asterisk2a + fbi   69

UK's Trident nuclear submarines 'vulnerable to catastrophic hack' | UK news | The Guardian
“To imagine that critical digital systems at the heart of nuclear weapon systems are somehow immune or can be confidently protected by dedicated teams of network managers is to be irresponsibly complacent.”
Trident  nuclear  war  WannaCry  cyber  cyberhack  cyberattack  WinXP  WindowsXP  NHS  NSA  FBI  Wikileaks  Microsoft 
june 2017 by asterisk2a
PanamaPapers: Eine Quelle - 400 Journalisten | NDR
// eng version - PanamaPapers: One Source, 400 Journalists - https://youtu.be/edIjDRghH0A ... min 10 ... this is also about terrorism, war crimes, arms dealers, money laundering, drug lords money, ... ... Greed has no concience. a paralell world. ... >> !!! min 24: many names ie in Germany can't be named because they are not public people and or that there is no evidence of criminal activity (used legal loophole to "avoide" tax). << Same every other country. That is why these papers won't be published raw searchable like Wikileaks. << !!! //&! Panama Papers - die Doku - April.2016 #panamapapers - Steueroasen Briefkastenfirmen mossack fonseca - youtu.be/_2IASABeghc //&! bbc.co.uk/programmes/b076vwwy
Panama  Papers  tax  amnesty  tax  avoidance  tax  evasion  investigative  journalism  journalism  journalismus  War  on  Drugs  arms  trade  money  laundering  War  on  Terror  NSA  CIA  FBI  white-collar  crime  Bahamas  CaymanIslands  Cayman  Islands  Luxembourg  Whistleblower  corruption  bribery  G20  G8  IMF  OECD  economic  damage 
april 2016 by asterisk2a
Redaction error reveals FBI did target Lavabit to spy on Edward Snowden
A redaction oversight by the US government has finally confirmed that the Federal Bureau of Investigation’s targeting of secure email service Lavabit was used specifically to spy on Edward Snowden.

Ladar Levison, creator of the email service, which was founded on a basis of private communications secured by encryption and had 410,000 users, was served a sealed order in 2013 forcing him to aid the FBI in its surveillance of Snowden.

