What’s an Egotistical Giraffe

egotistical giraffe copy

By Adam Weatherall

10/20/13

 

    The latest Edward Snowden revelations about our fans at the N.S.A have got we here at PowerFist.US a little concerned. Not for our own privacy, no, because according to Snowden’s last leaks, with programs like Prism, X-Keyscore, and Lovelace in full operation, surely our privacy has all but vanished. But we have indeed become concerned with the sanity of whoever is in charge of naming programs with questionable

Edward Snowden, holding the Sam Adams award for integrity in intelligence, in Russia

Edward Snowden receiving the Sam Adam’s Award

titles such as Egotistical Giraffe at the N.S.A. Yes, Mr. Snowden, the now famous whistle blower who this past week was the recipient of the prestigious Sam Adams award, revealed to us the existence of two new programs with Egotistical Giraffe and Egotistical Goat. These programs were designed to exploit the egos of internet users who believed they could achieve complete anonymity from using a service called TOR. But perhaps the most revealing detail of all is that the existence of these programs really just exposes us to the inflated egos of the analysts at the N.S.A .  Speaking on the ego Sigmund Freud once said, “Analysis does not set out to make pathological reactions impossible, but to give the patient’s ego freedom to decide one way or another.” And in a way that is exactly what the anonymity of TOR provided; the freedom to decide one way or another, without the ever watching eyes of government surveillance to sway your decisions.

    What you need to know about TOR or “The Onion Router” is that it’s an open-source public project that bounces its users’ internet traffic through several other computers, which it calls “nodes”, it does this to keep it anonymous and avoid online censorship tools. You also should know that TOR is a creation of the United States Government who, until October of 2012, provided up to 60% of its funding. In its original concept it was intended to be utilized by journalists, activists and campaigners in places like the US and Europe as well as China, Iran and Syria to maintain the privacy of their communications and avoid reprisals from their respective governments. Though TOR and services like it are by the vast majority accessed by users who mean well, it was presented to us by most media sources as the home of the now infamous website “The Silk Road”. The Silk Road, which was reported to operate on “The Dark Net”, was before it’s closing billed as an open air drug market which utilized bitcoin as a currency to make international drug deals and other nefarious transactions. However, this generalization of TOR and its user base has up to this point been vastly misrepresented. TOR or the “Darknet” as it has been commonly referred to was developed and is used by our own state department when attempting to contact people located in countries with oppressive governments. The journalists, activists, and dissidents who use TOR simply want to remain free from restrictive internet laws that might be used to dissuade the advancement of democratic principles. The D.O.D. or The State Department decided it was in our nation’s best interest to give the citizens the tools necessary to make privacy a possibility. The N.S.A’s attempt to dissuade even our own government with its “Egotistical” programs is one of many new concerns brought to light as of late.

    Foremost among those concerns is whether or not the NSA has acted against internet users in the U.S. when attacking TOR. One of the functions of the anonymity service is to hide the country of all of its users, meaning any attack could be hitting members of TOR’s substantial U.S. user base.

NSA Director Keith Alexander

NSA Director Keith Alexander

Collecting data specifically on U.S. users would be against even Egotistical Giraffe’s initial intentions, however, based on these latest Edward Snowden slides, this most certainly has already occurred. You see several of the N.S.A’s attacks resulted in implanting malicious code (much like a virus) on the computer of TOR users who visit particular websites. The agency said they are targeting terrorists or organized criminals visiting particular discussion boards, but these attacks could also hit journalists, researchers, or those who accidentally stumble upon a targeted site. And really they have no way to tell whether or not they are attacking a “good guy” or a “bad guy’s” computer until long after the attack has taken place. The N.S.A’s latest efforts should also raise concerns in the State Department and other U.S. government agencies that provide funding to increase TOR’s security, as part of the Obama administration’s internet freedom agenda to help citizens of repressive regimes. The other strategy of identifying TOR users was implementing N.S.A controlled servers at “exit” points for the service. By the N.S.A’s own admission this portion of the project was only “minorly successful” because of the variables that TOR presents, they were only able to capture a small selection of the total users. But what they did do is expose a flaw in the TOR system, a flaw that multiple nations have been searching for such as China and Iran; last year both unsuccessfully tried to hack the system. Now because of this exposed flaw, the dissidents and journalists this service was initially intended for in places like the aforementioned countries could now too be exposed.

    Why the revelations of these programs lead to further speculation as to the psychosis of the analyst at the N.S.A. is because what egotistical giraffe really shows us is one hand of the government breaking a system the other hand created. Self-injury does not usually exemplify the actions of sane individuals. It makes me wonder if we were to “analyze” the “analysts” currently working in the dark and murky corners of the N.S.A., what would we find out about the status of their egos? Again speaking on the Ego Sigmund Freud once said, “Every normal person, in fact, is only normal on the average. His ego approximates to that of the psychotic in some part or other and to a greater or lesser extent.” Left to their own devices, the N.S.A without warrant or consent, has implemented programs which monitor ex-lover’s and even attempted to break our own government’s programs, building meta-data filled files which can even be used to determine whether or not two individuals are actually in love. My analysis of the N.S.A. leaves me with only one question… who watches the watchers? For now I suppose it’s just myself and the like minded readers of powerfist.us, and more importantly people like Edward Snowden and the brave reporters at the Guardian and the Washington post who first brought us the news of Egotistical Giraffe. There is hope that logic is on the horizon however, this week N.S.A. Chairmen Army General Keith Alexander and his deputy are being pushed into resignation. Perhaps this is a sign that the next upcoming programs designed to infringe on our freedoms will at least be slightly less “egotistical” in the way they are named. But until then folks, to you and to all our fans at the N.S.A, I hope logic will prevail.

Go to Podcast>

For Egotistical Giraffe Slides>

Adam Weatherall
Adam Weatherall
Adam Weatherall is the political correspondent for PowerFist.Us a company whose mission is to spread truth and justice to all within it's reach, but more specifically to cover news stories that are often times pushed aside by larger media organizations.

  • Pingback: Podcast: What's an Egotistical Giraffe? | Power Fist

  • LetDemEatCake

    Insightful Adam…you picked-up on very subtle nuances even Greenwald hasn’t. There are things he either doesn’t know OR has chosen not to disclose for some reason.

    Based on evidence traced back to DOD ip addresses ,it IS entirely possible, and most likely, that the Egotistical Giraffe program or another with it’s capabilities were and continue to be used to terrorize Americans on news threads during the Bush administration and in advance of the 2008 Obama / Clinton campaigns in a attempt to control outcomes and suppress bad press.

    Furthermore with activity that included the oligarchy attacking the messengers /whistleblowers and degrading them, one could conclude that they have been using the sophisticated systems all along looking for info to blackmail / control targets with or to plant things that could be used later to degrade and/or control the tide, and to crush “tall poppies” who stand in the way of their friends in the corporate sector.

    Here was a anonymous advisory that came to one American way back in 2010. Prior to this, a DOJ attorney surfaced to that same individual in late 2006, handed them a note with four attorneys names written on it, and told the individual to hire one, stating “You don’t want “THIS” happening to anyone else.”.

    There were other advisories..people trying to help! Like this one-

    From Newsflasher:

    “I just wanted to inform that there is currently an ongoing “citizen’s investigation” into what I’ll call “Rogue elements” within various governmental agencies that are using “key-logging” malware and trojans to identify people who write highly unfavorable or nasty comments that reflect, perhaps, very badly on the cops in general or specific instances…they seemingly gather addresses, names, raffle around people’s private files once they’ve gained access to the computer and could easily plant “incriminating evidence” that they’ll be able to use later to further intimidate or escalate the situation to bring ultimate retaliations on “bad citizens” as they perceive anyone to be that dares criticize their so-called “professionalism” as their “enemy” worthy of being “taken out”. ”

    “Once, this investigation is completed, then released to the public, Officialdom in this area will have a $hitstorm to deal with as it opens a can of worms they are mortified to contemplate…remember a few years back when all the silly petty PPB intel info was found in some dead cops garage and it all made public and even the then Mayor, the Very Cats (Vera Katz) herself had been under “police surveillance” for being too liberal???? All I can say at this point is that “old ways die hard” but with PUBLIC INVESTIGATIONS and wide exposure of the results, change will come and old ways will give way to “new ways”…hang in there! ((and take pride in your role as one of society’s “change agents”)) ”

    Tuesday, May 18, 2010, 4:54:18 AM via a OregonLive.com article thread.

    After blowing the whistle on systematic anonymous threats that were traced back to DOD IP addresses in which appropriate authorities refused to investigate and stop, one whistle blower received the following anonymous threat (there were 100s of far worse anonymous communications than this one:

    From: Brodin

    [ add to contacts ]

    To: xxxxx@xxxxxxxx.com

    Cc:

    Date: Sunday, December 06, 2009 02:49 am

    Subject: T tramp ought to have been followed, arrested, and shut up w

    Message-ID:

    Received: (qmail 10318 invoked by uid 78); 6 Dec 2009 09:49:59 -0000

    Received: from unknown (HELO cloudmark1) (10.49.16.82) by 0 with SMTP; 6 Dec 2009 09:49:59 -0000

    Return-Path:

    Received: from [81.9.196.127] ([81.9.196.127:6682] helo=qihf.telecable.es) by cm-mr7 (envelope-from ) (ecelerity 2.2.2.41 r(31179/31189)) with ESMTP id 40/6A-03959-54E7B1B4; Sun, 06 Dec 2009 04:49:59 -0500

    User-Agent: Thunderbird 2.0.0.19 (Windows/20081209)

    MIME-Version: 1.0

    Content-Type: multipart/mixed; boundary=”————060309050105020903090606″

    Thanks for the article!

  • LetDemEatCake

    Here’s a copy of the email and it’s full headers that triggered a forensic investigation that was traced-back to US government…100s, if not thousands more systematic abusive and threatening anonymous communications followed.

    from tecsmpt02.cbba.net (tecsmpt02.cbba.net [216.249.201.7]) by Quarantine tecsmpt02 (216.249.201.7) for ,”xxxxx xxxxxx” ; Tue May 09 22:14:26 PDT 2006
    X-Brightmail-Tracker: AAAAAQK3sFc=
    Received: from smtp.cbba.com ([127.0.0.1]) by tecsmpt02.cbba.net (SMSSMTP 4.1.9.35) with SMTP id M2006050922142612830 ; Tue, 09 May 2006 22:14:26 -0700
    X-Envelope-To: xxxxxxxxxx@xxxxxxxx.com, xxxxxxxxx@xxxxxxxxx.com
    X-Received-From-Address: 220.91.17.51
    X-Envelope-From: CyrilLewis@rarebooks.to
    thread-index: AcZz8Js3TTptwL8zQXS8RuX0zvEsWw==
    Content-Class: urn:content-classes:message
    Importance: normal
    Priority: normal
    X-MimeOLE: Produced By Microsoft MimeOLE V6.00.3790.1830
    Received: from rarebooks.to ([220.91.17.51]) by smtp.cbba.com with Microsoft SMTPSVC(6.0.3790.1830); Tue, 9 May 2006 22:14:25 -0700
    Message-ID:
    Date: Wed, 10 May 2006 05:02:42 -0100
    Reply-To: “Mollie”
    From: “Mollie”
    User-Agent: Mozilla 4.77C-CCK-MCD {C-UDP; EBM-APPLE} (Macintosh; U; PPC)
    MIME-Version: 1.0
    To: , “xxxxxxxx”
    Subject: And slut, how do you think you look to your friends and family? you may be hot, but you are now known by 2 million+ and counting as a huge whore. Mom and dad must be proud.
    Content-Type: text/plain; charset=”us-ascii”
    Content-Transfer-Encoding: 7bit
    Return-Path:
    X-OriginalArrivalTime: 10 May 2006 05:14:25.0933 (UTC) FILETIME=[9B2BEBD0:01C673F0]

    Consider that THESE things government employees with access to this technology do, is not a one or two communication accident….systematic anonymous government surveillance and harassment was directed at this target from 2006 thru early 2012!

    Do we really want our government employees terrorizing taxpayers (non-terrorists), destroying their businesses and getting away with it…just because the person stood-out in their field?

    How many more Americans and their businesses have been harmed by this type of all consuming harassment?

  • Pingback: 2013 Year End Review | Powerfist