12.06.13
Posted in Action at 10:30 am by Dr. Roy Schestowitz
-
Recently, I committed support for a new authenticated encryption cipher for OpenSSH, chacha20-poly1305@openssh.com.
-
The 5½ minute video was made by Brian Knappenberger. Knappenberger is no stranger to tackling controversial internet subjects related to security and privacy, having previously made the documentary “We are Legion”, about Anonymous.
He is currently making another documentary about internet activist Aaron Swartz, who killed himself in January 2013 after he was charged with using MIT’s network to grab millions of articles from the non-for-profit academic journal archive JSTOR, with the aim of republishing them without restriction.
-
The video, which is part of the newspaper’s Made Simple series, uses fairly simple animation and a jazzy soundtrack to make a fairly complex topic accessible. By avoiding jargon, the video also does a pretty good job of explaining what implications this kind of surveillance has for every day web users.
-
MuckRock has been filing dozens of FOIA requests in hopes of freeing up info on the many contractors employed by the NSA. Unsurprisingly, this has met with little success. While it did manage to secure 16 pages on French security firm Vupen, its other requests have been met with claims that no responsive documents have been found. This is hard to believe considering some of the requests are about known NSA contractors.
-
Yesterday the 2014-2019 defense bill passed first reading in the French National Assembly. It marks a strong shift towards total online surveillance. If passed, the bill will not only allow live monitoring of everyone’s personal and private data but also do so without judicial oversight, as the surveillance will be enabled through administrative request. The bill also turns permanent measures that were only temporary.
-
Some German politicians and lobbyists have been pushing for some of Europe’s technology companies to group together and create separate IT infrastructure from US-based or US-controlled systems. These calls have come in light of concerns about US intelligence agencies’ surveillance of data held by US technology companies.
-
Uppdrag granskning (Mission Investigation) and SVT is the first Swedish news outlet to get access to documents concerning Sweden leaked by whistleblower Edward Snowden, who left the American organization for surveillance, NSA (National Security Agency) in May this year.
-
Corporate spies for Dow, Kraft and others have tried to discredit, shame and infiltrate civic groups using an array of dirty tricks.
-
When Edward Snowden unleashed the flood of classified documents and surveillance data secreted from U.S. spy agencies earlier this year, it is unclear if he anticipated the high-level damage it would do to U.S. international relations.
Headlines have focused on irate calls by heads of state to President Barack Obama and parliamentary moves to restore privacy. Diplomats have been summoned to repair fractured relationships.
-
-
-
-
US President Barack Obama, a well-known BlackBerry fan, has said that he’s not allowed to have an iPhone for “security reasons”.
In a speech at the White House promoting his healthcare changes to a youth audience, Obama said that he couldn’t use an iPhone, though he joked that his daughters seemed to spend a lot of time on theirs.
-
While the facility will feature state of the art technology and security measures, at the end of the day, like any other building, the data center will rely on local utilities, and local opponents want to cut it off from the grid. Advocacy groups, which have formed the OffNow coalition, are pushing for state legislation that would cut off utilities to the NSA’s new data center being built in Bluffdale, Utah. The argues that the NSA’s electronic snooping violates the Fourth Amendment, which protects against unwarranted searches and seizures, and proposed state legislation known as the 4th Amendment Protection Act would prevent the local government from supporting the building with local utilities.
-
-
If the National Security Agency says that it is not “intentionally” doing something—say, collecting records of the locations of Americans’ cell phones—then it is almost certainly taking that very action.
If it says it is doing so “incidentally,” it’s probably doing so on a large scale. If it adds that said effort does not “target” Americans or isn’t “directed” at them, that means it doesn’t believe those Americans—or Congress, or the courts—should mind, because the N.S.A. analyst who entered a search term or tapped into a mobile-network cable had first closed his eyes and thought about terrorists.
-
-
-
-
-
-
-
The website of the National Security Agency (NSA) went down on Thursday in what is at least the second instance of such an outage since former government contractor Edward Snowden began releasing classified documents about the agency’s surveillance activities earlier this year.
-
NSA surveillance allegations have led to countries questioning the country’s commitment to Internet freedom, a former Obama official says
-
Permalink
Send this to a friend
12.05.13
Posted in Action at 12:14 pm by Dr. Roy Schestowitz
Summary: Governments (which are dominated by corporations) continue to make security hard as part of a campaign to spy on everyone under claims that it helps “national security” (control from above)
I
T OUGHTN’T BE so shocking that empires rely on a lot of spying; they require remote penetration (infiltration, informants, eavesdropping, etc.) in order to deter against possible uprise — a challenge to their often-illicit colonisation and/or domestic imposition of power. The negative influence of Western policies (Anglo-Saxon in particular) on security and privacy of Free software products is only to be expected. We need to understand it if we wish to circumvent it.
No company has helped the NSA like Microsoft has. The only ‘competition’ to Microsoft in this respect are the telecom giants. Microsoft launched a new AstroTurfing campaign, trying to convince us that Google is worse even through it’s not. Microsoft is using privacy as an advantage point, falsely believing that the public is not smart enough to realise that Microsoft has been in bed with the NSA for over a decade. As one blogger put it, Microsoft’s “Scroogled” line of anti-Google T-shirts, mugs and other novelties “was guaranteed to be an instant collector’s item when it was first designed because of what it says about Microsoft — that they’re running scared [...] When you have to resort to mudslinging instead of simply competing, it’s clear that you’re playing catch-up.”
But wait, how privacy-respecting is Linux really? Well, unlike GNU, Linux is now developed to a large degree by US corporations that also work with the NSA. Google, which has made somewhat of a joke the notion of privacy on devices running Linux, is only one of them. Red Hat too is working with the NSA and based on this news about a Red Hat partner, the relationship only gets somewhat stronger. As one site put it, a the CIA is now involved, not just Red Hat partners and former staff. Ubuntu too makes mockery out of privacy, especially because of its arrangement with the CIA’s datacentre partner, Amazon (the CIA says is strives to collect all data and never delete it). Based on Snowden’s leaks, the NSA/CIA uses spying on porn surfing in order to discredit activists it does not like, so knowing what they search for on their desktop would help too. What happens when those agents are also getting the historical locations of activists, going many years back (hence knowing where they have been, not only who they spoke to)? Here is some sobering news, confirming what we knew but could not prove. This was originally covered by the Bezos (of Amazon)-owned Washington Post last night:
-
The National Security Agency is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world, according to top-secret documents and interviews with U.S. intelligence officials, enabling the agency to track the movements of individuals — and map their relationships — in ways that would have been previously unimaginable.
-
That little “entertaining” cell phone in your back pocket, which you are so addicted to thanks to all its apps, videos, messaging function and all other cool bells and whistles, that you can’t possibly live without? It is simply the definitive NSA tracking beacon used to find where you are at any given moment. The following infographic explains how the NSA does just that…
Western powers don’t seem to think that anyone in the world has privacy rights. Linux is originally from Finland (now developed in the US), GNU being all along from the US (MIT). In a way, these two projects have become targets of the nation they are currently made in. Developers seem to be aware of it.
Cisco, the giant whose sales in China are collapsing because of NSA connections, is buying some Free software projects, including those which facilitated private chats (Jabber). Here is an item from the latest news: “Newly absorbed, acquired and assimilated by Cisco for its cyber security prowess, Sourcefire remains a subsidiary company under its own brand name.”
Cisco is monopolising security and insecurity; this is not good. And there are also complaints (even from Linux developers) about Intel and random number generators, arguing that work is being done to subvert security in Linux and by extension in SSL. And just consider what Intel has done with ‘secure’ boot, making it so much harder to set up GNU/Linux and possible to remotely brick PCs. As one UEFI critic out it the other day, it may lead more people to Windows. “My attempt at installing Mint 16 on a UEFI system with Ubuntu has had some – at best – mixed results,” he said.
We could go on to IBM with TPM and other companies whose agenda, which is tied to forums that the NSA is a part of, makes the world a vulnerable place. It’s about control (by the top 1% or less), not control by users. And it ought to worry everyone. Free software is supposed to be about emancipation from control by others (“masters”), so Free software is in jeopardy now. █
Permalink
Send this to a friend
12.04.13
Posted in Action at 5:16 am by Dr. Roy Schestowitz
The NSA’s Stuxnet 2.0 is said to be under development
Summary: A roundup of news about cracking, sabotage, privacy infringement and illegal surveillance by the NSA and its allies
TRUTH be told, the NSA stories are starting to dry up. Almost 6 months after it all began there is finally some sense that we know almost everything that’s worth knowing. So what are the latest revelations? Well, not much, but there are some news items enumerated below and we’ll try to summarise them.
The Chinese press says that German companies/authorities no longer trust smartphones that are tied to the US [1]; espionage is a concern. China itself is pulling away from dependence on US technology giants [2,3]. They should really pull out of Windows/Microsoft dependence, not try to extend this dependence [4]. Apple is just as bad [5] and Facebook is a “monstrous surveillance engine” (to quote Richard Stallman) which now targets students [6]. GNU/Linux is a much safer option.
The corporate media in the US continues to cover these issues, but sometimes it’s done in the context of comedy [7] even though these are very serious issues that extend beyond the digital world [8] and merit investigations. The political debate in the UK [9] and US [10] sure is changing and in the rest of Europe there are threats of cutting data-sharing ties [11,12].
Jimmy Wales has harsh words for the NSA [13], which may be going much further and deeper than we even realise [14,15]. Even immigration may be a matter of “national security” (as in “terrorism” etc.) now [16]. Read the shocking details about infiltration into medical records for immigration purposes.
Good people are trying to explain to the world why it is a big deal [17-19], with even the BBC covering these issues by giving a platform to the ‘British Snowden’ [20]. The British government is meanwhile embarrassing itself by taking its assault on the press public [21-24]. International relationships are affected by the revelations [25-30] and Linux-based solutions for privacy-seeking users gradually appear [31]. Domestic surveillance, as it turns out [32], has become just as bad if not worse than foreign surveillance [33]. The United Nations recently got involved [34-37] and “Switzerland Launches Criminal Probe Into NSA Surveillance,” says one article [38] (the only English article of this kind). A lot of what we know about security is being reassessed [39,40] while corporate media like Murdoch’s WSJ continues to distort the facts [41,42,43], along with the NSA itself [44-46]. WSJ did the same thing to smear and malign Wikileaks back in the days.
There are some new attacks on the messenger, Glenn Greenwald [47-49], and The Guardian says that even the MI5 is now being pulled into interrogations [50]. The Japanese press reprints The Guardian [51] while observing with glee how Britain burned and dumped ‘embarrassing’ colonial documents in Singapore [52] (where Japan committed huge atrocities).
Readers may recall the many calls for the assassination of Julian Assange. Well, right now the corporate press is using similar arguments against Edward Snowden [53]. They really have no shame.
It is possible that in 2014 there will hardly be any major revelations about the NSA, but the important thing is that we now know a lot more about our world and we have documents to prove previously-doubted claims. Dan Gillmor, writing back in July, worried about our privacy on the Web [54] and back then (also July) people wondered what could be done about it [55,56]. Well, now that we know all that stuff which Snowden helped reveal we ought to understand that Free/libre software is essential and encryption on the Web (even at DNS level) is imperative. Whether people, companies and governments will change their existing habits next year is another matter altogether. They can’t use ignorance as an excuse anymore. Snowden’s greatest fear was that his leaks would not have an impact.
The NSA’s crimes are not just about privacy by the way. They are about physical sabotage too, as [57] helps remind us. Stop the vandals, defund the shut down the NSA. █
Related/contextual items from the news:
-
Telecoms firm has big hopes for secure-smartphone business after the news of US snooping on German leader’s calls, but device isn’t cheap
-
The NSA spying scandal has put a strain on the China business of Cisco and Qualcomm, the companies said recently
-
Cisco Systems, one of the largest networking equipment sellers in the world, has been losing major business in the wake of the NSA spying scandal. The company has publicly blamed the NSA for sowing distrust between American technology companies and the rest of the world – potentially costing them billions.
-
-
This possibly applies all mobile device makers and app writers. In fact it was not Apple but apps such as Dictionary.com, Pandora, the Weather Channel and Backflip – creator of the Paper Toss app, that collected and passed on to third party ad networks “Confidential data including users’ geographic location, age, gender, income, ethnicity, sexual orientation, and political affiliations.”
-
Code.org—a tech non-profit backed by Mark Zuckerberg, Jack Dorsey, and other top brass—wants to improve computer science education for young women and minorities. And hey, that’s great. But it wouldn’t be a Zuck joint without something insidious: the group will hold private data about kids for years.
The initiative is trying to sign up entire school districts to test the curriculum: Code.org will provide schools with course materials, teacher stipends, and general support. What a deal!
-
In “The Word” segment of Colbert’s show Rogers sets out an astounding defense of NSA surveillance.
-
-
Lord Macdonald says that ISC ‘needs more power, cash and opposition chair’
-
The United States Congress is working on legislation to restrict the intelligence-gathering activities of the National Security Agency (NSA), a group of American lawmakers told the European Parliament’s foreign affairs committee on Tuesday (26 November).
-
-
After Edward Snowden revelations, EU executive underlines US compliance with European law and ‘how things have gone badly’
-
The Wikipedia founder believes the recent revelations about spying by western governments will only give oppressive regimes more reason to censor the internet.
-
Someday, the unraveling of the National Security Agency’s spying on virtually everyone might make a great spy movie. In the latest revelation, there are reports the secretive federal agency may have tapped Google and Yahoo through major Internet backbone providers.
-
We may think we’re used to the potential harms of sharing too much data on social networks, but what happens when passive data collection from sensors can be shared –sometimes without your knowledge?
-
Disabled woman denied entry to U.S. after agent cites supposedly private medical details
-
-
Reacting to the leaked documents detailing the proposed Data Protection Regulation, ORG Executive Director Jim Killock warned that ‘pseudonymous’ categories of data could create privacy problems for EU citizens.
-
-
Here’s a recent interview I did for BBC World about the three top British spies deigning, for the first time ever, to be publicly questioned by the Intelligence and Security Committee in parliament, which has a notional oversight role…
-
Editor tells parliamentary committee that stories revealing mass surveillance by UK and US have prompted global debate
-
-
-
Living in self-imposed exile in Russia, former National Security Agency contractor Edward Snowden may be safely beyond the reach of Western powers. But dismayed by the continued airing of transatlantic intelligence, British authorities are taking full aim at a messenger shedding light on his secret files here — the small but mighty Guardian newspaper.
The pressures coming to bear on the Guardian, observers say, are testing the limits of press freedoms in one of the world’s most open societies. Although Britain is famously home to a fierce pack of news media outlets — including the tabloid hounds of old Fleet Street — it also has no enshrined constitutional right to free speech.
-
By targeting allies and enemies alike, the ‘Five Eyes’ club of English-speaking powers have eroded trust on the world stage
-
Germany’s opposition party, the Social Democrats, is gauging whether or not the European Union should approve a free-trade deal with the US CNN recently reported, “Negotiations on the Transatlantic Trade and Investment Partnership were already in a fragile state and will not be helped by claims that large French corporations such as telecom company Alcatel-Lucent have been targeted by the NSA.”
-
• Australia’s surveillance agency offered to share information collected about ordinary Australian citizens with its major intelligence partners, according to a secret 2008 document leaked by the US whistleblower Edward Snowden.
-
Even GCHQ and the NSA know their work may not be sustainable without a proper debate about their power
-
The Snowden revelations may not end internet surveillance, but they will certainly cause radical changes
-
-
Safeplug is a new network device from Cloud Engines, Inc., the company behind Pogoplug.
Using Tor, Safeplug allows you to browse the Internet anonymously from any device that you own. This is possible because it is designed to be connected to your router. And once activated, all connections that originate from any device behind your router are anonymized.
-
This is a long article about the FBI’s Data Intercept Technology Unit (DITU), which is basically its own internal NSA.
-
But the C.F.A.A.’s broad guidelines for calculating “loss” mean that digital protests often result in much harsher penalties than their real-world analogues in the U.S. For example, most of the seven hundred Occupy Wall Street protesters who were arrested for blocking off the Brooklyn Bridge in October, 2011, received a night in jail plus a small fine. But for their D.D.O.S. disturbance, the Paypal Fourteen are each facing up to fifteen years in prison, with a plea deal possible only if thirteen members of the group comply.
-
UN’s senior counter-terrorism official says revelations ‘are at the very apex of public interest concerns’
-
The National Security Agency’s global spying activities have prompted 21 countries to pursue a resolution at the United Nations against the United States. Brazil and Germany presented this resolution to the General Assembly, appealing to the right to privacy enshrined in the international Covenant on Civil and Political Rights.
-
-
-
The Swiss Federal Prosecutor’s Office has launched a criminal investigation into mass surveillance conducted by the US intelligence agencies.
According to the Swiss Broadcasting Corporation, the National Security Agency (NSA) could have violated article 271 of the penal code, which lists “unlawful activities on behalf of a foreign state”.
-
Revelations about the extent of the surveillance programmes undertaken by the NSA and GCHQ – as well as their efforts to undermine online security and encryption – have provoked fierce reaction around the world, sparking technical innovations, legal challenges, and moves towards political reform.
-
If tampering isn’t your style, why not put the backdoor in plain sight? That’s the approach NSA took with the Dual_EC RNG, standardized by NIST in Special Publication 800-90. There’s compelling evidence that NSA deliberately engineered this generator with a backdoor — one that allows them to break any TLS/SSL connection made using it. Since the generator is (was) the default in RSA’s BSAFE library, you should expect every TLS connection made using that software to be potentially compromised.
And I haven’t even mentioned Intel’s plans to replace the Linux kernel RNG with its own hardware RNG.
-
We actually have a specific example that proves Snowden’s point. As the New York Times reported in 2009, an NSA analyst “improperly accessed” former President Bill Clinton’s personal email. More recently, we’ve learned that the NSA analysts abused the agency vast surveillance powers to spying on ex-spouses or former lovers.
-
-
-
Document released just before holiday season includes disputed claims about spy agency to share with ‘family and close friends’
-
-
-
No person in recent memory has succeeded in creating so big a misunderstanding within the global policy elite as Edward Snowden, the NSA whistleblower who has drawn attention to US’s spying activities across the world.
-
Glenn Greenwald responded Sunday to accusations from news personalities that he has “monopolized” and “privatized” reporting (an accusation that seems to be newly cooked up for the purpose of discrediting journalists) on documents given to him by former NSA contractor Edward Snowden.
-
-
-
-
-
-
We use ratings for all kinds of services, so let’s try scoring the way we use the internet to check on our security and privacy
-
That is the worst case scenario. Yes, the NSA is definitely slurping up scads of information about your phone calls. It probably isn’t storing your Facebook chats, emails, and Skype calls. Our goal with this guide is to detail exactly what you need to do to assure that it can’t, even if it wants to. As you will see, it is a cumbersome process.
-
-
It is currently unclear if the Farsnews report is accurate, though director of security strategy at FireEye Jason Steer said it is certainly plausible.
“Given that this has already happened with Stuxnet, it is certainly more than plausible to believe that Stuxnet 2.0 is also possible. One would be naive to assume it wouldn’t happen again. With the change in relationship between Iran and the US, it is highly likely that Israel and Saudi Arabia united to try and negate the threat of nuclear bombs on their front door,” he said.
The original Stuxnet worm hijacked control of Siemens industrial control systems, then forced them to alter key processes to damage machinery. The malware has since managed to spread outside of Iran and has affected several other power plants, some close to Europe.
Steer told V3 that, given how successful the original Stuxnet was at spreading, the fallout of a more advanced variant could be devastating for power plants, but will be of little concern to most regular businesses.
Permalink
Send this to a friend
12.03.13
Posted in Action at 8:52 am by Dr. Roy Schestowitz
Drones don’t just kill “targets”
Summary: How a culture of unprecedented violence leads to less security and more hostility towards the West
THE Russian press is having a day field. Violence in the United States is not just rising domestically (“A high school student suffered a brain injury and remains in a medically-induced coma after a Texas sheriff’s deputy tasered him,” according to this report) but also in other nations. Drones which are run by the CIA (targeting people the NSA staff chooses) are invading countries and blasting a lot of people, not just “targets” which the NSA selects (based on electronic communications and profiling, not a trial). Even the US corporate press is starting to provide coverage of the anti-drone movement [1]; the same goes for British corporate press [2], which is trying to give the other side of the story. In the Washington Post (close ties to the government and the CIA) yesterday there was a piece calling the drone war “immoral” (it’s actually illegal), attributing it to Obama although it’s Bush who started it.
Maybe one day it will be realised that giving children guns as toys (in a holiday that is supposed to be about birth), tasering children and killing children abroad with overpriced Hellfire missiles is just fueling the United States’ enemies and in no way serves the national interests (a.k.a. “National Security”) of this nation. That’s just what happens when paramilitaries take over a country. Feuds cannot be ended using violence; negotiation is needed and people who left the CIA say that negotiation did work. It’s just not as profitable as war. █
Related/contextual items from the news:
-
Proponents argue that drones offer an efficient way of fighting al-Qaeda in the Arabian Peninsula, a Yemen-based affiliate of the global terrorist network. The Yemeni President Abd Rabbuh Mansur Hadi has endorsed the program, praising ongoing U.S.-Yemen counterterrorism cooperation and the “high precision that’s been provided by drones.” Human rights activists in Yemen and the families of many victims are outraged by the so-called “drone war” in the country, which the Bureau of Investigative Journalism estimates has resulted in between 21 and 56 civilian deaths. Aside from more conventional methods of protest – such as demonstrations, media campaigns, and the production of often scathing reports – activists are increasingly employing art as a medium through which to express their anger.
-
-
U.S. drone attacks in Afghanistan, Pakistan and other countries may be militarily effective, but they are killing innocent civilians in a way that is obscene and immoral. I’m afraid that ignoring this ugly fact makes Americans complicit in murder.
It is understandable why President Obama has made drone attacks his go-to weapon in the fight against terrorists and the Taliban. Armed, pilotless aircraft allow the CIA and the military to target individuals in enemy strongholds without putting U.S. lives at risk. But efficacy is not legitimacy, and I don’t see how drone strikes can be considered a wholly legitimate way to wage war.
Permalink
Send this to a friend
11.30.13
Posted in Action, Intellectual Monopoly at 2:55 pm by Dr. Roy Schestowitz
Summary: The problem known as “piracy” is an antiquated problem from history, tales, and Somalia, not people who challenge the real thieves — those who hoard and monopolise what’s public
AN interesting new report says that propaganda words like “piracy,” “theft” and “stealing” (often used to imply guilt of serious crimes) are to be banned from a court in the context of copyrights [1]. Copyrights, after all, are about copying; the word isn’t pronounced ‘theftrights’. Might we finally see fact-based judgment as a result? Will judges not be tempted to get carried away and wrapped up in misconception spread in the corporate media by its monopolistic owners? Let’s hope so.
As the “Pirate Party” founder reminds us, the real thieves are those who take away from society at the expense of artists [2] (take, not copy), sometimes at the expense of the public sector or the public domain [3].
The so-called ‘IP’ cartel continues to be run by selfish sociopaths who think they are above the law (or simple are the law) and treat even their own employees like cattle [4. They would go as far as using terms like “Pirate Sites” [5] to describe sharing sites which businesses may use to transmit files and individuals may use to store their own (self-created) media. We need to stop the attack on sharing and one important step is abolishing the use of propaganda words. Judge Kathleen Williams is awesome. █
Related/contextual items from the news:
-
Leading up to the trial, Hotfile has scored several significant wins against the MPAA. The Florida federal court ruled on several motions this week, and many went in favor of the file-hosting service. Most prominently, Judge Kathleen Williams decided that the movie studios and its witnesses are not allowed to use “pejorative” terms including “piracy,” “theft” and “stealing” during the upcoming proceedings.
-
Copyright maximalists want all sorts of new laws to “help authors get paid”. Well, I’m a published author, and all their efforts to “help” cost me money. Even if we strictly limit the argument to printed books, copyright maximalists still only succeed in harming authors and publishers. This is how.
-
It’s as if they lifted the plot right out of a Cory Doctorow novel. In Maryland, the Prince George’s County Board of Education is considering a proposal that would allow the school system to copyright ownership of all work created by students and teachers. The sweeping intellectual property grab could mean that anything from a drawing to an app to a lesson plan would become the property of the school system, not the creator.
-
Francis Gurry, the head of the World Intellectual Property Organization, seems to be running from scandal to scandal these days. While it has shown brief moments of enlightenment, for the most part, WIPO tends to be an organization very supportive of the copyright and patent maximalist agenda. Last year, we wrote about two incredible scandals that directly involved Gurry.
-
While its common for search engines to receive DMCA takedown requests for specific URLs, events in France have taken things to a whole new level. In order to protect the copyrights of film producers, the High Court of Paris has concluded a 2011 case by ordering Google, Microsoft and Yahoo to completely de-list 16 video streaming sites from their search results.
Permalink
Send this to a friend
11.28.13
Posted in Action at 9:18 am by Dr. Roy Schestowitz
Book burning in Chile following the 1973 CIA-backed coup that installed the Pinochet regime
Summary: Book burning (in the digital sense) is still practiced in Western nations, but those nations are adept at hiding it or justifying it
THE corporate media in the United Kingdom has been advocating online censorship for quite some time. Of course they throw all sorts of speech under the bus, labeling it all “extremist” [1]. In Facebook, a platform of censorship (some views are not permissible), the suppression of free speech continues to get worse [2], but somehow we’re led to believe that Internet censorship is only a problem in China, Russia, Iran, and so on (rivals of Western ideologies other than the money ideology).
While it is true and it is still evident that there is censorship in places like Russia [3] and Iran [4], here in the West we have similar restrictions that the newspapers don’t quite tell us about. Our ISPs are silently blocking many sites [5-6] for corporate reasons (nothing to do with “extremism”) and our governments spy on us like nowhere else, sometimes in order to facilitate blackmail against those with "extremist" (i.e. different/dissenting) views. It is a form of retribution [7].
Censorship is a global problem. Western nations are part of it. █
Related/contextual items from the news:
-
The government is to order broadband companies to block extremist websites and empower a specialist unit to identify and report content deemed too dangerous for online publication.
The crime and security minister, James Brokenshire, said on Wednesday that measures for censoring extremist content would be announced shortly. The initiative is likely to be controversial, with broadband companies already warning that freedom of speech could be compromised.
-
A California fitness trainer and mother of three was banned from Facebook for 48 hours after she published a post last week which was highly critical of a Curvy Girl Lingerie marketing campaign promoting body confidence in plus-sized women.
-
Index on Censorship tracked websites blocked by the Russian government under a law intended to combat child pornography. Among the materials banned: anti-Putin articles, Mein Kampf, content related to drug use, gambling, and suicide, and—of course—an icon of jailed band Pussy Riot.
-
Global Voices Advocacy’s Netizen Report offers an international snapshot of challenges, victories, and emerging trends in Internet rights around the world. This report begins in Iran, where Cryptocat, a user-friendly browser-based chat encryption tool envisioned as “cryptography for the masses,” was blocked last week. A blog post about the blocking reminded users that Cryptocat is “experimental software” that is “not guaranteed to protect you from excessively serious situations, such as government targeting, physical spying, or computer backdoors.” Heed that, kitty cats.
-
ISPs have condemned negotiations on a potential update of Swiss copyright law that is being influenced by the U.S. Government and entertainment companies. According to the ISPs the secret anti-piracy discussions, from which they were excluded, have so far yielded “useless” proposals including web blocking and file-sharer warnings. “We reject the monitoring of Internet traffic on principle,” a spokesman said.
-
In legal advice to the EU Court of Justice, Advocate General Pedro Cruz Villalón today announced that EU law allows for Internet service providers to be ordered to block their customers from accessing known copyright infringing sites. The opinion, which relates to a dispute between a pair of movie companies and an Austrian ISP over the now-defunct site Kino.to, is not legally binding. However, the advice of the Advocate General is usually followed in such cases.
-
FILESHARING MAGNATE Kim Dotcom reckons that a donation to Wikileaks kicked off all the trouble that saw his Megaupload service shut down.
Dotcom, who lost Megaupload but launched Mega a year to the day later, has been profiled in a book. We’ve not seen it yet, but Torrentfreak has. It reported that Dotcom said that a €20,000 tribute sent to Julian Assange’s Wikileaks could have triggered his problems.
David Fisher’s book, “The Secret Life of Kim Dotcom – Spies, Lies and the War for the Internet”, was written with access to Dotcom and reveals new information about a colourful character who lives in the spotlight.
Permalink
Send this to a friend
Posted in Action at 8:59 am by Dr. Roy Schestowitz
Summary: New scandals involving the NSA, including COINTELPRO-like targeting by the NSA
RECENT bombshells from Snowden et al. revealed a high degree of criminality in the NSA, which infects computer networks [1]. Perhaps they can no longer accuse China of doing such things. But to what degree have governments other than the United States’ played in all this? Well, there’s allegation that Canada’s government is now part of the same institutional corruption [2]. Other US allies, even neighbours of China (where the majority of the nation is of Chinese descent), may be complicit [3]. The high degree of state surveillance [4] is being studied [5] and citizens in the United States (not to be confused with the government) want some answers [6,7,8] about the NSA’s facilities. Networks got compromised [9], essentially subverting any notion of security [10]. Now we have it confirmed that the NSA used information it had gathered for blackmail [11-14]. This is a huge deal as it makes complicit nations accomplices in the act. Back in the days of COINTELPRO, the FBI used surveillance in an attempt to drive Martin Luther King to suicide. █
Related/contextual items from the news:
-
A presentation slide provided by Edward Snowden and published by the Dutch media outlet NRC on November 23 shows that the NSA has infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive and private information.
-
The NSA used U.S. Embassy in Ottawa as command post during summits
-
-
With revelations of spyware planted on 50,000 networks, the “Five Eyes” states have been allowed to trample over their citizens’ privacy for far too long
-
The MetaPhone project asks volunteers to install an Android app that sends the researchers copies of a device’s call logs and basic data from a person’s Facebook account. The researchers say that a large collection of such data will make it possible to use data-mining techniques to discover which aspects of people’s lives—as recorded in their Facebook data—can be revealed by examining just their calling and texting logs.
-
-
-
Bluffdale agreed to sell water to the National Security Agency at a rate below its own guidelines and the Utah average in order to secure the contract and spur economic development in the town, according to records and interviews.
-
As other countries push for more control over the Internet, “you’re going to see national boundaries begin in cyberspace,” said Jason Healey, director of policy group Cyber Statecraft Initiative at the Atlantic Council, according to Bloomberg.
-
That’s not to say that the NSA has “broken” all cryptography: “the math works,” says Schneier, and while anonymizing tools like Tor are targeted by NSA, they seem to remain secure. Instead, the NSA appears to have manipulated encryption tools and tapped into data center links and fiber backbones—in essence, silently removing the hinges from their doors.
-
The US authorities have studied online sexual activity and suggested exposing porn site visits as a way to discredit people who spread radical views, the Huffington Post news site has reported.
-
-
-
The disclosures from the Snowden files keep on coming, with each revelation more disturbing than the last. The latest report reveals a plan by the National Security Agency to collected information on six people’s online activity, particularly their visits to pornographic websites, to discredit them within their community.
This is an example of “how ‘personal vulnerabilities’ can be learned through electronic surveillance, and then exploited to undermine a target’s credibility, reputation, and authority,” activist Glenn Greenwald wrote in the Huffington Post on Tuesday evening.
Permalink
Send this to a friend
Posted in Action at 8:33 am by Dr. Roy Schestowitz
Summary: Why the paramilitaries need to be chased out of the state, for they only reduce national security and increase human toll
Paramilitaries are typically the tools of tyrants, but now even the United States has them, and they’re out of control [1]. They do illegal things [2] and the government has no power or even the will to stop them. Those who expose the paramilitaries [3-7] say that the leaders should be tried for murder [8] of thousands [9].
Recent developments in Iran [10] teach us that the paramilitaries have lied to us [11]. The paramilitaries are torturing innocent people in pursuit of the threat that makes paramilitaries seem necessary and the paramilitaries won’t let the public know the truth [12,13,14]. It is rather telling. The paramilitaries just want to recruit some spies [15], so they detain innocent people (with strong opinions) and make a farce of the legal system [16]. The paramilitaries’ power is derived from our fears and the phantom enemies which they create by provocation (assassinating many people without trial). Those paramilitaries have ties with Wall Street and they would rather we focued on phantom enemies rather than on those who steal trillions of dollars from us (robbing us blind).
The Western states are being taken over by paramilitaries. We need to take the state back from them. In the next post we’ll show the latest NSA scandals (aside for playing a role in thousands of assassinations without trial). █
Related/contextual items from the news:
-
For a long time, the Central Intelligence Agency was in the otherwise quiet business of doing what still lingers in popular consciousness as the stuff of, well, the CIA: Intelligence gathering. Data collection, sifting, and analysis. You know, wonky spy shit.
-
“When armed drones kill unarmed, innocent civilians, there is a clear breach of international law,” Ambassador Masood Khan said while explaining Pakistan’s position on the draft approved by the General Assembly Third Committee which deals with social, humanitarian and cultural questions.
-
-
-
The Pakistan political party led by former cricketer Imran Khan has named a man it claims is the CIA’s top operative in the country and called for him and the head of the agency to face trial over a recent missile strike.
The CIA would not confirm the Islamabad station chief’s name and declined to comment on the move by the Pakistan Tehreek-e-Insaf party.
-
-
-
-
-
Here’s a recent interview I did about the recent Iran nuclear deal, adding some context and history and trying to cut through some of today’s media myths
-
It’s been hailed as a breakthrough agreement that could thaw Iran’s relationship with the West. Days of intensive discussions in Geneva resulted in concessions from Iran to reverse its nuclear programme in return for a reduction in economic sanctions imposed by the world’s powers. It’s a remarkable deal that a year ago no-one would have seen coming, least of all the writers of Homeland.
-
The ACLU filed the suit on Tuesday under the Freedom of Information Act (FOIA) demanding the Central Intelligence Agency release two reports about its post-9/11 “program of rendition, secret detention, and torture of detainees”
“This illegal program was devised and authorized by officials at the highest levels of government, and five years after it officially ended, the American public still doesn’t have the full story about some of the most devastating rights violations committed in its name,” the ACLU said in a statement.
-
This week, the American Civil Liberties Union filed the second Freedom of Information Act lawsuit intended to pry loose the Senate Permanent Select Committee on Intelligence study, as well as the CIA’s response. Judging from history, the dispute will take a long time to resolve. So far, moreover, courts often have assented when the president’s emissaries demand secrecy in the name of national security.
-
-
When prisoners began streaming into the prison on the U.S. naval base at Guantanamo Bay in January 2002, the CIA recognized it as an unprecedented opportunity to identify sources. That year, 632 detainees arrived at the island. The following year 117 arrived.
-
But he later told the court that, as the severity of the diversion became apparent, he tried to reverse this decision by telling air traffic control the men were “laughing and joking”.
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »