SURVEILLANCE

The Greatest Threat to Our Freedoms: A Government of Scoundrels, Spies, Thieves, Ruffians, Rapists and Killers

“There is nothing more dangerous than a government of the many controlled by the few.”—Lawrence Lessig, Harvard law professor

The U.S. government remains the greatest threat to our freedoms.

The systemic violence being perpetrated by agents of the government has done more collective harm to the American people and our liberties than any single act of terror.

More than terrorism, more than domestic extremism, more than gun violence and organized crime, the U.S. government has become a greater menace to the life, liberty and property of its citizens than any of the so-called dangers from which the government claims to protect us.

This is how tyranny rises and freedom falls.
READ MORE: https://www.rutherford.org/publications_resources/john_whiteheads_commen...

Snowden casts light on NSA hack

The files released by a hacker group that claims to have breached the NSA are authentic, whistleblower Edward Snowden has said, explaining the documents’ importance and potential impact on the US elections and relations with allies around the world.

Over the weekend, a mysterious group called Shadow Brokers posted "samples" of files purloined from the Equation Group – widely believed to be a front for the National Security Agency – and said it would sell the rest in exchange for bitcoin. The NSA has yet to comment on the authenticity of the files.

Snowden, who blew the whistle on NSA surveillance operations in 2013, posted a series of tweets on Tuesday with his take on the hack.
READ MORE: https://www.rt.com/usa/356170-snowden-analysis-nsa-hack/

The Correct Way to Use DuckDuckGo Search Engine


Use DuckDuckGo for their bang searches, i.e. if you type !g followed by your query it will search google. This works for most any search engine or wiki. !reddit, !wikipedia, !gnews, !gh for github... it's great. Vanilla DuckDuckGo results are certainly lacking but that's not the main use for it.
MORE: https://www.reddit.com/r/conspiracy/comments/4xu7wg/avoid_feeding_the_be...

WikiLeaks to release 'pristine copy' of NSA cyberweapons hack data

As the dust settles, following the suspected breach of an elite NSA-linked hacking unit dubbed the Equation Group, which potentially exposed a number of cyberweapons used by US spooks, whistleblowing outfit WikiLeaks has claimed it will publish a 'pristine' version of the data online for the world to see.

The cyber-espionage toolset, which was first teased online by a mysterious group calling itself The Shadow Brokers, contains what purports to be NSA exploits previously used by the agency to target computers, firewalls and routers. After releasing one file as proof of legitimacy, the hackers opened an auction and demanded one million bitcoin — the equivalent of at least $550m – to hand over the rest.
READ MORE: http://www.ibtimes.co.uk/wikileaks-release-pristine-copy-nsa-cyberweapon...

The NSA Hacking Team Known as the "Equation Group" Appears to Have Been Hacked and Their Advanced Hacking Tools Have Been Leaked Online

The leak over the weekend of advanced hacking tools contains digital signatures that are almost identical to those in software used by the state-sponsored Equation Group, according to a just-published report from security firm Kaspersky Lab.

Group claims to hack NSA-tied hackers, posts exploits as proof "While we cannot surmise the attacker's identity or motivation nor where or how this pilfered trove came to be, we can state that several hundred tools from the leak share a strong connection with our previous findings from the Equation group," Kaspersky researchers wrote in a blog post published Tuesday afternoon.
READ MORE: http://arstechnica.com/security/2016/08/code-dumped-online-came-from-omn...

The "Totalitarian Tip-Toe" Dance of John Key and his Gang of Thugs and Liars Continues. Spy Agency to Get New Powers

During the run-up to the 2013 election Edward Snowden alleged that New Zealand had asked the US National Security Agency to use its PRISM technology to spy on New Zealanders on the government’s behalf. Prime Minister (and then GCSB Minister) John Key had strongly denied doing so:

[Key] replied, “Well we do exchange – and it’s well known – information with our partners – so that’s the first thing, we do do that. How they gather that information and whether they use techniques and systems like PRISM I can’t comment on that…..The Prime Minister continued: “I can’t tell you how the United States gathers all of their information and what techniques they use. I simply don’t know that.” He added, “If the question is, ‘Do we use the United States or one of our other partners to circumvent New Zealand law?’ then the answer is categorically no we don’t.”

The Tor Social Contract

At The Tor Project, we make tools that help promote and protect the essential human rights of people everywhere. We have a set of guiding principles that make that possible, but for a long time, those principles were more or less unspoken. In order to ensure that project members build a Tor that reflects the commitment to our ideals, we've taken a cue from our friends at Debian and written the Tor Social Contract -- the set of principles that show who we are and why we make Tor.

Our social contract is a set of behaviors and goals: not just the promised results we want for our community, but the ways we seek to achieve them. We want to grow Tor by supporting and advancing these guidelines in the time we are working on Tor, while taking care not to undermine them in the rest of our time.

Iraqi Insurgents Stymied the NSA and Other Highlights from 263 Internal Agency Reports

Early in the fight against al Qaeda in Afghanistan and insurgents in Iraq, the National Security Agency was blindsided by enemy fighters’ frequent use of rudimentary wireless communications devices known as “high–powered cordless phones,” according to documents among 263 published today by The Intercept.

The documents, drawn from the agency’s internal news site, SIDtoday, and provided by NSA whistleblower Edward Snowden, date mostly to the latter half of 2003, and show the NSA was at the time rapidly expanding its internet monitoring. But even as its digital surveillance grew more sophisticated, the agency saw its targets increasingly adopting crude forms of communications like shortwave radio, SMS cellphone messaging and, most vexingly, high-powered cordless phones.
READ MORE: https://theintercept.com/2016/08/10/iraqi-insurgents-stymied-the-nsa-and...

Microsoft Pitches Technology That Can Read Facial Expressions at Political Rallies

“Realtime Crowd Insights” is an Application Programming Interface (API), or a software tool that connects web applications to Microsoft’s cloud computing services. Through Microsoft’s emotional analysis API — a component of Realtime Crowd Insights — applications send an image to Microsoft’s servers. Microsoft’s servers then analyze the faces and return emotional profiles for each one.

In a November blog post, Microsoft said that the emotional analysis could detect “anger, contempt, fear, disgust, happiness, neutral, sadness or surprise.”
READ MORE: https://theintercept.com/2016/08/04/microsoft-pitches-technology-that-ca...

New attack bypasses HTTPS protection on Macs, Windows, and Linux

The attack can be carried out by operators of just about any type of network, including public Wi-Fi networks, which arguably are the places where Web surfers need HTTPS the most. It works by abusing a feature known as WPAD—short for Web Proxy Autodisovery—in a way that exposes certain browser requests to attacker-controlled code. The attacker then gets to see the entire URL of every site the target visits. The exploit works against virtually all browsers and operating systems. It will be demonstrated for the first time at next week's Black Hat security conference in Las Vegas in a talk titled Crippling HTTPS with Unholy PAC.
READ MORE: http://arstechnica.com/security/2016/07/new-attack-that-cripples-https-c...

Syndicate content