There are two myths about GNU/Linux on the desktop that I’d like to dispell:
You can’t find it on retail shelves, and
you can’t use it for work.
Kovid Goyal has announced the immediate availability for download of a new maintenance release of his famous Calibre ebook reader, editor and organizer software for GNU/Linux, Mac OS X, and Microsoft Windows operating systems. Calibre 2.22.0 introduces a number of new features, as well as multiple bug fixes that are detailed for your reading pleasure below.
While doing research for this piece I was surprised by how many Twitter apps that I’ve used in the past have fallen by the wayside. The apps that are no longer being developed or have stopped working for some obscure reason outweigh the amount of apps that have come along to fill the spaces, despite this I think I’ve managed to compile a list of apps that you may be compelled to try and use and possibly use as your default Twitter app.
We announced the other day that GNOME 3.16 Release Candidate was made available for testing and that many of its core components, applications, and libraries had been updated. Orca, the default screen reader and magnifier of the GNOME desktop environment, has been updated as well, with a great number of improvements, bug fixes, and updated translations.
GPG is a really cool tool that everyone ought to familiarise themselves with. It’s the tool Edward Snowden used to encrypt all the documents he obtained from government servers and it’s what he used to securely converse via email with the US journalists who broke the news that the NSA was spying on the world.
Plague Inc: Evolved is a unique mix of high strategy and terrifyingly realistic simulation. Your pathogen has just infected 'Patient Zero' - now you must bring about the end of human history by evolving a deadly, global Plague whilst adapting against everything humanity can do to defend itself.
“tzar” is an acronym for “that zombie apocalypse roguelike,” which tells you in one quick motion what exactly you’re getting into. I don’t know if the author planned for tzar to compete with things like zombies! or Cataclysm or even curses-of-the-undead; it could be that the choice of the zombie survival genre is a convenient theme. It shouldn’t really matter.
GNOME Tweak Tool, an open-source graphical software that lets users tweak various hidden settings of the GNOME desktop environment, has been updated recently with support for the upcoming GNOME 3.16 desktop environment, due for release on March 25, 2015.
The Neptune development team was proud to announce today, March 21, the immediate availability for download and update of the third maintenance release of their awesome Neptune 4 Linux operating system derived from the fantastic Debian GNU/Linux distribution and based on the latest KDE Applications 4.14.3 desktop environment.
We figured this would be a popular poll going in. What we didn’t know was exactly how popular. By the time the dust had settled, over twenty-five hundred of you had voted — more than double the previous FOSS Force poll record, set back in 2013 for the third and final round of our Best Personal Linux or FOSS Blog poll. Back then, a little over a thousand of you voted, leading us to think we’d crossed the Rainbow Bridge into Valhalla.
It’s the follow-up to Intel’s original MinnowBoard, but can the Max take on its ARM-based rivals?
Google is rolling out a new automatic "smart lock" function that uses your mobile device's accelerometer to determine when you set the gadget down, to possibly protect your data better if your device is stolen.
Google is currently rolling out a new smart lock mode called on-body detection. The feature, described in the screens below, uses your accelerometer to figure out when your device is in your hand or pocket, and lock when it's not. The idea being if you leave your phone sitting on a table or forget it somewhere, it will lock, preventing would-be thieves from easily accessing your data.
Google is adding a feature to Android’s smart lock that could significantly cut down on the number of times users need to enter a passcode to unlock their phones while they are out and about.
It’s an extremely useful feature for when you know you left your phone in a pocket or in between the sofa seats, but you just can’t find it to save your life. It’s a scenario we’re sure has happened to everyone at least a couple of times.
Having snapped up Hugo Barra, Google's ex-vice president of product management for Android in 2013, Xiaomi's sales are now expected to top $16 billion this year.
After an opening keynote by FSF president Richard Stallman - and the announcement of our newest board member, Kat Walsh - more than 300 attendees split up for talks on a wide variety of free software topics. These included MediaGoblin developer Christopher Webber on the role of free software in federation of the web, Seth Schoen of EFF on a new robotic certificate authority called Let's Encrypt, Deb Nicholson's lively comparison of the 1980's and the varied aspects of the free software movement, and Francis Rowe's discussion of the Libreboot free boot firmware. Talks continue into the early evening, concluding with the annual Free Software Awards at 17:45 EDT.
Mozilla has just updated its popular Firefox web browser application for all supported computer operating systems, including GNU/Linux, Mac OS X, and Microsoft Windows. The new stable release is now Mozilla Firefox 36.0.3 and you should receive it via the built-in updater tool of the software.
But even when Microsoft engineers built a TCP/IP stack into Windows, the pain continued. Andreessen and his colleagues left university to found Netscape, wrote a new browser from scratch and released it as Netscape Navigator. This spread like wildfire and led Netscape’s founders to speculate (hubristically) that the browser would eventually become the only piece of software that computer users really needed – thereby relegating the operating system to a mere life-support system for the browser.
Now that got Microsoft’s attention. It was an operating-system company, after all. On May 26, 1995 Gates wrote an internal memo (entitled “The Internet Tidal Wave”) which ordered his subordinates to throw all the company’s resources into launching a single-minded attack on the web browser market. Given that Netscape had a 90% share of that market, Gates was effectively declaring war on Netscape. Microsoft hastily built its own browser, named it Internet Explorer (IE), and set out to destroy the upstart by incorporating Explorer into the Windows operating system, so that it was the default browser for every PC sold.
The strategy worked: Microsoft succeeded in exterminating Netscape, but in the process also nearly destroyed itself, because the campaign triggered an antitrust (unfair competition) suit which looked like breaking up the company, only to founder at the last moment. So Microsoft lived to tell the tale, and Internet Explorer became the world’s browser. By 2000, IE had a 95% market share; it was the de facto industry standard, which meant that if you wanted to make a living from software development you had to make sure that your stuff worked in IE. The Explorer franchise was a monopoly on steroids.
The Free Software Foundation (FSF) today announced the addition of Kat Walsh to its board of directors. She becomes the ninth director on the FSF's board.
One of the most fascinating things about the desktop 3D printing space is the openness exuded by the developers of the printers themselves. Desktop 3D printers first got off the ground because of open source movements such as RepRap. While some 3D printer manufacturers have taken their creations and closed off this ‘openness,’ others have remained key contributors to the community. These open source designs have allowed for an extremely quick development and innovation of these machines, and without organizations like RepRap, we certainly wouldn’t have the 3D printers we have today.
That should seem far-fetched, but it isn't. The TSA continues to use pseudo-scientific "behavior detection" techniques that have given rise to persistent allegations of racial and ethnic profiling at our nation's airports.
While looking at what AMD cards to upgrade to, I happen to learn about the now ~1 year old Nvidia Maxwell architecture, which is - surprisingly - much more energy efficient. So efficient, that I could upgrade to a top-of-the-line card, with around 6Ãâ performance on most benchmarks compared to my current card, with only a 25W TDP increase.
I couldn't believe I missed this for almost a year, just because I was focused only on AMD cards.
Pakistani doctor's role in health campaign sparked local suspicions that efforts to fight polio were part of a Western plot.
Coca-Cola is courting controversy again after a new report found that the company pays fitness and nutrition experts to recommend drinking its soda as a healthy snack.
Several nutritionists and fitness experts suggested that sipping on a mini can of Coke could be part of a healthy diet during American Heart Month in February, but the Associated Press reported Monday that Coca-Cola is working with health experts in an attempt to promote its sugary beverage – one that’s otherwise being criticized for contributing to America’s obesity problem.
Four different research teams on Wednesday cracked four products–Adobe Flash, Reader, Mozilla Firefox, and Microsoft Internet Explorer—and collectively earned a payout of $317,000 on the first day of Pwn2Own 2015.
On September 16, 1996 Swedish hackers changed the CIA's website to read "Central Stupidity Agency" instead of "Central Intelligence Agency." Experts believe it to be one of the sickest burns delivered to the agency in all of 1996.
The possibility of an Iran nuclear deal depressing weapons sales was raised by Myles Walton, an analyst from Germany’s Deutsche Bank, during a Lockheed earnings call this past January 27th. Walton asked Marillyn Hewson, the chief executive of Lockheed Martin, if an Iran agreement could “impede what you see as progress in foreign military sales.” Financial industry analysts such as Walton use earnings calls as an opportunity to ask publicly-traded corporations like Lockheed about issues that might harm profitability.
The testimony of U.S. Navy Adm. Michael S. Rogers on March 4th - before the House Armed Services Committee on cyber operations and improving the military’s cybersecurity posture - not only paints an unusually vivid picture of a nation trying to re-invent its military infrastructure in response to a problem that it only partially understands, but also provides some indication as to the means by which it intends to get off the back-foot regarding response policies to cyber-attacks such as last autumn’s Sony Hack incident.
Ironically, the anti-terrorist legislation does not apply to politicians in high office, namely to the “State sponsors of terrorism”; nor does it apply to U.S. or Canadian diplomats, intelligence officials, who are routinely in liaison with terrorist organizations in the Middle East.
Individuals can be arrested but presidents and prime ministers are allowed to mingle and socialize with family members of the World’s most renowned terrorist and alleged architect of the 9/11 attacks: Osama bin Laden.
Lest we forget, one day before the 9/11 attacks, the dad of the sitting President of the United States of America, George Herbert Walker Bush was meeting none other than Shafig bin Laden, the brother of terror mastermind Osama bin Laden. It was a routine business meeting on September 10-11, no conflict of interest, no relationship to the 9/11 attacks which allegedly were carried out on the orders of Shafiq’s brother Osama.
[...]
The Carlyle Group is embroiled with the defense and intelligence establishment. “It is widely regarded as an extension of the US government, or at least the National Security Agency, the CIA, and the Pentagon.”
Double standards in anti-terrorism legislation? Double standards in police and law enforcement? No questions asked. No police investigation or interrogation of Osama’s brother Shafig. Normally, under established rules of police investigation, both Shafig bin Laden and the president’s dad George Herbert Walker Bush should have been remanded in custody for police questioning and in all likelihood, Shafig bin Laden would have been arrested as a potential suspect. But that did not happen.
The presence of members of the bin Laden family meeting up with the father of the president of the United States was hushed up and 13 members of the bin Ladens including Shafig were flown out of the US on September 19, 2001 in a plane chartered by the White House. Meanwhile, suspected Muslims are arrested on a mere suspicion, –e.g. that they have an old school friend, who’s cousin’s 86 year old grandmother is an an alleged sympathizer of the “jihad”.
Here, the pretense that the US is engaged in a campaign to defend human rights or ensure democracy is all but dispensed with. The United States “must protect the homeland, build security globally, and project power and win decisively,” the defense secretary declared. In other words, the US military must be in a position to conquer the world, and it must have unlimited funds at its disposal in order to do so.
As the US debates expanding its campaign against the Islamic State beyond Iraq and Syria, the leading US civil liberties group is intensifying its efforts to force transparency about lethal US counterterrorism strikes and authorities.
This is actually the third lawsuit the ACLU has filed over the secrecy of the drone rules. One is for information about the strikes that killed American terrorism suspect Anwar al-Awlaki and then later his 16-year-old son in Yemen.
The American Civil Liberties Union is suing the US government in an effort to compel a court to release documents detailing the Obama administration’s use of a secret, so-called “kill list” containing potential drone strike targets.
In 2008, President Obama ramped up the use of “killer drones” as a mainstay of U.S. counterterrorism policy. Since 9/11 and primarily under Obama, more than 500 drone strikes have killed nearly 4,000 individuals both in hot war zones, such as Iraq and Afghanistan, and in countries containing terrorist havens — including Pakistan, Yemen and Somalia.
The nonviolent activists also held a banner quoting Article 6 of the U.S. Constitution, stating that every treaty signed becomes the supreme law of the land. They brought the books to Hancock to remind everyone at the base of the signed treaties that prohibit the killing of civilians and assassinations of human beings.
The US is withdrawing its military personnel from a base in Yemen because of increasing insecurity there...
Oops! There goes another half billion dollars’ worth of war material lost to another enemy. This time in Yemen where until a few weeks ago President Obama could readily tout Yemen as the one foreign policy success story he could always hang his hat on. Yemen was the one place on this planet where Obama could avoid having to admit his foreign policy is not a total and abject failure. Yemen was where he could rationalize that his killer drone policy was actually working at keeping the enemy at bay. So what if most of the people killed by drones are innocent (over 96% by one recent analysis), many children and women that happened to get in the way. A little so called collateral damage never hurt the mighty US Empire’s warring ways.
The unraveling of Yemen should be a wake-up call for Obama loyalists. Obama was elected in large part because of his opposition to the disastrous Iraq War and his promise of a smarter Middle East policy, one less reliant on invasion and occupation. Nevertheless, in office, Obama has supported the occupation of Afghanistan and the NATO-led overthrow of Libya’s Muammar Gaddafi, which led to chaos.
Still, as Obama explained in a September 2014 foreign policy speech, the centerpiece of his strategy in the Middle East has been a more long-distance approach: “taking out terrorists who threaten us, while supporting partners on the front lines.” In other words: air strikes, drones and military aid. He touted the success of this strategy in Yemen and Somalia.
How twenty-three innocent Afghani civilians were wiped out by self-deceiving drone operators seven and a half thousand miles away.
Despite a promise made by President Obama nearly two years ago to take control of the drone war away from the Central Intelligence Agency (CIA), the spooks still have their fingers on the trigger.
In a poll of whether the animal should live or die, only half of those who had taken part said it should be spared.
Mehnert has also received a barrage of protest e-mails and even a death threat on the internet.
He said: "People are more concerned for the rat than their personal freedom or for the welfare of children in crisis areas around the world.
"They should write to their government and not to me!"
Pope Francis says nothing can justify the use of the death penalty and there is no "right" way to humanely kill another person.
Francis outlined the Catholic church's opposition to capital punishment in a letter to the International Commission against the Death Penalty, a group of former government officials, jurists and others who had an audience with him at the Vatican Friday.
Here I am talking of the softening of the boundary between two realms in which the UAV is used: what are usually termed the ‘military’ and the ‘civilian’ domains. Since 1995, when it flew the GNAT-750 surveillance drone over Bosnia, the CIA has used military drones as a tool of surveillance; since 2002, when the first CIA drone strike was conducted by an MQ-1 Predator on a ‘tall man’ in Afghanistan – believed to be Osama bin Laden, but in actual fact one of a group of innocent civilians collecting scrap metal – these drones have held lethal potential.
In a new interview the former vice president insinuates that Barack Obama treats terrorism as a "law-enforcement problem."
Indeed, Washington’s fingerprints were all over the operation: There was a $5-million bounty placed by the Americans on Marwan’s head. A U.S. military helicopter appeared in the area after the long firefight, allegedly to help evacuate the wounded. Marwan’s finger disappeared after the battle and showed up at an FBI lab in the United States a few days later.
Filipino officials have remained tight-lipped on the question of U.S. participation in the raid, invoking “national security” or choosing to make revelations only in secret executive sessions with the Senate. Thus it has fallen on the media to probe the U.S. role.
An intelligence agency employee whose drone crashed on the White House lawn earlier this year won't face criminal charges, the U.S. attorney's office in Washington announced Wednesday.
After allowing the United States to use its air space to bomb Islamic State fighters for six months, the Syrian army appears to have imposed a "red line" by shooting down a U.S. drone over territory of critical importance to Damascus.
The ace of spades, of course, was dictator Saddam Hussein. He was considered so important that US planners decided that an operation killing the deposed leader woud be worth it if it were likely that no more than 29 civilians were killed in the process.
"Our number was thirty," according to Marc Garlasco, a former Defense Intelligence Analyst, who spoke with 60 Minutes in 2007. "If you’re gonna kill up to twenty-nine people in a strike against Saddam Hussein, that’s not a problem.
Targeted killings have been a central part of US national security strategy for more than a decade, but the American public still knows scandalously little about who the government kills, and why. Now we’re filing a new lawsuit in our continuing fight to fix that.
Yemen's Shiite rebels issued a call to arms Saturday to battle forces loyal to the country's embattled president, as U.S. troops were evacuating a southern air base crucial to America's drone strike program after al-Qaida militants seized a nearby city.
The turmoil comes as Yemen battles al-Qaida in the Arabian Peninsula, the target of the drone program, and faces a purported affiliate of the extremist Islamic State group that claimed responsibility for a series of suicide bombings killing at least 137 people Friday.
All these factors could push the Arab world's most impoverished country, united only in the 1990s, back toward civil war.
As the Afghan president heads to the United States on his first trip to Washington as head of state, the landmark visit offers a chance for both sides to start afresh and wipe the slate clean on the legacy of troubled U.S-Afghan relations.
Ashraf Ghani faces a daunting task – long-term, the visit could set the tone for years to come. More pressingly, Ghani needs firm commitment of American military support in his fight against the Taliban and other insurgent groups, including an Islamic State affiliate, which he and U.S. military leaders fear is finding a foothold in Afghanistan.
How big is the problem? While the secrecy of the American drone warfare makes it impossible to know the exact scope of this program, the Bureau of Investigative Journalism reports that American drone strikes have killed almost 2,500 people — including hundreds of children — in Pakistan, Yemen and Somalia — and that’s not including drone killings in Iraq and Afghanistan.
Last month's international security conference in Geneva revealed estimates that as of January 2015 drone strikes in Pakistan killed nearly 4,000 people, including over 1000 civilians, mostly women and children.
America isn’t supposed to assassinate peopleââ¬Å —ââ¬Å Pres. Ronald Reagan had banned the practice.
An angry mob stoned and beat a woman before hurling her onto a riverbed and setting her body alight in the Afghan capital after she allegedly burned copies of the Quran, officials and eyewitnesses told NBC News.
The director of the CIA came the closest of any US official so far to acknowledging cooperation between the US and Iran in their current war against the Islamic State in Iraq.
Ecuador's leftist President Rafael Correa on Saturday accused the United States of trying to destabilize his government, by infiltrating it with spies.
The 51-year-old economist trained in the US has faced opposition protests as he seeks constitutional changes that would allow him to seek re-election next year to another four-year term.
Ecuadorian President Rafael Correa has accused the US Central Intelligence Agency (CIA) of being involved in opposition protests in the country with the aim of dragging it into chaos.
"There is a CIA presence there [in Ecuador's opposition] which has a goal of weakening the government," Correa said on Saturday, as quoted by the TeleSUR television network.
Early the next morning, villagers over a wide area were startled to find in their fields and open ground all sorts of strange weapons. What rained from the skies was lethality: 10 RPG-7 rocket launchers, 300 AK-47s, 25 9-mm pistols, two 7.62 sniper rifles, two night vision binoculars, 100 grenades, 23,800 rounds of 7.62 ammunition, 6,000 rounds of 9-mm ammunition, 100 anti-tank grenades as well as 10 telescopic sights for rocket launchers. Purulia, which housed the Ananda Marg headquarters, had seen nothing like this. The cargo weighed 4,375 kg!
On the heels of the news out of Moscow that Boris Nemtsov was gunned down, today Dr. Paul Craig Roberts spoke with King World News about the CIA and the murder of Nemtsov. This is a fascinating trip down the rabbit hole with the former U.S. Treasury official as he is warning that the CIA may be out of control.
On March 18, Joe Biden called Poroshenko. He congratulated him for violating Minsk.
It calls for granting Donbass special status autonomous rule. Draft Kiev legislation designates it “temporarily occupied territories.”
A White House statement said Biden “welcomed the (parliament’s) adoption of implementing measures relating to the law on special status for certain areas of eastern Ukraine…”
He lied saying legislation adopted complies with terms stipulated under “September 2014 and February 2015 Minsk agreements.”
With prosecutions of whistleblowers like Chelsea Manning, Edward Snowden, Thomas Drake, John Kiriakou and several others, the Obama administration is by far the most aggressive in history when it comes to punishing leaks. But is there a double standard when it comes to who is punished and who walks free? That is the question being raised after a lenient plea deal for David Petraeus, the retired four-star general and former head of the CIA. Unlike the others, Petraeus did not release information to expose perceived government wrongdoing. Instead, Petraeus gave classified material to his girlfriend, Paula Broadwell, who was writing his biography. Petraeus let Broadwell access his CIA email account and other sensitive material, including the names of covert operatives in Afghanistan, war strategies, and quotes from White House meetings. Earlier this month, he reached a plea deal, admitting to one count of unauthorized removal and retention of classified information. Prosecutors will not seek prison time, but instead two years probation and a fine. He remains an administration insider, advising the White House on the war against ISIS. We speak to Jesselyn Radack, National Security & Human Rights director at the Government Accountability Project. A former ethics adviser to the U.S. Department of Justice, Radackis the lawyer for Edward Snowden, Thomas Drake and John Kiriakou — three whistleblowers all charged under the Espionage Act. She recently wrote an article for Foreign Policy magazine, "Petraeus, Snowden, and the Department of Two-Tiered Justice."
The White House says it's consulting with former CIA Director David Petraeus about the fight against the Islamic State group despite his admission that he gave classified material to his biographer and mistress.
Petraeus has agreed to plead guilty to a misdemeanor count that carries a possible sentence of up to a year in prison. The retired four-star general allegedly gave the biographer eight binders of classified material.
A blow to US moves to aid rebels, the dissolution of Hazzm also highlights the risks that a new Department of Defense program could face in training and equipping fighters in Jordan, Turkey and Qatar.
But perhaps Brennan knows all this and is simply being “strategic”? After all, the CIA head also “warned against ascribing ‘Islamic legitimacy’ to the overseas terrorist group, saying that allowing them to identify themselves with Islam does a disservice to Muslims around the world.”
Pakistani officials on Tuesday executed 12 people in the country's single-largest day of executions since a moratorium on the death penalty was lifted in December, officials said.
The executions are sure to raise concerns over due process and proper oversight of the country's troubled criminal justice system, which rights groups say often does little to protect defendants.
Sweden may be involved in the CIA's drone strike campaign, as an investigation shows that an alleged CIA agent executed in Yemen in 2014 was likely recruited by Swedish intelligence.
When Castro lived in the Havana Libre Hotel in the early ’60s, he would often enjoy a chocolate milkshake from the hotel’s lunch counter. But in 1961, the CIA hired Mafia assassins to poison the dictator’s milky meal.
Richard Bissell, then the CIA deputy director for plans, arranged to offer Sam Giancana and Santo Trafficante, Jr.— heads of the Chicago and Tampa crime familiesââ¬Å —ââ¬Å $150,000 to help assassinate Castro with a poison pill.
Agency soldiers took over the camp and began training Tibetan freedom fighters there, teaching them to throw grenades, set landmines and use mortars as part of an ongoing fight against Chinese Communists. This was, after all, the height of the Cold War, and the American government was waging a bitter battle to prevent Communism from spreading.
The administration received 714,231 requests, which is slightly higher than 2013. In thirty-nine percent of those cases (250,581 requests), the government censored or denied requesters access. This is an increase from 244,675 requests last year.
Tearing a page, so to speak, from social media crowdfunding campaigns like last year's ALS Ice Bucket Challenge, the National Archives has turned to Twitter to raise a volunteer workforce of citizen archivists to help transcribe some of millions of digitized documents—including thousands of declassified CIA and Department of Defense files. The goal of the Transcription Challenge: 1,000 transcribed pages of documents by March 23.
The Center for Investigative Reporting sought state citations for patient abuses in long-term care facilities controlled by the state. When state regulators initially released the records, they were so heavily redacted that they were useless.
[JURIST] A judge for the US District Court for the Southern District of New York ruled Friday that the Department of Defense (DOD) [official websites] must release photographs [order, PDF] requested by the American Civil Liberties Union (ACLU) [advocacy website] in its Freedom of Information Act (FOIA) [official website] request for images depicting the abuse of prisoners in Iraq and Afghanistan. Judge Alvin Hellerstein found that the legal certification filed in 2012 by then Secretary of Defense Leon Panetta was inadequate, and that the government has failed to remedy the shortcomings of the certificate. The order is stayed for 60 days so that the DOD's Solicitor General may make a determination regarding appeal.
A federal district court judge will no longer accept the United States government’s secrecy arguments and has ruled that it must release thousands of photographs of detainee abuse and torture in Afghanistan and Iraq, including inhumane treatment at Abu Ghraib prison.
The government is “required to disclose each and all the photographs responsive” to the Freedom of Information Act request submitted by the American Civil Liberties Union (ACLU),” according to the order by Judge Alvin Hellerstein of the US District Court of the Southern District of New York.
Hellerstein found that the government still had failed to justify keeping each individual photograph secret. However, the judge stayed the order for 60 days so the Solicitor General could determine whether to file an appeal.
After the preliminary charges were read, the rest of the hearing was held behind closed doors and details were not made public. None of the five suspects, who have pleaded innocent, can be name
The CIA's nine-year resistance to releasing its Official History of the Bay of Pigs Operation was given the FOIA Failure Award on Friday (March 20) by the The FOIA Project, a non-profit organization that says it seeks " to provide the public with timely and complete information about every instance in which the federal government grants or withholds records under the Freedom of Information Act."
With a stroke of a pen, President Obama made it official that his office is exempt from information disclosure. And former Secretary of State Hillary Clinton probably won’t be disclosing work-related emails anytime soon.
The complaint asks for CIA files regarding "the unlawful diversion of U.S. government-owned weapons-grade uranium from the Nuclear Materials and Equipment Corporation (NUMEC) into the clandestine Israeli nuclear weapons program."
A month after former CIA officer Jeffrey Sterling was convicted on nine felony counts with circumstantial metadata, the zealous prosecution is now having potentially major consequences — casting doubt on the credibility of claims by the U.S. government that Iran has developed a nuclear weapons program.
Details of a 15-year-old Central Intelligence Agency sting emerging from a court case in the U.S. may prompt United Nations monitors to reassess some evidence related to Iran’s alleged nuclear weapons work, two western diplomats said.
It debunked forged documents it received before the 2003 Iraq War but has never acknowledged being given faked intelligence on Iran. For its part, Iran has consistently alleged that forgeries have played a key role in supporting claims that it ran a nuclear weapons program.
A CIA plan may have allowed US intelligence to claim that it had solid proof Iran was actively trying to build the final critical component of a nuclear weapon, had Iran fallen for the deception.
The European Center for Constitutional and Human Rights has been making the case for heavyweight members of the European Union to bring war crimes charges against members of the former administration.
The American Civil Liberties Union is suing the federal government, seeking to force a response to its request for documents about drone missile strikes against terror suspects.
House Republicans want to eliminate climate research.
GOP isn’t happy with the money the two national security agencies are spending on climate-change research.
In February 2015, the U.S. National Academy of Sciences along with other institutions published two reports on geoengineering (technological proposals to manipulate the climate) that were funded by, among others, the CIA.
The Norwegian Shipowners’ Association (NSA) has come in for harsh criticism over its policy towards scrapping in Bangladesh.
The NSA strongly advises its members against recycling their ships in Bangladesh, unless it is closely monitored and undertaken as part of projects aimed at improving standards in line with the Hong Kong International Convention for the Safe and Environmentally Sound Recycling of Ships (Hong Kong Convention) .
Large Japanese electricity utility Tokyo Electric Power (Tepco) confirmed on Thursday, March 19 that nearly all fuel in one of four damaged nuclear reactors at Fukushima No. 1 nuclear power plant has melted and fallen into the containment building.
With the design of the Fukushima Daiichi plants, the containment building was a very simple shell protecting the reactor from the elements, but provided no real protection in the event of a nuclear accident. Instead, the nuclear reactor was enclosed in primary and secondary containment vessels, which sat atop a thick concrete pad at the base of the containment building.
[...]
While there has been suspicions that nuclear fuel did melt its way through the containment vessel and to the base of the containment building, until Thursday there was no definitive proof meltdown had occurred.
The implication of the findings is that it will be very difficult to remove the highly radioactive molten fuel from Unit 1. As well, the molten fuel must continue to be cooled with water until it is removed.
Holes and fractures in the concrete base of the reactor building also means that groundwater continues to seep in and become irradiated before draining into the Pacific Ocean, causing an ongoing nuclear disaster.
The companies include BP, responsible for the Deepwater Horizon disaster in the Gulf of Mexico, Anadarko Petroleum, which was recently forced to pay a $5bn environmental clean-up charge and Brazilian mining company Vale, voted the corporation with most “contempt for the environment and human rights” in the world clocking over 25,000 votes in the Public Eye annual awards.
The Idaho Senate has approved spending $400,000 to kill wolves.
The risk of Greek companies bribing foreign officials is substantial, but Greece has not given the same priority to fighting foreign bribery as it has to domestic corruption. This sends an unfortunate message that foreign bribery is an acceptable means to win overseas business and improve Greece’s economy during an economic crisis. Greece must therefore urgently raise the priority of fighting foreign bribery and explicitly address foreign bribery in its national anti-corruption strategies.
The new Facebook service has, unsurprisingly, raised a few eyebrows, with some noting privacy concerns could prove a barrier to the service's success.
Kevin Dallas, CMO at WorldPay, said: "Social networks are an integral part of our lives, so it’s no surprise that they want to play a role in our finances.
"Many people, however, still have concerns about security online, with identity fraud that uses data cribbed from social networks rife. Until these fears are put to bed, this will be a big barrier to the wholesale adoption of this technology."
Austin-based think tank Stratfor has released its Decade Forecast 2015-2025, predicting the imminent collapse of Russia and the EU and the decline of China, while the US and its allies flourish.
I’m preparing to do a series of posts on CISA, the bill passed out of SSCI this week that, unlike most of the previous attempts to use cybersecurity to justify domestic spying, may well succeed (I’ve been using OTI’s redline version which shows how SSCI simply renamed things to be able to claim they’re addressing privacy concerns).
But — particularly given Richard Burr’s office’s assurances this bill is great because “business groups like the Financial Services Roundtable and the National Cable & Telecommunications Association have already expressed their support for the bill” — I wanted to raise a question I’ve been pondering.
To what extent have banks won themselves immunity by serving as intelligence partners for the federal government?
So how can a global company with Russian roots play a part in a conspiracy theory? Well, this one is easy: there should be some devilish inner job of the Russian secret services (to produce the “I knew it!” effect). In many cases you can change the adjective “Russian” for any other to produce a similar effect. It’s a simple yet effective hands-on recipe for a sensationalist article. Exploiting paranoia is always a great tool for increasing readership.
There are questions we’ve answered a million times: what are our links with the KGB? Why do you expose cyber-campaigns by Western intelligence services? When do you plan to hire Edward Snowden? And other ones of the ‘have you stopped beating your wife?’ kind.
We’re a transparent company, so we’ve got detailed answers ready. Of course we want to dispel any speculation about our participation in any conspiracy. We’ve nothing to hide: we’re in the security business and to be successful in it you have to be open to scrutiny.
America's MSM mock legitimate journalism. State propaganda Big Lies substitute for real news, information and analysis on issues mattering most.
The kicker, the ugliest irony – and the movie’s measure of how gutless and corrupt the American media has become – is that chief among Webb’s persecutors is the self-same home of Woodward and Bernstein, The Washington Post of All The President’s Men. Ultimately for Webb the bitterness became – tragically – too much to bear.
France has blocked five websites suspected of condoning terrorism and spreading hate speech, marking the first usage of new anti-terrorism powers approved by parliament last year that allow such bans without court orders.
Chicago State University President Wayne Watson tried to force an administrator to file sexual harassment charges against a professor who had criticized him. When the administrator refused, he fired her, according to a wrongful termination lawsuit brought against the university yesterday.
According to the survey, titled “Research on Impunity in Turkey” and conducted between Jan. 29 and Feb. 22, featuring the views of some 11,000 members of the media, 86 percent of respondents said they believe censorship or self-censorship is a common practice. More than 60 percent of respondents said they are absolutely sure that this is the case in Turkish media. Only 9 percent said they do not think there is censorship, while 3 percent said they are undecided.
While international attention has focused on the ongoing retrial of Al Jazeera television journalists Mohamed Fahmy and Baher Mohamed, local Egyptian reporters based in Cairo paint a picture of press freedom that's as bleak as it's ever been. With Thursday's adjournment of the Al Jazeera journalists' retrial, the two remain in a legal limbo. But there's nothing murky about the state of press freedom in President Abdel Fattah el-Sisi's Egypt.
For the second consecutive year, the Obama administration more often than ever censored government files or outright denied access to them under the U.S. Freedom of Information Act, according to a new analysis of federal data by The Associated Press.
The Obama administration set a new record again for more often than ever censoring government files or outright denying access to them last year under the U.S. Freedom of Information Act, according to a new analysis of federal data by The Associated Press.
New Delhi: As his upcoming film "Aur Devdas" -- a hard-hitting political take on Sarat Chandra Chattopadhyay's romantic-tragedy -- gears up for its release soon, director Sudhir Mishra says he is not bothered by the recent censorship issues.
On February 28, Under the Dome, a documentary on pollution and environment in China, by Chinese journalist Chai Jing, went viral within Chinese cyberspace. Within 48 hours, the film had been viewed more than 200 million times and had become the centre of national discourse.
Reporters without Borders designated 19 countries as "enemies of the internet," including the United States and Great Britain.
GreatFire's mirroring service serves as a kind of secondary home for sites like Google or The Tibet Post that would otherwise be blocked by China's web censorship systems. That makes it harder to block through conventional means, but it's still vulnerable to brute force attacks at the hosting level. Denial-of-service attacks are notoriously easy to launch, allowing relatively unsophisticated attackers to bring down comparatively large targets.
CNN’s Kristie Lu Stout sits down with The Sinocism China Newsletter’s Bill Bishop, Google’s former Head of Free Expression Lokman Tsui, and Amnesty International’s Roseann Rife. They discuss why Beijing is compelled to keep such a tight grip on cyberspace and how Western tech firms should assess the risk and opportunity of working in China.
FDR nixed shots with his wheelchair.
[...]
This, again, is why it is so important for the NSA director to control how he is photographed. When you are the all-seeing eye at the top of the data-viewing period, you cannot be caught doing poses from Dr. Strangelove or cackling to yourself like a Sith Lord.
The most disappointing part of the book is what it leaves out. Mr Grenier hints, but does not explicitly say, that the agency's censors forbade him from discussing the use of drones. Even after a decent passage of time, he has little to say about what went on at the notorious black sites, the prisons where terror detainees were subjected to "enhanced interrogation", including waterboarding.
The Senate Intelligence Committee advanced a terrible cybersecurity bill called the Cybersecurity Information Sharing Act of 2015 (CISA) to the Senate floor last week. The new chair (and huge fan of transparency) Senator Richard Burr may have set a record as he kept the bill secret until Tuesday night. Unfortunately, the newest Senate Intelligence bill is one of the worst yet.
In addition to hunting hackers, the Cybersecurity Information Security Act — the bill that just passed the Senate Intelligence Committee — collects information domestically to target terrorists if those so-called terrorists can be said to be hacking or otherwise doing damage to property.
The UK has been deploying CNE for over a decade, yet the release of the draft Equipment Interference Code of Practice (EI Code) is the first time the UK intelligence services have sought public authorisation for their activities. Indeed, it is the first time the intelligence services have publicly acknowledged they engage in CNE. For that reason, this consultation regarding the draft EI Code is extremely important. Privacy International and Open Rights Group appreciate this opportunity to weigh in on whether CNE is an appropriate surveillance technique and, if it is used, the controls, safeguards and oversight that must be applied.
Last week, the Senate Intelligence Committee voted (in secret, of course) to approve a new cybersecurity bill, dubbed CISA (as it was in the last Congress), though it kept the content of the actual bill secret until this week. The only Senator who voted against it was... Senator Wyden, of course, who rightly pointed out that this bill is "not a cybersecurity bill – it’s a surveillance bill by another name."
What's important about this revelation is not just the information itself -- many people had assumed this was the case -- but the fact that once more, bringing court cases against the UK's GCHQ has ferreted out numerous details that were previously secret. This shows the value of the strategy, and suggests it should be used again where possible.
The National Security Agency want to be able to hack more people, vacuum up even more of your internet records and have the keys to tech companies’ encryption – and, after 18 months of embarrassing inaction from Congress on surveillance reform, the NSA is now lobbying it for more powers, not less.
NSA director Mike Rogers testified in front of a Senate committee this week, lamenting that the poor ol’ NSA just doesn’t have the “cyber-offensive” capabilities (read: the ability to hack people) it needs to adequately defend the US. How cyber-attacking countries will help cyber-defense is anybody’s guess, but the idea that the NSA is somehow hamstrung is absurd.
BIOS-hacking until now has been largely the domain of advanced hackers like those of the NSA. But researchers Xeno Kovah and Corey Kallenberg presented a proof-of-concept attack today at the CanSecWest conference in Vancouver, showing how they could remotely infect the BIOS of multiple systems using a host of new vulnerabilities that took them just hours to uncover. They also found a way to gain high-level system privileges for their BIOS malware to undermine the security of specialized operating systems like Tails—used by journalists and activists for stealth communications and handling sensitive data.
Last week, the ACLU filed a welcome additional challenge to the NSA’s warrantless Internet backbone surveillance (aka “Upstream” surveillance) on behalf of Wikimedia and a number of other media and human rights organizations. We applaud all of those involved in bringing the case. It adds another avenue of attack on one of the NSA’s most audacious programs—tapping into the very backbone of the Internet and thereby putting all of our online activities under scrutiny.
Edward Snowden’s National Security Agency (NSA) leaks damaged national security, exposed spies to danger, aided terrorists and cost the UK taxpayer money, according to senior British security officials.
You’ve probably heard a lot about online mass surveillance, but maybe you’re wondering how exactly intelligence agencies are monitoring you. Helpfully, they like to give their surveillance programmes silly codenames, so we can explain what’s going on.
CEO Bill McDermott says reports about SAP’s role in the NSA’s controversial mass surveillance projects are “misleading” but adds firm is “honoured” that it contributes to national safety.
“There are no back doors in SAP technology, period,” he told Re/code at an event in Hanover, Germany, Monday night where the CeBit technology conference was under way.
Americans are OK with government surveillance on foreigners and politicians, but not when it comes to their own lives, according to a new survey. In the aftermath of Edward Snowden’s revelations about the National Security Agency’s antiterrorism monitoring initiatives, more than half of Americans think it’s unacceptable for the government to monitor U.S. citizens’ communications, according to a new survey from the Pew Research Center. But 60 percent think it’s fine to listen in on the conversations of foreign leaders, and 54 percent think it’s ok to monitor foreign citizens.
The co-founder of the world’s sixth most popular website thinks that the National Security Agency’s Internet spying is not only illegal but violates core provisions of the Constitution.
While explaining the rationale behind Wikipedia’s lawsuit against the spy agency on Friday, Jimmy Wales hoped that the legal action would lead to a landmark ruling declaring new limits on government’s spying powers.
The “minimum acceptable” result of the case, Wales said in a conversation on Reddit, would be to find that the NSA’s massive collection of data on the Internet’s backbone was illegal.
The National Security Agency may be allowed to continue scooping up American phone records indefinitely even if congressional authority for the spying program expires later this year, according to a recently declassified court order.
The National Security Agency may be allowed to continue scooping up American phone records indefinitely even if congressional authority for the spying program expires later this year, according to a recently declassified court order.
But former NSA researcher Patrick Wardle told Thomas Fox-Brewster of Forbes that he has found a way to bypass the Apple Mac’s Gatekeeper security and abuse such insecure downloads. Wardle told Fox-Brewster that the Gatekeeper does not check all components of the OS X download files. A malicious version of a “dylib file” (dynamic library) can be sneaked into legitimate downloads performed over insecure HTTP lines. This way you can infect Macs and steal data.
Finding vulnerable apps shouldn’t be too hard either. Wardle created a scanner that looked for applications that would use his naughty dylibs.
A new generation seeks answers, Jahn says. "What's the difference between the Stasi and the NSA?" young people ask him. Jahn, himself a victim of the Stasi, feels such questions are neither absurd nor trivializing. Both represent a "state intervention." A dictatorship's secret police is not comparable to an intelligence gathering organization of a democracy but a comparison can be helpful. The Stasi is ideal illustrative material. Had the files remained closed, we wouldn't have access to this timeless material. Opening them was first an act of liberation for the victims, but dealing with Stasi history as such is a lesson in democracy.
‘Even the East Germans couldn’t follow everybody all the time,” Bruce Schneier writes. “Now it’s easy.”
In a David versus Goliath battle, an Austrian law student may topple the biggest EU-US data sharing deal when he gets his day in court in a couple of weeks' time.
Amazon remains the only US internet giant in the Fortune 500 that has not yet released a report detailing how many demands for data it receives from the US government.
Although people are starting to notice, the retail and cloud giant has no public plans to address these concerns.
Word first spread last week when the ACLU's Christopher Soghoian, who's spent years publicly denouncing companies for poor privacy practices, told attendees at a Seattle town hall event that he's "hit a wall with Amazon," adding that it's "just really difficult to reach people there."
The NSA has a blanket order to spy on your domestic phone calls. It collects information about the date and time of numbers dialed and the length of call. There is no evidence that it is currently storing recordings of the phone calls, though it is widely suspected to be occurring.
Under this blanket order, the NSA collects data on 3 billion phone calls per day.
Buried in a news article Tuesday is a nugget of a story that could send privacy advocates reeling: the CIA is planning to increase spying on Facebook pages and tweets.
What’s more, the plan to increase cyber espionage has set of an intradepartmental feud. According to the Washington Post, the head of the agency’s clandestine service recently resigned, in part over objections to the plan. CIA director John Brennan “quickly replaced him with a longtime officer who had led an internal review panel that broadly endorsed [his] reform agenda.”
Thomas Drake became a symbol of the dangers whistleblowers face when they help journalists and Congress investigate wrongdoing at intelligence agencies. He claims he was subjected to a decade of retaliation by the National Security Agency that culminated in his being charged with espionage.
The U.S. National Security Agency has been trying to map the communications traffic of corporations around the world, and a classified document reveals that at least two of Canada’s largest companies are included.
A 2012 presentation by a U.S. intelligence analyst, a copy of which was obtained by The Globe and Mail, includes a list of corporate networks that names Royal Bank of Canada and Rogers Communications Inc.
The presentation, titled “Private Networks: Analysis, Contextualization and Setting the Vision,” is among the NSA documents taken by former contractor Edward Snowden. It was obtained by The Globe from a confidential source.
Critics say a crisis of transparency surrounds modern spying methods in Canada after revelations that a close ally – the U.S. National Security Agency – has been looking at the communications traffic of at least two Canadian corporations.
The trouble with USB-C stems from the fact that the USB standard isn't very secure. Last year, researchers wrote a piece of malware called BadUSB which attaches to your computer using USB devices like phone chargers or thumb drives. Once connected, the malware basically takes over a computer imperceptibly. The scariest part is that the malware is written directly to the USB controller chip's firmware, which means that it's virtually undetectable and so far, unfixable.
[...]
What the Verge fails to mention however, is that it's potentially much worse than that. If everyone is using the same power charger, it's not just renegade hackers posing as creative professionals in coffee shops that you need to worry about. With USB-C, the surveillance establishment suddenly has a huge incentive to figure out how to sneak a compromised cable into your power hole.
The measure introduced Thursday has already prompted outcry from some privacy advocates and human rights groups.
Leaked Edward Snowden documents, published for the first time today, reveal New Zealand is spying on them anyway – despite residents being New Zealanders.
Wrong, says the Prime Minister of the surveillance stories.
But John Key won't say why.
Don't believe what you read in the newspaper, says the Foreign Minister of reports New Zealand was spying on the Solomon Islands government.
However, there's no benefit in having discussions about it through the media, says Murray McCully.
And those doing the spying at the Government Communications Security Bureau won't assist, saying it doesn't comment on "operational" matters.
So, between the leaked top secret documents and the denials, how do we cut through to what's actually happening?
Broadly, the claim in relation to the GCSB is that it sucks up vast amounts of raw data from the Pacific which is then stored with the United States' National Security Agency.
New Zealand agency exposed spying on Japan, China, India among others including Antarctica.
CISA’s primary mechanism is to facilitate the transfer of “cyber threat indicators,” which are defined broadly enough to include private information such as email content or personal identities.
In the United States, the group charged with hacking computers is the Tailored Access Operations group (TAO) inside the NSA. We know that TAO infiltrates computers remotely, using programs with cool code names like QUANTUMINSERT and FOXACID. We know that TAO has developed specialized software to hack into everything from computers to routers to smartphones, and that its staff installs hardware “implants” into computer and networking equipment by intercepting and infecting it in transit. One estimate is that the group has successfully hacked into, and is exfiltrating information from, 80,000 computers worldwide.
Last month, Moscow-based security software maker Kaspersky Labs published detailed information on what it calls the Equation Group and how the U.S. National Security Agency and their U.K. counterpart, GCHQ, have figure how to embed spyware deep inside computers, gaining almost total control of those computers to eavesdrop on most of the world’s computers, even in the face of reboots, operating system reinstalls, and commercial anti-virus products. The details are impressive, and I urge anyone interested in tech to read the Kaspersky documents, or these very detailed articles.
Sony, meanwhile, has bought the rights to Greenwald's book No Place to Hide in the hope of making its own movie, and has set James Bond producer Barbara Broccoli for the project, though whether it still moves forward in the wake of Stone's take is an open question.
To explain what they mean by non-neutrality, Ashley and Ben write: “When it comes to the intelligence community . . . the law allows those actors to do things other people cannot.” They go on to note that this definition raises a question: why does the American public consistently rate so highly the U.S. military, an institution whose members necessarily detain and kill people with legal immunity?
Local Denver citizens became alarmed after discovering that they're being watched while dropping off mail by a hidden data collection device outside their local post office .
The events took place from Thanksgiving and continued until recently. Who was responsible for planting the device?
These days, it’s easy to take for granted just how amazing Google Maps is. Not only is Google’s mapping service incredibly useful for getting where you want to go, the satellite imagery it provides is the stuff straight out of old school spy movies.
As with all large, powerful institutions over time, the CIA constantly seeks expansion of its means and responsibilities, much like a growing child wanting ever more food and clothing and entertainment. This inherent tendency, the expansion of institutional empire, is difficult enough to control under normal circumstances, but when there are complex operations in many countries and tens of billions in spending and many levels of secrecy and secret multi-level files, the ability of any elected politicians - whose keenest attention is always directed towards re-election and acquiring enough funds to run a campaign - to exercise meaningful control and supervision becomes problematic at best. The larger and more complex the institution becomes, the truer this is.
Like so much else at the CIA, however, that tradition changed in the early 1980s, with Ronald Reagan’s determination to enforce his “Evil Empire” vision of the Soviet Union. The writing was quickly on the wall. The Reagan transition team denounced CIA career analysts for allegedly underestimating the Soviet commitment to world domination.
The US Government threatened to starve Berlin of intelligence if it harboured fugitive document-leaker Edward Snowden, German Vice Chancellor Sigmar Gabriel says.
The National Security Agency (NSA) leaker considered Germany as a place of refuge after he fled to Russia from the United States via Hong Kong in 2013.
The US Government threatened to starve Berlin of intelligence if it harboured fugitive document-leaker Edward Snowden, German Vice Chancellor Sigmar Gabriel says.
The National Security Agency (NSA) leaker considered Germany as a place of refuge after he fled to Russia from the United States via Hong Kong in 2013.
Lawmakers are nowhere close to a deal to renew provisions of the Patriot Act, with a deadline little more than two months away.
In a post on its official Tumblr, the United States’ Office of the Director of National Intelligence noted that it sought and received a reauthorization of its telephony metadata program, authorized under Section 215 of the Patriot Act. The program collects metadata on phone calls, including those of United States citizens.
After nearly two years of intense scrutiny over the American spy shop's mass surveillance programs, Rogers is making a full-court press to repair the agency's troubled legacy. That means portraying a shinier, happier version of the behemoth spy agency that led widespread surveillance on Germany's chancellor, prominent Muslims, and, well, everybody.
Mike McConnell, former chief of the US National Security Agency (NSA), has recently captured public attention with an unprecedented allegation that Chinese hackers "have penetrated every major corporation of any consequence in the US and taken information."
Last year, the Alaska Senate passed a powerful resolution condemning NSA spying and proclaiming that the Alaska State Legislature “will not assist the federal government by facilitating programs that are tyrannical in nature.”
The resolution also called on the federal government to end mass warrantless collection of electronic data.
Here we are, another year down the road, and Congress still hasn’t taken the first step to stop unconstitutional spying.
To preserve the right of its users who visit the website on a monthly basis, Wikipedia announced Wednesday it was suing the National Security Agency. This announcement made me question why more people and organizations aren’t doing the same.
Americans seem to love their amendments, but nobody really cares that the NSA violates the Fourth Amendment, which states every citizen has the right to privacy, and the First Amendment, which vows freedom of expression and association.
Australia’s defence intelligence agency sent an officer to work with New Zealand’s spy agency to help them develop their cyber capabilities and lead a new operational unit, new documents from NSA whistleblower Edward Snowden reveal.
New Zealand is conducting covert surveillance operations against some of its strongest trading partners and has obtained sophisticated malware to infect targeted computers and steal data, newly released documents reveal.
The country’s eavesdropping agency, Government Communications Security Bureau, or GCSB, is carrying out the surveillance across the Asia-Pacific region and beyond as part of its membership in the Five Eyes, a spying alliance that includes New Zealand as well as the United States, the United Kingdom, Canada, and Australia.
The Snowden story, in addition to its journalistic significance, was a key part of the effort to extend the Guardian brand to the U.S., where the company has pinned much of its hopes for the future.
Former employees of the National Security Agency are becoming a hot commodity in Silicon Valley amid the tech industry’s battle against government surveillance.
The Canadian daily The Globe and Mail reported On Tuesday that it gained access to an NSA document alleging the spy agency is mapping US and foreign companies’ corporate communications.
The American Civil Liberties Union earlier this week filed a lawsuit seeking to stop the National Security Agency from indiscriminately snooping on United States Internet traffic.
A Texas legislator introduced a bill that would stop the independent Texas power grid from being used to power mass, warrantless surveillance by the NSA.
Rep. Jonathan Stickland (R) introduced House Bill 3916 (HB3916) on March 13. The legislation would prohibit any political subdivision in Texas from providing water or electricity to any federal agency “involved in the routine surveillance or collection and storage of bulk telephone or e-mail records or related metadata concerning any citizen of the United States and that claims the legal authority to collect and store the bulk telephone or e-mail records or metadata concerning any citizen of the United States without the citizen’s consent or a search warrant that describes the person, place, or thing to be searched or seized.”
Central Intelligence Agency (CIA) Director John Brennan wants to pursue a dramatic expansion of hacking and cyber espionage in a shift that could reorganize power and create tension with the rival National Security Agency (NSA).
Remember the ultra-secure smartphone I told you about last summer called the Blackphone? Well, it's getting a serious upgrade that the NSA won't be happy about.
As one might expect, the NSA controlling encryption exports was a contentious issue. The agency had no particular interest in helping anyone outside of the U.S. actually secure their communications. It created a split world in which American citizens had access to better encryption ciphers, such as SSL with 1024-bit asymmetric encryption and 128-bit symmetric encryption. The rest of the world, meanwhile, was only eligible for encryption approved for export, which limited SSL to 512-bit asymmetric and 40- or 56-bit symmetric encryption. This weak export encryption solution gave the NSA the ability to continue monitoring international communications. More than just SSL suffered from this NSA decision, as well. The ancient VPN protocol, PPTP, supports three strengths of encryption to accommodate export: 40-, 56-, and 128-bit. Export restrictions even created controversy around Microsoft operating systems.
Researchers from France and the US call the newly discovered flaw “FREAK,” which apparently arises from “a class of deliberately weak export cipher suites… introduced under the pressure of the US government agencies to ensure that the NSA would be able to decrypt all foreign encrypted communication.”
A Montana bill that would take on NSA spying by denying material support and resources to federal agencies engaged in warrantless surveillance cleared a major hurdle today, passing the House Judiciary Committee by a 12-9 vote.
The Montana House gave preliminary approval to a bill that would take on NSA spying by denying material support and resources to federal agencies engaged in warrantless surveillance. The vote was 51-49.
This is not something we’ve actively reported on or aggressively tracked, but I’m planning on shining some light on who most aggressively lobbies against bills to advance liberty and/or reject federal power. In almost every situations, it’s law enforcement. And while many conservatives, for example, hold these folks in such high regard that they’re almost seen in a religious light, they’re the ones behind the scenes getting the most important bills voted down.
NSA whistleblower Thomas Drake has learned that the Pentagon Inspector General’s Office has rejected his whistleblower retaliation complaint, which he filed after the Justice Department’s prosecution against him collapsed.
As part of the Pentagon IG office’s audit, Drake provided details about waste and civil liberties abuses related to a program called TRAILBLAZER. He alleged in his complaint that he was spied upon by NSA management as he participated in this audit as a material witness. When he grew upset with the failure of the NSA to address problems, he decided to contact a Baltimore Sun reporter and reveal details related to the corruption.
The complaint he submitted to the IG’s office comprehensively detailed nearly ten years of retaliation by the agency for his whistleblowing. But, for no legal or statutory reason, the investigation into whistleblower retaliation only focused on five months and ignored a vast amount of other allegations made against the agency.
Navy Admiral Michael Rogers was responding to reports that the NSA had embedded spyware on computer hard drives on a vast scale and that it and its British counterpart had hacked into the world's biggest manufacturer of cellphone SIM cards. He spoke at a forum sponsored by the New America think tank.
The director of the National Security Agency (NSA) acknowledged an “aspect of risk” Wednesday in government agencies using computer technology that is manufactured abroad.
The document, written for the purpose of briefing then-director of the NSA, Keith Alexander (who is now running his own cyber security firm) says Iran was behind the "destructive cyberattack against Saudi Aramco in August 2012, during which data was destroyed on tens of thousands of computer."
The scale of that surveillance has become so great that the NSA has been known to collect images and content from conversations between ordinary people who are not even being targeted, including content that is sexual in nature, religious, political or related to mental health.
The business records request program based on Section 215 allows the FBI to obtain customer records from places like major telecom companies without going through the public court system.
I had come to the ââ¬â¹Stasi Museum with a group of U.S. and UK intelligence whistleblowers...
Later today, the government is scheduled to release two landmark opinions on NSA spying issued by the secret Foreign Intelligence Surveillance Court. The documents are being released as a result of FOIA lawsuit filed by EFF last year, seeking disclosure of many of the surveillance court's still-secret, yet significant, opinions.
It may also sound like the CIA is going to be doing a lot more digital snooping...
The leak of the NSA documents by Edward Snowden has resulted in a "very few changes" to the modus operandi of the US intelligence agency and its partners, says Norway's spy chief.
In 1980, personal computers were still in their infancy, and the internet did not exist. There were, of course, genuine concerns about threats to our privacy, but, looking back at my book of that year, they mostly revolved around telephone tapping, surveillance, and unwanted press intrusion. Data protection legislation was embryonic, and the concept of privacy as a human right was little more than a chimera.
As consolidation of the telecom sector is placing consumer data in the hands of fewer corporations, dozens of former AT&T business partners have warned regulators that the company has a poor record on privacy that should increase scrutiny of its proposed $48.5 billion merger with DirecTV.
A coalition of dozens of former AT&T business partners are raising alarms about the telecom giant's past cooperation with the National Security Agency (NSA), which could pose problems for its $48.5 billion merger with DirecTV.
General Petraeus’s case is about the unlawful removal and improper storage of classified materials, not the dissemination of such materials to the public. Indeed, a statement of facts filed with the plea agreement and signed by both General Petraeus and the Justice Department makes clear that “no classified information” from his “black books” (personal notebooks) that were given to his biographer, Paula Broadwell, appeared in the biography.
NSA whistleblower Thomas Drake denounced a plea bargain reached by former CIA Director David Petraeus and federal prosecutors, calling it a “slap on the wrist” for illegal actions “served no public good.”
By us invading Iraq we have every Muslim in the world hating us.
Lawyers for Jeffrey Sterling, a former CIA official convicted earlier this year of leaking classified information to a New York Times reporter, have requested a reconsideration of his conviction because two former generals, David Petraeus and James Cartwright, have received far more lenient treatment for what they call similar offenses.
Amnesty International USA Security and Human Rights Program Director Naureen Shah stated that the US National Security Agency’s mass surveillance program interferes with efforts to document and stop human rights abuses.
Shahid Buttar, a constitutional lawyer and executive director of the Bill of Rights Defense Committee (BORDC), was arrested by Capitol police at the end of a Senate Armed Services Committee hearing in which Director of National Intelligence James Clapper testified.
In video posted by the peace group, CODEPINK, Buttar shouts a question about NSA surveillance at Clapper as he is leaving. An officer is already nearby, which suggests he had already tried to get Clapper’s attention prior to the first question heard in the video.
This is the first, and probably will be the last, time that I have publicly voiced an opinion on any of your editorials. Quite frankly, I believe many of your editorials avoid the hard questions on a current issue in order not to be too controversial. I congratulate you here, though, because you have taken a clear stand on what needs to be done in the name of justice.
The Pira€te Party has been grow€ing in pop€ula€rity recently and is now the lar€gest political party in Ice€land accord€ing to a recent poll, with 29.1% of the vote. A whopp€ing 38 percent of Icelandic voters aged 18-49 year old would cast their vote for the Pira€te Party if the electi€ons were held today.
Rick Falkvinge, founder of the Swedish and first Pirate Party, says the growing support in Iceland is encouraging for Pirates worldwide.
The police shooting in Georgia earlier this month of a naked, unarmed man with bipolar disorder spotlights the growing number of violent confrontations between police and the mentally ill – an issue that goes before the Supreme Court this coming week.
At least half the people police kill each year have mental health problems, according to a 2013 report from the Treatment Advocacy Center and the National Sheriffs’ Association. On Monday, the nation’s highest court will consider how police must comply with the Americans With Disabilities Act when dealing with armed or violent people who have psychiatric problems or other disabilities.
The San Jose Police Department has set timetables for pilot-testing officer-worn cameras and a drone, surveillance technologies that have polarized local law-enforcement and civil libertarians over the past year.
American airpower has blown away eight wedding parties in three different countries—and we call ourselves the leaders of the global war on terror.
Gary Webb knew his story would cause a stir. The newspaper report he'd written suggested that a US-backed rebel army in Latin America was supplying the drugs responsible for blighting some of Los Angeles's poorest neighbourhoods – and, crucially, that the CIA must have known about it.
A Pakistani lawyer under death threats for defending a doctor who helped CIA agents hunt al-Qaida leader Osama bin Laden was shot dead on Tuesday, police said.
Samiullah Afridi represented Dr Shakil Afridi, who was jailed in 2012 for 33 years for running a fake vaccination campaign believed to have helped the US intelligence agency track down bin Laden. That sentence was overturned in 2013 and the doctor is now in jail awaiting a new trial.
A disastrous raid on alleged Islamic militants has ignited the worst political crisis yet for Philippine President Benigno Aquino -- and questions about the extent of any US role in the operation are deepening his discomfort.
Some Philippine lawmakers are asking whether the US military played a leading role in the operation in January, which ended with 44 police commandos dead in a field in the country's Muslim-majority south.
In October of 2002, 9 months before the US-led invasion of Iraq, the CIA produced a document summarizing relevant intelligence on Saddam Hussein's chemical and biological weapons programs. The document became the basis for the Bush Administration's public statements about the extent of Saddam's WMD program and was also distributed to members of Congress.
The document summarizing the CIA’s purported knowledge of Iraqi chemical, biological and nuclear weapons programs, produced in October 2002 and hidden from the public ever since, has finally been made public.
The CIA had previously released a heavily redacted version of the controversial National Intelligence Estimate (NIE) in 2004. Last year, transparency advocate John Greenwald made another FOIA request and received a declassified version of the document, which Vice News published this Thursday.
Among the U.S. arguments for invading Iraq was to topple a regime that developed weapons of mass destruction and that Iraq harbored terrorists, but a newly-surfaced intelligence report shows the rationale lacked certainty.
Almost nine months before the invasion of Iraq led by the United States, the CIA produced a document in October 2002 summarizing the agency’s purported knowledge of Iraqi chemical and biological weapons programs.
The report is rife with what now are obvious red flags that the Bush White House oversold the case for war. It asserts that Iraq had an active chemical weapons program at one point, though it admits that the CIA had found no evidence of the program's continuation. It repeatedly includes caveats like "credible evidence is limited." It gives little space to the doubts of the State Department's Bureau of Intelligence and Research, which found the CIA's findings on Iraq's nuclear program unconvincing and "at best ambiguous."
Twelve years after the U.S. launched its invasion of Saddam Hussein's Iraq, the secret intelligence report repeatedly cited by the George W. Bush administration as it campaigned for war has finally been made available to the American public.
The 2002 National Intelligence Estimate provides further proof that the president and his aides purposefully mischaracterized and exaggerated the dangers posed by the Iraqi regime in an effort to stoke fear about a nuclear or biological attack on the U.S. and its allies. A close reading of the report, which reflects the consensus of U.S. intelligence at the time, reveals an intelligence community at odds with itself about the nature of the potential threat.
Prime Minister Abdullah al-Thinni of the internationally recognized Libyan government based in Tobruk has appointed General Khalifa Haftar as commander of the army today.
I was in Iraq with a dozen of my CODEPINK colleagues a month before the US invasion in 2003. While we found a country wracked by 13 years of draconian Western sanctions and a people scared to openly criticize Saddam Hussein, we also found a middle class country with an extremely well-educated population where women made up the majority of university students and participated in all aspects of public life.
What then, of CIA director John Brennan’s promise to “overhaul” the organisation in what is ostensibly an effort to modernise it? His address to the press was filled with management speak. “Efficiencies” had to be wrung; hindering “seams” in the organisation’s structure preventing proper assessment of threats had to be targeted and removed.
The body tasked with investigating British abuses in Iraq has said it will not request as evidence the US Senate’s report on CIA torture, in the case of two Pakistani men tortured and rendered by the UK and the US.
Almost exactly twenty years after Truman’s speech, in February, 1967, the government’s cover was spectacularly blown by a college dropout. The dropout’s name was Michael Wood, and the operation he exposed was the C.I.A.’s covert use of an organization called the National Student Association. The revelation had a cascading effect, and helped to mark the end of the first phase of the Cold War.
Lawyers for two men, who claim they were tortured after capture by UK forces, are demanding access to an uncensored version of the CIA torture report from the Ministry of Defence (MoD) team charged with investigating abuses.
Solicitors Leigh Day, representing the men, has a long record of taking on similar cases, including the recent Al Sweady Inquiry into allegations of abuse by British soldiers.
Their clients are two Pakistani nationals, Yunus Rahmatullah and Amanatullah Ali, both of whom were captured in Iraq in 2004 by British special forces soldiers and held for a decade before being released by the US last year.
For years in the military courtroom at Guantanamo Bay, Cuba, there's been a subject no one could talk about: torture.
Fox News Channel conducted its own investigation and noted that the activities of the CIA and Brennan in particular in terms of torture intensified after the inauguration of Barack Obama in 2009. Since then, the department has received a number of secret rooms, where US secret agents would interrogate suspicious people.
A day after the Guardian exposed the first in a series of allegations of incommunicado detention and abuse at the Chicago police facility known as Homan Square, Cook County commissioner Richard Boykin sent a letter to the US Department of Justice. Citing what he likened to “CIA or Gestapo tactics”, Boykin joined officials and human-rights groups from the nation’s capital to the west side of Chicago in calling for a federal investigation into the secretive site.
The Guardian has reported that Chicago Police are operating a secret detention facility that mirrors the CIA’s “black sites.” From violations of due process to torture, the revelations raise serious concerns about the deteriorating state of freedom and justice in the United States.
Vickers is best known for having played a leading role in planning CIA paramilitary operations in the 1980s in Afghanistan, where he helped coordinate the guerrilla war against the Soviet army — a covert action campaign famously depicted in the movie “Charlie Wilson’s War.” He left the spy agency shortly afterward, and stayed out of government work for years.
HBO Films is making a feature about how the CIA hired psychologists to devise extreme interrogation tactics that the agency employed in the war on terror. This was all done with the full knowledge and cooperation of the American Psychological Association, making it possible that your own therapist was thinking about waterboarding while you went on and on about Richard getting that promotion instead of you.
HBO Films is developing a movie adaptation of the Vanity Fair article, Rorschach And Awe, written by Katherine Eban. While this source material certainly provides a snappy title for the project, the subject matter is deeply troubling – examining, as it does, the role of two professional psychologists in the development of torture techniques for the Central Intelligence Agency.
US Senator Ron Wyden’s said that the US Department of Justice has left unanswered all questions concerning the US government's use of drones, government agencies' interpretations of the law and the report on CIA torture.
Nowhere does Cole mention some of the more bizarre and unconscionable aspects of CIA’s torture and abuse such as “rectal feeding” and “rectal hydration” that involved a “pureed” blend of hummus and raisins that was “rectally infused.” The CIA justified these techniques as “medically necessary,” which was the kind of lie that Cole likes to pretend was not part of the CIA’s modus operandi. And nowhere does Professor Cole note that these sadistic techniques were performed on totally innocent victims, who were known to be innocent by many at the CIA. It is believed that nearly 25% of the victims were totally innocent, which created no problem for Vice President Dick Cheney but should have bothered the first recipient of the ACLU’s prize for contributions on civil liberties in 2013.
The International Criminal Court (ICC) prosecutor is studying a US Senate report on the CIA's torture of terrorism suspects “very, very closely”, she told Middle East Eye on Thursday.
Three months after the Senate report was released, Georgetown University Law Center Prof. David Cole emphasized a major new piece of the issue.
[...]
What is new? John Yoo, a former US Department of Justice lawyer, has been famous – or infamous – for some time for writing various memoranda justifying stretching international law with new interpretations that could justify the new techniques.
Poland will respect the sentence of the Human Rights Tribunal at Strasbourg and pay compensation to victims of torture at CIA “black sites”, Foreign Minister Grzegorz Schetyna said.
A federal judge dismissed a former CIA operative’s lawsuit alleging he was subject to a “hostile work environment” and discriminated against because of his disability and race. The judge decided the CIA had appropriately made a state secrets claim and there was no way to litigate the case without creating “substantial risk” to “national security.”
The Miller Center hosted an event Friday titled “The CIA and the Question of Torture: Reading the Senate Report on the CIA’s Detention and Interrogation Program.” The program included a panel of professional experts who debated the significance of the Senate’s recent torture report and placed them into broad historical context.
CIA whistleblower John Kiriakou is more than three weeks into an 86-day term on house arrest. He was released from a federal “correctional” institution in Loretto, Pennsylvania, in early February.
Kiriakou pled guilty to violating the Intelligence Identities Protection Act (IIPA), but it was not until he spoke up about waterboarding being torture in an interview in 2007 that he became a target for prosecution. He maintains, while what he did was wrong, he was the subject of a selective and vindictive prosecution.
Marc Levin’s documentary Freeway: Crack in the System premieres tonight on Al-Jazeera America. Here, he writes about Freeway Rick Ross’s connection to Selma and a generation of prisoners.
Were the atrocities committed by the CIA following the horrific events of 9/11, which have now come to light, enhanced interrogation or torture? They were neither. They were unmitigated sadism and unabashed sexual sadism committed by opportunistic psychopaths employed by the CIA. These individuals included CIA officials, government contractors and psychologists.
The CIA has declassified a list of songs they used as part of their systematic methods of torture and interrogation. The surprising list features songs by Prince, Matchbox Twenty, Eminem, The Bee Gees and Metallica.
Rights group Amnesty International on Tuesday urged five European countries to come clean on alleged cooperation with CIA operations involving torture and help bring those responsible to justice, AFP informs quoted by interantional media.
Here’s what we learned from the release of the US Senate’s report on the CIA’s use of torture: the agency tortured some people, in the president’s flippant phrase. More than a few people it turns out, though we probably will never know exactly how many.
The techniques of torture were brutal, even sadistic. Though, again, the most barbarous measures have been redacted from public disclosure. The CIA learned almost nothing of value from these heinous crimes. More strikingly, the agency didn’t expect to pry out any fresh intelligence. Instead, what the torturers wanted most desperately was to extract false confessions, writhing accounts of fantastical ties between Saddam Hussein and Al Qaeda, linking Iraq to the 9/11 attacks, that could be used retroactively to justify a phony war. Thus does one crime feast on another.
But here’s the rub. We still know much less than we know about the government’s torture programme. And that’s not just because two-thirds of the CIA report remains sequestered at Langley. Why? To protect sources and methods? Hardly. You can find those easily enough in any book on the Spanish Inquisition. The techniques haven’t changed that much in five centuries. Just add a few jolts of electricity.
While the CIA wants to keep the details of its torture methods cloaked in mystery, the agency was very happy to let the fact that it was torturing prisoners of its covert operations slip out. Partly this was intended to send a message to the agency’s enemies, that terrible torments were going to be inflicted on the bodies and minds of anyone would stood in its way: from Jihadis to Edward Snowden, if they could just lay their hands on him.
...first time we can properly scrutinise a trade agreement negotiated on our behalf is when the terms of the agreement are already locked up.
In recent weeks customers of UK ISPs have received letters from copyright trolls demanding settlement for alleged downloading of movies. Today they can fight back. Southampton-based lawyer Michael Coyle informs TorrentFreak that if the accused make a charitable donation in support of his London Marathon run, he will provide his time for free.