asterisk2a + cryptopocalypse   55

Investigatory Powers Bill: May defends surveillance powers - BBC News
Mrs May has said Britain's spies must continue to be allowed to hack into foreign computer networks, under so-called "bulk equipment interference warrants", as this was "a key operational requirement for GCHQ".
She told MPs that bulk powers had played a significant role in every major counter-terrorism investigation over the past decade, including seven terror plots foiled in the past 18 months, and in responding to the bulk of cyber attacks against UK interests.
Investigatory  Powers  Bill  Snoopers  Charter  Theresa  May  War  on  Terror  Surveillance-Industrial  Complex  surveillance  surveillance  state  Orwellian  Internet  Privacy  Privacy  encryption  Cryptopocalypse  cryptography  bulk  data  collection  Vorratsdatenspeicherung  Dataretention  Meta  GPS  mobilephone  Big  Meta  profiling  Smartphone  human  rights  backdoors  backdoor  Secret  Courts  MI5  MI6  GCHQ  organised  crime  activism  activist  Tories  Conservative  Party  David  Cameron  cyber  cyber  attack 
march 2016 by asterisk2a
Security Experts Warn of Orwellian Future in Apple Case | Re/code
[ all without a warrant ] Your Samsung smart TV or Amazon Echo might spy on you next if the government succeeds in forcing Apple to disable security protections on a smartphone to further the FBI’s investigation into the San Bernardino attacks. Security experts from Stanford, Harvard and Rice universities and independent researchers laid out this Orwellian scenario in a court filing today, supporting Apple’s fight against a court order to help investigators hack a smartphone used by one of the assailants in the mass killing. The group of seven experts argues that the judge’s order [...] disturbing possibilities for how law enforcement might turn everyday items into surveillance tools. //&! Amazon Quietly Disabled Encryption in Latest Version of Fire OS - on.recode.net/1TXeXPB //&! Twitter, Airbnb, eBay, Kickstarter, LinkedIn and Square File Brief Supporting Apple - on.recode.net/1LXQ3sG &! Three Industry Trade Groups to File Briefs Supporting Apple - on.recode.net/1oTUdwx
Apple  FBI  Surveillance-Industrial  Complex  surveillance  surveillance  state  Orwellian  Internet  Privacy  Privacy  encryption  Cryptopocalypse  cryptography  War  on  Terror  Patriot  Act  bulk  data  collection  Dataretention  Vorratsdatenspeicherung  Meta  Big  Smartphone  mobile  homescreen  anonymity  human  rights  FISA  Court  FISAAA  Secret  Courts  GCHQ  NSA  Snoopers  Charter  Yahoo!  backdoors  backdoor  GPS  profiling  Facebook  Twitter 
march 2016 by asterisk2a
Why Was a Facebook Executive Arrested in Brazil? Encryption. | Re/code
Case in point: Facebook executive Diego Dzodan was arrested by Brazilian police Tuesday morning on his way to work for the same reason Brazilian authorities succeeded — albeit temporarily — in having WhatsApp banned from the country back in December: Encryption. Dzodan — who is still detained at the time of this writing — was arrested because of Facebook’s “repeated non-compliance with court orders,” according to a police press release. What does that mean? Brazilian authorities have requested that WhatsApp hand over user messages in multiple criminal investigations over the past few months, and WhatsApp repeatedly claims that it can’t hand over those messages because it doesn’t have them.
encryption  Apple  WhatsApp  Facebook  Internet  Privacy  Privacy  Cryptopocalypse  cryptography 
march 2016 by asterisk2a
Here Are the Most Interesting Things Apple and the FBI Said About Encryption | Re/code
on.recode.net/1QsrklN - FBI Director James Comey shifted from his shopworn phrase about “going dark” and instead talked about Apple and other technology companies using encryption to create “warrant-proof spaces in our lives.” Naturally, this is a technological development that law enforcement sees as a giant roadblock to gathering evidence in criminal investigations. He also admitted the bureau screwed up when it changed the Apple ID password on the shooter’s phone.
Apple  FBI  encryption  cryptography  Cryptopocalypse  Internet  Privacy  Privacy 
march 2016 by asterisk2a
Shami Chakrabarti: ‘Who’s the most dangerous person in Britain? David Cameron’ | Voluntary Sector Network | The Guardian
The outgoing Liberty director explains why plans to scrap the Human Rights Act threaten freedom, and why she won’t stop campaigning [...] I ask Chakrabarti – once branded by the Sun as “the most dangerous woman in Britain” – who she thinks deserves the “most dangerous” hallmark now. “Right now? David Cameron.” She says. “Actually, can I have more than one? Then him and that particular group in the cabinet now who are dedicated to scrapping the Human Rights Act. That group. They are an existential threat to the rights and freedoms of the most vulnerable people in our country.” [...] investigatory powers bill. “We wouldn’t let the state impose identity cards, but these,” she holds up her phone, “these we buy.”
UK  USA  David  Cameron  Tories  NSA  GCHQ  Secret  Courts  FISA  Court  FISAAA  Surveillance-Industrial  Complex  surveillance  state  Snoopers  Charter  Patriot  Act  human  rights  Act  Brexit  neoliberalism  neoliberal  neoconservatism  neoconservatives  Theresa  May  Schengen  Agreement  War  on  Terror  Torture  ISIS  far-right  Rechtsruck  Rechtsextremismus  Internet  Privacy  Privacy  Big  Data  Meta  Data  profiling  encryption  Cryptopocalypse  cryptography  backdoors  backdoor 
march 2016 by asterisk2a
Apple raises concerns over UK's draft surveillance bill - BBC News
The US-based firm has passed on its thoughts to a parliamentary committee scrutinising the legislation. It focuses on three issues: encryption, the possibility of having to hack its own products, and the precedent it would set by agreeing to comply with UK-issued warrants. The Home Secretary Theresa May said last month that the proposed powers were needed to fight crime and terror. [...] But Apple appears to be concerned that the bill's language could still be interpreted more expansively and force the creation of a so-called "backdoor" to provide the authorities with access. Apple argues that the existence of such a backdoor would risk creating a weakness that others then might exploit, making users' data less secure. [...] Overseas warrants A second area of concern relates to the issue of "extra-territoriality". Existing British legislation - and the bill - maintain that companies need to comply with warrants for information wherever they are based and wherever the data resides.
Surveillance-Industrial  Complex  GCHQ  Snoopers  Charter  Internet  Privacy  Privacy  encryption  Cryptopocalypse  cryptography  backdoors  backdoor  Vorratsdatenspeicherung  Dataretention  bulk  data  collection  human  rights  Theresa  May  Tories  nasty  party  Conservative  David  Cameron  George  Osborne  War  on  Terror  organised  crime  austerity  military–industrial  surveillance  state  NSA  propaganda  manufactured  consent  Polarisation  islamic  radicalism  islamic  extremism  ISIS  corporate  state  corporate  media  Lügenpresse  populism  Big  metadata  neoconservatism  neoconservatives  presidency  barackobama 
december 2015 by asterisk2a
Video "Stark: Demokratie durch Überwachung in Gefahr" | Zapp | ARD Mediathek
Der "Spiegel" ist offenbar ins Visier von Geheimdiensten geraten, das Bundeskanzeleramt soll davon seit 2011 gewusst haben. "Spiegel"-Redakteur Stark zeigt sich erschüttert. // freie presse ist pfeiler der demokratie. - 4te gewalt. checks and balances. // mit hilfe von selectoren liste werden journalisten ueberwacht! und ihre bewegung via cellphone tracking. //&! spiegel.de/thema/national_security_agency/ //&! Vorratsdatenspeicherung schreckt Whistleblower ab. "Sammelwut verprellt Informanten." - bit.ly/1lCqrKZ - Vorratsdatenspeicherung hilft nicht bei Verbrechensaufklaerung.
NSA  GCHQ  Whistleblower  surveillance  Surveillance-Industrial  Complex  surveillance  state  BND  Angela  Merkel  journalismus  investigative  journalism  journalism  Big  Data  Edward  Snowden  Wikileaks  democracy  social  democracy  corporate  state  corporate  media  Pressefreiheit  freedom  of  press  Dataretention  Snoopers  Charter  Vorratsdatenspeicherung  Russia  China  bulk  collection  Meta  Data  Internet  Privacy  Privacy  human  rights  presidency  barackobama  Hegemony  USA  War  on  Terror  national  interest  patriotism  Patriot  Act  CIA  FBI  Iraq  War  cablegate  FISA  Court  FISAAA  Secret  Courts  military–industrial  military  intervention  TTIP  TPP  TISA  encryption  Cryptopocalypse  cryptography  Separation  of  powers  Checks  and  Balances  organised  crime  War  on  Drugs  Positioning  framing  PR  spin  doctor 
december 2015 by asterisk2a
Theresa May accused of rushing surveillance bill through back door | Politics | The Guardian
Home secretary gives committee three weeks to study ‘snooper’s charter’, despite having ruled out fast-tracking it after Paris attacks [...] The joint committee that scrutinised the previous “snooper’s charter” bill – the draft communications data bill – in 2012 sat for five months and held 13 public witness sessions over a six-week period. It also took evidence in private from the security services. //&! bit.ly/1lkbLjn - State computer hacking The bill gives powers for security services to hack in to phones, computers and networks worldwide in interests of national security. [ like environmental and animal rights activists ]
Snoopers  Charter  Theresa  May  nasty  party  Tories  Conservative  GCHQ  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Dataretention  bulk  data  collection  democracy  David  Cameron  George  Osborne  Internet  Privacy  Privacy  human  rights  Secret  Courts  oversight  abuse  of  power  accountability  cyber  war  cyber  attack  TOR  Linux  encryption  Cryptopocalypse  cryptography  MI5  MI6 
november 2015 by asterisk2a
Glenn Greenwald on why the CIA is smearing Edward Snowden after the Paris attacks: "The real objective is to depict Silicon Valley as terrorist-helpers for the crime of offering privacy protections to Internet users and to force them to give the U.S. gov
Glenn Greenwald on why the CIA is smearing Edward Snowden after the Paris attacks: "The real objective is to depict Silicon Valley as terrorist-helpers for the crime of offering privacy protections to Internet users and to force them to give the U.S. gov "backdoor" access into communications"
encryption  cryptography  Cryptopocalypse  War  on  Terror  backdoor  backdoors  Edward  Snowden  NSA  GCHQ  Surveillance-Industrial  Complex  surveillance  state  Orwellian  bulk  data  collection  Snoopers  Charter  Vorratsdatenspeicherung  Dataretention 
november 2015 by asterisk2a
Überwachung in Großbritannien: Neues Gesetz vorgestellt - SPIEGEL ONLINE
Die Werbekampagne hat sich gelohnt. Am heutigen Mittwoch veröffentlichte Innenministerin Theresa May einen Gesetzentwurf (hier als PDF), der britischen Geheimdiensten noch mehr Macht verspricht. Die Spione können, sobald die sogenannte Investigatory Powers Bill vom Parlament verabschiedet wird, ganz legal das tun, was sie bislang ohne solide rechtliche Grundlage machten. Gleichzeitig sagte Innenministerin May, sie wolle die Aufsicht über die Geheimdienste stärken. [...] Theresa May betonte im Parlament, dass es nicht darum gehe, den gesamten Browserverlauf zu speichern, sondern nachvollziehen zu können, mit wem Verdächtige kommunizieren. [ jeder ist nun verdaechtig ] [ UK people seem not to care ]
Dataretention  Vorratsdatenspeicherung  Snoopers  Charter  Theresa  May  UK  Tories  Conservative  Party  neoconservatism  neoconservatives  GCHQ  War  on  Terror  extremism  Surveillance-Industrial  Complex  surveillance  state  British  Empire  NSA  human  rights  Internet  Privacy  Privacy  oversight  transparency  Separation  of  powers  injustice  Justice  System  Secret  Courts  Edward  Snowden  USA  encryption  Cryptopocalypse  cryptography  Wertegesellschaft  Orwellian  society  Big  Brother  abuse  of  power  democracy  lobbyist  lobby  Lobbying  military–industrial  profiteer  corporate  espionage  industrial  espionage  cyber  espionage  corporate  state  corporate  media  activists  activism 
november 2015 by asterisk2a
Hacked! - Tech Weekly podcast by Guardian Tech Weekly
book - @War: The Rise of the Military-Internet Complex3 Nov 2015 by Shane Harris // Doomsday Scenarios: breaking the internet, bringing down electricity grid, transportation/infrastructure, nuclear plant, manipulating digital money vault/value exchanges, << low probability - high impact >> distrust/lost trust.
