial civilian use. Think of the Internet, or CDMA.

But what we're seeing now - and this mirrors the militarization of so much of civilian life - is the reverse. Apparently civilian technologies such as Groove's Peer to Peer system are being repurposed as surveillance technologies. And as the spooks welcome the technology companies, the technology companies reciprocate: welcoming them onto their boards.

What can foreign policy maven Richard Perle [bio - lives on in Google cache] add to Autonomy? A hitherto unnoted expertise on Bayesian modelling? Somehow, I think not.

This cosy relationship doesn't always help the vendor.

The presence of veteran spook Brent Scowcroft on the Qualcomm board can't help too much when your staff are being arrested overseas on espionage charges. (Qualcomm denied the charge, and adding to the murk, the founder's own laptop was subsequently mysteriously swiped, prompting a hilarious apology from the Wall Street Journal about failing to protect information. However, we digress.

The Electronic Information Privacy Center has obtained a list of contractors and what they're working on. You can read a summary here and EPIC's more detailed correspondence here. And fascinating it is too.

One thought that occurred to us as we were watching these shadowy organisations blinking in daylight was they really would rather we didn't know precisely what they're up to.

We shall be ringing Ms. Michelle Tavares of Hicks & Assoc. Inc. of Arlington, VA in an attempt to understand what Threat-based Adaptive Red Teaming and Experimentation really is.

That's the trouble with Total Poindexter Awareness.

It's bi-directional. ®

Many thanks to Jorn Barger for drawing our attention to so many of these connections.

Choosing a cloud hosting partner with confidence

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.