4,358 New MKUltra Docs To Be Released After Crowdfunding Campaign

4,358 New MKUltra Docs To Be Released After Crowdfunding Campaign

John Greenewald has been FOIA requesting undisclosed, government documents since he was 15 years old, having filed roughly 9,000 requests. So, when he realized a batch of documents he received regarding the CIA’s mind control project MKUltra, was missing thousands of pages, he demanded an answer. Now, after a two-year battle to acquire those documents, the CIA finally acquiesced, though it commanded a fee.

Greenewald was made aware of the documents by a Reddit user who cross-checked his cache with their original index, finding 4,358 missing. Greenewald called the CIA to request them and was unsurprisingly met with resistance.

He was told the documents contained information regarding behavioral modification and were unrelated to MKUltra. But he wasn’t convinced, so he filed another FOIA to attain them.

Typically, Greenewald can submit a fee waiver for a FOIA request, under the grounds that he is a journalist and the publication of the files is for public interest, bettering the public’s understanding of the way government operates.

But this time his waiver was denied, with the CIA requiring a payment of $425.80 for his request. Unfortunately, Greenwald couldn’t come up with the money, instead turning to a GoFundMe crowdsourcing campaign. His goal was met within five days.

The disclosure of documentation surrounding the MKUltra program is of high public interest lately, especially with the release of the Netflix docudrama Wormwood, which investigates the death of former CIA scientist Frank Olsen, who became a victim of the program.

MKUltra was a program focused on studying the potential to control the minds of unwitting subjects, often through the administration of psychoactive substances, such as LSD.

Frank Olson was one of the CIA’s own, who was unknowingly given LSD before his suspicious death, falling from the 13th story window of a New York hotel.

Greenwald’s website was one of the first publications to release the CIA’s MKUltra documents after acquiring them in 2004. Since then, they have become the most commonly searched documents of more than 2,000,000 on the CIA’s website.

It will still take some time before this missing batch of documents makes its way into Olson’s hands and is published on his website, but we look forward to seeing what else the CIA has kept hidden from the public regarding one of its most nefarious and clandestine programs.

 

Watch this episode of Beyond Belief, in which John Greenewald discusses his career filing FOIA requests to uncover secret government programs:



Is Your Smart Speaker Spying On You?

Those personal assistants everyone seems to be getting for their home are convenient voice-activated tools for an increasing number of tasks. But when Alexa and Google Home are constantly recording and uploading your voice to the cloud, a third-party server, you could potentially be exposing yourself to hackers, government intrusion, and corporate spying. Are these legitimate concerns or paranoid conspiracy?

Amazon Echo and Alexa 

By now, almost everyone is familiar with Amazon’s voice-command personal assistant, Alexa – arguably better than Siri, but not quite as intuitive as HAL 9000, though that’s probably for the best. Since the technology was introduced in 2014, a number of iterations from Amazon and Google have been created to put smart speakers in the homes of every consumer.

These speakers are able to play your favorite song, order pizza, activate other smart devices, and maintain your calendar. But some of the other conveniences they can handle involve personal data, like locating your phone, accessing bank account information, and calling your loved ones. All of this is accomplished by having a microphone ready to start recording at any given moment.

These days, new technological advents are a double-edged sword; they’re increasingly convenient, but also increasingly intrusive. That microphone recording your request to order take-out is also uploading it to a cloud server; a third party that is able to do what it wishes with that information.

Now, it would require a lot of data storage to record and save everything, all the time, so the device waits for a wake word to start listening. Your recording is then sent to the cloud to be translated by voice recognition software.

Amazon calls this the Alexa Voice Service, or AVS, which one can access and use to build your own voice assistant with a single-board computer like Raspberry Pi. That’s why the basic versions of the technology, like the Amazon Dot, that don’t include a Bluetooth speaker, can provide the technology so inexpensively; it’s basically just a microphone that sends your voice recordings to software in the cloud.

 

home intelligent voice activated assistant 3d rendering concept of hi tech futuristic artificial intelligence speech recognition technology

 

 

So, if the technology is that simple, doesn’t that leave it vulnerable to hackers? Yes, it does. In fact, there have been several different successful hacks that have forced Amazon to warn users of design flaws and vulnerabilities.

On Amazon’s pre-2017 technology, one programmer created a malware code that could be installed on Alexa-enabled devices to make it stream recorded conversations directly to his computer. This program was installed by physically removing the rubber bottom and soldering a connection between the device’s internal hardware, an SD card reader, and his laptop.

Though this particular connection would have been blatantly obvious to the person whose device was tapped, he said he would be able to create a 3D-printed plate that could be easily planted and go unnoticed with more time and development.

Amazon’s response? Don’t buy one of their devices from a third party. This might be the only advice needed for most consumers, but for those unfamiliar with the technology, they may be unwittingly spied on in public places where Amazon products are starting to be planted. Last year, the Wynne hotel in Las Vegas announced it would put Echoes in all of its rooms, while Amazon is adamantly targeting other hotel groups to do the same.

But that wasn’t the only instance of someone finding a security flaw in one of these speakers. Hackers have found a way to translate voice commands into high-frequency pitches able to be heard by Alexa but not by you – kind of like a dog whistle. Again, to use this hack you must be close to the speaker, though it’s much more reticent than having to install something.

While just about anything can be hacked by someone with enough know-how, there have been cases in which these devices have been recording everything as soon as they were turned on, straight from the factory. One tech blogger found his Google Home mini-speaker was recording and uploading his conversations without him saying the wake word. Google has since fixed this design oversight, but it goes to show just how easily it could “accidentally” happen.

Can Government Subpoena Your Voice Assistant?

The technology has only been available for a few years and already the police have tried to acquire a warrant to access recordings from one of these always-on devices. In a case in Arkansas, police sought access to an Amazon Echo in the home of a man convicted of murder.

The company refused to hand over the information and told police that there wouldn’t even be anything there unless the wake word was used to activate the device. Eventually, the defendant agreed to allow the police access to the Echo, from which they found no incriminating evidence, and the case was dropped.

But it wasn’t just the Amazon smart speaker that the police and prosecution hoped to find evidence in, it was also his smart water meter. Prosecutors pointed to a large amount of water used between 1-3 a.m., the time it was thought the defendant hosed down his porch to clean off blood from the victim. The defendant said the am/pm function wasn’t accurate and that he used that much water 12 hours earlier to fill the hot tub.

 

alexa spying on you

 

It’s this level of detail that our web of smart devices can unwittingly tell others about our activity. The use of a smart electric meter can even be used to see what television programs we’re watching by matching electricity fluctuations with the brightness of the screen. Essentially, each program creates a unique power signature, that can be matched to monitor your television habits.

Because these devices are recording data and uploading it to a third-party server, it can be made public or sold to advertisers who can calculate your habits with metadata. It’s unclear whether this type of intrusive data collection is actually being employed by many companies, but it’s highly likely. And as more and more of our appliances become part of the Internet of Things or IoT, every time you use them, data will be mined and analyzed in order to monitor your behavior.

The ACLU has proposed a set of rules and regulations that should be adhered to by law enforcement and other third parties for the protection of consumer privacy, though they haven’t been written into any legislation yet. It seems that unless we figure out a way to prevent the sharing of all this personal information from the use of smart utilities, we may be offering up access to every minute detail of our lives.

Read Article

Our unique blend of yoga, meditation, personal transformation, and alternative healing content is designed for those seeking to not just enhance their physical, spiritual, and intellectual capabilities, but to fuse them in the knowledge that the whole is always greater than the sum of its parts.


Use the same account and membership for TV, desktop, and all mobile devices. Plus you can download videos to your device to watch offline later.

Desktop, laptop, tablet, phone devices with Gaia content on screens
Testing message will be here