cyber  war  industrial  espionage  scam  phishing  scam  corporate  espionage  cyber  espionage  USA  UK  Cina  Russia  Israel  Five  Eyes  NSA  GCHQ  Surveillance-Industrial  Complex  surveillance  state  military–industrial  foreign  affairs  Hegemony  foreign  policy  Intelligence  foreign  relations  book  Smart  Grid  encryption  Cryptopocalypse  cryptography  cyber  security  IT  password  security  energy  security 
october 2015 by asterisk2a
Markus Beckedahl, Andre Meister: Kontrolle ist gut. #Landesverrat ist besser. - YouTube
// Statement von Georg Restle zu der Anzeige wegen Landesverrat gegen die Journalisten Markus Beckedahl und Andre Meister von Netzpolitik.org. - youtu.be/bLuu4ekznT8 // Verschwörung gegen die Freiheit (Doku, ZDF 2014) - youtu.be/HoTW5c2MEYQ // &! O-Ton GroKo - youtu.be/y9pRz5KQ6vo - Eiertanz: Viele, viele naive Fragen zum BND-Skandal // &! http://www.dctp.tv/filme/markus-beckedahl-netzpolitik-org/
netzpolitik  Pressefreiheit  Lügenpresse  Angela  Merkel  GroKo  Surveillance-Industrial  Complex  military–industrial  NSA  GCHQ  Five  Eyes  surveillance  state  Orwellian  BND  corporate  espionage  industrial  espionage  cyber  espionage  cyber  war  USA  Europe  UK  Germany  Vorratsdatenspeicherung  Dataretention  Snoopers  Charter  bulk  data  collection  FISA  Court  FISAAA  Patriot  Act  presidency  barackobama  David  Cameron  encryption  Cryptopocalypse  cryptography  False  Flag  on  Terror  IT  Security  cyber  netzpolitik.org  freedom  of  press  of  Information  Act  National  Security  interest  on  Drugs  organised  crime  cyber  crime  investigative  journalism  journalismus  journalism  Whistleblower  Career  Politicians  No  Representation  social  contract  political  theory  Internet  Privacy  Privacy  Meta  metadata  Big  Wikileaks  Edward  Snowden  Julian  Assange  Secret  Courts  Glenn  Greenwald 
august 2015 by asterisk2a
U.K. ‘Emergency’ Surveillance Law Ruled Unlawful By High Court | TechCrunch
In a high profile win for civil liberties in the U.K., surveillance legislation rushed through the national parliament in a matter of days last year has today been declared unlawful under European Human Rights law. Two MPs, Tom Watson (Labour) and David Davis (Conservative), along with civil rights campaign group Liberty, took the government to the High Court last month, challenging the Data Retention and Investigatory Powers Act (DRIPA) on privacy and data protection grounds. Today the High Court agreed with their challenge. [...] the European Court of Justice ruling that had, months earlier, struck down EU data retention powers as disproportionate. [...] [abuse] The court also ruled section 2 unlawful because it does not build in limits to accessing this data by requiring access be authorized by a court or independent body. // Part of Tories 2015 manifesto; Scrap the Human Rights Act, and introduce a British Bill of Rights - bbc.in/1JJI1U4
UK  human  rights  Tories  Conservative  Party  general  election  2015  election  campaign  promises  David  Cameron  Snoopers  Charter  NSA  GCHQ  Five  Eyes  Dataretention  bulk  data  collection  encryption  Cryptopocalypse  cryptography  ISIS  False  Flag  War  on  Terror  Surveillance-Industrial  Complex  surveillance  surveillance  state  Orwellian  DRIPA  Internet  Privacy  Privacy  FISA  Court  FISAAA  presidency  barackobama  Pentagon  military–industrial  oversight  transparency  abuse  of  power  accountability  Vorratsdatenspeicherung  Europe  populism  propaganda  manufactured  consent  corporate  state  corporate  media  PR  spin  doctor 
august 2015 by asterisk2a
Russia will fork Sailfish OS to shut out pesky Western spooks
Paranoia over NSA tampering spurs de-Westernisation drive // well only the Paranoid survive. [...] Russia’s Minister of Communications and Mass Media, Nikolai Nikiforov, has taken part in talks to form a consortium that will aid Russia in developing a custom mobile OS, reportedly a forked version of Jolla’s Sailfish OS, to lessen its dependence on Western technology. Nikiforov held a working meeting last week with the leadership of Hong Kong-based Sailfish Holdings, developer of the quietly admired Sailfish OS. Alongside other participants, the parties involved discussed the use of open-source software in the public and private sectors, taking into account technical, economic and political factors, the latter of which is expected to include United States’ interference with exported technologies.
Open  Source  Russia  corporate  espionage  industrial  espionage  cyber  espionage  NSA  Five  Eyes  Nationalism  barackobama  presidency  Europe  GCHQ  UK  Foreign  Intelligence  affairs  relations  2015  cyber  war  encryption  Angela  Merkel  Leadership  Career  Politicians  No  Representation  human  rights  Privacy  Internet  Privacy  Cryptopocalypse  cryptography  national  interest  False  Flag  on  Terror  on  Drugs  organised  crime  backdoors  backdoor  IT  Security  exploit  Germany  FRance  surveillance  Surveillance-Industrial  Complex  surveillance  state  Orwellian  corporate  state  manufactured  consent  Cold  propaganda  populism  Pressefreiheit  Lügenpresse  Vorratsdatenspeicherung  Snoopers  Charter  investigative  journalism  Whistleblower  tracking  bulk  data  collection  democracy  freedom  freedom  of  press  Secret  Courts  FISA  Court  FISAAA  BND  military–industrial 
august 2015 by asterisk2a
Pressure mounts over claims Police Scotland breached rules over spying on journalists (From Herald Scotland)
PRESSURE is mounting on ministers to take action on Police Scotland amid further criticism of the force over claims it illegally spied on a journalist to uncover sources. The force's elite Counter Corruption Unit (CCU) is said to have snooped on the reporter without getting judicial approval - a tactic which was banned on March 25 following a row over officers using the Regulation of Investigatory Powers Act (Ripa) to access journalists’ phone records, texts and emails. // [ endemic and systemic! you are not safe. period. ] // &! bbc.in/1OQEaGJ - Ministers questioned over Police Scotland 'spying' claims // &! bbc.in/1KUFPu9 &! bbc.in/1Maojno << time to get their story right!?
Met  Police  GCHQ  freedom  of  press  UK  journalismus  investigative  journalism  journalism  corporate  state  corporate  media  media  conglomerate  Pressefreiheit  Lügenpresse  Five  Eyes  NSA  Career  Politicians  No  Representation  democracy  Surveillance-Industrial  Complex  surveillance  state  Orwellian  military–industrial  2015  human  rights  Internet  Privacy  Privacy  Snoopers  Charter  Vorratsdatenspeicherung  abuse  of  power  corruption  manufactured  consent  populism  War  on  Terror  False  Flag  organised  crime  cyber  cyber  crime  Cryptopocalypse  cryptography  encryption  backdoors  backdoor  propaganda  Intelligence  Agency  Foreign  Intelligence  corporate  espionage  industrial  espionage  cyber  espionage  Nationalism  national  interest  domestic  affairs  affairs  policy  relations  MI5  MI6  Secret  Courts  FISA  Court  FISAAA 
august 2015 by asterisk2a
Windows 10: Microsoft under attack over privacy | Technology | The Guardian
>> It is not Free. Period! Stupid. << // &! Get Tracked with Windows 10 | Tech Talk Today 198 - youtu.be/Gh0y5drKwAE &! http://www.jupiterbroadcasting.com/85697/get-tracked-with-windows-10-ttt-198/ &! Microsoft’s new small print – how your personal data is (ab)used - https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/ &! &! bit.ly/1eNKQJm - Mit Windows 10 wird alles besser - sagt Microsoft. Viele Neuerungen funktionieren aber nur, weil der Konzern auf Nutzerdaten zugreift. Wir zeigen, wie Sie die Datensammelei sinnvoll einschränken. [ einschraenken, nicht abschaltbar - selling you out ] &! bit.ly/1g2TLHN - Like all proprietary software, Windows 10 puts those that use it under the thumb of its owner. [...] Windows is an open window onto you &! bit.ly/1SFoXhT &! Linux: The OS of the Future - youtu.be/cTpujBq1Zi0 // &! bit.ly/1MUDxeB &! youtu.be/ULq1ajA1Jek
TOS  Microsoft  Platform  Internet  Privacy  Privacy  Big  Data  advertisement  advertisement  targeting  user  Facebook  Windows  10  business  model  Free  perma-cookie  ISP  Google  Wireless  Carrier  Android  Apple  human  rights  Linux  Open  Source  Twitter  backdoors  backdoor  Cryptopocalypse  encryption  NSA  FISA  Court  FISAAA  corporate  espionage  industrial  espionage  cyber  espionage  national  interest  Nationalism  Five  Eyes  GCHQ  Secret  Courts  cryptography  FOSS  GNU  GNU/Linux  GPL 
august 2015 by asterisk2a
How NSA and GCHQ spied on the Cold War world - BBC News
American and British intelligence used a secret relationship with the founder of a Swiss encryption company to help them spy during the Cold War, newly released documents analysed by the BBC reveal.
Cold  War  NSA  GCHQ  MI5  MI6  surveillance  state  Surveillance-Industrial  Complex  military–industrial  history  European  Orwellian  encryption  Cryptopocalypse  cryptography  Enigma  WW2  USA  UK 
july 2015 by asterisk2a
Sicherheitshysterie nach britischem Urteil gegen Vorratsdatenspeicherung: „Tausende Leben in Gefahr“ | netzpolitik.org
Die Notwendigkeit der technisierten Überwachung wird gar nicht mehr hinterfragt, die gerichtlichen Backpfeifen an die britische Regierung stattdessen in grotesker Weise kommentiert. So titelt beispielhaft der Telegraph in Anlehnung an eine Aussage der britischen Innenministerin Theresa May: Thousands of lives at risk after High Court rules snooping powers unlawful. // theguardian.com/world/surveillance - bit.ly/1fa4mQP // &! bit.ly/1CMnrUg &! bit.ly/1DoKqiZ - Why appeasing governments over encryption will never work. David Cameron & the director of the FBI have both asked for ‘backdoors’ to be included in encryption software [...] Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications, is worth reading in full. It concludes that proposals for backdoors are “unworkable in practice, raise enormous legal and ethical questions, and would undo progress on security at a time when internet vulnerabilities are causing extreme economic harm”.
Snoopers  Charter  Vorratsdatenspeicherung  DRIPA  data  retention  law  bulk  data  collection  propaganda  surveillance  surveillance  state  Orwellian  False  Flag  War  on  Terror  ISIS  ISIL  Surveillance-Industrial  Complex  military–industrial  UK  GCHQ  MI5  Met  Police  abuse  of  power  transparency  accountability  democracy  Secret  Courts  Five  Eyes  British  Empire  populism  Lügenpresse  manufactured  consent  corporate  state  NSA  Career  Politicians  Tony  Blair  presidency  barackobama  David  Cameron  society  Gesellschaft  European  Union  Internet  Privacy  Privacy  human  rights  self-censorship  encryption  Cryptopocalypse  backdoors  backdoor  FBI  MI6  cyber  corporate  espionage  industrial  espionage  cyber  espionage  Intelligence  Agency  Foreign  Intelligence  national  interest  protectionism  economic  damage  IT  Security  policy  folly  policy  error 
july 2015 by asterisk2a
Totale Kontrolle (ARTE Doku) - YouTube
"angriff auf das privatleben." // false feeling of safety. true criminals (not opportunists) are not fended off with personal surveillance installations. // Security is very wish wash and can not be easily defined. // False Flag organised crime, war on terror, ... to take step by step away some kind of remaining privacy and freedom. // NSA & Co sell their programs as reasonable and efficient (able to prevent X). No transparency. No accountability. // automatic verdaechdig // Chris Hedges & Noam Chomsky - Corporate State //
surveillance  state  Orwellian  Privacy  Internet  Privacy  human  rights  society  Stasi  2.0  Career  Politicians  Big  Data  democracy  abuse  of  power  False  Flag  vested  interest  interest  groups  Meta  Data  metadata  self-censorship  military–industrial  complex  NSA  Five  Eyes  freedom  bulk  collection  UK  USA  Europe  Germany  corporate  state  War  on  Terror  civil  liberty  Gesellschaft  National  Security  interest  Cryptopocalypse  cyber  encryption  Patriot  Act  corporate  espionage  industrial  espionage  GCHQ  BND  organised  crime  cyber  espionage  FISA  Court  Secret  Courts  Pentagon  Police  World  Police  Imperialism  Empire  Drone  Strike  Drone  Warfare  Totalitarianism 
june 2015 by asterisk2a
NSA und GCHQ spähen Anti-Viren-Hersteller wie Kaspersky aus - SPIEGEL ONLINE
[ Washington, even Obama doesn't know about the true extent. NSA, Five Eyes, for profit military and intelligence complex is an entity that is OVER Washington. Because telling Washington would be a National Security risk. ] Frisch veröffentlichte Snowden-Unterlagen zeigen, wie der amerikanische und der britische Geheimdienst gezielt Anti-Viren-Software austricksen und deren Hersteller ausforschen. In den Dokumenten taucht auch ein deutscher Anbieter auf. [...] Der britische Geheimdienst GCHQ und die amerikanische NSA haben gezielt Anti-Viren-Hersteller ausspioniert. Ziel war es offenbar, Wege zu finden, die Virenschutzprogramme auszutricksen: Die Schadsoftware der Geheimdienste sollte von den Programmen unentdeckt bleiben.
NSA  GCHQ  Five  Eyes  surveillance  state  Cryptopocalypse  encryption  backdoors  backdoor  TrueCrypt  Edward  Snowden  Reverse  Engineering  FISA  Court  Secret  Courts  UK  USA  presidency  barackobama  Stasi  2.0  Imperialism  False  Flag  corporate  espionage  industrial  espionage  cyber  espionage  cyber  war  IT  Security  cyber  crime  cyber  cyber  attack  Privacy  Internet  Privacy  Antivirus  Orwellian  Empire  vested  interest  interest  groups  national  interest  military–industrial  complex  Intelligence  Agency  Foreign  Intelligence  Cold  relations  policy  affairs  Wikileaks  cablegate  Career  Politicians  No  Representation  Totalitarian  Despotism  oligarchy  oversight  transparency  democracy  Washington  Security 
june 2015 by asterisk2a
Chris Hedges - Our Only Hope Will Come Through Rebellion - 29th March 2014 - YouTube
military industrial complex does what it wants and asks and gets what it wants. // Truth is hidden. Decent is criminalised. // things are only to get worse. // protect corporate state and spy on other corporate states and corporate entities. // for-profit military industrial complex // 9/11 opportunist, false flag, to profit from program X to protect our nation // no warrent needed - https://en.wikipedia.org/wiki/Warrant_(law) // the corporate state has no incentive to give up Stasi 2.0 // >> = Totalitarian state // we have totalitarian structures! period. // reform can not come from those who are in the center of power and a implicit of the status quo ... meaning only a revolution through rebellion is the option. defying the law and opting for civil disobedience. moral and physical courage needed.
surveillance  state  NSA  GCHQ  Stasi  2.0  Orwellian  Five  Eyes  Cold  War  civil  liberty  Constitution  FISA  Court  FISAAA  Patriot  Act  military–industrial  complex  Whistleblower  democracy  oversight  transparency  accountability  Intelligence  Agency  abuse  of  power  Separation  of  powers  Career  Politicians  No  Representation  Congress  Washington  lobbyist  lobby  Lobbying  National  Security  False  Flag  Privacy  Internet  Privacy  USA  UK  Warrent  metadata  KGB  WMD  Iraq  War  War  on  Drugs  War  on  Terror  organised  crime  Politics  of  Fear  history  Empire  Drone  Strike  Drone  Warfare  Palestine  Gaza-Israel  conflict  Foreign  Intelligence  World  Police  World  G8  Europe  corporate  espionage  industrial  espionage  cyber  espionage  Cryptopocalypse  encryption  Edward  Snowden  Wikileaks  Julian  Assange  Torture  Pressefreiheit  Lügenpresse  media  conglomerate  presidency  barackobama  Angela  Merkel  opportunist  Opportunism  Wall  Street  trust  trustagent  Secret  Courts  Chelsea  Manning  corruption  self-censorship 
june 2015 by asterisk2a
The Surveillance Economy and Extreme Income Inequality: You Can't Have One Without the Other - YouTube
Uber and Airbnb is equal to informal economy (uncertainty) = staying power only for owner of marketplace (wealth accumulation & ultimate bargain power as owner of (monopoly/oligopoly form of marketplace). Silicon Valley made the informal economy cool again bc its on your smartpone (homescreen). Uber & Co are becoming, as owners of said marketplace, the new super elite (with no shared economic interest & no stakeholder in local economy). Disenfranchised & Price war. // The perfect, crazy, too good to be true, idea - will crash eventually (accumulating wealth with little to no input [see stakeholder theory/shared economic interest/long-term views and interest!]). // Start-up Lesson/Advice: "cost of choice" & paying computation with advertising = corruption (Google, Facebook &Co) paying (Wall Street, short-termism [Fast Food]) for micro-management of your life, of your choice. = U loosing free will. // youtu.be/kZO8mgarU0k youtu.be/XdEuII9cv-U youtu.be/cCvf2DZzKX0 youtu.be/5puB_7Q2n74
abuse  of  power  income  inequality  inequality  surveillance  state  Orwellian  democracy  Net  Neutrality  censorship  self-censorship  Gini  coefficient  Career  Politicians  USA  Five  Eyes  World  Police  World  Ian  Bremmer  book  Jaron  Lanier  21stcentury  Privacy  Internet  Privacy  Vorratsdatenspeicherung  Cryptopocalypse  history  Open  Source  transparency  accountability  lobbyist  lobby  Lobbying  stakeholder  Wall  Street  crony  capitalism  tax  evasion  tax  avoidance  profit  maximisation  bribery  corruption  shareholder  value  occupywallstreet  Indignados  Indignants  short-term  thinking  short-term  view  Share  Economy  1099  Economy  marketplace  marketplace  efficiencies  commodity  business  commoditization  Service  Sector  Jobs  Niedriglohn  Niedriglohnsektor  Universal  Basic  Silicon  Valley  tax  free  income  capital  gains  informal  Super  Rich  1%  Uber  AirBnB  self-employment  contractor  Zero  Hour  Contract  Big  Data  analytics  Software  Is  Eating  The  World  augmented  intelligence  Failure  bailout  GFC  Google  oligopoly  oligopol  monopoly  business  model  Start-Up  lesson  Start-Up  advice  cost  of  choice  advertising  economics  of  abundance  marginal  cost  business  plan  long-term  view  long-term  thinking  Zeitarbeit  The  Leih 
june 2015 by asterisk2a
UN: Government efforts to undermine encryption threaten basic human rights | PandoDaily
The report also focuses on schemes from the United Kingdom and the US to force tech companies to include backdoors in their products, thus giving these governments unfettered access to what consumers believe is private data.
encryption  backdoors  backdoor  cryptography  Cryptopocalypse  Internet  Privacy  Privacy  human  rights  surveillance  state  Orwellian  Dataretention  Vorratsdatenspeicherung  UK  USA  Europe  Postgeheimnis 
may 2015 by asterisk2a
The government's data law - an attack on encryption? - BBC News
The row over forcing internet service providers (ISPs) to hold on to far more data about their users' online activities has stretched over three parliaments. The idea first came up under the last Labour government, when it was quashed by Conservative and Liberal Democrat opposition. Then it was resurrected by the Coalition, with Theresa May's plans - immediately dubbed the Snooper's Charter - blocked by her Liberal Democrat partners. // &! "radicalisation" http://www.bbc.co.uk/news/uk-politics-32714802 &! http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/11630495/Muslim-Council-hits-back-at-top-cops-Marks-and-Spencer-radicalisation-comments.html https://youtu.be/slOe_4zxQCI
Snoopers  Charter  UK  Vorratsdatenspeicherung  GCHQ  surveillance  state  Orwellian  War  on  Terror  War  on  Drugs  organised  crime  False  Flag  Privacy  Internet  Privacy  human  rights  Conservative  Party  David  Cameron  Theresa  May  backdoors  backdoor  encryption  cryptography  Cryptopocalypse 
may 2015 by asterisk2a
Danny Boyle: the Olympic opening ceremony would be done differently in 2015 - Newsnight - YouTube
do we want to give them the data, our lives?! it seems positive and benign, but it changes our lives in the long-term and we are only seen as data pools. // dave eggers novel the circle
Internet  Privacy  book  Facebook  Google  Big  Data  perma  cookie  Orwellian  State  surveillance  FISA  Court  FISAAA  Secret  Courts  NSA  GCHQ  Foreign  Intelligence  Intelligence  Agency  corruption  abuse  of  power  Privacy  human  rights  analytics  Vorratsdatenspeicherung  Five  Eyes  False  Flag  War  on  Terror  cyber  cyber  espionage  corporate  espionage  industrial  espionage  Microsoft  backdoors  backdoor  encryption  cryptography  Cryptopocalypse 
may 2015 by asterisk2a
Jung & Naiv - Bundesinnenminister de Maizière hat sich über die "digitale Sorglosigkeit" von euch beklagt
Bundesinnenminister de Maizière hat sich über die "digitale Sorglosigkeit" von euch beklagt. Ihr würdet so viel Privates öffentlich posten! Uns hat heute interessiert: Warum traut er sich von “digitaler Sorglosigkeit” bei Dingen, die wir öffentlich posten, zu reden, wenn gerade er jemand ist, der selbst die Dinge wissen will, die wir nicht öffentlich digital mitteilen? (Vorratsdatenspeicherung)
encryption  cryptography  Cryptopocalypse  Privacy  Internet  Privacy  surveillance  state  Orwellian  BND  Career  Politicians  GroKo  NSA  Selectors  Vorratsdatenspeicherung  human  rights 
may 2015 by asterisk2a
Snowden documents show spy agencies exploiting issues with China’s most popular browser | PandoDaily
New reports from CBC News and the Intercept show that intelligence agencies in Canada, the United States, Australia, the United Kingdom, and New Zealand exploited vulnerabilities in Alibaba’s UC Browser to surveil 500 million people. The agencies also planned to use various app stores to distribute their spyware. The reports indicate that UC Browser offered up all kinds of information about its users. This is notable because it’s the most popular Web browser in China and has an estimated 500 million users, making it a valuable target for spying. The problems are said to be limited to the Android version of the Web browser.
Five  Eyes  NSA  Alibaba  Edward  Snowden  War  on  Terror  surveillance  state  Orwellian  False  Flag  GCHQ  Intelligence  Agency  Foreign  Intelligence  cyber  encryption  cryptography  Cryptopocalypse  Internet  Privacy  Privacy  human  rights  presidency  barackobama  corporate  espionage  industrial  espionage  cyber  espionage  cyber  attack 
may 2015 by asterisk2a
President Obama: The Re/code Interview - YouTube
slick downplay, comparing cyber war & industrial, coroporate cyber espionage (breaking in into Gemalto for SIM encryption keys) with basketball. And also tapping the phone of Angela Merkel ... &! http://youtu.be/td7Dcsco-WY "Obama on the state of the world: the extended Vox conversation" - is he a realist or just a coward!? /// >> http://www.bbc.co.uk/news/technology-31545050 &! http://www.spiegel.de/netzwelt/netzpolitik/nsa-und-gchq-haben-sim-karten-schluessel-von-gemalto-erbeutet-a-1019515.html &! Silicon Valley subbed him on his proposals and road show 20 min away from their door, is a tell tale what they think of him saying one thing and what the NSA&Co put them through and demands (see Yahoo!'s case with the FISA Court) - tcrn.ch/17ovyqD &! If it were a private person were hack into and steal Gemalto encryption keys, the person would be thrown in jail FOREVER! youtu.be/bIpNXh9Nh9k?t=16m32s &! NSA, GCHQ, Five Eyes like to bully people to do X for them & drop possible charges.
presidency  barackobama  NSA  USA  Gemalto  SIM  encryption  cyber  war  GCHQ  governance  on  Terror  Cryptopocalypse  cryptography  corporate  espionagem  industrial  espionage  espionage  cyber  espionage  UK  Five  Eyes  Internet  Privacy  Privacy  human  rights  Stasi  Stasi  2.0  organised  crime  on  Drugs  ethical  machine  Checks  and  Balances  Separation  of  powers  democracy  abuse  of  power  David  Cameron  cyber  crime  cyber  attack  cyber  securityr  IT  Security  surveillance  state  Orwellian  FISA  Court  FISAAA  Secret  Courts  Silicon  Valley 
february 2015 by asterisk2a
The NSA Reportedly Stole Millions Of SIM Encryption Keys To Gather Private Data | TechCrunch
The American National Security Agency (NSA), and the British Government Communications Headquarters (GCHQ), similar clandestine intelligence agencies, stole SIM card encryption keys from a manufacturer, allowing the groups to decrypt global cellular communications data. [...] “NSA and GCHQ basically have the keys to decyrpting mobile communications anywhere in the world, even without the participation of local communication carriers (which, even if not much, acts as some check on intelligence agency behavior). It’s the equivalent of these agencies having printed doorkeys for the front doors to millions or even billions of homes around the world, just in case they one day decided they needed to get in. Frankly, people should have no faith in the security of global mobile communications.” >> CLU’s Christopher Soghoian - "Steal millions of crypto keys and then complain publicly that encryption is a problem. The UK and US govs are shameless."
NSA  GCHQ  governance  War  on  Terror  encryption  Cryptopocalypse  cryptography  corporate  espionage  industrial  espionage  espionage  cyber  espionage  USA  UK  Five  Eyes  Internet  Privacy  Privacy  human  rights  Stasi  Stasi  2.0  presidency  barackobama  organised  crime  War  on  Drugs  ethical  machine  Checks  and  Balances  Separation  of  powers  democracy  abuse  of  power  David  Cameron  Gemalto  cyber  crime  cyber  attack  cyber  security  cyber  IT  surveillance  state  Orwellian 
february 2015 by asterisk2a
Linux Journal - Wikipedia, the free encyclopedia
In early July 2014 it was revealed that the NSA's XKeyscore program targeted readers of Linux Journal, which the NSA considers an "extremist forum". // &! NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance - http://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance // &! NSA targets the privacy-conscious - http://daserste.ndr.de/panorama/aktuell/NSA-targets-the-privacy-conscious,nsa230.html "Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA." - visiting site X puts you on watch list/collect data list - ie Wikileaks, Tor, Linux Journal, CCC unter anderem !+& bit.ly/1sZSWV9 >> leads to self-censorship like in East Germany.
NSA  Internet  Privacy  Privacy  human  rights  XKeyscore  Linux  CCC  activism  activists  Hacktivism  target  targeting  GCHQ  encryption  cryptography  Cryptopocalypse  IT  Security  cyber  cyber  war  cyber  espionage  corporate  espionage  industrial  espionage  espionage  FISA  Court  FISAAA  Foreign  Intelligence  Five  Eyes  presidency  barackobama  Stasi  Stasi  2.0  history  backdoor  backdoors  abuse  of  power  surveillance  state  Orwellian  Big  Data  Meta  Data  Unix  Google  Search  Tor  VPN  anonymity  self-censorship  free  speech  freedom  of  press  freespeech  free  press  Pressefreiheit  Meinungsfreiheit  Information  wants  to  be  free  knowledge  M 
february 2015 by asterisk2a
Kaspersky claims US spies can infect computers with malware that is almost impossible to detect | PandoDaily
NSA has found a way to infect computers targeted for surveillance with malware that is almost impossible to detect and even harder to remove. Kaspersky Lab says in its report that a threat actor known as the Equation Group made this possible by infecting firmware used in hard drives made by the world’s top manufacturers. // &! Reddit - bit.ly/1ATpm6v >> According to Kaspersky, getting the malicious code into a drive’s firmware is not an easy task, and can’t be done with help of public tools, meaning that the NSA had to have access to source codes for hard drives produced by these companies. [meaning they asked for access (and or intercepted orders) when OEM orders came from targeted countries/firms? or spoof hw vendor sites and let them download the manipulated firmware] &! bit.ly/19vzSpI - ie Iran and Russia.
NSA  CIA  surveillance  state  Orwellian  Foreign  Intelligence  corporate  espionage  cyber  espionage  espionage  industrial  espionage  GCHQ  Five  Eyes  backdoor  backdoors  corporate  values  corporate  governance  ethical  machine  FISA  Court  FISAAA  Regin  Whistleblower  rootkit  cyber  war  Iratemonk  Firmware  nls_933w.dll  USB  Air  Gap  cyber  security  cyber  attack  cyber  crime  USA  presidency  barackobama  Stuxnet  organised  crime  human  rights  cryptography  Cryptopocalypse  encryption  IT  on  Terror  Malware  Internet  Privacy  Privacy 
february 2015 by asterisk2a
Start Ups Should Prioritize Security, Even at the Earliest Stages - YouTube
>> weakest link is human being in the middle - thus need advisory/consulting/one person hire whose sole focus is it to make the org and tech secure and the people savvy. &! &! Five Easy Steps to Secure Your Startup - https://www.youtube.com/watch?v=SBWHWCFm9xQ - 1. get rid of MS Office - use Google Docs or other secure online secure office docs replacement / 2. Use ONE dedicated machine for online banking/finance (netbook) / 3. two-factor authentication - especially email / 4. do background checks / 5. plus teach savvyness in password choice and tools, general awareness and general security issues ie targeted phishing etc etc - on regular (updated) basis ... "most if not all attacks start with phishing"
IT  Security  Start-Up  lesson  Start-Up  advice  cyber  war  cyber  attack  DDoS  encryption  cryptography  Cryptopocalypse  cyber  cyber  crime  internet  online  password  phishing  phishing  scam  two-factor  authentication 
february 2015 by asterisk2a
TimesTalks - Laura Poitras, Glenn Greenwald and Edward Snowden with David Carr
Don’t miss this special opportunity to hear the director of CITIZENFOUR – the film nominated for the Academy Award for Best Documentary Feature – the first journalist to write about Snowden’s revelations and Snowden himself (via live video) in conversation with New York Times media columnist David Carr about the film and the issues it raises. // min 43 --- presidency barack obama worst administration ever for clamping down on freedom of press, whistleblowers, against transparency, governance, seperation of powers/checks and balances (NSA/CIA), - Obama got the executive power to close guantanamo, shut off surveillance without warrants. // subverts democracy. &! &! U.S. DROPS TO 49TH IN WORLD PRESS FREEDOM RANKINGS, WORST SINCE OBAMA BECAME PRESIDENT - bit.ly/1zaIdVO
CITIZENFOUR  Edward  Snowden  Laura  Poitras  Glenn  Greenwald  presidency  barackobama  transparency  NSA  governance  oversight  accountability  Whistleblower  freedom  of  press  freepress  Pressefreiheit  free  press  free  speech  Torture  Foreign  Intelligence  Intelligence  Agency  GCHQ  CIA  Warrant  FISAAA  FISA  Court  Europe  China  cyber  war  values  idealism  surveillance  state  Orwellian  moral  beliefs  ethical  machine  ethical  beliefs  corporate  espionage  cyber  espionage  industrial  espionage  espionage  democracy  No  Representation  Privacy  Internet  Privacy  encryption  cryptography  Cryptopocalypse  human  rights  Act  Patriot  Act 
february 2015 by asterisk2a
With the help of Pinterest, Twitter, and others, a new Facebook platform wants to keep the web secure | PandoDaily
The service is called ThreatExchange, and companies like Yahoo, Twitter, and Pinterest have all agreed to share threat information with each other via the boringly-named tool. But these companies aren’t the only ones worried that information about digital threats isn’t shared as well as it could be. A new agency, the Cyber Threat Intelligence Integration Center, has been formed to facilitate similar sharing amongst various intelligence agencies. ThreatExchange and CTIIT were both formed out of the belief that digital threats are a puzzle whose pieces are held by various groups. The only way to solve that puzzle, then, is to convince everyone to share their pieces. Otherwise the puzzle will always be incomplete. // what if NSA abuses knowledge this org got (of US companies) to abuse the knowledge via FISA Court injunction not to release it to public knowledge - ie to compromise and or steal intelligence from non-US firms.
IT  Security  cyber  encryption  ThreatExchange  Silicon  Valley  internet  online  cryptography  Cryptopocalypse  DDoS  NSA  CIA  BND  Five  Eyes  surveillance  state  Orwellian  Intelligence  Agency  Foreign  Intelligence  transparency  governance  accountability  Europe  China  FISA  Court  FISAAA  ethical  machine  cyber  espionage  corporate  espionage  industrial  espionage  cyber  attack  cyber  war  cyber  crime 
february 2015 by asterisk2a
EFF’s Game Plan for Ending Global Mass Surveillance | Electronic Frontier Foundation
[...] Most people haven’t even heard of it, but Executive Order 12333 is the primary authority the NSA uses to engage in the surveillance of people outside the U.S. While Congress is considering much-needed reforms to the Patriot Act, there’s been almost no debate about Executive Order 12333. [...] [... and its also the private industry as contractor shovelling money for Wall Street shareholders, paid for by tax payer money ...]
EFF  surveillance  state  Orwellian  NSA  encryption  cryptography  Cryptopocalypse  Internet  Privacy  Privacy  Big  Data  metadata  Meta  Data  human  rights  USA  Five  Eyes  Foreign  Intelligence  Intelligence  Agency  GCHQ  backdoor  backdoors  CIA  FBI  cyber  security  cyber  attack  cyber  war  cyber  espionage  corporate  espionage  espionage  FISA  Court  FISAAA  presidency  barackobama  David  Cameron  democracy  governance  transparency  accountability  Career  Politicians  Patriot  Act  Act  Whistleblower 
february 2015 by asterisk2a
Security Nightmares 2014 [31c3] mit Frank Rieger & Ron - YouTube
see last 2 minutes, regular change of passwords and encryption method. &! Black Hat USA 2013 - The Factoring Dead: Preparing for the Cryptopocalypse - http://youtu.be/33RbRid1deo
encryption  password  integrity  password  security  cryptography  cryptowar  cryptopocalypse  internet  security  cyber  security  online  security  Five  Eyes  NSA  GCHQ  surveillance  state  Orwellian 
february 2015 by asterisk2a

related tags

&  1%  2.0  3D  9/11  21stcentury  abundance  abuse  accountability  Act  activism  activist  activists  advertisement  advertising  advice  affairs  Agency  Agreement  AI  Air  AirBnB  al-Qaida  Alan  algorithm  Alibaba  analytics  and  Android  Angela  anonymity  Antivirus  Apple  artificial  Assange  attack  augmented  austerity  authentication  automation  avoidance  awareness  backdoor  backdoors  bailout  Balances  barackobama  Basic  be  beliefs  Bernie  Big  Bill  Blair  blind  BND  book  Bremmer  Brexit  bribery  British  Brother  bulk  business  cablegate  Cameron  campaign  capital  capitalism  Career  Carrier  CCC  CCTV  censorship  Charter  Checks  Chelsea  China  choice  CIA  Cina  CITIZENFOUR  civil  Class  Clinton  coefficient  Cold  collection  commoditization  commodity  complex  computing  conflict  conglomerate  Congress  consent  Conservative  Constitution  content  contract  contractor  cookie  corporate  corruption  cost  Court  Courts  creative  Creatives  creator  crime  crony  cryptography  cryptopocalypse  cryptowar  cyber  damage  data  Dataretention  David  DDoS  democracy  democrats  Despotism  destruction  disrupting  disruption  DNC  doctor  dogma  domestic  DRIPA  Drone  Drugs  Eating  economic  economics  Economy  Edward  EFF  efficiencies  election  Elizabeth  Empire  encryption  energy  Engineering  Enigma  error  espionage  espionagem  Establishment  ethical  Europe  European  evasion  exploit  exploits  extremism  Eyes  Facebook  Failure  False  far-right  FBI  Fear  fearmongering  Firmware  FISA  FISAAA  Five  Flag  folly  forecast  foreign  FOSS  framing  FRance  free  freedom  freelance  freepress  freespeech  Future  G8  gains  Gap  Gaza-Israel  GCHQ  Gemalto  general  George  Germany  Gesellschaft  GFC  Gini  Glenn  Gmail  GNU  GNU/Linux  Google  governance  GPL  GPS  Greenwald  Grid  GroKo  groups  gun  Hacktivism  Hegemony  Hillary  history  homescreen  Hour  human  Ian  idealism  ideology  image  Imperialism  income  Indie  Indignados  Indignants  industrial  inequality  informal  Information  injustice  innovation  innovator  integrity  intelligence  interest  internet  intervention  investigative  Investigatory  Iraq  Iratemonk  Is  ISIL  ISIS  islamic  ISP  Israel  IT  Jaron  Jobs  journalism  journalismus  Julian  Justice  KGB  knowledge  Lanier  Laura  law  Leadership  Leiharbeit  lesson  liberty  Linux  lobby  Lobbying  lobbyist  long-term  Lügenpresse  M  machine  Malware  Manning  manufactured  Manufacturing  marginal  marketplace  markets  maximisation  May  media  Meinungsfreiheit  Merkel  Met  Meta  metadata  MI5  MI6  Microsoft  Middle  military  military–industrial  mirror  mobile  mobilephone  model  monopoly  moral  Music  nasty  national  Nationalism  neoconservatism  neoconservatives  neoliberal  neoliberalism  Net  netzpolitik  netzpolitik.org  Neutrality  Niedriglohn  Niedriglohnsektor  nls_933w.dll  No  NRA  NSA  occupywallstreet  of  oligarchy  oligopol  oligopoly  on  online  Open  Opportunism  opportunist  organised  Orwellian  Osborne  oversight  ownership  Palestine  party  password  Patriot  patriotact  patriotism  Pentago  Pentagon  perception  perma  perma-cookie  phishing  plan  Platform  Poitras  Polarisation  Police  policy  political  Politicians  Politics  populism  Positioning  Postgeheimnis  power  powers  PR  prediction  predictions  presidency  presidential  press  Pressefreiheit  printing  PRISM  Privacy  Privileged  profiling  profit  profiteer  promises  propaganda  protectionism  public  quantum  radicalism  Rechtsextremismus  Rechtsruck  recognition  Regin  relations  Representation  republican  republicans  retention  Reverse  Rich  rights  Robotics  rootkit  Russia  Sanders  scam  Schengen  Search  Secret  Sector  security  securityr  Selectors  self-censorship  self-employment  sentiment  Separation  Service  Share  shareholder  short-term  Silicon  SIM  Smart  Smartphone  smoke  smoking  Snoopers  Snowden  social  society  Software  Source  speech  spin  spot  squeezed  stakeholder  Start-Up  Stasi  state  Street  Strike  Stuxnet  Super  surveillance  Surveillance-Industrial  System  Taliban  target  targeting  tax  TaxiOS  Tempora  Terror  The  theory  Theresa  thinking  ThreatExchange  TISA  to  Toff  Tony  TOR  Tor  Tories  Torture  TOS  Totalitarian  Totalitarianism  TPP  tracking  transparency  TrueCrypt  trust  trustagent  TTIP  Turing  Twitter  two-factor  Uber  UK  Union  Universal  Unix  USA  USB  user  Valley  value  values  vested  view  violence  Vorratsdatenspeicherung  VPN  Wall  wants  war  Warfare  Warrant  Warren  Warrent  Wars  Washington  Werkvertrag  Wertegesellschaft  WhatsApp  Whisteblower  Whistleblower  Wikileaks  Windows  Wireless  WMD  Work  World  WW2  XKeyscore  Yahoo!  YouTube  Zeitarbeit  Zero 

Copy this bookmark:



description:


tags: