asterisk2a + balances   6

The Observer view on Trump’s folly in risking not just peace in the Middle East | Observer editorial | Opinion | The Guardian
https://www.theguardian.com/us-news/2018/may/05/trump-israel-private-security-iran-nuclear-deal-analysis - Trump’s dirty ops attack on Obama legacy shows pure hatred for Iran deal US president’s move using Israeli private security brings prospect of a new conflict in the Middle East ever closer & https://www.theguardian.com/uk-news/2018/may/05/trump-team-hired-spy-firm-dirty-ops-iran-nuclear-deal - Revealed: Trump team hired spy firm for ‘dirty ops’ on Iran arms deal Israeli agency told to find incriminating material on Obama diplomats who negotiated deal with Tehran
DonaldTrump  Iran  Donald  Trump  Republicans  USA  America  governance  checks  balances 
may 2018 by asterisk2a
Video "Stark: Demokratie durch Überwachung in Gefahr" | Zapp | ARD Mediathek
Der "Spiegel" ist offenbar ins Visier von Geheimdiensten geraten, das Bundeskanzeleramt soll davon seit 2011 gewusst haben. "Spiegel"-Redakteur Stark zeigt sich erschüttert. // freie presse ist pfeiler der demokratie. - 4te gewalt. checks and balances. // mit hilfe von selectoren liste werden journalisten ueberwacht! und ihre bewegung via cellphone tracking. //&! spiegel.de/thema/national_security_agency/ //&! Vorratsdatenspeicherung schreckt Whistleblower ab. "Sammelwut verprellt Informanten." - bit.ly/1lCqrKZ - Vorratsdatenspeicherung hilft nicht bei Verbrechensaufklaerung.
NSA  GCHQ  Whistleblower  surveillance  Surveillance-Industrial  Complex  surveillance  state  BND  Angela  Merkel  journalismus  investigative  journalism  journalism  Big  Data  Edward  Snowden  Wikileaks  democracy  social  democracy  corporate  state  corporate  media  Pressefreiheit  freedom  of  press  Dataretention  Snoopers  Charter  Vorratsdatenspeicherung  Russia  China  bulk  collection  Meta  Data  Internet  Privacy  Privacy  human  rights  presidency  barackobama  Hegemony  USA  War  on  Terror  national  interest  patriotism  Patriot  Act  CIA  FBI  Iraq  War  cablegate  FISA  Court  FISAAA  Secret  Courts  military–industrial  military  intervention  TTIP  TPP  TISA  encryption  Cryptopocalypse  cryptography  Separation  of  powers  Checks  and  Balances  organised  crime  War  on  Drugs  Positioning  framing  PR  spin  doctor 
december 2015 by asterisk2a
President Obama: The Re/code Interview - YouTube
slick downplay, comparing cyber war & industrial, coroporate cyber espionage (breaking in into Gemalto for SIM encryption keys) with basketball. And also tapping the phone of Angela Merkel ... &! http://youtu.be/td7Dcsco-WY "Obama on the state of the world: the extended Vox conversation" - is he a realist or just a coward!? /// >> http://www.bbc.co.uk/news/technology-31545050 &! http://www.spiegel.de/netzwelt/netzpolitik/nsa-und-gchq-haben-sim-karten-schluessel-von-gemalto-erbeutet-a-1019515.html &! Silicon Valley subbed him on his proposals and road show 20 min away from their door, is a tell tale what they think of him saying one thing and what the NSA&Co put them through and demands (see Yahoo!'s case with the FISA Court) - tcrn.ch/17ovyqD &! If it were a private person were hack into and steal Gemalto encryption keys, the person would be thrown in jail FOREVER! youtu.be/bIpNXh9Nh9k?t=16m32s &! NSA, GCHQ, Five Eyes like to bully people to do X for them & drop possible charges.
presidency  barackobama  NSA  USA  Gemalto  SIM  encryption  cyber  war  GCHQ  governance  on  Terror  Cryptopocalypse  cryptography  corporate  espionagem  industrial  espionage  espionage  cyber  espionage  UK  Five  Eyes  Internet  Privacy  Privacy  human  rights  Stasi  Stasi  2.0  organised  crime  on  Drugs  ethical  machine  Checks  and  Balances  Separation  of  powers  democracy  abuse  of  power  David  Cameron  cyber  crime  cyber  attack  cyber  securityr  IT  Security  surveillance  state  Orwellian  FISA  Court  FISAAA  Secret  Courts  Silicon  Valley 
february 2015 by asterisk2a
The NSA Reportedly Stole Millions Of SIM Encryption Keys To Gather Private Data | TechCrunch
The American National Security Agency (NSA), and the British Government Communications Headquarters (GCHQ), similar clandestine intelligence agencies, stole SIM card encryption keys from a manufacturer, allowing the groups to decrypt global cellular communications data. [...] “NSA and GCHQ basically have the keys to decyrpting mobile communications anywhere in the world, even without the participation of local communication carriers (which, even if not much, acts as some check on intelligence agency behavior). It’s the equivalent of these agencies having printed doorkeys for the front doors to millions or even billions of homes around the world, just in case they one day decided they needed to get in. Frankly, people should have no faith in the security of global mobile communications.” >> CLU’s Christopher Soghoian - "Steal millions of crypto keys and then complain publicly that encryption is a problem. The UK and US govs are shameless."
NSA  GCHQ  governance  War  on  Terror  encryption  Cryptopocalypse  cryptography  corporate  espionage  industrial  espionage  espionage  cyber  espionage  USA  UK  Five  Eyes  Internet  Privacy  Privacy  human  rights  Stasi  Stasi  2.0  presidency  barackobama  organised  crime  War  on  Drugs  ethical  machine  Checks  and  Balances  Separation  of  powers  democracy  abuse  of  power  David  Cameron  Gemalto  cyber  crime  cyber  attack  cyber  security  cyber  IT  surveillance  state  Orwellian 
february 2015 by asterisk2a
President Obama Is Waging a War on Hackers | WIRED
war on whistleblower and investigative journalism. // "In next week’s State of the Union address, President Obama will propose new laws against hacking that could make either retweeting or clicking on the above (fictional) link illegal. The new laws make it a felony to intentionally access unauthorized information even if it’s been posted to a public website. The new laws make it a felony to traffic in information like passwords, where “trafficking” includes posting a link. [...] But they are blunt political solutions which reflect no technical understanding of the problem." // &! huffingtonpost.com/2015/01/20/obama-hackers_n_6511700.html &! entrepreneur.com/article/242099 &! america.aljazeera.com/opinions/2015/1/in-obamas-war-on-hackers-everyone-loses.html "Both steps would not only be ineffective at improving cybersecurity in any practical sense but also further empower the government to go after activists and journalists such as Barrett Brown,
Anti-Hacking  Legislation  presidency  barackobama  cyber  war  Whistleblower  investigative  journalism  journalism  journalismus  Barrett  Brown  Aaron  Swartz  STEM  Career  Politicians  policy  error  policy  folly  NSA  CIA  surveillance  state  Orwellian  free  speech  freedom  of  press  Information  wants  to  be  free  Pressefreiheit  Meinungsfreiheit  white  hat  hacker  free  press  Checks  and  Balances  Separation  of  powers  democracy  accountability  Political  Governance  corporate  oversight  abuse  of  power  Foreign  Intelligence  Five  Eyes  GCHQ 
february 2015 by asterisk2a
Blacklisted: The Secret Government Rulebook For Labeling You a TerroristThe Intercept
"The heart of the document revolves around the rules for placing individuals on a watchlist. “All executive departments and agencies,” the document says, are responsible for collecting and sharing information on terrorist suspects with the National Counterterrorism Center. It sets a low standard—”reasonable suspicion“—for placing names on the watchlists, and offers a multitude of vague, confusing, or contradictory instructions for gauging it." [...] The immediate family of suspected terrorists [...] ”associates” who have a defined relationship with a suspected terrorist, but whose involvement in terrorist activity is not known. A third loophole is broader still—individuals with “a possible nexus” to terrorism, but for whom there is not enough “derogatory information” to meet the reasonable suspicion[.]" |PS: The Intercept/First Look.org = Greenwald & Omydiar, former sold it all to the latter. // Patriot Act II - http://bit.ly/1zVO3wf // http://bit.ly/1y4kc1R source not from Snowden!
watchlist  TIDE  list  no  fly  list  USA  NSA  CIA  FBI  War  on  Terror  surveillance  state  Orwellian  PRISM  Edward  Snowden  Wikileaks  TOR  Julian  Assange  presidency  barackobama  GCHQ  BND  terrorism  fightagainstterror  Patriot  Act  Patriot  Act  II  checks  and  balances  oversight  Political  Governance  accountability  transparency  democracy  Democratic  Process  trust  trustagent  confidence  Politics 
july 2014 by asterisk2a

related tags

2.0  Aaron  abuse  accountability  Act  America  and  Angela  Anti-Hacking  Assange  attack  balances  barackobama  Barrett  be  Big  BND  Brown  bulk  cablegate  Cameron  Career  Charter  checks  China  CIA  collection  Complex  confidence  corporate  Court  Courts  crime  cryptography  Cryptopocalypse  cyber  Data  Dataretention  David  democracy  Democratic  doctor  Donald  DonaldTrump  Drugs  Edward  encryption  error  espionage  espionagem  ethical  Eyes  FBI  fightagainstterror  FISA  FISAAA  Five  fly  folly  Foreign  framing  free  freedom  GCHQ  Gemalto  governance  hacker  hat  Hegemony  human  II  industrial  Information  Intelligence  interest  Internet  intervention  investigative  Iran  Iraq  IT  journalism  journalismus  Julian  Legislation  list  machine  media  Meinungsfreiheit  Merkel  Meta  military  military–industrial  national  no  NSA  of  on  organised  Orwellian  oversight  Patriot  patriotism  policy  Political  Politicians  Politics  Positioning  power  powers  PR  presidency  press  Pressefreiheit  PRISM  Privacy  Process  Republicans  rights  Russia  Secret  security  securityr  Separation  Silicon  SIM  Snoopers  Snowden  social  speech  spin  Stasi  state  STEM  surveillance  Surveillance-Industrial  Swartz  Terror  terrorism  TIDE  TISA  to  TOR  TPP  transparency  Trump  trust  trustagent  TTIP  UK  USA  Valley  Vorratsdatenspeicherung  wants  war  watchlist  Whistleblower  white  Wikileaks 

Copy this bookmark:



description:


tags: