01.02.14

Gemini version available ♊︎

Privacy Watch: Latest on NSA et al.

Posted in Action at 10:43 am by Dr. Roy Schestowitz

Micorsoft

Snowden

  • Edward Snowden is revealed as the NSA whistleblower

    Along with journalist colleagues Glenn Greenwald and Laura Poitras, I spent six days with Edward Snowden in Hong Kong. He had spent almost all of his short adult life working in America’s spy agencies, but at the end of those six days, the unknown 29-year-old became one of the most famous faces on the planet. He went public in a Guardian video, revealing himself as the source of one of the biggest leaks in western intelligence history.

  • FreeBSD rethinks encryption after Snowden leaks

    Only three months after the Snowden leaks on NSA snooping began, we learn from Ars Technica that the developers at FreeBSD have decided to rethink the way they access random numbers to generate cryptographic keys. Starting with version 10.0, users of the operating system will no longer be relying solely on random numbers generated by Intel and Via Technologies processors. This comes as a response to reports that government spooks can successfully open some encryption schemes.

  • Snowden: ‘Surveillance of the Public Must Be Debated by the Public’
  • NSA Moves to Prevent Snowden-Like Leaks

    Agency Implementing 2-Person Rule, Increasing Encryption Use

Greenwald

Machon

  • NSA: An Orwellian surveillance system gone global

    While British politics and media display a strong reluctance to confront the harsh realities of UK spying, we should be worried about further revelations of a dystopian, Orwellian surveillance system gone global, former MI5 agent Annie Machon told RT.

  • Snowden, privacy and the CCC

    Here’s an RT inter­view I did about the media response to Edward Snowden, the media response, pri­vacy and what we can do.

Obama

Judgement

  • Ruling In Favor Of NSA’s Program Relied On Claims In 9/11 Report That Aren’t Actually In That Report
  • Judge Falls for The Big Lie About NSA Spying

    The September 11th terrorist attacks revealed, in the starkest terms, just how dangerous and interconnected the world is. While Americans depended on technology for the conveniences of modernity, al-Qaeda plotted in a seventh-century milieu to use that technology against us. It was a bold jujitsu. And it succeeded because conventional intelligence gathering could not detect diffuse filaments connecting al-Qaeda.

    Prior to the September 11th attacks, the National Security Agency (“NSA”) intercepted seven calls made by hijacker Khalid al-Mihdhar, who was living in San Diego, California, to an al-Qaeda safe house in Yemen. The NSA intercepted those calls using overseas signals intelligence capabilities that could not capture al-Mihdhar’s telephone number identifier. Without that identifier, NSA analysts concluded mistakenly that al-Mihdhar was overseas and not in the United States. Telephony metadata would have furnished the missing information and might have permitted the NSA to notify the Federal Bureau of Investigation (“FBI”) of the fact that al-Mihdhar was calling the Yemeni safe house from inside the United States.

  • Zimbabwe: U.S. Hypocrisy On Access to Information Shameful

1984

  • NSA forces novelist to can his book

    A Scottish sci-fi writer has cancelled the last instalment in a trilogy about high-tech government spying after discovering that the NSA has been doing exactly what he described in his books.

  • NSA forces novelist to scrap book
  • This too shall pass

    Snowden in 2013 revealed what George Orwell in 1949 had already revealed in 1984: that Big Brothers who spy on their citizens will go on to do very bad things. He then asked for asylum in a country with a long history of its own citizens seeking asylum from his country.

Sci-FI Made Real

Corporate and Other

  • Will De Blasio Scale Back the N.Y.P.D.’s C.I.A.?

    Kelly hired David Cohen, the former head of the C.I.A.’s spy division, to run the force’s intelligence outfit. Cohen, a trained economist known to be intensely loyal to his superiors (and profane with everyone else), created the Demographics Unit, which imbedded special recruits in eighteen Muslim neighborhoods to monitor every aspect of daily life. At the same time, Kelly created the International Liaison Program, which posted detectives in eleven hot spots overseas, including London, Paris, Madrid, Abu Dhabi, and Tel Aviv. “We’ve reorganized the department to accommodate this world view,” Kelly said. “You might say that the N.Y.P.D. has aspired to become a Council on Foreign Relations with guns.”

  • NSA and Government Spying: Are These the Only Groups Collecting Information on Us?

    We have all heard by now of the massive surveillance being conducted by the NSA and other governments across the world. China is a well-known anti-privacy country and others have decided to also spy on their citizens’ social network activities amongst other things. The Internet censorship trends are getting pretty bad.

  • ‘Embarrassed’ to use Facebook: Teens shift to other sites to ‘unfriend’ with parents

    Older teenagers have turned their backs on Facebook, an EU-funded study has found. Young people are opting for alternative social networks like Twitter and WhatsApp, while the “worst people of all, their parents, continue to use the service.”

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

DecorWhat Else is New


  1. Welcome to 2022: Intentional Lies Are 'Benefits' and 'Alternative Facts'

    A crooks-run EPO, together with the patent litigation cabal that we’ve dubbed ‘Team UPC’ (it has nothing to do with science or with innovation), is spreading tons of misinformation; the lies are designed to make the law-breaking seem OK, knowing that Benoît Battistelli and António Campinos are practically above the law, so perjury as well as gross violations of the EPC and constitutions won’t scare them (prosecution as deterrence just isn’t there, which is another inherent problem with the UPC)



  2. From Software Eating the World to the Pentagon Eating All the Software

    “Software is eating the world,” according to Marc Andreessen (co-founder of Netscape), but the Empire Strikes Back (not the movie, the actual empire) by hijacking all code by proxy, via Microsoft, just as it grabbed a lot of the world’s communications via Skype, bypassing the world's many national telecoms; coders need to fight back rather than participate in racist (imperial) shams such as GitHub



  3. Links 22/1/2022: Skrooge 2.27.0 and Ray-Tracing Stuff

    Links for the day



  4. IRC Proceedings: Friday, January 21, 2022

    IRC logs for Friday, January 21, 2022



  5. Peak Code — Part II: Lost Source

    "Debian and Mozilla played along. They were made “Yeoman Freeholders” in return for rewriting their charters to “work closely with the new Ministry in the interests of all stakeholders” – or some-such vacuous spout… because no one remembers… after that it started."



  6. Links 22/1/2022: Ubuntu MATE 21.10 for GPD Pocket 3, MINISFORUM Preloads GNU/Linux

    Links for the day



  7. Computer Users Should be Operators, But Instead They're Being Operated by Vendors and Governments

    Computers have been turned into hostile black boxes (unlike Blackbox) that distrust the person who purchased them; moreover, from a legislative point of view, encryption (i.e. computer security) is perceived and treated by governments like a threat instead of something imperative — a necessity for society’s empowerment (privacy is about control and people in positions of unjust power want total and complete control)



  8. Peak Code — Part I: Before the Wars

    Article/series by Dr. Andy Farnell: "in the period between 1960 and 2060 people had mistaken what they called "The Internet" for a communications system, when it had in fact been an Ideal and a Battleground all along - the site of the 100 years info-war."



  9. Links 21/1/2022: RISC-V Development Board and Rust 1.58.1

    Links for the day



  10. IRC Proceedings: Thursday, January 20, 2022

    IRC logs for Thursday, January 20, 2022



  11. Gemini Lets You Control the Presentation Layer to Suit Your Own Needs

    In Gemini (or the Web as seen through Gemini clients such as Kristall) the user comes first; it's not sites/capsules that tell the user how pages are presented/rendered, as they decide only on structural/semantic aspects



  12. The Future of Techrights

    Futures are difficult to predict, but our general vision for the years ahead revolves around more community involvement and less (none or decreased) reliance on third parties, especially monopolistic corporations, mostly because they oppress the population via the network and via electronic devices



  13. [Meme] UPC for CJEU

    When you do illegal things and knowingly break the law to get started with a “legal” system you know it’ll end up in tears… or the CJEU



  14. Links 20/1/2022: 'Pluton' Pushback and Red Hat Satellite 6.10.2

    Links for the day



  15. The Web is a Corporate Misinformation/Disinformation Platform, Biased Against Communities, Facts, and Science

    Misinformation/disinformation in so-called 'news' sites is a pandemic which spreads; in the process, the founder of GNU/Linux gets defamed and GNU/Linux itself is described as the problem, not the solution to the actual problems



  16. Links 20/1/2022: McKinsey Openwashing and Stable Kernels

    Links for the day



  17. IRC Proceedings: Wednesday, January 19, 2022

    IRC logs for Wednesday, January 19, 2022



  18. Links 20/1/2022: Linuxfx 11.1 WxDesktop 11.0.3 and FreeIPMI 1.6.9 Released

    Links for the day



  19. Links 19/1/2022: XWayland 22.1 RC1 and OnlyOffice 7.0 Release

    Links for the day



  20. Links 19/1/2022: ArchLabs 2022.01.18 and KDE's 15-Minute Bug Initiative

    Links for the day



  21. When Twitter Protects Abusers and Abuse (and Twitter's Sponsors)

    Twitter is an out-of-control censorship machine and it should be treated accordingly even by those who merely "read" or "follow" Twitter accounts; Twitter is a filter, not a news/media platform or even means of communication



  22. IRC Proceedings: Tuesday, January 18, 2022

    IRC logs for Tuesday, January 18, 2022



  23. Links 19/1/2022: Wine 7.x Era Begins and Istio 1.12.2 is Out

    Links for the day



  24. Another Video IBM Does Not Want You to Watch

    It seems very much possible that IBM (or someone close to IBM) is trying to purge me from Twitter, so let’s examine what they may be trying to distract from. As we put it 2 years ago, "Watson" is a lot more offensive than those supposedly offensive words IBM is working to purge; think about those hundreds of Red Hat workers who are black and were never told about ethnic purges of blacks facilitated by IBM (their new boss).



  25. What IBM Does Not Want You to Watch

    Let's 'Streisand it'...



  26. Good News, Bad News (and Back to Normal)

    When many services are reliant on the integrity of a single, very tiny MicroSD card you're only moments away from 2 days of intensive labour (recovery, investigation, migration, and further coding); we've learned our lessons and took advantage of this incident to upgrade the operating system, double the storage space, even improve the code slightly (for compatibility with newer systems)



  27. Someone Is Very Desperate to Knock My Account Off Twitter

    Many reports against me — some successful — are putting my free speech (and factual statements) at risk



  28. Links 18/1/2022: Deepin 20.4 and Qubes OS 4.1.0 RC4

    Links for the day



  29. Links 18/1/2022: GNOME 42 Alpha and KStars 3.5.7

    Links for the day



  30. IRC Proceedings: Monday, January 17, 2022

    IRC logs for Monday, January 17, 2022


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts