Jack Howard, Early NSA Whistleblower, Updated.

admin Virginia Hoge Leave a Comment

[Posted December 18, 2013]

whistleblower1387393825 ¬

Whistleblowers are sometimes anonymous, courageous people who speak out and face great persecution for doing so, never recoginzed or known.

They act from their conscience, as all true whistleblowers do.

PRISM

prism1387393723 ¬

Jack Howard, probably not his real name, posted comments to this blog in November of 2010 which told me that Topix was sharing its user’s data with the NSA.

Most of the concerns that have been raised by the Snowden revelations, were touched upon and elaborated on by Jack Howard: Spying, illicit data acquisition, phone-tapping, the involvement of powerful figures in Tech, World-wide spying, the lust for Power and Control behind it.

Remember, this was 3 years ago. What is now common knowledge, was not known at all. I think it might be hard for people now to imagine the sharp reaction of the cover-up, the vicious lashing out, early whistleblowers like Howard got for their courage, in a climate where little was being said about NSA spying. It was fierce, it was intense, Topix was pissed it got caught. Its reaction was to bully.

The great mistake the NSA made in ever dealing with Chris Tolles and Topix, apart from not even morally considering what was going on, on the site, was that they were so arrogant, they thought they could control all criticism, with bullying. They flaunted the surveillance, that was their method.

Jack Howard: Virginia,This “Topix” operation isnt about “ad revenues” or money at all really. This is a top down fascist operation where Topix is able to spy on citizens, profile them, invasion of privacy, etc. This is what is really going on. 

The “Tolle Trolls” can observe the habits of millions of Americans, perhaps report them to law enforcement, mess with their credit report, etc. 

Topix is very much about ad revenues, even words in comments are linked to ads, its a Content Farm, loaded with ads whose revenues line the pockets of its backers, but his warning illustrates the deep involvement and complicity of Topix with the NSA.

Jack Howard described the spying he was facing at that time. It involved phone call spying which is domestic spying, something the NSA has recently claimed it does not do without a court order!

NSA speaks out on Snowden Spying

Gen. Keith Alexander: No, that’s not true. NSA can only target the communications of a U.S. person with a probable cause finding under specific court order.

Oh really??? Jack Howard has his phone tapped as a whistleblower 4 years before the 60 Minutes interview. An important open question is how many other early whistleblowers were targeted?

Jack Howard: These guys at Topix somehow tapped my phone and then began to post my phone conversation. Unbeleievable

The complicity of Topix in everything Howard describes, is chilling. Its so much more than sharing their user’s data, its real involvement.

Jack Howard: What I don’t like is they are able to spy on you.

Topix was the vehicle, his phone conversation was posted on.

As I have warned over and over again, the partnering with a site as corrupt as Topix is how the massive data trove illicitly gathered can be used as a method of terrorism, black-mail, strong-arming and control. Its the most dangerous potential outcome of what Snowden revealed, a nightmarish 1984 scenario. No one knows that better, than one who has experienced it:

Terrorism on Topix of NSA Whistleblowers

Jack Howard: Yes, these trolls are quite resourceful. They always let me know that they know where I live, my name, and as I stated they posted a short blurb to let me know they have listened into phone calls.

Is there organized crime on Topix? You bet there is.

For years, people on Topix have complained about the savage PI outing they face there, similiar to what Howard describes:

I have been watching this for over a year. They have hacked all my information and are not shy about letting me know. They also intentionally “hint” or make a deliberate “mistake” when “taunting” me. This allows them a degree of deniability. Instead of feeding back my address they’ll intentionally list a residence that is just slightly off the truth.

I had hardly known about the NSA and didn’t even know what encryption was when his comments were posted.

Virginia Hoge: can you explain what encryption means Jack?

He told me about the NSA’s dealings in the Silicon Valley, which Chris Tolles was intimately involved with:

Jack Howard: According to Crowell, the NSA has a great deal of expertise in securing communications, and it wants to ensure thatproducts bought by the Defense Department meet NSA standards. “In addition, as part of the NSA’s intelligence mission, [the agency needs] to have a thorough understanding of where commercial products are headed.”

Taher Elgamal, author of the Netscape data-recovery plan, whorecently left Netscape to start his own venture, said Netscape had no choice but to maintain constant contact with the NSA. “They’re costing the industry a lot of money,” Elgamal said. Others agree. 

“Everyone in Silicon Valley, including us, has to have specific staff – highly paid experts – to deal with them,” said Chris Tolles, security group product manager at Sun.

“Their job is to wrangle this from a policy standpoint.”Sun has had run-ins with the NSA in the past. Two years ago, the NSA objected to Sun including encryption in the exportable version of Java 1.1. The end result was that Sun stripped encryption out of Java 1.1 and the software was delayed by about six months.

Chris Tolles has so far gotten off scott-free, of not only for the so-many human right’s abuses and vast destruction caused by his site, but his partnership with the NSA. A performer, he has attempted to use Twitter as a platform to present an “innocent face”.

I am sure, wherever Jack Howard is today, he is rolling his eyes, as I did:

More Topix NSA cover-up

Howard had looked into the backgrounds and history of other notorious Silicon Valley figures behind Topix:

Jack Howard: Still think you’re dealing with “trolls”, then read these bios.

Richard “Rich” Skrenta (b.1967 in Pittsburgh, Pennsylvania) is a computer programmer and Silicon Valley entrepreneur who created the search engine blekko.

In 1982, as a high school student at Mt. Lebanon High School, Skrenta wrote the Elk Cloner virus that infected Apple II machines. It is widely believed to be the first large-scale self-spreading personal computer virus ever created.

Cover-up that never should have happened

Jack Howard: The events on TOPIX leave no doubt that there is a “gang” of souless cyber hackers running loose with sophisticated software, used to target the population.

You can laugh, at Howard’s talk of a potential “computer dictatorship”, until you read Rich Skenta’s post about “King Google” – an accomplice of Topix’s – and stop to consider how the vast harm to so many lives and businesses, the illegal drug dealing, the abuse to children, the massive media scandal of Topix, has stayed so well-protected and hidden, as it should never have been.

Winner-Take-All: Google and the Third Age of Computing

Jack Howard on the same thread, also posted comments about Wikileaks. I have come to the conclusion he, as I did, approached them for help with exposure, which they denied, to him as they did to me. I did not write up his comments about Wikileaks, I many times asked for their help, I was ignored.

I wrote up his warnings of the NSA being given the user’s data of all who visited Topix’s forums.

Is Topix giving out users personal data to the NSA?

I became an NSA whistleblower myself.

The evolution of the NSA revelations since Snowden, have been largely focused on the NSA and not their Tech Corporate accomplices, certainly not on Topix. Howard’s early warnings are therefore, all the more important.

This post is made in honor to an unknown American Hero: Jack Howard. Wherever he is today, I hope he is well and thank him.

November, 2010 (full comments here: Original NSA comments):

These guys at Topix somehow tapped my phone and then began to post my phone conversation. Unbeleievable

Jack Howard
November 27, 2010 05:30 PM

wow, Jack, thats awful. I have had my Topix PM’s hacked, my computer threatened to be hacked, my life has been threatened many times. I am so sorry to hear of your experience.

Virginia Hoge
November 28, 2010 11:20 AM

Yes, these trolls are quite resourceful. They always let me know that they know where I live, my name, and as I stated they posted a short blurb to let me know they have listened into phone calls.

Is there organized crime on Topix? You bet there is.

Jack Howard
November 28, 2010 10:19 PM

This booklet “Is the Devil in your laptop”? is a great way to understand the “social engineering” being done on Topix.

http://www.larouchepub.com/eiw/public/2007/2007_40-49/2007_40-49/2007-49/pdf/20-21_747-48.pdf

Jack Howard
November 28, 2010 10:22 PM

Another good read. Topix poses a real threat.

`Spacewar’: Welcome to the Post-Human Era

Jack Howard
November 28, 2010 10:32 PM

wow. Yes, there sure is Jack, I can vouch for this as well. Its one thing to say you support an atmosphere of absolute free speech, its another entirely to manipulate this atmosphere in service of real deviance.

Virginia Hoge
November 29, 2010 11:12 AM

My stalker troll is able to censor comment replies, she is able to block comments entirely, she is able to rig Topix polls. She is empowered, apparently by the company unless I here from them otherwise, and she is super-mean and directed.

Virginia Hoge
November 29, 2010 11:14 AM

wow. see, its the immunity from prosecution that people are not getting when they cannot comprehend the danger of cyber-criminals. For instance, if an anonymous troll posts a death threat to me on Topix, Topix will protect the identity of that troll, not delete the comment, and declare no responsibility for it. I can go to law enforcement and they say there is nothing they can do because the poster is anonymous. So, until I am dead, no crime has happened, none.

Virginia Hoge
November 29, 2010 04:19 PM

Virginia,This “Topix” operation isnt about “ad revenues” or money at all really. This is a top down fascist operation where Topix is able to spy on citizens, profile them, invasion of privacy, etc. This is what is really going on. 

The “Tolle Trolls” can observe the habits of millions of Americans, perhaps report them to law enforcement, mess with their credit report, etc. 

The Justice Department should shut Topix down, but the problem there is the organized crime interests that run Topix, enjoy a very high level of support and protection inside the Justice Department.

I have been watching this for over a year. They have hacked all my information and are not shy about letting me know. They also intentionally “hint” or make a deliberate “mistake” when “taunting” me. This allows them a degree of deniability. Instead of feeding back my address they’ll intentionally list a residence that is just slightly off the truth.

Jack Howard
November 30, 2010 10:01 AM

Still think you’re dealing with “trolls”, then read these bios.

Richard “Rich” Skrenta (b.1967 in Pittsburgh, Pennsylvania) is a computer programmer and Silicon Valley entrepreneur who created the search engine blekko.

In 1982, as a high school student at Mt. Lebanon High School, Skrenta wrote the Elk Cloner virus that infected Apple II machines. It is widely believed to be the first large-scale self-spreading personal computer virus ever created.

After his stint at AOL he went on to cofound Topix LLC, a Web 2.0 company in the news aggregation & forums market.[2] In 2005, he and his fellow cofounders sold a 75% share of Topix to a newspaper consortium made up of Tribune, Gannett, and Knight Ridder. Currently, he heads the startup company Blekko Inc, an internet search engine,[3] which began public beta testing on November 1, 2010[4] and recently gained Marc Andreessen as an investor.[5]

Marc Andreessen:MarNetscape’s IPO in 1995 propelled Andreessen into the public’s imagination. Featured on the cover of Time[8][9] and other publications,[10] Andreessen became the poster-boy wunderkind of the Internet bubble generation: young, twenty-something, high-tech, ambitious, and worth millions (or billions) of dollars practically overnight.

Andreessen is an investor in social news website Digg and several other early-stage technology startups, like Plazes, Netvibes, CastTV and Twitter. His latest project is Ning, which launched in October 2004. (actually its the RockMelt browser launched in 2010 see below)[11]He serves on the board of Facebook,[2] eBay, Kno, Hewlett-Packard, and Open Media Network, a combined Kontiki (VeriSign) client and media player, launched in 2005.

Andreessen married Laura Arrillaga in 2006.[16] She is the founder of the Silicon Valley Social Venture Fund,[17] and the daughter of Silicon Valley real estate billionaire John Arrillaga.

Jack Howard
 November 30, 2010 11:05 AM

The creaters of Topix all come out of the AOL milieu. Don’t forget that narco terrorist group known as FARC had always used a special AOL account to communicate, launder drug money, etc.

AOL was essentially aiding the FARC in their cocaine and terrorist operations.

Jack Howard
 November 30, 2010 11:12 AM

Look at the latest “Highschool” hostage story out of Wisconsin. I’ll guarantee you the suspect was a devotee of these “point and shoot” video games. The suspect shot and killed himself as police were approaching. 

This was same thing with the Columbine shootings and all the other school shootings. The shooter had become a brainwashed “game player”. 

The same interests that created these “video games” also created TOPIX.

Jack Howard
 November 30, 2010 11:32 AM

wow, so scary Jack. I have long wondered about the violence of video game playing. Wow, interesting.

Virginia Hoge
November 30, 2010 12:19 PM

Whats going on in the Silicon Valley Jack??? And is it connected to the Hoover Institute at Stanford?

Virginia Hoge 
November 30, 2010 01:19 PM

The key to understanding what Topix is all about:

LSD Freaks Meet Cyber-Hackers In 1974, Stewart Brand, chief propagandist for both the psychotropic drug revolution and the personal computer revolution, published a collection of his previously published essays under the title, II Cybernetic Frontiers. Two of the essays consisted of interviews he had conducted with Gregory Bateson, one of the architects of the psychedelic revolution in America, through his posting at the Palo Alto Veterans Hospital, where much MK-Ultra experimentation took place. Bateson was one of the four or five most influential members of the Cybernetics Group. The other, longer essay in the book, “Fanatic Life and Symbolic Death Among the Computer Bums,” was first published in the December 1972 issue of the leading counterculture publication, Rolling Stone.

Brand began the Rolling Stone piece with the startling boast: “Ready or not, computers are coming to the people. That’s good news, maybe the best since psychedelics.” He continued, “It’s way off the track of the `Computers–Threat or Menace?’ school of liberal criticism but surprisingly in line with the romantic fantasies of the fore-fathers of the science, such as Norbert Wiener, Warren McCulloch, J.C.R. Licklider, John von Neumann, and Vannevar Bush. The trend owes its health to an odd array of influences: the youthful fervor and firm dis-Establishmentarianism of the freaks who design computer science; an astonishingly enlightened research program from the very top of the Defense Department; an unexpected market-flanking movement by the manufacturers of small calculating machines; and an irrepressible midnight phenomenon known as Spacewar.”

Brand provided a detailed explanation of Spacewar, perhaps the very first computer war game to be designed. “Ah, Spacewar. Reliably, at any night-time moment (i.e., non-business hours) in North America, hundreds of computer technicians are effectively out of their bodies, computer-projected onto cathode ray tube display screens, locked in life-or-death space combat for hours at a time, ruining their eyes, numbing their fingers in frenzied mashing of control buttons, joyously slaying their friends and wasting their employers’ valuable computer time.”

Beginning in 1963, when the U.S. space program was moved out of the military and housed under NASA, J.C.R. Licklider convinced his boss at ARPA (what would later be called DARPA) to devote a fraction of the agency’s budget to computer research. At the time, the Department of Defense was the world’s largest consumer of computers. Licklider became the director of an ARPA unit called IPTO (Information Processing Techniques Office), and, over the next years, disbursed millions of dollars to a wide range of computer and Artificial Intelligence research centers.

Until 1969, when the Mansfield Amendment placed restrictions on how the Pentagon could spend its research and development money, there were no boundary conditions on the kinds of projects that IPTO could bankroll. Billions of dollars went into the early development of computer networking, computer graphics, “virtual reality,” simulation, and other key facets of what, today, is a $9-11 billion-a-year commercial industry of point-and-shoot video games. The Media Lab at MIT and the Stanford Artificial Intelligence Lab were two of the magnets for this money and the research work which fueled both the Pentagon training-simulation programs and the evolving video-game industry.

In his book On Killing, Lt. Col. David Grossman recounts how the advent of high-speed computers allowed the social engineers, responsible for training soldiers to overcome their aversion to killing, provided an unsurpassed technology for stimulus-response behavior modification. The increasingly realistic video graphics, the advanced work on neurological processes–all hallmarks of the cybernetic “man-machine” project–transformed the U.S. military into a force of programmed killers, and ultimately became the social engineers’ “weapon of choice” for twisting the minds of millions of America’s youth.

The social engineers seeking to fulfill Adorno, Horkheimer, Russell, and Huxley’s visions of a perfectly engineered society, led by a “scientific dictatorship,” were never far removed from the computer and AI labs where the technologies were being developed and tested.

Jack Howard
November 30, 2010 02:16 PM

Wow. So do you believe this is all about the encouraging of inhuman behavior to produce a scientific dictatorship? also to use Topix to spy on and to gather personal data on people?

Virginia Hoge 
November 30, 2010 02:31 PM

 did you see this Jack? http://www.marketoracle.co.uk/Article24643.html



Virginia Hoge
 November 30, 2010 03:33 PM

 Virginia, the banks are already bankrupt. Look at the 100,000 person protest in Ireland over the last week. Besides it is these same bankrupt financial interests that created TOPIX and other social networking sites. It is definitely “mind control” and “social control”.

The events on TOPIX leave no doubt that there is a “gang” of soulless cyber hackers running loose with sophisticated software, used to target the population.

The government should shut down TOPIX and confiscate all the infrastructure.

Jack Howard
 November 30, 2010 05:21 PM

 wow. scary Jack. its explains a lot though. For instance, did you see my post about the death threat to Obama that took 31 days to remove?

Virginia Hoge 
November 30, 2010 05:46 PM

 another thing Jack, if what you are saying is true, is that I have had a Monster troll on my back my entire time on Topix. 

This human beast has done literally everything possible to demean, threaten and scare me in thousands of comments, its absolutely ridiculous the trolling I have endured on Topix. She changes names/characters all the time to mass troll me day and night with vile threats, name-steals, the works. She is a sadist.

No one could have endured, Jack, what I have on Topix, or few. I was one of the rare people, all that abuse made stronger and stronger.

Virginia Hoge
November 30, 2010 06:03 PM 

http://www.interesting-people.org/archives/interesting-people/199807/msg00079.html



Jack Howard
 November 30, 2010 06:24 PM

 The TOPIX trolls are very similar. 

Good for you for standing up to them. 

What I don’t like is they are able to spy on you.

Jack Howard
November 30, 2010 06:26 PM 

According to Crowell, the NSA has a great deal of expertise insecuring communications, and it wants to ensure thatproducts bought by the Defense Department meet NSA standards. “In addition, as part of the NSA’s intelligence mission, [the agency needs] to have a thorough understanding of where commercial products are headed.”

Taher Elgamal, author of the Netscape data-recovery plan, whorecently left Netscape to start his own venture, said Netscape had no choice but to maintain constant contact with the NSA. “They’re costing the industry a lot of money,” Elgamal said. Others agree. 

“Everyone in Silicon Valley, including us, has to have specific staff – highly paid experts – to deal with them,” said Chris Tolles, security group product manager at Sun.

“Their job is to wrangle this from a policy standpoint.”Sun has had run-ins with the NSA in the past. Two years ago, the NSA objected to Sun including encryption in the exportable version of Java 1.1. The end result was that Sun stripped encryption out of Java 1.1 and the software was delayed by about six months.

Jack Howard 
November 30, 2010 06:44 PM
 
oh no. just great, Jack. its bad enough when they threaten invasion into your personal life, its scary to think it could go further.

Virginia Hoge
November 30, 2010 07:10 PM

can you explain what encryption means Jack?

Virginia Hoge 
November 30, 2010 07:12 PM 

I guess this says it all:

”The NSA wants software vendors to make sure that any product with strong encryption have some way for the government to tap into the data.”

Virginia Hoge November 30, 2010 07:13 PM 

I knew the severity of the bullying I was enduring was wrong. I was like “the hell with you, you are not going to bully me off Topix”. But I have been continually surprised, by the ferocity of it.

Virginia Hoge
 November 30, 2010 07:17 PM 

People are forged by their circumstance.

Jack Howard

Leave a Reply

Your email address will not be published. Required fields are marked *