asterisk2a + tor   15

Theresa May accused of rushing surveillance bill through back door | Politics | The Guardian
Home secretary gives committee three weeks to study ‘snooper’s charter’, despite having ruled out fast-tracking it after Paris attacks [...] The joint committee that scrutinised the previous “snooper’s charter” bill – the draft communications data bill – in 2012 sat for five months and held 13 public witness sessions over a six-week period. It also took evidence in private from the security services. //&! bit.ly/1lkbLjn - State computer hacking The bill gives powers for security services to hack in to phones, computers and networks worldwide in interests of national security. [ like environmental and animal rights activists ]
Snoopers  Charter  Theresa  May  nasty  party  Tories  Conservative  GCHQ  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Dataretention  bulk  data  collection  democracy  David  Cameron  George  Osborne  Internet  Privacy  Privacy  human  rights  Secret  Courts  oversight  abuse  of  power  accountability  cyber  war  cyber  attack  TOR  Linux  encryption  Cryptopocalypse  cryptography  MI5  MI6 
november 2015 by asterisk2a
Linux Journal - Wikipedia, the free encyclopedia
In early July 2014 it was revealed that the NSA's XKeyscore program targeted readers of Linux Journal, which the NSA considers an "extremist forum". // &! NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance - http://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance // &! NSA targets the privacy-conscious - http://daserste.ndr.de/panorama/aktuell/NSA-targets-the-privacy-conscious,nsa230.html "Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA." - visiting site X puts you on watch list/collect data list - ie Wikileaks, Tor, Linux Journal, CCC unter anderem !+& bit.ly/1sZSWV9 >> leads to self-censorship like in East Germany.
NSA  Internet  Privacy  Privacy  human  rights  XKeyscore  Linux  CCC  activism  activists  Hacktivism  target  targeting  GCHQ  encryption  cryptography  Cryptopocalypse  IT  Security  cyber  cyber  war  cyber  espionage  corporate  espionage  industrial  espionage  espionage  FISA  Court  FISAAA  Foreign  Intelligence  Five  Eyes  presidency  barackobama  Stasi  Stasi  2.0  history  backdoor  backdoors  abuse  of  power  surveillance  state  Orwellian  Big  Data  Meta  Data  Unix  Google  Search  Tor  VPN  anonymity  self-censorship  free  speech  freedom  of  press  freespeech  free  press  Pressefreiheit  Meinungsfreiheit  Information  wants  to  be  free  knowledge  M 
february 2015 by asterisk2a
Tor Exec Claims NSA Agents Supply It With Vulnerability Information | TechCrunch
surprise .... ... secret agency agents using tor and telling TOR to fix exploits and bugs so they their cover isn't blown by other states secret agency efforts to blow their cover and earth their hacking and spying activities .... *facepalm*
TOR  surveillance  state  Orwellian  GCHQ  China  BND  NSA  CIA  FBI  Russia  cyber  attack  cyber  security  cyberwar  cyberespionage  cyber  espionage 
august 2014 by asterisk2a
Personal Privacy Is Only One of the Costs of NSA Surveillance | Threat Level | WIRED
The Foundation’s report, released today, outlines some of the collateral damage of NSA surveillance in several areas, including: Economic losses to US businesses due to lost sales and declining customer trust. The deterioration of internet security as a result of the NSA stockpiling zero-day vulnerabilities, undermining encryption and installing backdoors in software and hardware products. Undermining the government’s credibility and leadership on “internet freedom” and governance issues such as censorship. -->> its like trade sanctions - but on the internet among other things. +++ http://youtu.be/DU_1yoUzKs8
USA  NSA  surveillance  state  Orwellian  unintended  consequences  complexity  unknown  unknowns  presidency  barackobama  foreign  policy  foreign  affairs  diplomacy  GCHQ  BND  globalisation  globalization  sanctions  Europe  Germany  War  on  Terror  War  on  Drugs  China  Internet  Privacy  cyberespionage  cybersecurity  cyber  security  cyber  attack  cyberwar  cyberattack  cybercrime  Industrial  Espionage  trust  trustagent  Career  Politicians  policy  folly  policy  error  accountability  oversight  Political  Governance  Democratic  Process  democracy  freedom  of  press  Pressefreiheit  Whistleblower  free  speech  self-censorship  Wikileaks  Edward  Snowden  Julian  Assange  TOR  TrueCrypt 
july 2014 by asterisk2a
Blacklisted: The Secret Government Rulebook For Labeling You a TerroristThe Intercept
"The heart of the document revolves around the rules for placing individuals on a watchlist. “All executive departments and agencies,” the document says, are responsible for collecting and sharing information on terrorist suspects with the National Counterterrorism Center. It sets a low standard—”reasonable suspicion“—for placing names on the watchlists, and offers a multitude of vague, confusing, or contradictory instructions for gauging it." [...] The immediate family of suspected terrorists [...] ”associates” who have a defined relationship with a suspected terrorist, but whose involvement in terrorist activity is not known. A third loophole is broader still—individuals with “a possible nexus” to terrorism, but for whom there is not enough “derogatory information” to meet the reasonable suspicion[.]" |PS: The Intercept/First Look.org = Greenwald & Omydiar, former sold it all to the latter. // Patriot Act II - http://bit.ly/1zVO3wf // http://bit.ly/1y4kc1R source not from Snowden!
watchlist  TIDE  list  no  fly  list  USA  NSA  CIA  FBI  War  on  Terror  surveillance  state  Orwellian  PRISM  Edward  Snowden  Wikileaks  TOR  Julian  Assange  presidency  barackobama  GCHQ  BND  terrorism  fightagainstterror  Patriot  Act  Patriot  Act  II  checks  and  balances  oversight  Political  Governance  accountability  transparency  democracy  Democratic  Process  trust  trustagent  confidence  Politics 
july 2014 by asterisk2a
Bad news for whistleblowers. Secret is far less secret than you think | PandoDaily
Only DAU thinks Secret or Whisper or any other consumer grade app, on a consumer grade tablet or phone, promising keeping them anonymity, uses these apps to 'blow the whistle.' ahhm troll, hate and gossip or even leak stuff. I thought Silicon Valley ppl are smart. No they just know how to code & design ... "to make the world better" ... sort of. “A court order without probable cause or even a subpoena may be enough for law enforcement or for a civil litigant to demand records.“ Conley went on to say that anonymous app companies need to make sure their backend data practices line up with the advertised purpose of their product: “They need to think through their own process. If you are offering a service that is about providing anonymous communication, then if you are retaining their identity and tying it to their communication, then you are kind of undermining the whole purpose of your service.”
Secret  Whisper  anonymity  Internet  Privacy  DAU  Whistleblower  Troll  Trolls  Haters  Hater  culture  VPN  Tor  cryptography  encryption  PGP  TrueCrypt  Smartphone  mobilephone  Silicon  Valley  lowest  common  denominator  social  science  social  study  civic  society  civil  society  Zivilgesellschaft  gossip  culture  gossip  social  society 
june 2014 by asterisk2a

related tags

2.0  abuse  accountability  Act  activism  activists  affairs  and  anonymity  Appelbaum  Assange  attack  backdoor  backdoors  balances  barackobama  be  Big  BND  bulk  Cameron  Career  cartel  CCC  Charter  checks  China  CIA  civic  civil  collection  Comcast  common  Complex  complexity  confidence  consequences  Conservative  corporate  Court  Courts  cryptography  Cryptopocalypse  culture  cyber  cyberattack  cybercrime  cyberespionage  cybersecurity  cyberwar  data  Dataretention  DAU  David  democracy  Democratic  denominator  diplomacy  Drugs  Edward  encryption  error  espionage  Europe  Eyes  FBI  fightagainstterror  FISA  FISAAA  Five  fly  folly  foreign  free  freedom  freespeech  GCHQ  George  Germany  Glenn  globalisation  globalization  Google  gossip  Governance  Greenwald  Hacktivism  Hater  Haters  history  human  II  industrial  Information  Intelligence  Internet  ISP  IT  Jacob  Julian  knowledge  Lavabit  Linux  list  lowest  M  May  Meinungsfreiheit  Meta  metadata  MI5  MI6  mobilephone  nasty  no  NSA  of  oligopol  oligopoly  on  Orwellian  Osborne  oversight  party  Patriot  PGP  policy  Political  Politicians  Politics  power  presidency  press  Pressefreiheit  PRISM  Privacy  Process  rights  Russia  sanctions  science  Search  Secret  security  self-censorship  Silicon  Smartphone  Snoopers  Snowden  social  society  speech  Stasi  state  study  surveillance  Surveillance-Industrial  target  targeting  Terror  terrorism  Theresa  TIDE  to  TOR  Tor  Tories  transparency  Troll  Trolls  TrueCrypt  trust  trustagent  unintended  Unix  unknown  unknowns  USA  Valley  VPN  wants  war  watchlist  Whisper  Whistleblower  Wikileaks  XKeyscore  Zivilgesellschaft 

Copy this bookmark:



description:


tags: