Main Menu

Privatized NSA Army is Attacking YOU!

In the first part of this article series, the post 9/11 rise of a private NSA was detailed. Some started in reaction to the twin tower attack. They aren’t connected with the government, intelligence, or homeland security. They are private citizens that have no security clearances in any western country.

They use the free OSINT [open-source intelligence] software found on the internet to find or decide who is a terrorist. Many of them enjoy the feeling of power they from getting people fired from their jobs and put on terrorist investigation lists.

They are freelancers with no oversight or rules. They are only accountable to themselves and their employers. These freelancers thrive on their ability to remain hidden from the public eye. In reality, they could be your socially inept, angry neighbor down the street who is afraid of their own shadow in person. But give them a keyboard and they’ll take your job, your bank account and your freedom.

These freelancers have carved a niche for themselves at the bottom of the OSINT and hacking professions. Today these people who feel so insignificant in their own lives are the cyber warriors for hire by anyone who has an ax to grind and the means to pay them. 

They are Hate for Hire.

Freelance Cyber Soldiers

Our view is that cyber is another operational domain, much as the seas are, much as the land is, much as space is.”Admiral Mike Rogers – Commander US Cyber Command, Director of the NSA, Chief of CSS

Cyber in this context goes way beyond hacker attacks aimed at taking down a website. It is meant to cause damage and even death as a military tool. Because this new frontier is so new, the laws governing “Cyber-war” have yet to drawn up. What has been done so far are a set of guidelines that define who and what can and can’t be targeted.

The Tallinn Manual [an academic, non-binding study on how international law applies to cyber conflicts and cyber warfare] sets out 95 black letter rules to apply international law to Cyber warfare. In the context of war, there are crimes against humanity that are unique to cyber. All the rules follow established laws of war including targeting civilians is a war crime. This will become very important by the time you get to the bottom of the article and make the remedy very simple to accomplish.

When you compare these rules to the conduct described in the first part of this article series detailing how people exercising 1st Amendment rights were treated by freelancers like Weisburd the pattern of abuse is clear. These rules are trying to describe Laws of War.

Weisburd doesn’t get paid to follow people. After stalking and collecting information his method hasn’t changed since the beginning. Weisburd has not merely “dismantled” websites. He has harassed individuals engaged in perfectly legal online dissent, threatened their family members, harassed their employers, and harassed their web hosts. He regularly uses lies, disinformation and threats to accomplish these goals. Weisburd decides what is “threatening.”

If we no longer question who gets to spy, then who gets to decide who is a sanctionable enemy of the state? Who gets to run counter-terror operations against whom? What punishment can they meet out?