Levison was ordered to install a surveillance package on his company’s servers and later to turn over Lavabit’s encryption keys so that it would give the FBI the ability to read the most secure messages that the company offered. He was also ordered not to disclose the fact to third-parties.
Lavabit  encryption  FBI  Whistleblower  Pentagon  CIA  NSA  Edward  Snowden  Wikileaks  Bradley  Manning  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Patriot  Act  FISA  Court  Secret  Court 
march 2016 by asterisk2a
The tone between Apple and the FBI is now openly hostile | The Verge
Apple attorney: "I can only conclude that the DoJ is so desperate at this point that it has thrown all decorum to the winds... Everyone should beware, because it seems like disagreeing with the Department of Justice means you must be evil and anti-American. Nothing could be further from the truth." //&! Apple has accused the US government of trying to "smear" it with "desperate" and "unsubstantiated" claims. - bbc.in/24UbxT5
War  on  Terror  Patriot  Act  Apple  FBI  encryption 
march 2016 by asterisk2a
Security Experts Warn of Orwellian Future in Apple Case | Re/code
[ all without a warrant ] Your Samsung smart TV or Amazon Echo might spy on you next if the government succeeds in forcing Apple to disable security protections on a smartphone to further the FBI’s investigation into the San Bernardino attacks. Security experts from Stanford, Harvard and Rice universities and independent researchers laid out this Orwellian scenario in a court filing today, supporting Apple’s fight against a court order to help investigators hack a smartphone used by one of the assailants in the mass killing. The group of seven experts argues that the judge’s order [...] disturbing possibilities for how law enforcement might turn everyday items into surveillance tools. //&! Amazon Quietly Disabled Encryption in Latest Version of Fire OS - on.recode.net/1TXeXPB //&! Twitter, Airbnb, eBay, Kickstarter, LinkedIn and Square File Brief Supporting Apple - on.recode.net/1LXQ3sG &! Three Industry Trade Groups to File Briefs Supporting Apple - on.recode.net/1oTUdwx
Apple  FBI  Surveillance-Industrial  Complex  surveillance  surveillance  state  Orwellian  Internet  Privacy  Privacy  encryption  Cryptopocalypse  cryptography  War  on  Terror  Patriot  Act  bulk  data  collection  Dataretention  Vorratsdatenspeicherung  Meta  Big  Smartphone  mobile  homescreen  anonymity  human  rights  FISA  Court  FISAAA  Secret  Courts  GCHQ  NSA  Snoopers  Charter  Yahoo!  backdoors  backdoor  GPS  profiling  Facebook  Twitter 
march 2016 by asterisk2a
Europe Must Stand Up to American Cyber-Snooping - SPIEGEL ONLINE
Is Barack Obama a friend? Revelations about his government's vast spying program call that assumption into doubt. The European Union must protect the Continent from America's reach for omnipotence.
USA  presidency  barackobama  War  on  Terror  organised  crime  Surveillance-Industrial  Complex  Orwellian  State  surveillance  bulk  data  collection  FISA  Court  FISAAA  Edward  Snowden  cablegate  Wikileaks  Chelsea  Manning  Whistleblower  UK  NSA  FBI  CIA  MI5  MI6  GCHQ  Snoopers  Charter  Patriot  Act  Fear  fearmongering  scaremongering  Internet  Privacy  Privacy  human  rights  Secret  Courts  Big  Vorratsdatenspeicherung  Dataretention  mobilephone  Hegemony  China  Russia  BRIC  Empire 
march 2016 by asterisk2a
Here Are the Most Interesting Things Apple and the FBI Said About Encryption | Re/code
on.recode.net/1QsrklN - FBI Director James Comey shifted from his shopworn phrase about “going dark” and instead talked about Apple and other technology companies using encryption to create “warrant-proof spaces in our lives.” Naturally, this is a technological development that law enforcement sees as a giant roadblock to gathering evidence in criminal investigations. He also admitted the bureau screwed up when it changed the Apple ID password on the shooter’s phone.
Apple  FBI  encryption  cryptography  Cryptopocalypse  Internet  Privacy  Privacy 
march 2016 by asterisk2a
Chris Hedges on What it Takes to be a Rebel in Modern Times - YouTube
If you care about the truth you eventually run into problems as the journalist who usually manipulates facts for a living. // neoliberalism sold to us through lies and manipulated facts. // 2/3rds of the country in poverty. // mania for hope is a political pacifier even for the liberals, keeping people hopeful - keeps people complacent. // moral imperative for civil disobedience. // but do not use the word hope! // game is fixed. // rebellion led by day class intellectuals. that band together with the underclass. // if you have whole-sale surveillance, you can't have investigative journalism // it's about ratings and money, they don't do journalism. << corporate media. // dismantling BBC by tories is a power play by tories (power elite) // &! redd.it/3x3kw7 - Most of the information we spread online is quantifiably “bullshit” - The internet encourages the spread of information that is emotionally resonant but factually untrue
journalismus  investigative  journalism  journalism  mainstream  media  Noam  Chomsky  Chris  Hedges  activists  activism  democracy  manufactured  consent  society  propaganda  newscorp  News  Corp.  News  Corporation  social  democracy  trust  trustagent  distrust  neoliberalism  neoliberal  Gini  coefficient  inequality  Super  Rich  1%  poverty  Revolution  Rebellion  Occupy  Central  occupywallstreet  crony  capitalism  corporate  state  corporate  media  Surveillance-Industrial  Complex  surveillance  state  populism  Wall  Street  shareholder  value  profit  maximisation  lobbyist  lobby  Lobbying  revolving  door  interest  groups  vested  interest  rat  race  status  anxiety  zombie  consumer  disenfranchise  disenfranchised  post-racial  America  economic  justice  #BlackLivesMatter  presidency  barackobama  abuse  of  power  political  theory  political  economy  CIA  NSA  FBI  surveillance  Hacktivism  FOI  Freedom  of  Information  Act  transparency  oversight  accountability  media  conglomerate  conglomerate  business  model  pageviews  BBC  British  Broadcasting  Company 
december 2015 by asterisk2a
Video "Stark: Demokratie durch Überwachung in Gefahr" | Zapp | ARD Mediathek
Der "Spiegel" ist offenbar ins Visier von Geheimdiensten geraten, das Bundeskanzeleramt soll davon seit 2011 gewusst haben. "Spiegel"-Redakteur Stark zeigt sich erschüttert. // freie presse ist pfeiler der demokratie. - 4te gewalt. checks and balances. // mit hilfe von selectoren liste werden journalisten ueberwacht! und ihre bewegung via cellphone tracking. //&! spiegel.de/thema/national_security_agency/ //&! Vorratsdatenspeicherung schreckt Whistleblower ab. "Sammelwut verprellt Informanten." - bit.ly/1lCqrKZ - Vorratsdatenspeicherung hilft nicht bei Verbrechensaufklaerung.
NSA  GCHQ  Whistleblower  surveillance  Surveillance-Industrial  Complex  surveillance  state  BND  Angela  Merkel  journalismus  investigative  journalism  journalism  Big  Data  Edward  Snowden  Wikileaks  democracy  social  democracy  corporate  state  corporate  media  Pressefreiheit  freedom  of  press  Dataretention  Snoopers  Charter  Vorratsdatenspeicherung  Russia  China  bulk  collection  Meta  Data  Internet  Privacy  Privacy  human  rights  presidency  barackobama  Hegemony  USA  War  on  Terror  national  interest  patriotism  Patriot  Act  CIA  FBI  Iraq  War  cablegate  FISA  Court  FISAAA  Secret  Courts  military–industrial  military  intervention  TTIP  TPP  TISA  encryption  Cryptopocalypse  cryptography  Separation  of  powers  Checks  and  Balances  organised  crime  War  on  Drugs  Positioning  framing  PR  spin  doctor 
december 2015 by asterisk2a
Krieg ǀ Evolution der Gewalt — der Freitag
Krieg Die Geschichte der Kriege hört nicht auf, sie ändern nur ihre Form und ihre Gestalt: Herfried Münklers neuer Wälzer // Kriegssplitter: Die Evolution der Gewalt im 20. und 21. Jahrhundert Herfried Münkler Rowohlt 2015, 400 S., 24,95 €
cyber  war  Drone  Strike  Drone  Warfare  civil  war  private  military  company  Blackwater  Academi  CIA  FBI  corporate  espionage  industrial  espionage  cyber  espionage  Iraq  Lybia  arms  trade  military–industrial  complex  military  intervention  military  Surveillance-Industrial  surveillance  state  surveillance  self-censorship  Dictatorship  free  speech  freedom  of  expression  freedom  of  speech  Pressefreiheit  freedom  of  press  of  Information  Act  FOI  democracy  No  Representation  Career  Politicians  neoconservatism  neoconservatives  TTIP  NAFTA  crony  capitalism  corporate  state  corporate  media  Lügenpresse  manufactured  consent  Polarisation  Russia  vladimirputin  Putin  Crimea  Crimea  Crisis  economic  free  trade  trade  agreement  CETA  TPP  TISA  protectionism  sanctions  OPEC  China  commodity  prices  class  neoliberalism  neoliberal  profiteer  racket  Wall  Street  profit  maximisation  shareholder  value  human  rights  Internet  Privacy  Privacy  G  Zero  World  Police  USA  national  interest  Nationalism  corporate  scandal  book  Contractor  Contractor  outsourcing 
