EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

02.10.14

Techrights Joins ‘The Day We Fight Back’

Posted in Site News at 4:16 pm by Dr. Roy Schestowitz

header

Summary: A Tuesday protest, titled ‘The Day We Fight Back’, has got our support

TECHRIGHTS has covered mass surveillance for a number of years now. Information about the NSA, for example, has been mostly accessible, but it was not widely published (corporate media was complicit) and there were no leaked documents to factually support key claims. At times, the truth did get published, only to be followed by puff pieces and clever denials by the abusers and their accomplices or collaborators (people like Rupert Murdoch). Noise outweighed the signal and left some people uncertain.

This week, just ahead of ‘The Day We Fight Back’, a new site run by two journalists who personally spoke to Snowden in Hong Kong and then broke NSA stories officially became public. There are some stories derived from it below. A lot of the stuff we now know is not necessarily new, but the public reaction, press reaction, etc. leave us hopeful that ‘new media’ is possible, even if the publisher cannot be trusted.

  • NIST continues using SHA-1 algorithm after banning it

    The SSL certificate for www.nist.gov is signed using the SHA-1 hashing algorithm, and was issued by VeriSign on 23 January 2014, more than three weeks after NIST’s own ban came into effect. Also issued this year, NIST’s “Secure File Transfer Service” at xnfiles.nist.gov uses a SHA-1 certificate.

    An attacker able to find SHA-1 collisions could carefully construct a pair of certificates with colliding SHA-1 hashes: one a conventional certificate to be signed by a trusted CA, the other a sub-CA certificate able to be used to sign arbitrary SSL certificates. By substituting the signature from the CA-signed certificate into the sub-CA certificate, certificate chains containing the attacker-controlled sub-CA certificate will pass browser verification checks. This attack is, however, made more difficult by path constraints and the inclusion of unpredictable data into the certificate before signing it.

  • IBM developing Self-Destructing Microchips for US Defense

    Science Fiction Movies always show the possible direction of the development of technology and gives us the opportunity to think about it. The U.S. Government is also trying to develop such technology that was introduced in movies like Star Trek and TERMINATOR i.e. Self destructing Network of computers, Sensors and other devices.

    [...]

    The project announced a year back, known as Vanishing Programmable Resources (VAPR), which is dedicated to developing a CMOS microchip that self-destructs when it receives a certain frequency of radio signal from military command, in order to fully destroy it and preventing it from being used by the enemy.

  • Glenn Greenwald’s New Site Goes Live With NSA Allegations

    Glenn Greenwald’s new site devoted to the security leaks of Edward Snowden and broader “adversarial journalism” has launched as The Intercept.

    The site is led by Greenwald and two other noted investigative journalists – Laura Poitras and Jeremy Scahill. Scahill takes the lead bylines with Greenwald on the site’s first major story – an investigation of the NSA’s role in locating targets for U.S. drone strikes.

  • NSA Refuses to Confirm or Deny Whether It Has Documents on Spy Program It Already Talked About

    I’m getting a kick out of the letters the National Security Agency (NSA) has been sending me in response to my Freedom of Information Act (FOIA) requests.

    A couple of weeks ago, the NSA refused to release 156 pages of draft talking points the agency created in the wake of the Edward Snowden leak, citing a “grave threat” to national security if any portion of the documents were declassified and released.

    Now, the NSA is refusing to confirm or deny whether it has documents on a top-secret surveillance program the agency has acknowledged exists and discussed publicly.

    This is the backstory.

    On January 16, The Guardian published a report based on documents the newspaper obtained from Snowden identifying an NSA program called DISHFIRE, which captures 200 million text messages a day from around the globe, “pretty much everything it can,” according to an internal NSA document published by The Guardian.

  • New Photos of the NSA and Other Top Intelligence Agencies Revealed for First Time

    Over the past eight months, classified documents provided by NSA whistleblower Edward Snowden have exposed scores of secret government surveillance programs. Yet there is little visual material among the blizzard of code names, PowerPoint slides, court rulings and spreadsheets that have emerged from the National Security Agency’s files.

  • Gov’t Officials Leak Classified Info To Journalists To Discredit Snowden For Leaking Classified Info To Journalists

    We already mentioned the bizarre NY Times article from over the weekend that described how Snowden apparently used some basic web crawler software to collect the documents he later leaked. As we noted, the basic story itself is unremarkable, other than for how the NY Times tried to turn “man uses basic tool” into a story. However, there is a really good quote from Snowden himself (via his lawyers) in response to the article. Since most of it involves senior government officials telling NYT reporters about security problems at some NSA facilities, Snowden was quick to point out the irony:

    “It’s ironic that officials are giving classified information to journalists in an effort to discredit me for giving classified information to journalists. The difference is that I did so to inform the public about the government’s actions, and they’re doing so to misinform the public about mine.”

  • What Key NSA Overseers Don’t Know About the Phone Dragnet

    Is the National Security Agency collecting and storing data on fewer telephone calls than we thought? So say reports in the Wall Street Journal, Washington Post, and New York Times. “Although intelligence officials have indicated since last summer that the National Security Agency was vacuuming up nearly every American telephone record for counter-terrorism investigations,” the L.A. Times reports in its version, “officials acknowledged Friday that the spy agency collects data from less than a third of U.S. calls because it can’t keep pace with cellphone usage.”

  • GCHQ – Don’t Spy On Us

    On Tuesday, internet users all over the world are standing up to say no to GCHQ and the NSA’s mass surveillance. Over the last eight months we’ve heard plenty about how intelligence agencies monitor us on the Internet.

  • ‘The Day We Fight Back’ against NSA spying is Tuesday

    Even though the movement is mainly aimed at pushing the U.S. government to take action, more than 5,000 websites from around the world have committed to participating in some way to speak up for privacy protections. Some notable names taking part include the ACLU, the Electronic Frontier Foundation, Mozilla, and the Libertarian Party, which will run banners on their websites asking users to write their legislators and raise hell.

  • Report: NSA Relies on Unreliable Phone Data for Drone Strikes
  • NSA spying undermines separation of powers: Column

    The program makes it easy for the president to spy on and blackmail his enemies.

  • Omidyar online magazine launches with fresh NSA story

    The online news venture backed by eBay founder Pierre Omidyar debuted Monday, featuring fresh revelations about US intelligence from investigative reporter Glenn Greenwald.

    The news site dubbed “The Intercept” launched with two articles, including one co-authored by Greenwald stating that the US National Security Agency is relying on electronic surveillance, such as cell phone location, rather than human intelligence, to locate targets for lethal drone strikes.

    The report said the NSA “geolocates” the SIM card or handset of a suspected terrorist’s mobile phone for raids and drone strikes to capture or kill suspected terrorists.

  • NSA ‘drone strikes based on mobile phone data’

    The US National Security Agency (NSA) uses electronic surveillance rather than human intelligence in lethal drone strikes, it has been reported.

    The new publication headed by Glenn Greenwald, the journalist who broke the news of US government surveillance in The Guardian, claims the revelations were made by a former US drone operator.

  • The Intercept, the first online publication from eBay founder Pierre Omidyar, is now live
  • Omidyar’s ‘Intercept’ launches with new NSA revelations
  • Lights Out for NSA? Maryland Lawmakers Push to Cut Water, Electricity to Spy Agency Headquarters

    The National Security Agency’s headquarters in Ft. Meade, Md., will go dark if a cohort of Maryland lawmakers has its way.

    Eight Republicans in the 141-member Maryland House of Delegates introduced legislation Thursday that would deny the electronic spy agency “material support, participation or assistance in any form” from the state, its political subdivisions or companies with state contracts.

    The bill would deprive NSA facilities water and electricity carried over public utilities, ban the use of NSA-derived evidence in state courts and prevent state universities from partnering with the NSA on research.

  • Surveillance by NSA violates 4th amendment

    What is the NSA, and what does it do? The NSA is the National Security Agency. This program is funded by the “government” – in other words, us.

    As it says at nsa.gov, its commitment is to combat terrorism around the globe, support and protect our troops in the field and adhere to the spirit and the letter of the Constitution and the laws and regulations of the United States.

    The NSA began to expand its programs after the 9/11 incident in New York. George W. Bush was president at the time. President Obama is now enforcing and expanding the program.

  • Death By Metadata: Jeremy Scahill & Glenn Greenwald Reveal NSA Role in Assassinations Overseas

    In the first exposé for their new venture, First Look Media’s digital journal The Intercept, investigative journalists Jeremy Scahill and Glenn Greenwald reveal the National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes. The NSA identifies targets based on controversial metadata analysis and cellphone tracking technologies, an unreliable tactic that has resulted in the deaths of innocent and unidentified people. The United States has reportedly carried out drone strikes without knowing whether the individual in possession of a tracked cellphone or SIM card is in fact the intended target of the strike. Scahill and Greenwald join us in this exclusive interview to discuss their report and the launch of their media project.

  • NSA Metadata Used For Drone Strikes

    Contrary to the continual rationalizations by NSA defenders such as President Obama that metadata is benign – that it is only used to see patterns not identify individuals – it is now being reported that metadata alone is the basis for lethal drone strikes. According to First Look Media metadata, not human intelligence, is the tool the NSA is using to locate people to be assassinated by drone strikes.

  • Snowden accused of using hacking’s greatest weapon to access NSA files: wget

    Exfiltrated data said to be using previously unknown port 80. Experts remain amused by media hype.

    [...]

    So this is where the FUD and comical nature of this story starts. In essence, the big news here is that Snowden used wget, or something similar, to mirror the NSA’s SharePoint archives. This isn’t mastermind-level hacking, it’s something at any network administrator would know how to do.

  • 75 Percent of Defense Contractors Say NSA Revelations Changed Their Security Practices
  • When NSA Error Leads to Innocent People’s Deaths
Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

A Single Comment

  1. Needs Sunlight said,

    February 11, 2014 at 2:57 am

    Gravatar

    A link to the project might be useful to include:

    https://thedaywefightback.org/

    It will be Feb 11th.

What Else is New


  1. Links 19/6/2018: Total War: WARHAMMER II Confirmed for GNU/Linux, DragonFlyBSD 5.2.2 Released

    Links for the day



  2. More Media Reports About Decline in Quality of European Patents (Granted by the EPO)

    What the media is saying about the letter from Grünecker, Hoffmann Eitle, Maiwald and Vossius & Partner whilst EPO communications shift attention to shallow puff pieces about how wonderful Benoît Battistelli is



  3. Beware Team UPC's Biggest Two Lies About the Unitary Patent (UPC)

    Claims that a Unified Patent Court (UPC) will commence next year are nothing but a fantasy of the Liar in Chief, Benoît Battistelli, who keeps telling lies to French media (some of which he passes EPO money to, just like he passes EPO money to his other employer)



  4. Diversity at the EPO

    Two decades of EPO with 16-17 years under the control of French Presidents (and nowadays predominantly French management in general with Inventor Award held in France almost half the time) is "diversity at the EPO"



  5. Orrin Hatch, Sponsored the Most by the Pharmaceutical Industry, Tries to Make Its Patents Immune From Scrutiny (PTAB)

    Orrin Hatch is the latest example of laws being up for sale, i.e. companies can 'buy' politicians to act as their 'couriers' and pass laws for them, including laws pertaining to patents



  6. Links 17/6/2018: Linux 4.18 RC1 and Deepin 15.6 Released

    Links for the day



  7. To Keep the Patent System Alive and Going Practitioners Will Have to Accept Compromises on Scope Being Narrowed

    35 U.S.C. § 101 still squashes a lot of software patents, reducing confidence in US patents; the only way to correct this is to reduce patent filings and file fewer lawsuits, judging their merit in advance based on precedents from higher courts



  8. The Affairs of the USPTO Have Turned Into Somewhat of a Battle Against the Courts, Which Are Simply Applying the Law to Invalidate US Patents

    The struggle between law, public interest, and the Cult of Patents (which only ever celebrates more patents and lawsuits) as observed in the midst of recent events in the United States



  9. Patent Marketing Disguised as Patent 'Advice'

    The meta-industry which profits from patents and lawsuits claims that it's guiding us and pursuing innovation, but in reality its sole goal is enriching itself, even if that means holding science back



  10. Microsoft is Still 'Cybermobbing' Its Competition Using Patent Trolls Such as Finjan

    In the "cybersecurity" space, a sub-domain where many software patents have been granted by the US patent office, the patent extortion by Microsoft-connected trolls (and Microsoft's 'protection' racket) seems to carry on; but Microsoft continues to insist that it has changed its ways



  11. Links 16/6/2018: LiMux Story, Okta Openwashing and More

    Links for the day



  12. The EPO's Response to the Open Letter About Decline in Patent Quality as the Latest Example of Arrogance and Resistance to Facts, Truth

    Sidestepping the existential crisis of the EPO (running out of work and issuing many questionable patents with expectation of impending layoffs), the PR people at the Office choose a facts-denying, face-saving 'damage control' strategy while staff speaks out, wholeheartedly agreeing with concerned stakeholders



  13. In the United States the Patent Trial and Appeal Board, Which Assures Patent Quality, is Still Being Smeared by Law Firms That Profit From Patent Maximalism, Lawsuits

    Auditory roles which help ascertain high quality of patents (or invalidate low-quality patents, at least those pointed out by petitions) are being smeared, demonised as "death squads" and worked around using dirty tricks that are widely described as "scams"



  14. The 'Artificial Intelligence' (AI) Hype, Propped Up by Events of the European Patent Office (EPO), is Infectious and It Threatens Patent Quality Worldwide

    Having spread surrogate terms like “4IR” (somewhat of a 'mask' for software patents, by the EPO's own admission in the Gazette), the EPO continues with several more terms like “ICT” and now we’re grappling with terms like “AI”, which the media endlessly perpetuates these days (in relation to patents it de facto means little more than "clever algorithms")



  15. Links 15/6/2018: HP Chromebook X2 With GNU/Linux Software, Apple Admits and Closes a Back Door ('Loophole')

    Links for the day



  16. The '4iP Council' is a Megaphone of Team UPC and Team Battistelli at the EPO

    The EPO keeps demonstrating lack of interest in genuine patent quality (it uses buzzwords to compensate for deviation from the EPC and replaces humans with shoddy translators); it is being aided by law firms which work for patent trolls and think tanks that propel their interests



  17. Grünecker, Hoffmann Eitle, Maiwald and Vossius & Partner Find the Courage to Express Concerns About Battistelli's Ugly Legacy and Low Patent Quality

    The astounding levels of abuse at the EPO have caused some of the EPO's biggest stakeholders to speak out and lash out, condemning the Office for mismanagement amongst other things



  18. IAM Concludes Its Latest Anti-§ 101 Think Tank, Featuring Crooked Benoît Battistelli

    The attack on 35 U.S.C. § 101, which invalidates most if not all software patents, as seen through the lens of a Battistelli- and Iancu-led lobbying event (set up by IAM)



  19. Google Gets Told Off -- Even by the Typically Supportive EFF and TechDirt -- Over Patenting of Software

    The EFF's Daniel Nazer, as well as TechDirt's founder Mike Masnick, won't tolerate Google's misuse of Jarek Duda's work; the USPTO should generally reject all applications for software patents -- something which a former Commissioner for Patents at the USPTO seems to be accepting now (that such patents have no potency after Alice)



  20. From the Eastern District of Texas to Delaware, US Patent Litigation is (Overall) Still Declining

    Patent disputes/conflicts are increasingly being settled outside the courts and patents that aren't really potent/eligible are being eliminated or never brought forth at all



  21. Links 13/6/2018: Cockpit 170, Plasma 5.13, Krita 4.0.4

    Links for the day



  22. When the USPTO Grants Patents in Defiance of 35 U.S.C. § 101 the Courts Will Eventually Squash These Anyway

    Software/abstract patents, as per § 101 (Section 101) which relates to Alice Corp v CLS Bank at the US Supreme Court, are not valid in the United States, albeit one typically has to pay a fortune for a court battle to show it because the patent office (USPTO) is still far too lenient and careless



  23. Buzzwords and Three-Letter Acronyms Still Abused by the EPO to Grant a Lot of Patents on Algorithms

    Aided by Microsoft lobbying (with its very many patent trolls) as well as corrupt Battistelli, the push for software patenting under the guise of "artificial intelligence" ("AI") carries on, boosted by Battistelli's own "Pravda" (which he writes for), IAM Magazine



  24. The United States is Far Better Off With the Patent Trial and Appeal Board (PTAB), So Why Do Lawyers Attack It?

    The anti-PTAB lobby (which is basically the pro-troll or pro-litigation lobby) continues to belittle and insult PTAB, having repeatedly failed to dismantle it; in the meantime PTAB is disarming several more patent trolls and removing from the system patents which were granted in error (as well as the associated lawsuits)



  25. Links 12/6/2018: Neovim 0.3 and Wine 3.10

    Links for the day



  26. Corrupt Benoît Battistelli Promotes Software Patents in IAM's Patent Trolls-Funded Event in the United States

    With less than 3 weeks remaining for Battistelli's term he engages in gross revisionism, lobbying, and even looting of the patent office



  27. The EPO's 'Expert' Georg Weber is Still Advocating Software Patents in Europe (But He Disguises Them Using Buzzwords)

    The EPO's overzealous support for software patents continues unabated while the European Parliament looks the other way; this is part of the plan to expand patent scope in Europe and flood the continent with low-quality patents (causing a ruinous litigation boom like in China)



  28. Battistelli's EPO is Outdoing North Korea When It Comes to Propaganda and Abuses Against Staff

    Battistelli’s ‘scorched Earth’ approach — his sole legacy at the EPO — has left many workers in mental breakdowns (if not dead), but to celebrate the ‘Battistelli years’ three weeks before the end of his term the Office issues new propaganda material (pertaining exclusively to the Battistelli years, 2010 to 2018) while Battistelli-leaning media offers ‘cover’



  29. IPBC, a Patent Trolls-Funded Event of IAM, is Advancing the Attacks on Section 101/Alice

    Andrei Iancu preaches to the litigation 'industry' in an event (lobbying opportunity) organised by the patent trolls' lobby, IAM



  30. PTAB Carries on Undeterred and Unabated, Courts Are Becoming Less Tolerant of Low-Quality Patents

    With the shift away from the Eastern District of Texas (EDTX) and with PTAB applying growing levels of scrutiny to patents the likelihood that abstract patents will endure at the patent office or the courts is greatly diminished


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts