national-security   213

« earlier    

UK government planning to require age verification for access to porn
This thread has pointed out the unintentional side effect which I hadn't considered: this database of user auth info and their porn habits will be an incredibly valuable target for foreign governments and hackers, and a single foreign porn company owns the AV service they are potentially planning to use for it.

"if they can't find a way to de-link identities from usage, this is a monumental national security risk and it's beyond insane they're even considering it. "Sorry Prime Minister, Russia now knows what porn every MP, civil servant and clearance holder watches and when, and we don't know how much of it they've given to Wikileaks. In retrospect, having the world's most obvious SIGINT target built in PHP and hosted in the Cayman Islands by an uncleared foreign 25 year old working for a porn company probably wasn't the best idea".'
age  verification  porn  uk  politics  censorship  security  national-security  wikileaks  russia 
november 2017 by jm
Tomgram: William Hartung, The Trillion-Dollar National Security Budget | TomDispatch
You wouldn’t know it, based on the endless cries for more money coming from the military, politicians, and the president, but these are the best of times for the Pentagon.  Spending on the Department of Defense alone is already well in excess of half a trillion dollars a year and counting.  Adjusted for inflation, that means it’s higher than at the height of President Ronald Reagan’s massive buildup of the 1980s and is now nearing the post-World War II funding peak.  And yet that’s barely half the story.  There are hundreds of billions of dollars in “defense” spending that aren’t even counted in the Pentagon budget.
war  national-security  war-on-terror  budget 
july 2017 by altoii
The Trump White House Is Screwed, Big League | New Republic
Michael Flynn's resignation is just the beginning of this major national security scandal involving Russia.
donald-trump  national-security  national-security-advisor  michael-flynn  fbi  russia 
february 2017 by ddbeck
David Bromwich · Act One, Scene One · LRB 16 February 2017
The national security state that Obama inherited and broadened, and has now passed on to Trump, is so thoroughly protected by secrecy that on most occasions concealment will be an available alternative to lying. Components of the Obama legacy that Trump will draw on include the curtailment of the habeas corpus rights of prisoners in the War on Terror; the creation of a legal category of permanent detainees who are judged at once impossible to put on trial and too dangerous to release; the expanded use of the state secrets privilege to deny legal process to abused prisoners; the denial of legal standing to American citizens who contest warrantless searches and seizures; the allocation of billions of dollars by the Department of Homeland Security to supply state and local police with helicopters, heavy artillery, state-of-the-art surveillance equipment and armoured vehicles; precedent for the violent overthrow of a sovereign government without consultation and approval by Congress (as in Libya); precedent for the subsidy, training and provision of arms to foreign rebel forces to procure the overthrow of a sovereign government without consultation and approval by Congress (as in Syria); the prosecution of domestic whistleblowers as enemy agents under the Foreign Espionage Act of 1917; the use of executive authority to order the assassination of persons – including US citizens – who by secret process have been determined to pose an imminent threat to American interests at home or abroad; the executive approval given to a nuclear modernisation programme, at an estimated cost of $1 trillion, to streamline, adapt and miniaturise nuclear weapons for up to date practical use; the increased availability – when requested of the NSA by any of the other 16 US intelligence agencies – of private internet and phone data on foreign persons or US citizens under suspicion.
obama-administration  national-security  secrecy  security-state 
february 2017 by altoii
The Last Diplomat - WSJ
he competing forces of intelligence and diplomacy began to collide. When Munter pushed the CIA to be more “judicious” in its drone strikes in the tribal areas, the CIA’s station chief responded by telling diplomats not to discuss the drone program even in private meetings with senior Pakistani officials...By the time Edward Snowden leaked classified documents detailing the NSA’s global operations in 2013, the pressure to catch government moles had increased exponentially, former FBI officials say. The bureau was eager to bring cases.
good-writing  politics  government  dc  pakistan  diplomacy  spies  nsa  fbi  national-security 
december 2016 by jomc
Keep fear alive | The Baffler
When it comes to state action, the most important distinction between what’s good for public safety (i.e., your health) and what’s good for national security (i.e., the health of the empire, markets, and prominent corporations) resides in the concept of the criminal predicate. This means, simply, that an agent of the government must have some reasonable cause to believe you are involved with a crime before launching an investigation into your life. When the criminal predicate forms the basis for state action, police and spies are required to focus on people they have reason to believe are up to no good. Without the criminal predicate, police and spies are free to monitor whomever they want. Police action that bypasses criminal predicates focuses on threats to people and communities that threaten power—regardless of whether those threats to power are fully legal and legitimate.
war-on-terror  national-security  policing 
march 2016 by altoii
A Person Subject to Government Secrecy Rules Complains About Hillary Clinton's Approach to Them - The Atlantic
Summary: If a low-level State Dept. staffer had done what Clinton did, that person would be facing criminal prosecution, full stop. That is perhaps bullshit but it is bullshit that Clinton has endorsed wholeheartedly. But her narcissism is huge enough that it never occurs to her that she should be subject to the same laws as other people under the sovereign power of the United States government. In short, Clinton is a royalist, not a democrat.
a-nation-of-men-not-laws  security-state  hillary-clinton  national-security  united-states-government 
february 2016 by absfac
Federal Court Lifts National Security Letter Gag Order; First Time in 14 Years
A federal district court judge in New York has fully lifted an 11-year-old gag order that the FBI imposed on Nicholas Merrill, the founder of a small Internet service provider, to prevent him from speaking about a National Security Letter served on him in 2004...It marked the first time such a gag order has been fully lifted since the USA Patriot Act in 2001 expanded the FBI’s authority to unilaterally demand that certain businesses turn over records simply by writing a letter saying the information is needed for national security purposes...Like other NSL recipients, Merrill was also instructed that he could not mention the order to anyone.
national-security  courts  free-speech 
september 2015 by altoii
How to Read the New National Military Strategy
This week Gen. Martin Dempsey, the outgoing chairman of the Joint Chiefs of Staff, released a new National Military Strategy (NMS). The NMS is prescribed in law (Title 10.153) as one of the top-level…
geopolitics  international-relations  strategy  national-security 
july 2015 by joeo10
Pando: The CIA helped sell a mapping startup to Google. Now they won't tell us why
I just got a very interesting letter from the Central Intelligence Agency. It came in response to a FOIA request I put in regarding a decade-old business transaction between the CIA and Google. Not…
wiretapping-and-other-eavesdropping-devices-and-methods  national-security  wikileaks  surveillance 
july 2015 by danhon

« earlier    

related tags

a-nation-of-men-not-laws  age  america  anpo  apple  australia  barack-obama  budget  bullshit  bureaucracy  cdu  censorship  china  cia  civil-liberties  cj-info  cj-system  classified-docs  climate-change  code  congress  conservatism  conversation  corporatism  corruption  courts  cryptography  data-mining  databases  dc  democracy  deutschland  dhs  diplomacy  discussion  doj  donald-trump  drones  drought  edward-snowden  encryption  fbi  fiction  fisa  foia  foreign-affairs  foreign-policy  fraud  free-press  free-speech  freedom-of-the-press  geopolitics  germany  good-writing  gov-info  government  gps  groupthink  hacking  hillary-clinton  human-rights-and-human-rights-violations  hypocrisy  impunity  info-policy  info-sharing  intelligence  international-relations  internet  it  james-clapper  james-joyce  japan  journalism  journalists  kgb  labor  law  leaks  lgbt  liberal-party  libertarianism  literature  lying  maps  media  medical  michael-flynn  michael-kinsley  militarization  military  national-intelligence  national-security-advisor  nationhood  ndaa  news  nsa  nuclear  obama-administration  oversight  pakistan  patriot-act  police  policing  political-science  politics  porn  power  press  prism  privacy  privatization  profiling  prosecutors  public-policy  queerness  racism  regulation  research  risk-assessment  rome  russia  russiagate  secrecy  security-state  security-theater  security  snowden  software-archaeology  software  spiegel  spies  spying  state-secrets  strategy  surveillance-state  surveillance  tech  technological-palimpsests  terrorism  toread  torture  transparency  twitter  uk  united-states-government  united-states  us-politics  verification  war-on-terror  war  water  weapons  whistleblowing  wikileaks  wiretapping-and-other-eavesdropping-devices-and-methods 

Copy this bookmark:



description:


tags: