SURVEILLANCE

Group Wants To Shut Down Tor For a Day On September 1

An internal group at the Tor Project is calling for a full 24-hour shutdown of the Tor network to protest the way the Tor Project dealt with the Jake Applebaum sexual misconduct accusations, and because of recent rumors it might be letting former government agents in its ranks. Two Tor members, also node operators, have shut down their servers as well, because of the same reason.
READ MORE: https://politics.slashdot.org/story/16/08/22/0319205/group-wants-to-shut...

The NSA Leak Is Real, Snowden Documents Confirm

On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.

The provenance of the code has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear how the software leaked, one thing is now beyond speculation: The malware is covered with the NSA’s virtual fingerprints and clearly originates from the agency.
READ MORE: https://theintercept.com/2016/08/19/the-nsa-was-hacked-snowden-documents...

NSA HACK: Cisco Acknowledges ASA Zero Day Exposed by ShadowBrokers

Cisco has quickly provided a workaround for one of two vulnerabilities that was disclosed in the ShadowBrokers’ data dump and issued an advisory on the other, which was patched in 2011, in order to raise awareness among its customers.
The ShadowBrokers are an unknown group of hackers that emerged over the weekend with claims it had hacked the Equation Group, a top-of-the-line APT believed to be the NSA.
READ MORE: https://wp.me/p3AjUX-vcV

NSA HACK: EquationGroup Tool Leak – ExtraBacon Demo

You may have heard that recently (15/08/2016) a group known as Shadow Brokers released what are said to be a bunch of exploits and tools written and used by the NSA.

Two tar were released, one with the password of “theequationgroup”, named “eqgrp-free-file.tar.xz.gpg”. The other is named “eqgrp-auction-file.tar.xz.gpg”, and according to the post where Shadow Brokers broke the news (now removed, but cached here), they will release the key for this file, which supposedly contains juicier content, to the person who bids the most in their bitcoin auction, which ends at a time of Shadow Brokers’ choosing.
READ MORE: https://xorcatt.wordpress.com/2016/08/16/equationgroup-tool-leak-extraba...

The Greatest Threat to Our Freedoms: A Government of Scoundrels, Spies, Thieves, Ruffians, Rapists and Killers

“There is nothing more dangerous than a government of the many controlled by the few.”—Lawrence Lessig, Harvard law professor

The U.S. government remains the greatest threat to our freedoms.

The systemic violence being perpetrated by agents of the government has done more collective harm to the American people and our liberties than any single act of terror.

More than terrorism, more than domestic extremism, more than gun violence and organized crime, the U.S. government has become a greater menace to the life, liberty and property of its citizens than any of the so-called dangers from which the government claims to protect us.

This is how tyranny rises and freedom falls.
READ MORE: https://www.rutherford.org/publications_resources/john_whiteheads_commen...

Snowden casts light on NSA hack

The files released by a hacker group that claims to have breached the NSA are authentic, whistleblower Edward Snowden has said, explaining the documents’ importance and potential impact on the US elections and relations with allies around the world.

Over the weekend, a mysterious group called Shadow Brokers posted "samples" of files purloined from the Equation Group – widely believed to be a front for the National Security Agency – and said it would sell the rest in exchange for bitcoin. The NSA has yet to comment on the authenticity of the files.

Snowden, who blew the whistle on NSA surveillance operations in 2013, posted a series of tweets on Tuesday with his take on the hack.
READ MORE: https://www.rt.com/usa/356170-snowden-analysis-nsa-hack/

The Correct Way to Use DuckDuckGo Search Engine


Use DuckDuckGo for their bang searches, i.e. if you type !g followed by your query it will search google. This works for most any search engine or wiki. !reddit, !wikipedia, !gnews, !gh for github... it's great. Vanilla DuckDuckGo results are certainly lacking but that's not the main use for it.
MORE: https://www.reddit.com/r/conspiracy/comments/4xu7wg/avoid_feeding_the_be...

WikiLeaks to release 'pristine copy' of NSA cyberweapons hack data

As the dust settles, following the suspected breach of an elite NSA-linked hacking unit dubbed the Equation Group, which potentially exposed a number of cyberweapons used by US spooks, whistleblowing outfit WikiLeaks has claimed it will publish a 'pristine' version of the data online for the world to see.

The cyber-espionage toolset, which was first teased online by a mysterious group calling itself The Shadow Brokers, contains what purports to be NSA exploits previously used by the agency to target computers, firewalls and routers. After releasing one file as proof of legitimacy, the hackers opened an auction and demanded one million bitcoin — the equivalent of at least $550m – to hand over the rest.
READ MORE: http://www.ibtimes.co.uk/wikileaks-release-pristine-copy-nsa-cyberweapon...

The NSA Hacking Team Known as the "Equation Group" Appears to Have Been Hacked and Their Advanced Hacking Tools Have Been Leaked Online

The leak over the weekend of advanced hacking tools contains digital signatures that are almost identical to those in software used by the state-sponsored Equation Group, according to a just-published report from security firm Kaspersky Lab.

Group claims to hack NSA-tied hackers, posts exploits as proof "While we cannot surmise the attacker's identity or motivation nor where or how this pilfered trove came to be, we can state that several hundred tools from the leak share a strong connection with our previous findings from the Equation group," Kaspersky researchers wrote in a blog post published Tuesday afternoon.
READ MORE: http://arstechnica.com/security/2016/08/code-dumped-online-came-from-omn...

The "Totalitarian Tip-Toe" Dance of John Key and his Gang of Thugs and Liars Continues. Spy Agency to Get New Powers

During the run-up to the 2013 election Edward Snowden alleged that New Zealand had asked the US National Security Agency to use its PRISM technology to spy on New Zealanders on the government’s behalf. Prime Minister (and then GCSB Minister) John Key had strongly denied doing so:

[Key] replied, “Well we do exchange – and it’s well known – information with our partners – so that’s the first thing, we do do that. How they gather that information and whether they use techniques and systems like PRISM I can’t comment on that…..The Prime Minister continued: “I can’t tell you how the United States gathers all of their information and what techniques they use. I simply don’t know that.” He added, “If the question is, ‘Do we use the United States or one of our other partners to circumvent New Zealand law?’ then the answer is categorically no we don’t.”

Syndicate content