october 2015 by asterisk2a
Pando: Sec. of Defense to Silicon Valley: “There is no limit to what we can achieve together"
Ash Carter announces a new public-private project and delivers a recruitment pitch. [...] a hawkish focus on his goal: to develop stronger private partnerships in Silicon Valley. // [ defence contractor ] // &! Andreessen: Pentagon Wants to Work With Silicon Startups - youtu.be/PTBV4rowPsg &! youtu.be/_lQWIFi0D4k "nation state wars" &! // &! IT Security needs time in stealth before production ready - youtu.be/VY6TUw3J9FY // &! The Takeaway - youtu.be/HlDfMi9Uzqc - attracting talent & repair relations post-Edward Snowden & 'state-subsidies' for Valley firms (defence/defense contracts) // &! youtu.be/C_qeUCU7N1o - rebuilding bridge between SV and Pentagon // youtube.com/watch?v=0dZs9wzQsZI
Pentagon  military–industrial  complex  Surveillance-Industrial  surveillance  state  NSA  FBI  CIA  Orwellian  GCHQ  Five  Eyes  interest  groups  vested  interest  Big  Data  abuse  of  power  technological  progress  Software  Is  Eating  The  World  World  Police  corporate  espionage  cyber  espionage  industrial  espionage  Europe  China  Israel  Russia  Japan  Cold  War  cyber  Drone  Warfare  Drone  Strike  NASA  Department  of  Defense  counter  culture  Silicon  Valley  Wall  Street  profit  maximisation  shareholder  value  Internet  Privacy  Privacy  cyber  attack  cyber  security  Net  Neutrality  IoT  PR  spin  doctor  public  relations  Edward  Snowden  Wikileaks  Whistleblower  Julian  Assange  Career  Politicians  presidency  barackobama  Chelsea  Manning  Defense  Contractor  trust  distrust  trustagent 
august 2015 by asterisk2a
Einreise in USA: So sollten Sie sich am Flughafen verhalten - SPIEGEL ONLINE
Schneider ist nicht die Einzige, die draußen bleiben musste. Mehr als 700 Deutsche sind wie sie im Jahr 2013 an der Grenze zur USA abgewiesen worden - also Hunderte, aber für die US-Botschaft in Berlin "eine unbedeutende Anzahl", wie ihr Pressesprecher mitteilte. Immerhin seien 2,7 Millionen Bundesbürger in dem Jahr in die USA gereist. [...] Wenn die Grenzbeamten erst einmal einen Verdacht hätten, "sind sie schwer umzustimmen", sagt Rechtsanwalt Thomas Schwab von der Kanzlei Winheller in Frankfurt. Er unterstützt seit Jahren Mandanten bei der Beantragung für USA-Visa. [...] Bei den abgewiesenen Reisenden vermuteten die Beamten oft Terrorgefahr oder die Absicht, ohne entsprechendes Visum zu arbeiten oder einzuwandern. // https://www.google.co.uk/?gfe_rd=cr&ei=0uvLVc-IHa-A7QbMxrf4DA#q=site:firstlook.org+%2B+no+fly+list // &! GOVERNMENT MAY NOW TELL YOU WHY YOU'RE ON "NO FLY" LIST, BUT NOT ALWAYS - bit.ly/1FO9VKO // &! bit.ly/1hyWauO - illegal immigration in USA. / undocumented / alien
no  fly  list  USA  NSA  Five  Eyes  surveillance  state  Orwellian  War  on  Terror  National  Security  FBI  Pentagon  VISA  travel  advice  immigrants  immigration 
august 2015 by asterisk2a
Sicherheitshysterie nach britischem Urteil gegen Vorratsdatenspeicherung: „Tausende Leben in Gefahr“ | netzpolitik.org
Die Notwendigkeit der technisierten Überwachung wird gar nicht mehr hinterfragt, die gerichtlichen Backpfeifen an die britische Regierung stattdessen in grotesker Weise kommentiert. So titelt beispielhaft der Telegraph in Anlehnung an eine Aussage der britischen Innenministerin Theresa May: Thousands of lives at risk after High Court rules snooping powers unlawful. // theguardian.com/world/surveillance - bit.ly/1fa4mQP // &! bit.ly/1CMnrUg &! bit.ly/1DoKqiZ - Why appeasing governments over encryption will never work. David Cameron & the director of the FBI have both asked for ‘backdoors’ to be included in encryption software [...] Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications, is worth reading in full. It concludes that proposals for backdoors are “unworkable in practice, raise enormous legal and ethical questions, and would undo progress on security at a time when internet vulnerabilities are causing extreme economic harm”.
Snoopers  Charter  Vorratsdatenspeicherung  DRIPA  data  retention  law  bulk  data  collection  propaganda  surveillance  surveillance  state  Orwellian  False  Flag  War  on  Terror  ISIS  ISIL  Surveillance-Industrial  Complex  military–industrial  UK  GCHQ  MI5  Met  Police  abuse  of  power  transparency  accountability  democracy  Secret  Courts  Five  Eyes  British  Empire  populism  Lügenpresse  manufactured  consent  corporate  state  NSA  Career  Politicians  Tony  Blair  presidency  barackobama  David  Cameron  society  Gesellschaft  European  Union  Internet  Privacy  Privacy  human  rights  self-censorship  encryption  Cryptopocalypse  backdoors  backdoor  FBI  MI6  cyber  corporate  espionage  industrial  espionage  cyber  espionage  Intelligence  Agency  Foreign  Intelligence  national  interest  protectionism  economic  damage  IT  Security  policy  folly  policy  error 
july 2015 by asterisk2a
US torture doctors could face charges after report alleges post-9/11 'collusion' | Law | The Guardian
The largest association of psychologists in the United States is on the brink of a crisis, the Guardian has learned, after an independent review revealed that medical professionals lied and covered up their extensive involvement in post-9/11 torture. The revelation, puncturing years of denials, creates the potential for leadership firings, loss of licenses and even prosecutions. For more than a decade, the American Psychological Association (APA) has maintained that a strict code of ethics prohibits its more than 130,000 members to aid in the torture of detainees while simultaneously permitting involvement in military and intelligence interrogations.
9/11  Torture  Interrogation  national  interest  NSA  CIA  FBI  gwbush  bush  georgewbush  presidency  barackobama  philosophy  USA  populism  manufactured  consent  War  on  Terror  surveillance  state  Orwellian  FISA  Court  Secret  Courts  Patriot  Act  Nationalism  corporate  state  propaganda  media  conglomerate  Lügenpresse  Iraq  War  WMD  al-Qaida  Drone  Strike  Drone  Warfare  Five  Eyes  Intelligence  Agency  Foreign  Intelligence  policy  affairs  UK  Europe  Germany  United  Nations  Security  Council  United  Nations 
july 2015 by asterisk2a
Silk Road Prosecutors Ask Judge to 'Send a Message' In Ulbricht Sentencing | WIRED
[ politics involved ] Ahead of Ulbricht’s sentencing Friday, prosecutors in his case have sent the judge a 16-page letter asking that Ulbricht be given “a lengthy sentence, one substantially above the mandatory minimum.” And one of the reasons for that harsh sentence, the Department of Justice attorneys argue, is to “send a clear message” to anyone who would follow in Ulbricht’s footsteps and create the next Dark Web drug market. [...] “Although the Government has achieved some successes in combating these successor dark markets, they continue to pose investigative challenges for law enforcement,” reads the letter. “To the extent that would-be imitators may view the risk of being caught to be low, many are still likely to be deterred if the stakes are sufficiently high.” That argument ignores plenty of studies that show that long prison sentences don’t tend to deter crime. // &! bit.ly/1PVEvgk &! youtu.be/BvC9oDlT8mM &! youtu.be/weN0yyTSk4I
Aaron  Swartz  Silk  Road  Justice  System  cyber  crime  cyber  war  USA  UK  Career  Politicians  Dark  Web  darknet  Unrechtsstaat  NSA  GCHQ  Five  Eyes  surveillance  state  Orwellian  mandatory  minimum  sentences  on  Drugs  presidency  barackobama  FBI  CIA  Ross  Ulbricht 
may 2015 by asterisk2a
“The biggest company you’ve never heard of” acquired by major military contractor you’ve heard of | PandoDaily
“Spies For Hire: The Secret World of Intelligence Outsourcing” // This merely scratches the surface of one of the biggest Silicon Valley firms you’ve never heard of. And it serves as a reminder that Silicon Valley is a pure creation of the US government military-intelligence complex, a relationship that today’s tech heroes would rather we all forgot—a relationship embedded in Santa Clara County’s genetic coding, no matter how well those secrets are kept. // http://pando.com/2014/03/29/google-apparently-scrubs-military-contractor-partner-listing-after-pando-report
book  surveillance  state  Orwellian  NSA  Pentagon  USA  Wall  Street  for-profit  budget  deficit  presidency  barackobama  Patriot  Act  FISA  Court  FISAAA  CIA  FBI  intelligence  contractor  contractor  Agency  military-intelligence  military–industrial  complex  DARPA  Silicon  Valley  outsourcing  Palantir 
may 2015 by asterisk2a
Twitter case exposes the Justice Department’s nonsensical views on disclosing government surveillance | PandoDaily
And the government’s arguments, even if they are legally sound, are starting to make it clearer than ever that it doesn’t want to talk about its surveillance programs.
Twitter  FISA  Court  FISAAA  surveillance  state  Orwellian  USA  NSA  FBI  War  on  Terror  War  on  Drugs  organised  crime  Five  Eyes  GCHQ  presidency  barackobama 
may 2015 by asterisk2a
Kommentar: Warum die aktuellen Erkenntnisse über das Versagen des Kanzleramtes bei BND-Aufsicht schon lange abzusehen waren | netzpolitik.org
"Beihilfe." // &! Eiertanz: Viele, viele naive Fragen zum BND-Skandal - youtu.be/y9pRz5KQ6vo // &! Wirtschaftsspionage für Amerika? "Das Ganze ist ein Riesenskandal", sagt Hans-Christian Ströbele (Grüne) zur BND-Spitzelaffäre. - on.fb.me/1GznzV8 profiling of EU politicians, policy makers as well as EADS, EuroCopter and other stuff, shows that War on Terror, Drugs, and organised crime as a pretence is wrong to a certain extent, it shows that power corrupts and absolute power corrupts absolutely. // &! Der BND-Skandal - Worum geht's eigentlich? youtu.be/pcGzfv-Fndc // &! on.fb.me/1POvdPJ - Was ist mit der Bundeskanzlerin? Wann spricht sie zum BND-Skandal? // German intelligence agency knew NSA was spying on European leaders as early as 2008 - bit.ly/1DEvH3h "It was too worried about the NSA retaliating by limiting the information it shares." Stockholm Syndrome. No Leadership. Only Career Politicians.
surveillance  state  Orwellian  NSA  BND  cyber  espionage  corporate  espionage  industrial  espionage  Five  Eyes  GCHQ  Angela  Merkel  barackobama  presidency  GroKo  Career  Politicians  transparency  democracy  No  Representation  FBI  Torture  accountability  profiling  military–industrial  complex  cyber  crime  cyber  security  cyber  war  Foreign  Intelligence  policy  affairs  USA  World  Police  relations  corruption  abuse  of  power  Edward  Snowden  Privacy  Internet  Privacy  encryption  IT  National  security  cybersecurity  online  security 
april 2015 by asterisk2a
EFF’s Game Plan for Ending Global Mass Surveillance | Electronic Frontier Foundation
[...] Most people haven’t even heard of it, but Executive Order 12333 is the primary authority the NSA uses to engage in the surveillance of people outside the U.S. While Congress is considering much-needed reforms to the Patriot Act, there’s been almost no debate about Executive Order 12333. [...] [... and its also the private industry as contractor shovelling money for Wall Street shareholders, paid for by tax payer money ...]
EFF  surveillance  state  Orwellian  NSA  encryption  cryptography  Cryptopocalypse  Internet  Privacy  Privacy  Big  Data  metadata  Meta  Data  human  rights  USA  Five  Eyes  Foreign  Intelligence  Intelligence  Agency  GCHQ  backdoor  backdoors  CIA  FBI  cyber  security  cyber  attack  cyber  war  cyber  espionage  corporate  espionage  espionage  FISA  Court  FISAAA  presidency  barackobama  David  Cameron  democracy  governance  transparency  accountability  Career  Politicians  Patriot  Act  Act  Whistleblower 
february 2015 by asterisk2a
The Silk Road trial is proof positive that bitcoin is not (and has never been) anonymous | PandoDaily
>> still, FBI probably hacked its way to the person behind Silk Road, stalk him and steal his laptop in-front of his face. [...] [&!] [&!] In this sense, it seems that the KYC (know your customer) requirements currently being mandated by regulators around the globe should prove to be a sufficient solution to safely embracing the numerous benefits of bitcoin (and Blockchain) technology.
Bitcoin  anonymity  Silk  Road  FBI  dark  web 
february 2015 by asterisk2a
UK government asks: How's our hacking?
UK gov releases equipment interference guidelines for spy & law enforcement agencies; the guidelines never calls it hacking but 'interference activities; Deputy Director @ Privacy International Eric King (@e3i5) says it's the UK gov's attempt to grant itself some of the most intrusive powers. // "This is the first time that the agencies have admitted that they are in the hacking business," Eric King, the deputy director of London-based digital rights watchdog Privacy International, told Mashable. King said that it amounts to a belated attempt to give these activities a scrap of legal basis, in the face of a lawsuit filed by his group last year, which challenged the legality of the UK intelligence service GCHQ's hacking activities, revealed by Edward Snowden documents. For King, the document is basically an attempt by the UK government to grant itself "some of the most invasive and intrusive" powers it has at its disposal.
UK  GCHQ  David  Cameron  surveillance  state  Orwellian  cyber  espionage  corporate  espionage  espionage  Intelligence  Agency  Foreign  Intelligence  presidency  barackobama  NSA  CIA  FBI  relations  policy  affairs  Politics  Political  Governance  corporate  ethical  machine  Europe  Five  Eyes  Career  Politicians  abuse  of  power  transparency  accountability  trust  trustagent  confidence  democracy  unintended  consequences  Internet  Privacy  Privacy  human  rights  War  on  Terror  War  on  Drugs  organised  crime  encryption  backdoor  backdoors  wiretapping  interdiction 
february 2015 by asterisk2a
Here’s how reporters are reacting to Snowden’s revelations | PandoDaily
The global surveillance programs revealed by Edward Snowden have caused journalists to change how they operate, question what the government knows about them, and consider abandoning investigative reporting, according to a survey from the Pew Research Center. A significant number of the journalists surveyed said they had changed their behavior, whether it’s how they store sensitive files (49 percent), how they communicate with other journalists (29 percent), whether they’ve reached out to a source (13 percent), or pursued a specific story (2 percent). Many are also convinced the government is gathering information about them. Some 64 percent of journalists believed intelligence agencies had “probably collected data” about them. (The other 36 percent, as “InfoSec Taylor Swift” joked, must not read the news.)
investigative  journalism  journalism  journalismus  presidency  barackobama  surveillance  state  Orwellian  encryption  Internet  Privacy  Privacy  Whistleblower  NSA  CIA  FBI  GCHQ  BND  Five  Eyes  Wikileaks  Intelligence  Agency  foreign  relations  foreign  policy  foreign  affairs  Career  Politicians  Politics  David  Cameron  UK  USA  Europe  Espionage  Act  corporate  cyber  FISA  Court  FISAAA  Secret  Courts  leverage  Power  Play  Political  Governance  oversight  accountability  trust  trustagent  confidence  democracy  transparency  No  Representation  short-term  view  short-term  thinking  unintended  consequences  Lügenpresse  Pressefreiheit  freedom  of  press  wiretapping  folly  science  error  distrust  fairness  Law  &  Justice  Justice  System  complexity 
february 2015 by asterisk2a
CIA Folterbericht: Die zehn schlimmsten Quälereien der CIA - SPIEGEL ONLINE
Viele Passagen in dem Folterbericht zur CIA sind geschwärzt - doch was man lesen kann, ist entsetzlich genug: Gefangenen wurden Schläuche zur Zwangsentleerung eingeführt, sie wurden in Eiswasser gesteckt, anal penetriert. SPIEGEL ONLINE zeigt Auszüge aus dem Dokument. &! &! - http://youtu.be/34ifEkmQLe8 >> Wolfgang Neskovic: Der CIA-Folter-Report | SWR1 Leute - Folter ist und kann durch nichts gerechtfertigt werden." Das sagt Wolfgang Neskovic, ehemaliger Richter am Bundesgerichtshof und jetzt Buchautor: Er hat den CIA-Folter-Report auf Deutsch herausgegeben. Neskovic war außerdem Mitglied der SPD, Grünen und der Linken und kennt den Politikbetrieb wie kaum ein Zweiter.
torture  dehumanisation  subhuman  history  USA  CIA  patriotism  Patriot  Act  presidency  barackobama  gwbush  War  on  Terror  NSA  FBI  interrogation  psychology  Iraq  War  al-Qaida  jihadist  humanity  crime  human  rights 
february 2015 by asterisk2a
BADASS intelligence program shows there’s no distinction between for-profit and governmental surveillance | PandoDaily
Put another way: so long as government agencies are able to access or intercept data collected by private services, there is no distinction between for-profit surveillance and government spying programs. All the information eventually goes to the same place.
BADASS  PRISM  FISAAA  FISA  Court  USA  surveillance  state  surveillance  Orwellian  NSA  CIA  FBI  tracking  warrant  presidency  barackobama  War  on  Terror  War  on  Drugs  organised  crime  foreign  intelligence  foreign  policy  foreign  relations  foreign  affairs  Europe  UK  GCHQ  Edward  Snowden  Whistleblower  perma-cookies  zombie  cookies 
january 2015 by asterisk2a
Google did fight to reveal warrant for WikiLeaks journalists’ Gmail accounts, attorney says | PandoDaily
bit.ly/1EnsklH - [any american company, or company with american satellite office is not deemed safe. that that is just the tip of the iceberg.] An attorney for Google has told the Washington Post that the company did fight a gag order preventing it from telling three WikiLeaks journalists their Gmail accounts were monitored by the Justice Department as the result of a warrant issued in March 2012. The statement was made in response to questions from WikiLeaks regarding Google’s compliance with the warrant, the existence of which it didn’t reveal to its subjects until December 2014, more than two-and-a-half years after the warrant was first issued. The warrant allowed the FBI to receive metadata and the full content of any messages sent via the monitored accounts. (WikiLeaks says the Gmail accounts were for personal use and that all sensitive conversations take place via encrypted communications tools.)
Google  USA  NSA  FBI  CIA  surveillance  state  Orwellian  Wikileaks  GCHQ  Privacy  Internet  Privacy  human  rights  Espionage  Act  Patriot  Act  War  on  Terror  War  on  Drugs  organised  crime  presidency  barackobama  journalism  journalismus  investigative  journalism  Whistleblower 
january 2015 by asterisk2a
WIR WOLLEN AUFKLÄRUNG - Frank Schirrmachers letztes Interview - YouTube
Power Corrupts. Absolute Power Corrupts Absolutely. // Institutionen mit Gehimwissen und den Buergern absolute transparenz abverlangen. // Souveränität ueber unserer Persoehnlichen daten. // Wir brauchen Aufklaerung. // NSA & Co is Politisch und Rechtsfreier raum - Apperat der Macht. // // In heutiger Zeit leben Menschen jeden Tag mit Angst. Existenzangest. Angst um dinge die man nicht beeinflussen kann, aber wir jeden Tag zu hoeren bekommen (Nachrichten 24/7). &! youtube.com/watch?v=hj3gAsqrB18 "Constanze Kurz (CCC) & das Happy End im Überwachungszeitalter - Jung & Naiv: Folge 106" &! youtube.com/watch?v=tFrLKMu0UYk - "Die sechs Ws der Überwachung mit Sascha Lobo - Jung & Naiv: Folge 110" << min31 Drone Strike & Collateral Damage = USA as an Unrechtsstaat and War Crimes. & Before that NSA sourcing out work to private companies (Edward Snowden worked for one). & min42 - Self-Censorship / The World is now an Airport. - bit.ly/1uo270A
surveillance  state  Orwellian  NSA  Big  Data  transparency  abuse  of  power  Career  Politicians  Politics  accountability  oversight  governance  GCHQ  Google  BND  Angela  Merkel  Germany  presidency  barackobama  Consumer  Protection  unintended  consequences  complexity  Edward  Snowden  Wikileaks  Julian  Assange  cablegate  diplomacy  foreign  relations  foreign  policy  foreign  affairs  Double  Agent  Unrechtsstaat  Überwachungsstaat  Stasi  No  Representation  Europe  UK  USA  Facebook  regiem  society  culture  public  awareness  Amazon  democracy  Democratic  Process  Drones  Drone  Warfare  Drone  Strike  CIA  FBI  Intelligence  Agency  War  on  Terror  War  on  Drugs  organised  crime  Secret  Courts  FISA  Court  Patriot  Act  World  Police  Political  corporate  governance  military–industrial  complex  self-censorship  secrecy 
november 2014 by asterisk2a
Revealed: how Whisper app tracks ‘anonymous’ users | Technology | The Guardian
[ NSA & Co. served them with an order to comply, in order to watch over employees. Spotting potential Whistleblowers and leaks. Period. ] The technology, for example, enables the company to monitor all the geolocated messages sent from the Pentagon and National Security Agency. It also allows Whisper to track an individual user’s movements over time. When users have turned off their geolocation services, the company also, on a targeted, case-by-case basis, extracts their rough location from IP data emitted by their smartphone. & http://techcrunch.com/2014/10/16/whisper-suspected-of-tracking-user-info-and-sharing-it-with-the-u-s-government/ & http://pando.com/2014/10/08/twitter-sues-the-justice-department-for-the-right-to-be-honest-with-consumers/ & http://www.theguardian.com/media/2014/oct/17/-sp-whisper-tracking-location-users-facts-response
Whisper  TOS  FISA  Court  NSA  CIA  FBI  surveillance  state  Orwellian  Stasi  Internet  Privacy  Privacy  anonymity  anonym  geolocation  Whistleblower  Secret  Courts  TrueCrypt  Lavabit  backdoor  backdoors  transparency  MI5  MI6  Silicon  Valley  Principle  corporate  values  personal  values  corporate  culture 
october 2014 by asterisk2a
America Must End Its Paranoid War on Hackers | WIRED
"Our privileged attorney-client communications were routinely and illegally opened by the prison; when weev was interrogated by the FBI (while being denied an attorney) about one of his communications to me and complained about his privileged attorney-client mail being opened, one of the FBI agents told him that they “didn’t give a fuck about the attorney client privilege.” Unfortunately, this attitude is typical of many FBI agents; generally they believe they are above the law they are entrusted to enforce. [...] I’ve heard similar tales of nasty, brutish, and petty treatment when dealing with the U.S. penal system from other hackers I know who were thrown in jail for non-violent offenses. [...] Hackers are the new communists for the DOJ.
cyber  crime  cyber  attack  white  hat  hacker  black  hat  hacker  USA  NSA  GCHQ  domestic  affairs  foreign  affairs  diplomacy  surveillance  state  Orwellian  Career  Politicians  policestate  Police  Brutality  prison–industrial  complex  military–industrial  complex  FBI  CIA  presidency  barackobama  human  rights  Justice  System  Law  &  Justice  DOJ  LulzSec  Anonymous 
october 2014 by asterisk2a
National Crime Agency director general: UK snooping powers are too weak | UK news | The Guardian
The UK’s top law enforcement officer says Britons must be prepared to sacrifice their freedoms online if they want to be protected from terrorists and cyber criminals. This includes giving authorities access to private email and social media contents. Speaking to The Guardian, the director general of the National Crime Agency (NCA), Keith Bristow, warned that the UK’s biggest threats are becoming increasingly focused on the web, and that authorities had not done enough to persuade the public that greater oversight of their online activity was necessary. // "The National Crime Agency was set up by the coalition to spearhead the national response to serious and organised crime. It has been called Britain’s version of America’s FBI with ministers considering giving it even greater powers and handing it the lead role in counter terrorism. It replaced the Serious and Organised Crime Agency, which was beset by problems from its birth."
surveillance  state  Orwellian  UK  GCHQ  USA  NSA  CIA  FBI  MI6  MI5  War  on  Terror  War  on  Drugs  Internet  Privacy  cyber  espionage  cyber  cyber  attack  cyber  crime  organised  crime  NCA 
october 2014 by asterisk2a
Notes on the Celebrity Data Theft | Hacker News
!!! - https://www.nikcub.com/posts/notes-on-the-celebrity-data-theft/ "In reviewing months worth of forum posts, image board posts, private emails, replies for requests for services, etc. nowhere was the FindMyPhone API brute force technique (revealed publicly and exploited in iBrute) mentioned. This doesn’t mean that it wasn’t used privately by the hackers – but judging by the skill levels involved, the mentions and tutorials around other techniques and some of the bragged about success rates with social engineering, recovery, resets, rats and phishing – it appears that such techniques were not necessary or never discovered. [...] Timestamps, forum posts and other data suggests that the collection was built up over a long period of time. [...] In terms of staying secure the most obvious solutions are to pick a better password, set your security answers to long random strings and enable two-factor authentication. [+] ring-fence your email [private & public & communication]."
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers  DAU 
september 2014 by asterisk2a
Tone deaf Mt. Gox CEO Mark Karpeles warns the world about the dangers of hackers | PandoDaily
"Recent events show that with appropriate motivation anything can be hacked.Maybe everyone should stop and think about what it means for them" - Karpeles tweet would appear to be a reference to the recent celebrity hacking scandal which has seen nude photos of several female stars published online, with extortion request sent to prevent the release of others. (Ironically, many of these demands were for payment in bitcoin.) Even if it weren’t for Karpeles’ track record with alleged hacking attacks, the tweet would nevertheless have been ill-advised. As many other public figures have learned, any hint at victim-blaming in this instance is sure to draw criticism. Combine this with the fact that Karpeles’ nearly bankrupted thousands of people, and this comment warrants a special kind of outrage.
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers 
september 2014 by asterisk2a
Apple - Press Info - Re: Celebgate / The Fappening / 4Chan / AnonIB / iCloud rippers / n00d Celeb Trading Ring
bit.ly/1uvDa0P "This statement, which probably had several thousand pairs of lawyer eyeballs on it before it was sent to the press, is slippery. [&] iCloud rippers" || From the Statement: "To protect against this type of attack, we advise all users to always use a strong password and enable two-step verification." + @SwiftOnSecurity "Celebrity photo leak being result of an amalgam of targeted attacks instead of 1 iCloud vulnerability explains inconsistent data and leaks." + @pmarca "Subtext for iCloud hacks: "Security questions" are a bad idea -- too easily guessed, particularly for public figures. Known problem!" + @cdixon "Services that repeatedly ask for passwords on mobile devices encourage weak passwords." + bit.ly/1q86n2z - "I’m talking about the fact that people won’t feel the same way about their phones after this." + anon-ib.com down as of recently + bit.ly/1vKzfks "Apple is now attempting to distance its service from any fault in the hacks." + bit.ly/1rhC9Ky + bit.ly/W7V3H2
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter  iCloud  rippers 
september 2014 by asterisk2a
BBC News - FBI investigates 'Cloud' celebrity picture leaks
Posting of celebrity nude pictures leads to FBI investigation - bbc.in/1nSuXzy +++ FBI probes celebrity photo leaks - bbc.in/1A1UtIo +++ bit.ly/1w34y7C +++ bit.ly/1sWQKJE +++ on.wsj.com/1A0YJrA >> 'If people were no complete script kiddies/amateurs, there will be no forensic trail and no real clear picture of how those pictures got stolen from peoples iCloud and other Cloud Services.' +++ News Corp.'s BSkyB Sky News - youtu.be/2AuRvgOpoYQ +++ bbc.in/1nw4iJ9 - "getting people to use passwords this long [14 chars] is a challenge. "It would be nice if we could get most of the population at least as far as eight characters," +++ bbc.in/1qXX1m2 "celebrities had weak passwords [+] brute force attack [...] We now need to hear from Apple on whether its engineers think that theory holds water. The other key question that needs answering, says Ferguson, is how the hackers obtained the email addresses they would have needed to gain access to the victims' accounts."
phishing  phishing  scam  Social  engineering  Hacking  two  factor  authentication  two  factor  verification  online  security  internet  security  encryption  Privacy  Privacy  gossip  culture  gossip  Celebrity  of  You  culture  cyber  security  cyber  attack  cyber  crime  Apple  Cloudstorage  cloud  iCloud  Dropbox  AWS  S3  leak  passwords  password  password  security  password  integrity  Sexual  objectification  objectification  consent  brute  force  attack  FBI  n00d  Celeb  Trading  Ring  AnonIB  4chan  Reddit  TheFappening  Celebgate  imgur  Twitter 
september 2014 by asterisk2a
Tor Exec Claims NSA Agents Supply It With Vulnerability Information | TechCrunch
surprise .... ... secret agency agents using tor and telling TOR to fix exploits and bugs so they their cover isn't blown by other states secret agency efforts to blow their cover and earth their hacking and spying activities .... *facepalm*
TOR  surveillance  state  Orwellian  GCHQ  China  BND  NSA  CIA  FBI  Russia  cyber  attack  cyber  security  cyberwar  cyberespionage  cyber  espionage 
august 2014 by asterisk2a
Blacklisted: The Secret Government Rulebook For Labeling You a TerroristThe Intercept
"The heart of the document revolves around the rules for placing individuals on a watchlist. “All executive departments and agencies,” the document says, are responsible for collecting and sharing information on terrorist suspects with the National Counterterrorism Center. It sets a low standard—”reasonable suspicion“—for placing names on the watchlists, and offers a multitude of vague, confusing, or contradictory instructions for gauging it." [...] The immediate family of suspected terrorists [...] ”associates” who have a defined relationship with a suspected terrorist, but whose involvement in terrorist activity is not known. A third loophole is broader still—individuals with “a possible nexus” to terrorism, but for whom there is not enough “derogatory information” to meet the reasonable suspicion[.]" |PS: The Intercept/First Look.org = Greenwald & Omydiar, former sold it all to the latter. // Patriot Act II - http://bit.ly/1zVO3wf // http://bit.ly/1y4kc1R source not from Snowden!
watchlist  TIDE  list  no  fly  list  USA  NSA  CIA  FBI  War  on  Terror  surveillance  state  Orwellian  PRISM  Edward  Snowden  Wikileaks  TOR  Julian  Assange  presidency  barackobama  GCHQ  BND  terrorism  fightagainstterror  Patriot  Act  Patriot  Act  II  checks  and  balances  oversight  Political  Governance  accountability  transparency  democracy  Democratic  Process  trust  trustagent  confidence  Politics 
july 2014 by asterisk2a
Supreme Court to Cops: 'Get a Warrant' for Cell Phone Searches - Businessweek
The U.S. Supreme Court, in a decision with broad implications for digital privacy rights and police investigations, ruled today that police must generally get a warrant before searching the cells phones of people they arrest. The court heard two cases related to warrantless searches of cell phones and how the Fourth Amendment’s protection against unreasonable search and seizure applies to new technologies.
Constitution  USA  digital  privacy  cell  phone  searches  warrant  probable  cause  surveillance  state  surveillance  NSA  FBI  Internet  Orwellian 
june 2014 by asterisk2a
CCC-TV - Kryptographie nach Snowden
Die Verwendung von mittelmäßiger Kryptographie scheint gegen Angreifer mit Milliarden-Etat komplett versagt zu haben. Namentlich RC4, MD5 und SHA1 scheinen praxisrelevant brechbar.
encryption  Cryptography  RC4  MD5  SHA4  NSA  AES  MD4  SHA-2  stuxnet  RSA  Security  LLC  Skype  backdoor  Microsoft  FBI  cybersecurity  cyberespionage  cyberwar  cyberattack  Windows  8  corporate  governance  corporatism  conglomerate  Linux  Apple  transparency  oversight  Privacy  Lvabit  Edward  Snowden  Wikileaks  SSL  digital  natives  digitalnatives 
december 2013 by asterisk2a
FAZ.NET-Fernsehkritik: Alles, was wir privat nannten, ist jetzt weg - FAZ.NET-Frühkritik - FAZ
„Alles, was wir einmal Bürgerrechte oder Privatsphäre nannten: Das ist alles weg.“ Ein fulminanter Satz. In historischer Perspektive bedeutet das nichts anderes als den Verlust dessen, was unsere Vorfahren seit der Aufklärung als die Essenz der bürgerlichen Gesellschaft erkämpft haben. Gerade die Bundeskanzlerin, wie auch der Bundespräsident, sollten als ehemalige DDR-Bürger wissen, was das bedeutet. [...] Ihr „Nullsprech“ mag politisch opportun sein, wäre aber nichts anderes als die Bankrotterklärung Europas vor seiner eigenen Geschichte. [....] >> https://www.facebook.com/monitor.wdr/posts/576794722359472 "eine solche Opposition hat keine Chance gegen eine Kanzlerin, die im politischen Niemandsland alleine durch Schweigen ihre Mehrheit sichert." + http://www.faz.net/aktuell/feuilleton/debatten/ueberwachung/offener-brief-an-angela-merkel-deutschland-ist-ein-ueberwachungsstaat-12304732.html
Bürgerrechte  angelamerkel  XKeyScore  Constitution  julianassange  Europe  accountability  JoachimGauck  transparency  liberty  barackobama  History  individual  liberty  political  folly  career  politician  Edward  Snowden  civil  society  democracy  Julian  Assange  policy  error  policy  folly  political  theory  2013  Tempora  Orwellian  State  UK  political  error  GCHQ  PRISM  Glenn  Greenwald  liberal  democracy  election2013  civil  liberty  FBI  USA  surveillance  civil  rights  general  election  FSA  liberal  conservative  Whisteblower  Germany  BND  presidency 
july 2013 by asterisk2a
BND gründet neue Abteilung zur Abwehr von Hackerangriffen - SPIEGEL ONLINE
Fieberhaft sucht der Bundesnachrichtendienst nach Experten für eine Abteilung, die Cyberspionage auf Regierungsstellen und die deutsche Industrie abwehren soll. Nach SPIEGEL-Informationen werden bis zu 130 Mitarbeiter benötigt. Doch die Kooperation mit deutschen Hackern ist teuer. [...] Schindler zeichnete ein drastisches Bild der Bedrohung durch Cyberspionage, die vor allem von China ausgehe. Dort arbeiten nach BND-Erkenntnissen bis zu 6000 Experten in einer eigens eingerichteten Abteilung des Verteidigungsministeriums, die sich auf die Abschöpfung von Technologieunternehmen und Rüstungskonzernen aus dem Ausland spezialisiert haben. Russland betreibe eine ähnlich aggressive Cyberstrategie, allerdings seien die staatlichen Hacker dort als private Firmen getarnt. In den letzten Monaten registrierte der Dienst pro Tag drei bis fünf Attacken allein auf Bundes- und Regierungsstellen in Deutschland.
fightagainstterror  terroristattack  terrorism  cyberwar  cyberespionage  foreign  policy  CIA  Zero  G  G8  foreignaffairs  cybersecurity  USA  FBI  cyberattack  Russia  Germany  BND  MI6  China  MI5 
march 2013 by asterisk2a
Cloud Computing: EU-Bericht warnt vor Überwachung durch die USA - SPIEGEL ONLINE
Sie empfehlen den Parlamentariern deshalb, sich um Rechtssicherheit beim Cloud Computing zu kümmern. Ihnen wird nahegelegt, mit den USA in Verhandlungen zu treten, damit das Menschenrecht auf Privatsphäre auch für europäische Staatsbürger gelte. Außerdem sollten deutliche Warnungen vorgeschrieben werden: Denn wenn Cloud-Daten von der EU in die USA überführt werden, würden diese dem dortigen Überwachungsapparat ausgesetzt. Das müsse jedem Betroffenen mitgeteilt werden.
surveillance  surveillance  state  USA  Europe  patriotact  NSA  FBI 
january 2013 by asterisk2a
Wall Street: FBI will mehr als 100 Finanz-Gangster enttarnen - SPIEGEL ONLINE - Nachrichten - Wirtschaft
Es ist eine klare Kampfansage an die Kriminellen der Wall Street. Das FBI will nach eigenen Angaben mehr als 120 mögliche Insider-Händler dingfest machen, die an der Wall Street oder in ihrem Umfeld arbeiten. Insgesamt werden sogar doppelt so viele Personen verdächtigt, börsenrelevante Informationen über Unternehmen weitergegeben zu haben, durch die Finanz-Profis abkassieren konnten. Es sei das erste Mal, dass das FBI überhaupt die Menge der verdächtigten Personen beziffert, schreibt das "Wall Street Journal".

http://online.wsj.com/article/SB10001424052970203833004577249710504638728.html?mod=WSJEurope_hpp_LEFTTopStories
FBI  2012  insidertrading 
february 2012 by asterisk2a
Former-SAC Capital Manager Testifies He Committed Crimes at Hedge Fund - Bloomberg
Ex-SAC Capital Advisors LP portfolio manager Noah Freeman told a federal jury in New York that he committed insider trading while working at two separate hedge funds, including while overseeing a $300 million fund at SAC.Freeman, 35, who pleaded guilty to securities fraud charges in February and is cooperating with the government, testified today against Winifred Jiau, 43, the first of the so-called expert networkers to go on trial as part of a U.S. crackdown on insider trading of hedge funds. She’s accused of passing illegal tips to fund managers.

Asked about the practice of using expert networkers to get inside information while at Sonar, Freeman said, “It was a regularly employed part of our business model.”

Since November, the office of Manhattan U.S. Attorney Preet Bharara has charged 13 people in its probe of expert networkers and insider trading at hedge funds. Eight people have pleaded guilty, including Barai, who entered his plea on May 27.
SAC  insider-trading  hedgefunds  2011  investigation  SEC  FBI 
june 2011 by asterisk2a
Fraud Caused the 1930s Depression and the Current Financial Crisis | zero hedge
Professor William K. Black writes:

The original Pecora investigation documented the causes of the economic collapse that led to the Great Depression. It ... established that conflicts of interest and fraud were common among elite finance and government officials.

---------------------------

James Galbraith recently said that "at the root of the crisis we find the largest financial swindle in world history", where "counterfeit" mortgages were "laundered" by the banks.

-
The decisive role that "accounting control frauds" played in driving the current crisis is clear. The FBI warned of an "epidemic" of mortgage fraud in 2004 and predicted that it would cause an economic crisis if it were not stopped. The mortgage lending industry's own experts reported that "liar's" loans were "an open invitation to fraudsters" and fully warranted their name -- "liar's" loans -- because fraud was endemic in such loans.
-
HISTORY RHYMES.
fraud  USA  economy  gwbush  politics  FHFA  FBI  2010  greatrecession  greatdepression  economists  foreclosure  greenspan  alangreenspan  ZIRP  fiscal  policy  history 
october 2010 by asterisk2a
YouTube - Fireside Chat: Obama Seeks Exec Power
TheAlyonaShow | 30 July 2010
The Obama Administration is giving the FBI access to any emails and web history of someone deemed necessary to an investigation. Alyona is upset with how the Administration went about it and is moving to cement the atrocious Bush policies as the norm of American power.
2010  barackobama  presidency  privacy  Afghanistan  iraq  usa  FBI  politics  fraud  election  accountability 
july 2010 by asterisk2a

related tags

#BlackLivesMatter  &  1%  2.0  4chan  9/11  Aaron  abuse  Academi  accountability  Act  activism  activists  advice  AES  affairs  Afghanistan  Agency  Agent  agreement  al-Qaida  alangreenspan  Amazon  America  American  amnesty  and  Angela  angelamerkel  AnonIB  anonym  anonymity  Anonymous  anxiety  Apple  arms  Assange  attack  austerity  authentication  avoidance  awareness  AWS  backdoor  backdoors  BADASS  Bahamas  balances  barackobama  Bay  BBC  big  Bitcoin  BitTorrent  black  Blackwater  Blair  BND  book  Bradley  bribery  BRIC  British  Broadcasting  Brutality  brute  budget  bulk  bush  business  Bürgerrechte  cablegate  Cameron  capitalism  career  cartel  cause  Cayman  CaymanIslands  Celeb  Celebgate  Celebrity  cell  Central  CETA  Charter  checks  Chelsea  Cheney  China  Chomsky  Chris  CIA  civil  class  cloud  Cloudstorage  coefficient  Cold  Colin  collateral  collection  Comcast  commodity  communism  company  complex  complexity  compromise  confidence  conglomerate  Congress  consent  consequences  conservative  conspiracy  Constitution  consumer  contractor  cookies  copyright  Corp.  corporate  Corporation  corporatism  corruption  Council  counter  Court  Courts  crime  Crimea  Crisis  crony  cryptography  Cryptopocalypse  culture  cyber  cyberattack  cyberespionage  cyberhack  cybersecurity  cyberwar  damage  dark  darknet  DARPA  data  Dataretention  DAU  David  decency  Defense  deficit  dehumanisation  democracy  Democratic  Department  deregulation  Dick  Dictatorship  digital  digitalnatives  diplomacy  disenfranchise  disenfranchised  distrust  doctor  DOJ  domestic  door  Double  Dream  DRIPA  Drone  Drones  Dropbox  Drugs  East  Eating  economic  economists  economy  Edward  EFF  election  election2013  Empire  encryption  engineering  error  espionage  ethical  Europe  European  evasion  expression  Eyes  Facebook  factor  fairness  False  FBI  fear  fearmongering  Feindbilder  FHFA  fightagainstterror  FinFisher  FISA  FISAAA  fiscal  Five  Flag  fly  FOI  folly  for  for-profit  force  foreclosure  foreign  foreignaffairs  framing  fraud  free  freedom  FSA  G  G8  G20  Gamma  GCHQ  general  geolocation  geopolitics  georgewbush  Germany  Gesellschaft  Gini  Glenn  Google  gossip  governance  GPS  greatdepression  greatrecession  greenspan  Greenwald  GroKo  Group  groups  gwbush  hacker  Hacking  Hacktivism  hat  hedgefunds  Hedges  Hegemony  history  HMRC  homescreen  human  humanity  iCloud  identification  identity  II  IMF  imgur  immigrants  immigration  Imperialism  individual  industrial  inequality  Information  infringement  insider-trading  insidertrading  integrity  intelligence  interdiction  interest  internet  interrogation  intervention  investigation  investigative  IoT  iraq  IRS  Is  ISIL  ISIS  Islands  ISP  Israel  IT  jail  Japan  jihadist  JoachimGauck  journalism  journalismus  Julian  julianassange  justice  laundering  Lavabit  law  leak  leverage  liberal  liberty  Linux  list  LLC  lobby  Lobbying  lobbyist  LulzSec  Luxembourg  Lvabit  Lybia  Lügenpresse  machine  madoff  mainstream  mandatory  Manning  manufactured  maximisation  MD4  MD5  media  Merkel  Met  Meta  metadata  method  MI5  MI6  Microsoft  Middle  military  military-intelligence  military–industrial  minimum  mobile  mobilephone  model  money  n00d  NAFTA  NASA  national  Nationalism  Nations  natives  NATO  NCA  neoconservatism  neoconservatives  neoliberal  neoliberalism  Net  Neutrality  News  newscorp  NHS  no  Noam  NSA  nuclear  objectification  Occupy  occupywallstreet  OECD  of  oligopol  oligopoly  on  online  OPEC  organised  Orwellian  outsourcing  oversight  pageviews  Palantir  Panama  Papers  Party  password  passwords  Patriot  patriotact  patriotism  Pentago  Pentagon  perma-cookies  personal  philosophy  phishing  phone  Pirate  Play  Polarisation  Police  policestate  policy  political  politician  Politicians  politics  ponzischeme  populism  Positioning  post-racial  POTUS  poverty  Powell  power  powers  PR  presidency  press  Pressefreiheit  prices  Principle  PRISM  prison–industrial  privacy  private  probable  Process  profiling  profit  profiteer  progress  propaganda  Protection  protectionism  psychology  public  Putin  quo  race  racket  rat  RC4  Rebellion  Reddit  regiem  regulation  regulators  relations  Representation  retention  Revolution  revolving  Rich  rights  Ring  rippers  Road  Ross  RSA  Russia  S3  SAC  sanctions  scam  scandal  scaremongering  science  SCOTUS  searches  SEC  secrecy  Secret  security  Security-Industrial  self-censorship  self-regulation  sentences  sentiment  Separation  Sexual  SHA-2  SHA4  shareholder  short-term  Silicon  Silk  Skype  Smartphone  Snoopers  Snowden  social  society  socratic  Software  speech  spin  SSL  Stasi  state  status  Street  Strike  stuxnet  subhuman  Super  surveillance  Surveillance-Industrial  Swartz  System  tax  technological  Tempora  Terror  terrorism  terroristattack  The  TheFappening  theory  thinking  TIDE  TISA  to  Tony  too  TOR  Tories  Torrent  torture  TOS  TPP  tracking  trade  Trading  tragedy  transparency  travel  Trident  TrueCrypt  trust  trustagent  TTIP  Twitter  two  UK  Ulbricht  unintended  Union  United  Unrechtsstaat  usa  user  Valley  value  values  verification  vested  view  VISA  vladimirputin  Vorratsdatenspeicherung  Wall  WannaCry  war  warez  Warfare  warrant  Washington  watchlist  web  Whisper  Whisteblower  Whistleblower  white  white-collar  Wikileaks  Windows  WindowsXP  WinXP  wiretapping  WMD  World  XKeyscore  XKeyScore  Yahoo!  You  Zero  ZIRP  zombie  Überwachungsstaat 

Copy this bookmark:



description:


tags: