11.18.13
Posted in Action, America, Europe at 5:56 am by Dr. Roy Schestowitz


Photo from FreeJeremy.net
Summary: Presumption of innocence and fair trials are no longer respected all that much (Hammond judged/punished by the spouse of a Stratfor client)
WHERE minor offences can lead to disproportionately long jail sentences [1] there is a story about Hammond [2], whose case we alluded to the other day. He helped show how surveillance expanded to the private sector (Stratfor) to be used against protests. We should view surveillance as a weapon [3,4] and the ‘trial’ of Hammond as a mockery of the system (connections between the judge and Stratfor [5]). This trial was as unfair as the witchhunt against Aaron Swartz. Punishment against dissent is getting more harsh, potentially requiring no trial for a prison sentence [6,7]. European citizens should be worried about this because this kind of ‘legal’ system is silently entering the EU [8,9], led by the CIA and other aggressors who defend centres of power. Presumption of innocence is becoming a thing to be remembered and noted only in history lessons. Due to ‘national security’ we are told that presumption of innocence is worth abandoning or superseding in some cases. █
Related/contextual items from the news:
-
If this were happening in any other country, Americans would be aghast. A sentence of life in prison, without the possibility of parole, for trying to sell $10 of marijuana to an undercover officer? For sharing LSD at a Grateful Dead concert? For siphoning gas from a truck? The punishment is so extreme, so irrational, so wildly disproportionate to the crime that it defies explanation.
-
Jeremy Hammond, a 28-year-old political activist, was sentenced today to 10 years in prison after pleading guilty to participating in the Anonymous hack into the computers of the private intelligence firm Strategic Forecasting (Stratfor). The Ceremonial Courtroom at the Federal Court for the Southern District of New York was filled today with an outpouring of support by journalists, activists and other whistleblowers who see Jeremy Hammond’s actions as a form of civil disobedience, motivated by a desire to protest and expose the secret activities of private intelligence corporations.
-
If the NSA can hack Petrobras, the Russians can justify attacking Exxon/Mobil. If GCHQ can hack Belgacom to enable covert wiretaps, France can do the same to AT&T. If the Canadians target the Brazilian Ministry of Mines and Energy, the Chinese can target the U.S. Department of the Interior. We now live in a world where, if we are lucky, our attackers may be every country our traffic passes through except our own.
-
-
Jeremy Hammond’s lawyers plan to file a motion this week for Judge Preska’s recusal. Sparrow Media reported that Preska was made aware of the published connection between her husband and Stratfor and that her husband’s Stratfor-related information was published by Wikileaks, but “Preska indicated that this personal connection to the Hammond case ‘would not effect her ability to be impartial’.” A video from last week’s press conference featuring journalists, attorneys and civil liberties advocates is posted below.
-
The National Defense Authorization Act (NDAA) and its use of indefinite detention of U.S. citizens has brought liberals and conservatives together across the country. Lane County commissioners Faye Stewart, a conservative, and Pete Sorenson, a progressive, were able to agree on the issue at a recent meeting.
-
Ever since President Obama took office in January 2009, and almost immediately promised to close George W. Bush’s “war on terror” prison at Guantánamo Bay, Cuba, he has faced opposition from Congress. Lawmakers only took four months to begin passing legislation designed to tie his hands, and, in recent years, they have imposed restrictions of increasing severity designed to keep Guantánamo open, and to prevent any more prisoners from being released, for reasons that involve either hysteria, cynical fearmongering or bleak games of political football.
-
The European Court of Human Rights has rejected a request from the Polish government to exclude the press and public from a hearing next month into whether Poland hosted a secret CIA jail on its soil, the court said on Thursday.
The hearing in Strasbourg, scheduled for December 3, will be the first time an open court has heard the allegations that Warsaw allowed the United States to detain and interrogate al Qaeda suspects in a forest in northern Poland.
-
Permalink
Send this to a friend
Posted in Action, Microsoft at 5:11 am by Dr. Roy Schestowitz
Summary: A roundup of privacy-related news, with special focus on the role played by proprietary software in political espionage
SINCE Microsoft and the NSA are so close and we already know about NSA attempts to put back doors in operating systems, it should not be surprising that Microsoft Windows has a back door (more likely sevral) and Stuxnet was made possible to devise/deploy on Windows. Based on some news from Ars Technica [1], now that a lot of this shocking information is out there, Microsoft is trying to shift away from weak encryption (or breakable encryption), but it’s likely to be too late because Microsoft made such weakness a standard. “Microsoft is retiring two widely used cryptographic technologies that are growing increasingly vulnerable to attacks,” the article says. Further down the article notes: “The state-sponsored Flame malware that targeted Iran pulled off the only known in-the-wild collision attack earlier this decade. Using a never-before seen technique to subvert the MD5 algorithm, Flame-infected computers were able to pose as official servers belonging to Microsoft. By forging Microsoft’s digital signatures, the infected machines were able to trick uninfected computers into installing highly malicious software they otherwise would have refused. Microsoft has since decommissioned MD5 in its update system. Tuesday’s advisory indicates that the company is aiming to learn from that past incident by retiring SHA1 before it falls to the same type of attack.”
But why not assume that this weakness was the result of complicity (with the NSA) rather than an “incident” or some kind of accident? There are other bits of Microsoft software which gleefully invite the NSA in, e.g. Skype (incidentally, the researcher who showed it could be maliciously exploited has just died in an accident [2]).
We need to accept the fact that a lot of software is insecure by design. It’s designed to give power to particular parties, not the users. It’s an important distinction which helps show why proprietary software oughtn’t be trusted.
In other news, the United States’ “Internet Kill Switch” is back in the headlines [3] and countries like Germany are expected to have something to say [4]. Snowden’s E-mail provider is taking privacy up a notch [5] and Snowden’s leaks are said to be having an impact on privacy perceptions [6] because companies like Facebook [7], Google [8], and of course Microsoft do not protect users’ privacy at all. Facebook is notably worse because it helps the government train face recognition classifiers for people whose friends tag them [9]. In case of protests, for example, activists can be identified and named (which helps those who crush protests or intimidate protesters [10]).
There seems to be a shift motivating encryption of the Web [11] and rejection of proprietary software [12] because privacy rights are being misused [13-16], only making privacy advocates stronger and more popular [17]. In the UK, privacy abuses against foreign leaders [18] have been damaging, but not as damaging as the Streisand Effect caused by the attack on the press and on privacy advocates [19]. █
Related/contextual items from the news:
-
-
In 2006, while working for the EADS Corporate Research centre, he also put together a paper on how to exploit Skype to act as a botnet.
-
In a Freedom of Information Act case brought by EPIC against the Department of Homeland Security, a federal court has ruled that the DHS may not withhold the agency’s plan to deactivate wireless communications networks in a crisis. EPIC had sought “Standard Operating Procedure 303,” also known as the “internet Kill Switch,” to determine whether the agency’s plan could adversely impact free speech or public safety.
-
-
-
-
“Ads work the same way and just as with all of the content on Facebook, we show you which of your friends have interacted with something to make it more relevant to you,” Facebook chief privacy officer Erin Egan write in a post posted at 12:05PM ET on Friday
While Facebook made a point to clarify the new privacy policy, it’s actually changing very little about it — despite all the backlash the changes caused when they were initially introduced.
-
-
Identifying people from video streams or boatloads of images can be a daunting task for humans and computers.
-
On Halloween of this year, EFF and EarthRights International (ERI) filed an appeal in the Second Circuit (PDF) to protect the rights of dozens of environmental activists, journalists, and attorneys from a sweeping subpoena issued by the Chevron Corporation. And just last week, both the Republic of Ecuador (PDF) and a group consisting of Human Rights Watch, Automattic, a pair of anonymous bloggers, and academics Ethan Zuckerman and Rebecca McKinnon (PDF) filed amicus briefs in support of our appeal.
-
A vastly larger percentage of the world’s web traffic will be encrypted under a near-final recommendation to revise the Hypertext Transfer Protocol (HTTP) that serves as the foundation for all communications between websites and end users.
-
This could spawn migration to GNU/Linux on client and server in governments globally not just a few early adopters like Europe, China, India, Brazil and Russia. By next year there could be dozens of governments making the move. I advised Canada to do that years ago. They might have another idea now that USA is the biggest threat in the world to cybersecurity with documented attacks.
-
In criminal cases, defendants have a right to know what evidence the government plans to use against them and how the government gathered that evidence. This basic due process principle is essential: it allows defendants to test in court whether law enforcement officers obtained evidence in violation of the Fourth Amendment. But in a new legal brief, the government has refused to confirm or deny whether it relied on constitutionally questionable mass surveillance programs to gather evidence for a criminal prosecution.
-
From Pen America, cosponsored by the ACLU and the Fordham Law School Center on National Security, a talk on surveillance with James Bamford, Ariel Dorfman, Glenn Greenwald, and Bruce Schneier.
-
The CIA’s main business is sending operatives abroad to recruit spies and, especially since 9/11, chasing down terrorists for its target-hungry drone pilots. But NR, as it’s known, is the agency’s stay-at-home division. It’s nothing like Homeland, however, with operatives running about with guns in the D.C. suburbs (though its 1960s-era predecessors once spied on antiwar and civil rights activists and recruited Cuban exiles to harass Fidel Castro). It also works with the FBI and NSA in bugging foreign diplomatic missions there.
-
For me, this has been a perfect illustration of the positive aspects of the web. With the rampart commercialization of the Internet and issues such as advertisers tracking users surfing habits, the NSA’s gathering data on nearly everything that happens online and crackers trying to break into computers at every turn, it’s easy to come to the conclusion that the public network is nothing but a virtual space fraught with danger. But it’s also a place of great promise, as Charlie’s story so aptly demonstrates.
Twenty years ago, my roommate and her family would not be able to follow the progress being made by Charlie nearly so closely. They would’ve had to rely on bits and pieces of often unreliable, certainly incomplete, information picked up by word of mouth through phone calls. They would not have felt as involved with the situation as they now do either, which is also important.
-
Dark Mail alliance is the non-profit group formed by the leaders of Silent Circle and Lavabit.
Silent Circle offers a suite of secure, communication services, while Lavabit is the secure email provider used by Edward Snowden, the ex-CIA contractor now living in Russia.
-
Britain’s GCHQ intelligence service monitors diplomats’ travels using a sophisticated automated system that tracks hotel bookings. Once a room has been identified, it opens the door to a variety of spying options.
-
Permalink
Send this to a friend
Posted in TechBytes Video at 3:24 am by Dr. Roy Schestowitz

Direct download as Ogg (00:02:13, 7.3 MB)
Summary: Dr. Richard Stallman, the Free Software Foundation’s founder, comments on the practice of indefinitely detaining suspects or even killing them without establishing guilt
Made entirely using Free/libre software, heavily compressed for performance on the Web at quality’s expense
Permalink
Send this to a friend