asterisk2a + fisaaa   56

Security Experts Warn of Orwellian Future in Apple Case | Re/code
[ all without a warrant ] Your Samsung smart TV or Amazon Echo might spy on you next if the government succeeds in forcing Apple to disable security protections on a smartphone to further the FBI’s investigation into the San Bernardino attacks. Security experts from Stanford, Harvard and Rice universities and independent researchers laid out this Orwellian scenario in a court filing today, supporting Apple’s fight against a court order to help investigators hack a smartphone used by one of the assailants in the mass killing. The group of seven experts argues that the judge’s order [...] disturbing possibilities for how law enforcement might turn everyday items into surveillance tools. //&! Amazon Quietly Disabled Encryption in Latest Version of Fire OS - on.recode.net/1TXeXPB //&! Twitter, Airbnb, eBay, Kickstarter, LinkedIn and Square File Brief Supporting Apple - on.recode.net/1LXQ3sG &! Three Industry Trade Groups to File Briefs Supporting Apple - on.recode.net/1oTUdwx
Apple  FBI  Surveillance-Industrial  Complex  surveillance  surveillance  state  Orwellian  Internet  Privacy  Privacy  encryption  Cryptopocalypse  cryptography  War  on  Terror  Patriot  Act  bulk  data  collection  Dataretention  Vorratsdatenspeicherung  Meta  Big  Smartphone  mobile  homescreen  anonymity  human  rights  FISA  Court  FISAAA  Secret  Courts  GCHQ  NSA  Snoopers  Charter  Yahoo!  backdoors  backdoor  GPS  profiling  Facebook  Twitter 
march 2016 by asterisk2a
Europe Must Stand Up to American Cyber-Snooping - SPIEGEL ONLINE
Is Barack Obama a friend? Revelations about his government's vast spying program call that assumption into doubt. The European Union must protect the Continent from America's reach for omnipotence.
USA  presidency  barackobama  War  on  Terror  organised  crime  Surveillance-Industrial  Complex  Orwellian  State  surveillance  bulk  data  collection  FISA  Court  FISAAA  Edward  Snowden  cablegate  Wikileaks  Chelsea  Manning  Whistleblower  UK  NSA  FBI  CIA  MI5  MI6  GCHQ  Snoopers  Charter  Patriot  Act  Fear  fearmongering  scaremongering  Internet  Privacy  Privacy  human  rights  Secret  Courts  Big  Vorratsdatenspeicherung  Dataretention  mobilephone  Hegemony  China  Russia  BRIC  Empire 
march 2016 by asterisk2a
Shami Chakrabarti: ‘Who’s the most dangerous person in Britain? David Cameron’ | Voluntary Sector Network | The Guardian
The outgoing Liberty director explains why plans to scrap the Human Rights Act threaten freedom, and why she won’t stop campaigning [...] I ask Chakrabarti – once branded by the Sun as “the most dangerous woman in Britain” – who she thinks deserves the “most dangerous” hallmark now. “Right now? David Cameron.” She says. “Actually, can I have more than one? Then him and that particular group in the cabinet now who are dedicated to scrapping the Human Rights Act. That group. They are an existential threat to the rights and freedoms of the most vulnerable people in our country.” [...] investigatory powers bill. “We wouldn’t let the state impose identity cards, but these,” she holds up her phone, “these we buy.”
UK  USA  David  Cameron  Tories  NSA  GCHQ  Secret  Courts  FISA  Court  FISAAA  Surveillance-Industrial  Complex  surveillance  state  Snoopers  Charter  Patriot  Act  human  rights  Act  Brexit  neoliberalism  neoliberal  neoconservatism  neoconservatives  Theresa  May  Schengen  Agreement  War  on  Terror  Torture  ISIS  far-right  Rechtsruck  Rechtsextremismus  Internet  Privacy  Privacy  Big  Data  Meta  Data  profiling  encryption  Cryptopocalypse  cryptography  backdoors  backdoor 
march 2016 by asterisk2a
Pando: At what point is the convenience of technology outweighed by the constant stress?
Yesterday, I wrote about new proposals to allow the government to trawl the social media accounts of visa applicants before allowing or denying entry to the US.  Specifically, I wrote about my relief, as a visa-carrying foreign worker, at having deleted my social media accounts last year. For all the myriad reasons the government might declare me unworthy of living here -- particularly under President Trump -- at least an old dumb tweet won’t be one of them. [...] Connected technology was supposed to make our lives easier. And of course it has, in countless ways. But what it doesn’t seem to have done is made our lives less stressful...
USA  Visa  application  Social  Media  Big  Data  bulk  collection  FISAAA  FISA  Court  Patriot  Act  Nationalism  War  on  Terror  NSA  GCHQ  Internet  Privacy  Privacy  self-censorship  Orwellian  State  surveillance  Surveillance-Industrial  Complex  surveillance  neoconservatism  neoconservatives  UK  barackobama  presidency  David  Cameron  Theresa  May  Snoopers  Charter  immigration  migration  Smartphone  Meta  Data  encryption  democracy  free  speech  freedom  of  speech  freedom  of  expression  ISIS  Silicon  Valley 
february 2016 by asterisk2a
Video "Hitlers Polizei" | Dokumentation und Reportage | ARD Mediathek
Police as instrumental piece for Power. First to use is against political enemies. Then against all other enemies! ... Gesinnungswandel. Nazifizierung. Als ueberlebenschance. Als einzige job security. Angleichung. Bedinnungslose hingabe. // History doesn't have to repeat itself, but rhymes. // wegsperren aller die als gefahr gesehen werden. und wenn man auch dafuer gesetze machen muss, spezial fuer diese faelle. regiemgegner. "Schutzhaft" als Schreckensinstument. ohne vor einem richter zu kommen, ohne verteidiger. Willkuer und Terror! --- Geheimpolizei Gestapo. "Staatsfeindliche taetigkeit." "Volksschaedlinge." "Volkshygiene" << ie LGBT etc "Fremdkoerper" // Im polizeigefaengnis werden dann gestaendnisse ... erzwungen. Wie im Krieg gegen den Terror heute. // Aus polizisten werden polizei soldaten, nicht dem rechtsstaats dienig, sondern dem Fuehrer.
WW2  WWI  Polizeistaat  Police  State  Adolf  Hitler  Holocaust  Surveillance-Industrial  Complex  surveillance  Internet  Privacy  Privacy  Dictatorship  Military  State  military–industrial  activists  activism  democracy  social  democracy  history  GCHQ  NSA  profiling  Stasi  Stasi  2.0  Ziviler  Ungehorsam  Occupy  Central  occupywallstreet  Machtgehabe  Machtspiele  Machtausübung  Fear  Separation  of  powers  Justice  System  Law  &  Justice  Patriot  Act  War  on  Terror  Abu  Ghraib  FISA  Court  FISAAA  Secret  Courts  Snoopers  Charter  Guantanamo  Bay  Gestapo  Whistleblower  Torture 
january 2016 by asterisk2a
Obama Says It's "Insurmountable" To Monitor Private Social Media Messages Of Potential Attackers - BuzzFeed News
President Obama answers questions on detecting terror plots through monitoring of communications & social media - “We have to recognize that no government has the capacity to detect every post on social media.”
presidency  barackobama  military–industrial  complex  Surveillance-Industrial  surveillance  state  War  on  Terror  CISA  Paris  France  radicalization  Snoopers  Charter  Internet  Privacy  Privacy  radicalisation  islamic  radicalism  islamic  extremism  ISIS  UK  USA  Germany  Vorratsdatenspeicherung  Dataretention  bulk  data  collection  Patriot  Act  activists  activism  Pentagon  NSA  GCHQ  BND  Edward  Snowden  Wikileaks  Julian  Assange  FISA  Court  FISAAA  Secret  Courts 
december 2015 by asterisk2a
Video "Stark: Demokratie durch Überwachung in Gefahr" | Zapp | ARD Mediathek
Der "Spiegel" ist offenbar ins Visier von Geheimdiensten geraten, das Bundeskanzeleramt soll davon seit 2011 gewusst haben. "Spiegel"-Redakteur Stark zeigt sich erschüttert. // freie presse ist pfeiler der demokratie. - 4te gewalt. checks and balances. // mit hilfe von selectoren liste werden journalisten ueberwacht! und ihre bewegung via cellphone tracking. //&! spiegel.de/thema/national_security_agency/ //&! Vorratsdatenspeicherung schreckt Whistleblower ab. "Sammelwut verprellt Informanten." - bit.ly/1lCqrKZ - Vorratsdatenspeicherung hilft nicht bei Verbrechensaufklaerung.
NSA  GCHQ  Whistleblower  surveillance  Surveillance-Industrial  Complex  surveillance  state  BND  Angela  Merkel  journalismus  investigative  journalism  journalism  Big  Data  Edward  Snowden  Wikileaks  democracy  social  democracy  corporate  state  corporate  media  Pressefreiheit  freedom  of  press  Dataretention  Snoopers  Charter  Vorratsdatenspeicherung  Russia  China  bulk  collection  Meta  Data  Internet  Privacy  Privacy  human  rights  presidency  barackobama  Hegemony  USA  War  on  Terror  national  interest  patriotism  Patriot  Act  CIA  FBI  Iraq  War  cablegate  FISA  Court  FISAAA  Secret  Courts  military–industrial  military  intervention  TTIP  TPP  TISA  encryption  Cryptopocalypse  cryptography  Separation  of  powers  Checks  and  Balances  organised  crime  War  on  Drugs  Positioning  framing  PR  spin  doctor 
december 2015 by asterisk2a
IS-Terrorist Abdelhamid Abaaoud war in Deutschland -Video - SPIEGEL ONLINE
[ War on Terror. Surveillance state = ineffective. Or did one intelligence agency know about his where about and did not inform national agencies? to let it happen? there are no checks and balances. ] Mutmaßlicher Drahtzieher der Anschläge in Paris: Abdelhamid Abaaoud war auch in Deutschland - 19.11.2015 - Er galt als gefährlichster Islamist Belgiens und soll hinter den Anschlägen von Paris stecken: Abdelhamid Abaaoud wurde bei der Anti-Terror-Razzia in Saint-Denis getötet. Nach Informationen von SPIEGEL ONLINE hielt sich Abaaoud wiederholt in Deutschland auf.
War  on  Terror  Big  Data  Surveillance-Industrial  Complex  surveillance  state  Orwellian  corporate  state  NSA  oversight  accountability  GCHQ  military–industrial  Paris  France  Intelligence  Agency  Foreign  Intelligence  bulk  collection  Vorratsdatenspeicherung  abuse  of  power  Separation  of  powers  Secret  Courts  FISA  Court  FISAAA  Snoopers  Charter  Dataretention 
november 2015 by asterisk2a
Jung & Naiv - Kommissar für Menschenrechte über die Situation in...
[ right to privacy ] [ institutional ingrained problem ] // Der Menschenrechtskommissar des Europarats, Nils Muižnieks, war heute zu Gast in der BPK und hat über die Menschenrechtslage in Deutschland berichtet. Hier sind unsere naiven Fragen an ihn zu Ehe für alle, Totalüberwachung, institutioneller Rassismus und Menschenrechte in der deutschen Außenpolitik... und seine Antworten.
self-censorship  Internet  Privacy  Privacy  European  Union  human  rights  NSA  oversight  GCHQ  BND  CIA  9/11  War  on  Terror  Secret  Courts  FISA  Court  FISAAA  Patriot  Act  Dataretention  Vorratsdatenspeicherung  Snoopers  Charter  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Career  Politicians  Justice  System  democracy  Law  &  Justice  No  Representation  social  contract  political  theory  political  economy  foreign  affairs  foreign  policy  Intelligence  foreign  relations  Torture  public  awareness  public  debate  public  discourse  public  perception  manufactured  consent  Polarisation  Lügenpresse  Pressefreiheit  freedom  of  press  corporate  media  corporate  state  military–industrial  propaganda  populism  Nationalism  USA  UK  Germany  corporate  espionage  industrial  espionage  cyber  espionage  cyber  Politics 
october 2015 by asterisk2a
Remembering 9/11: The Wolf In 'Patriot Act' Sheep's Clothing | Zero Hedge
https://www.youtube.com/watch?t=47&v=lA9KaeyFEMc - the hay stack we had pre-9/11 was big enough, they had the information points/red dots regarding coming attacks - but they were not able to act on them. filter them out, screen them, forward them to appropriate actors. // // gov overreach, ineffectiveness, waste, ... // also tax dollar waste. budget is blacked out. no info how big, on what spend, contractors (profiteering), ...
Patriot  Act  Edward  Snowden  9/11  Surveillance-Industrial  Complex  surveillance  state  military–industrial  Orwellian  Pentagon  NSA  GCHQ  Five  Eyes  Internet  Privacy  Privacy  Boston  Marathon  Bombing  FISA  Court  FISAAA 
september 2015 by asterisk2a
U.S. developing sanctions against China over cyberthefts - The Washington Post
[ double standard. probably know that they will be outed come time to have e-mailed trade secrets of other nations big companies to their own national companies, even if it is just for infrastructure or defense contract bids ] The White House is getting ready to issue "unprecedented economic sanctions" against Chinese companies and individuals "who have benefited from their government’s cybertheft of valuable U.S. trade secrets," says the Washington Post. But the Post doesn't explain what those sanctions would be, or why the U.S. is going after individual targets instead of the Chinese government itself. One thing that is clear: Chinese president Xi Jinping is scheduled to visit the U.S. next month.
cyber  war  China  NSA  GCHQ  Five  Eyes  IT  Security  Patent  trade  secret  Europe  Germany  corporate  espionage  cyber  espionage  industrial  espionage  presidency  barackobama  Edward  Snowden  Wikileaks  Julian  Assange  bulk  data  collection  FISA  Court  FISAAA  national  interest  Nationalism  protectionism  Security  False  Flag  on  Terror  smoke  mirror  smoking  gun  Russia  Israel  USA  UK  Courts  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Internet  Privacy  Privacy  military–industrial  Hacking  cyber  attack  cyber  crime  cyber 
september 2015 by asterisk2a
Alternatives Management: Vertrauen als Ressource für Unternehmen - SPIEGEL ONLINE
Oft werben diejenigen am meisten darum, die unter Vertrauensverlust leiden. Denn tatsachlich sinkt das Vertrauen in die Wirtschaft und das Misstrauen steigt. Das ist das Ergebnis nahezu aller Studien zum Thema Verbrauchervertrauen // &! bit.ly/1Vd5jYF - Twitter just made it more difficult to hold politicians accountable // Same with the Conservative Party deleting all their speeches and documents after they won majority in election and partnered up with libdems - bit.ly/1c7hHG6 &! bit.ly/1Epl5va // Auch Geld funktioniert nur dank Vertrauen [...] Der Systemtheoretiker Niklas Luhmann beschrieb Vertrauen daher auch als "Mechanismus zur Reduktion sozialer Komplexität". Ständiges Misstrauen dagegen mache unser Zusammenleben deutlich schwieriger, sagt Martin Schweer. [...] Schnell zeigte sich: Hatte der eine das Geschäft fair und zum gegenseitigen Vorteil abgewickelt, erhöhte der andere in der nächsten Runde seinen Einsatz. // &! bit.ly/1ILzkZU - Does honesty matter ...
bank  bailout  GFC  Career  Politicians  Congress  No  Representation  social  contract  transparency  accountability  crony  capitalism  capitalism  post-capitalism  Buffer  Wall  Street  shared  economic  interest  profit  maximisation  shareholder  value  banking  crisis  trust  distrust  trustagent  Start-Up  advice  Start-Up  lesson  Conservative  Party  DWP  David  Cameron  George  Osborne  spin  doctor  PR  public  relations  neoliberalism  neoliberal  algorithm  Page  Rank  monopoly  monopsony  oligopoly  oligopol  Iain  Duncan  Smith  Open  Data  Open  Source  NSA  GCHQ  Secret  Courts  Surveillance-Industrial  Complex  surveillance  state  Orwellian  military–industrial  Pentagon  WMD  False  Flag  FISA  Court  FISAAA  public  record  public  interest  Misstrauen  Lügenpresse  Freedom  of  Information  Act  BND  Angela  Merkel  GroKo  Eurogroup  election  campaign  promises  Internet  Archive.org  Google  Cache  political  theory  governance  corporate  governance  fiat  currency  inequality  Gini  coefficient  fairness  Generationengerechtigkeit  Gerechtigkeit  Justice  System  Jim  Crow  voter  turnout  apathy  indifference  TOS  EULA  win-win  partnerships  cooperation  Google  Data  of  of  public  of  public 
august 2015 by asterisk2a
Larry Lessig’s campaign to run as the “Referendum President” & restore representative democracy - YouTube
min 7 campaign finance and party / politician finance - voucher system (tax free, out of your tax, financed by all tax payers, distributed across all). give it to the party and politician/candidate u think will represent u. does what you think is right. 1 man one woman one (voting right 16), company got a voucher. no lobby org got vocher. its the people. // GroKo Germany election Merkel partied in Berlin in-front of her party. No in-front of the people. // 100bn in corporate subsidies per y in USA alone statistic via Kato Institute (liberal think tank) // the internet is both the best it possibly can be and the worst it possibly can be // Americans have no capacity to admit to their mistakes. // &! youtu.be/48OtjHGpcIQ - Referendum Candidate Lessig Would Consider Biden as VP
lobbyist  lobby  Lobbying  presidential  election  2016  Politics  reform  No  Representation  Career  Politicians  inequality  Super  Rich  1%  post-capitalism  crony  capitalism  Wall  Street  shared  economic  interest  shareholder  value  profit  maximisation  Paul  Mason  Jeremy  Corbyn  Elizabeth  Warren  Robert  Reich  GroKo  TTIP  TTP  CETA  NAFTA  climate  change  GFC  bank  bailout  Super  PAC  Generationengerechtigkeit  fairness  sovereign  debt  crisis  babyboomers  accountability  transparency  political  theory  social  contract  subsidies  subsidizing  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Jim  Crow  military–industrial  Internet  Privacy  Net  Neutrality  Privacy  human  rights  Whistleblower  Chelsea  Manning  Edward  Snowden  Julian  Assange  NSA  Five  Eyes  interest  groups  interestgroups  vested  interest  GCHQ  USA  UK  Secret  Courts  FISA  Court  FISAAA  Wikileaks  BND  deceiving  Drone  Strike  Drone  Warfare  Zivilgesellschaft  Zivilcourage  Bürgertum  civil  liberty  civil  courage  civil  society  civil  rights  Gesellschaft  Wegwerfgesellschaft  climate  crisis  economic  damage  capitalism  exploitation  Iraq  War  9/11  False  Flag  Torture  War  on  Terror  aspirational  economic  F 
august 2015 by asterisk2a
Markus Beckedahl, Andre Meister: Kontrolle ist gut. #Landesverrat ist besser. - YouTube
// Statement von Georg Restle zu der Anzeige wegen Landesverrat gegen die Journalisten Markus Beckedahl und Andre Meister von Netzpolitik.org. - youtu.be/bLuu4ekznT8 // Verschwörung gegen die Freiheit (Doku, ZDF 2014) - youtu.be/HoTW5c2MEYQ // &! O-Ton GroKo - youtu.be/y9pRz5KQ6vo - Eiertanz: Viele, viele naive Fragen zum BND-Skandal // &! http://www.dctp.tv/filme/markus-beckedahl-netzpolitik-org/
netzpolitik  Pressefreiheit  Lügenpresse  Angela  Merkel  GroKo  Surveillance-Industrial  Complex  military–industrial  NSA  GCHQ  Five  Eyes  surveillance  state  Orwellian  BND  corporate  espionage  industrial  espionage  cyber  espionage  cyber  war  USA  Europe  UK  Germany  Vorratsdatenspeicherung  Dataretention  Snoopers  Charter  bulk  data  collection  FISA  Court  FISAAA  Patriot  Act  presidency  barackobama  David  Cameron  encryption  Cryptopocalypse  cryptography  False  Flag  on  Terror  IT  Security  cyber  netzpolitik.org  freedom  of  press  of  Information  Act  National  Security  interest  on  Drugs  organised  crime  cyber  crime  investigative  journalism  journalismus  journalism  Whistleblower  Career  Politicians  No  Representation  social  contract  political  theory  Internet  Privacy  Privacy  Meta  metadata  Big  Wikileaks  Edward  Snowden  Julian  Assange  Secret  Courts  Glenn  Greenwald 
august 2015 by asterisk2a
AT&T has 'extraordinary, decades-long' relationship with NSA – report | US news | The Guardian
New York Times and ProPublica cite newly released NSA documents Telecoms giant assisted with ‘wiretapping United Nations headquarters’ << in ny, isn't that some kind of international territory? "The site of the UN Headquarters has extraterritoriality status. This affects some law enforcement where UN rules override the laws of New York City, but it does not give immunity to those who commit crimes there."
UN  United  Nations  United  Nations  Security  Council  NSA  Five  Eyes  national  interest  foreign  affairs  foreign  policy  barackobama  presidency  War  on  Terror  False  Flag  abuse  of  power  FISA  Court  FISAAA  Surveillance-Industrial  Complex  surveillance  state  Orwellian  corporate  state  corporate  media  manufactured  consent  populism  propaganda 
august 2015 by asterisk2a
U.K. ‘Emergency’ Surveillance Law Ruled Unlawful By High Court | TechCrunch
In a high profile win for civil liberties in the U.K., surveillance legislation rushed through the national parliament in a matter of days last year has today been declared unlawful under European Human Rights law. Two MPs, Tom Watson (Labour) and David Davis (Conservative), along with civil rights campaign group Liberty, took the government to the High Court last month, challenging the Data Retention and Investigatory Powers Act (DRIPA) on privacy and data protection grounds. Today the High Court agreed with their challenge. [...] the European Court of Justice ruling that had, months earlier, struck down EU data retention powers as disproportionate. [...] [abuse] The court also ruled section 2 unlawful because it does not build in limits to accessing this data by requiring access be authorized by a court or independent body. // Part of Tories 2015 manifesto; Scrap the Human Rights Act, and introduce a British Bill of Rights - bbc.in/1JJI1U4
UK  human  rights  Tories  Conservative  Party  general  election  2015  election  campaign  promises  David  Cameron  Snoopers  Charter  NSA  GCHQ  Five  Eyes  Dataretention  bulk  data  collection  encryption  Cryptopocalypse  cryptography  ISIS  False  Flag  War  on  Terror  Surveillance-Industrial  Complex  surveillance  surveillance  state  Orwellian  DRIPA  Internet  Privacy  Privacy  FISA  Court  FISAAA  presidency  barackobama  Pentagon  military–industrial  oversight  transparency  abuse  of  power  accountability  Vorratsdatenspeicherung  Europe  populism  propaganda  manufactured  consent  corporate  state  corporate  media  PR  spin  doctor 
august 2015 by asterisk2a
Russia will fork Sailfish OS to shut out pesky Western spooks
Paranoia over NSA tampering spurs de-Westernisation drive // well only the Paranoid survive. [...] Russia’s Minister of Communications and Mass Media, Nikolai Nikiforov, has taken part in talks to form a consortium that will aid Russia in developing a custom mobile OS, reportedly a forked version of Jolla’s Sailfish OS, to lessen its dependence on Western technology. Nikiforov held a working meeting last week with the leadership of Hong Kong-based Sailfish Holdings, developer of the quietly admired Sailfish OS. Alongside other participants, the parties involved discussed the use of open-source software in the public and private sectors, taking into account technical, economic and political factors, the latter of which is expected to include United States’ interference with exported technologies.
Open  Source  Russia  corporate  espionage  industrial  espionage  cyber  espionage  NSA  Five  Eyes  Nationalism  barackobama  presidency  Europe  GCHQ  UK  Foreign  Intelligence  affairs  relations  2015  cyber  war  encryption  Angela  Merkel  Leadership  Career  Politicians  No  Representation  human  rights  Privacy  Internet  Privacy  Cryptopocalypse  cryptography  national  interest  False  Flag  on  Terror  on  Drugs  organised  crime  backdoors  backdoor  IT  Security  exploit  Germany  FRance  surveillance  Surveillance-Industrial  Complex  surveillance  state  Orwellian  corporate  state  manufactured  consent  Cold  propaganda  populism  Pressefreiheit  Lügenpresse  Vorratsdatenspeicherung  Snoopers  Charter  investigative  journalism  Whistleblower  tracking  bulk  data  collection  democracy  freedom  freedom  of  press  Secret  Courts  FISA  Court  FISAAA  BND  military–industrial 
august 2015 by asterisk2a
Pressure mounts over claims Police Scotland breached rules over spying on journalists (From Herald Scotland)
PRESSURE is mounting on ministers to take action on Police Scotland amid further criticism of the force over claims it illegally spied on a journalist to uncover sources. The force's elite Counter Corruption Unit (CCU) is said to have snooped on the reporter without getting judicial approval - a tactic which was banned on March 25 following a row over officers using the Regulation of Investigatory Powers Act (Ripa) to access journalists’ phone records, texts and emails. // [ endemic and systemic! you are not safe. period. ] // &! bbc.in/1OQEaGJ - Ministers questioned over Police Scotland 'spying' claims // &! bbc.in/1KUFPu9 &! bbc.in/1Maojno << time to get their story right!?
Met  Police  GCHQ  freedom  of  press  UK  journalismus  investigative  journalism  journalism  corporate  state  corporate  media  media  conglomerate  Pressefreiheit  Lügenpresse  Five  Eyes  NSA  Career  Politicians  No  Representation  democracy  Surveillance-Industrial  Complex  surveillance  state  Orwellian  military–industrial  2015  human  rights  Internet  Privacy  Privacy  Snoopers  Charter  Vorratsdatenspeicherung  abuse  of  power  corruption  manufactured  consent  populism  War  on  Terror  False  Flag  organised  crime  cyber  cyber  crime  Cryptopocalypse  cryptography  encryption  backdoors  backdoor  propaganda  Intelligence  Agency  Foreign  Intelligence  corporate  espionage  industrial  espionage  cyber  espionage  Nationalism  national  interest  domestic  affairs  affairs  policy  relations  MI5  MI6  Secret  Courts  FISA  Court  FISAAA 
august 2015 by asterisk2a
Windows 10: Microsoft under attack over privacy | Technology | The Guardian
>> It is not Free. Period! Stupid. << // &! Get Tracked with Windows 10 | Tech Talk Today 198 - youtu.be/Gh0y5drKwAE &! http://www.jupiterbroadcasting.com/85697/get-tracked-with-windows-10-ttt-198/ &! Microsoft’s new small print – how your personal data is (ab)used - https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/ &! &! bit.ly/1eNKQJm - Mit Windows 10 wird alles besser - sagt Microsoft. Viele Neuerungen funktionieren aber nur, weil der Konzern auf Nutzerdaten zugreift. Wir zeigen, wie Sie die Datensammelei sinnvoll einschränken. [ einschraenken, nicht abschaltbar - selling you out ] &! bit.ly/1g2TLHN - Like all proprietary software, Windows 10 puts those that use it under the thumb of its owner. [...] Windows is an open window onto you &! bit.ly/1SFoXhT &! Linux: The OS of the Future - youtu.be/cTpujBq1Zi0 // &! bit.ly/1MUDxeB &! youtu.be/ULq1ajA1Jek
TOS  Microsoft  Platform  Internet  Privacy  Privacy  Big  Data  advertisement  advertisement  targeting  user  Facebook  Windows  10  business  model  Free  perma-cookie  ISP  Google  Wireless  Carrier  Android  Apple  human  rights  Linux  Open  Source  Twitter  backdoors  backdoor  Cryptopocalypse  encryption  NSA  FISA  Court  FISAAA  corporate  espionage  industrial  espionage  cyber  espionage  national  interest  Nationalism  Five  Eyes  GCHQ  Secret  Courts  cryptography  FOSS  GNU  GNU/Linux  GPL 
august 2015 by asterisk2a
Chris Hedges - Our Only Hope Will Come Through Rebellion - 29th March 2014 - YouTube
military industrial complex does what it wants and asks and gets what it wants. // Truth is hidden. Decent is criminalised. // things are only to get worse. // protect corporate state and spy on other corporate states and corporate entities. // for-profit military industrial complex // 9/11 opportunist, false flag, to profit from program X to protect our nation // no warrent needed - https://en.wikipedia.org/wiki/Warrant_(law) // the corporate state has no incentive to give up Stasi 2.0 // >> = Totalitarian state // we have totalitarian structures! period. // reform can not come from those who are in the center of power and a implicit of the status quo ... meaning only a revolution through rebellion is the option. defying the law and opting for civil disobedience. moral and physical courage needed.
surveillance  state  NSA  GCHQ  Stasi  2.0  Orwellian  Five  Eyes  Cold  War  civil  liberty  Constitution  FISA  Court  FISAAA  Patriot  Act  military–industrial  complex  Whistleblower  democracy  oversight  transparency  accountability  Intelligence  Agency  abuse  of  power  Separation  of  powers  Career  Politicians  No  Representation  Congress  Washington  lobbyist  lobby  Lobbying  National  Security  False  Flag  Privacy  Internet  Privacy  USA  UK  Warrent  metadata  KGB  WMD  Iraq  War  War  on  Drugs  War  on  Terror  organised  crime  Politics  of  Fear  history  Empire  Drone  Strike  Drone  Warfare  Palestine  Gaza-Israel  conflict  Foreign  Intelligence  World  Police  World  G8  Europe  corporate  espionage  industrial  espionage  cyber  espionage  Cryptopocalypse  encryption  Edward  Snowden  Wikileaks  Julian  Assange  Torture  Pressefreiheit  Lügenpresse  media  conglomerate  presidency  barackobama  Angela  Merkel  opportunist  Opportunism  Wall  Street  trust  trustagent  Secret  Courts  Chelsea  Manning  corruption  self-censorship 
june 2015 by asterisk2a
Danny Boyle: the Olympic opening ceremony would be done differently in 2015 - Newsnight - YouTube
do we want to give them the data, our lives?! it seems positive and benign, but it changes our lives in the long-term and we are only seen as data pools. // dave eggers novel the circle
Internet  Privacy  book  Facebook  Google  Big  Data  perma  cookie  Orwellian  State  surveillance  FISA  Court  FISAAA  Secret  Courts  NSA  GCHQ  Foreign  Intelligence  Intelligence  Agency  corruption  abuse  of  power  Privacy  human  rights  analytics  Vorratsdatenspeicherung  Five  Eyes  False  Flag  War  on  Terror  cyber  cyber  espionage  corporate  espionage  industrial  espionage  Microsoft  backdoors  backdoor  encryption  cryptography  Cryptopocalypse 
may 2015 by asterisk2a
Law changed to allow GCHQ hacking ... just as GCHQ hauled into court for hacking • The Register
[ unaccountable, free for all to hack anything that is in the domestic interest, can be corporate intelligence, trade secrets, patents, corporate documents & communications; Russia, China, Germany, Brazil, India. The NEW COLD WAR. see also 2015 BND affair with selectors. ] Government legislation to exempt GCHQ from prosecution on charges of illegal hacking has been passed and come into effect – apparently torpedoing an ongoing claim against the surveillance agency being heard by the Investigatory Powers Tribunal. Last July, a coalition of internet service providers and international organisations teamed up with Privacy International to take legal action against GCHQ. Their claim, which arrived in court today, has been hobbled by what the privacy warriors said was the revelation that the government had quietly ushered through legislation amending the Computer Misuse Act to exempt GCHQ and law enforcement from prosecution, and did so while the case was ongoing.
cyber  war  cyber  attack  GCHQ  on  Terror  organised  crime  on  Drugs  accountability  surveillance  state  Orwellian  2015  corporate  espionage  industrial  espionage  cyber  espionage  NSA  USA  UK  presidency  barackobama  David  Cameron  encryption  Europe  trade  secret  corporate  intelligence  Airbus  Five  Eyes  Agency  domestic  interest  abuse  of  power  corruption  FISA  Court  FISAAA  Patriot  Act  Act  Courts  Cold  Cold  2.0  BND  selector  Wall  Street  Internet  Privacy  IT  Security  geopolitics  Foreign  National  Security  globalisation  globalization 
may 2015 by asterisk2a
“The biggest company you’ve never heard of” acquired by major military contractor you’ve heard of | PandoDaily
“Spies For Hire: The Secret World of Intelligence Outsourcing” // This merely scratches the surface of one of the biggest Silicon Valley firms you’ve never heard of. And it serves as a reminder that Silicon Valley is a pure creation of the US government military-intelligence complex, a relationship that today’s tech heroes would rather we all forgot—a relationship embedded in Santa Clara County’s genetic coding, no matter how well those secrets are kept. // http://pando.com/2014/03/29/google-apparently-scrubs-military-contractor-partner-listing-after-pando-report
book  surveillance  state  Orwellian  NSA  Pentagon  USA  Wall  Street  for-profit  budget  deficit  presidency  barackobama  Patriot  Act  FISA  Court  FISAAA  CIA  FBI  intelligence  contractor  contractor  Agency  military-intelligence  military–industrial  complex  DARPA  Silicon  Valley  outsourcing  Palantir 
may 2015 by asterisk2a
NSA phone data collection 'illegal', US court rules - BBC News
A federal appeals court has found that the National Security Agency’s collection of millions of Americans’ phone records isn’t authorized under the Patriot Act. http://pando.com/2015/05/07/judges-say-its-illegal-for-the-nsa-to-collect-americans-call-records/
surveillance  state  Orwellian  NSA  Five  Eyes  presidency  barackobama  Patriot  Act  Constitution  Privacy  Internet  Privacy  human  rights  FISA  Court  FISAAA  Secret  Courts  GCHQ  UK  USA  Edward  Snowden  Whistleblower  metadata  Big  Data  analytics 
may 2015 by asterisk2a
Twitter case exposes the Justice Department’s nonsensical views on disclosing government surveillance | PandoDaily
And the government’s arguments, even if they are legally sound, are starting to make it clearer than ever that it doesn’t want to talk about its surveillance programs.
Twitter  FISA  Court  FISAAA  surveillance  state  Orwellian  USA  NSA  FBI  War  on  Terror  War  on  Drugs  organised  crime  Five  Eyes  GCHQ  presidency  barackobama 
may 2015 by asterisk2a
John Oliver Edward Snowden Interview - YouTube
language shapes thoughts. how you communicate and on what level. US elected official talk is always about "keeping America and Americans, safe." what % of baby boomers or millennial do knows what meda data, profiling, and big data is or do or how it can be leveraged. they know what a selfie and a selfie stick is. That's why Career Politicians and Lobby organisations hire PR people. CORPORATE (Wall Street) PR PEOPLE!!! Talking 5 minutes to the nation and saying nothing at all of concrete notion, IS CORPORATE PR SPEAK. Setting the tone for the public discourse, its sort of art and honed down to a science. // &! Last Week Tonight with John Oliver: Government Surveillance (HBO) >> https://youtu.be/XEVlyP4_11M >> Section 215 - bulk collection // principle, no to self-censorship
Edward  Snowden  surveillance  state  Orwellian  public  discourse  public  awareness  public  interest  public  perception  communication  language  Internet  Privacy  Privacy  Career  Politicians  No  Representation  Five  Eyes  public  relations  interest  groups  lobbyist  Lobbying  lobby  presidency  barackobama  public  opinion  publicrelations  Policy  Makers  social  cohesion  Millennials  short-term  thinking  short-term  view  crony  capitalism  Wall  Street  FISA  Court  FISAAA  Patriot  Act  War  on  Terror  False  Flag  military–industrial  complex  metadata  Vorratsdatenspeicherung  Intelligence  Agency  Foreign  Intelligence  World  Police  abuse  of  power  USA  UK  Imperialism  National  Security  vested  interest  interest  bulk  collection  reform  Constitution  corporate  espionage  industrial  espionage  cyber  espionage  Europe  Empire  British  Empire  CIA  self-censorship 
april 2015 by asterisk2a
Ideas at the House: Panel - The War on Whistleblowers and Their Publishers - YouTube
warrentless spying on journalists, including wiretapping, espionage, and hacking into accounts. -//- &! Glenn Greenwald's Infamous Battle with NPR's Dina Temple-Raston - https://www.youtube.com/watch?v=C2RxQpESxoI &! &!
Whistleblower  investigative  journalism  journalism  journalismus  barackobama  presidency  surveillance  state  Orwellian  NSA  CIA  White  House  Washington  freedom  of  press  of  Information  Act  FISA  Court  FISAAA  First  Amendment  Information  wants  to  be  free  cyber  war  Separation  of  powers  abuse  of  power  Career  Politicians  Law  &  Justice  Justice  System  Judiciary  on  Terror  Drone  Warfare  on  Drugs  organised  crime  human  rights  Privacy  Internet  Privacy  Secret  Courts 
february 2015 by asterisk2a
President Obama: The Re/code Interview - YouTube
slick downplay, comparing cyber war & industrial, coroporate cyber espionage (breaking in into Gemalto for SIM encryption keys) with basketball. And also tapping the phone of Angela Merkel ... &! http://youtu.be/td7Dcsco-WY "Obama on the state of the world: the extended Vox conversation" - is he a realist or just a coward!? /// >> http://www.bbc.co.uk/news/technology-31545050 &! http://www.spiegel.de/netzwelt/netzpolitik/nsa-und-gchq-haben-sim-karten-schluessel-von-gemalto-erbeutet-a-1019515.html &! Silicon Valley subbed him on his proposals and road show 20 min away from their door, is a tell tale what they think of him saying one thing and what the NSA&Co put them through and demands (see Yahoo!'s case with the FISA Court) - tcrn.ch/17ovyqD &! If it were a private person were hack into and steal Gemalto encryption keys, the person would be thrown in jail FOREVER! youtu.be/bIpNXh9Nh9k?t=16m32s &! NSA, GCHQ, Five Eyes like to bully people to do X for them & drop possible charges.
presidency  barackobama  NSA  USA  Gemalto  SIM  encryption  cyber  war  GCHQ  governance  on  Terror  Cryptopocalypse  cryptography  corporate  espionagem  industrial  espionage  espionage  cyber  espionage  UK  Five  Eyes  Internet  Privacy  Privacy  human  rights  Stasi  Stasi  2.0  organised  crime  on  Drugs  ethical  machine  Checks  and  Balances  Separation  of  powers  democracy  abuse  of  power  David  Cameron  cyber  crime  cyber  attack  cyber  securityr  IT  Security  surveillance  state  Orwellian  FISA  Court  FISAAA  Secret  Courts  Silicon  Valley 
february 2015 by asterisk2a
Linux Journal - Wikipedia, the free encyclopedia
In early July 2014 it was revealed that the NSA's XKeyscore program targeted readers of Linux Journal, which the NSA considers an "extremist forum". // &! NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance - http://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance // &! NSA targets the privacy-conscious - http://daserste.ndr.de/panorama/aktuell/NSA-targets-the-privacy-conscious,nsa230.html "Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA." - visiting site X puts you on watch list/collect data list - ie Wikileaks, Tor, Linux Journal, CCC unter anderem !+& bit.ly/1sZSWV9 >> leads to self-censorship like in East Germany.
NSA  Internet  Privacy  Privacy  human  rights  XKeyscore  Linux  CCC  activism  activists  Hacktivism  target  targeting  GCHQ  encryption  cryptography  Cryptopocalypse  IT  Security  cyber  cyber  war  cyber  espionage  corporate  espionage  industrial  espionage  espionage  FISA  Court  FISAAA  Foreign  Intelligence  Five  Eyes  presidency  barackobama  Stasi  Stasi  2.0  history  backdoor  backdoors  abuse  of  power  surveillance  state  Orwellian  Big  Data  Meta  Data  Unix  Google  Search  Tor  VPN  anonymity  self-censorship  free  speech  freedom  of  press  freespeech  free  press  Pressefreiheit  Meinungsfreiheit  Information  wants  to  be  free  knowledge  M 
february 2015 by asterisk2a
Kaspersky claims US spies can infect computers with malware that is almost impossible to detect | PandoDaily
NSA has found a way to infect computers targeted for surveillance with malware that is almost impossible to detect and even harder to remove. Kaspersky Lab says in its report that a threat actor known as the Equation Group made this possible by infecting firmware used in hard drives made by the world’s top manufacturers. // &! Reddit - bit.ly/1ATpm6v >> According to Kaspersky, getting the malicious code into a drive’s firmware is not an easy task, and can’t be done with help of public tools, meaning that the NSA had to have access to source codes for hard drives produced by these companies. [meaning they asked for access (and or intercepted orders) when OEM orders came from targeted countries/firms? or spoof hw vendor sites and let them download the manipulated firmware] &! bit.ly/19vzSpI - ie Iran and Russia.
NSA  CIA  surveillance  state  Orwellian  Foreign  Intelligence  corporate  espionage  cyber  espionage  espionage  industrial  espionage  GCHQ  Five  Eyes  backdoor  backdoors  corporate  values  corporate  governance  ethical  machine  FISA  Court  FISAAA  Regin  Whistleblower  rootkit  cyber  war  Iratemonk  Firmware  nls_933w.dll  USB  Air  Gap  cyber  security  cyber  attack  cyber  crime  USA  presidency  barackobama  Stuxnet  organised  crime  human  rights  cryptography  Cryptopocalypse  encryption  IT  on  Terror  Malware  Internet  Privacy  Privacy 
february 2015 by asterisk2a
TimesTalks - Laura Poitras, Glenn Greenwald and Edward Snowden with David Carr
Don’t miss this special opportunity to hear the director of CITIZENFOUR – the film nominated for the Academy Award for Best Documentary Feature – the first journalist to write about Snowden’s revelations and Snowden himself (via live video) in conversation with New York Times media columnist David Carr about the film and the issues it raises. // min 43 --- presidency barack obama worst administration ever for clamping down on freedom of press, whistleblowers, against transparency, governance, seperation of powers/checks and balances (NSA/CIA), - Obama got the executive power to close guantanamo, shut off surveillance without warrants. // subverts democracy. &! &! U.S. DROPS TO 49TH IN WORLD PRESS FREEDOM RANKINGS, WORST SINCE OBAMA BECAME PRESIDENT - bit.ly/1zaIdVO
CITIZENFOUR  Edward  Snowden  Laura  Poitras  Glenn  Greenwald  presidency  barackobama  transparency  NSA  governance  oversight  accountability  Whistleblower  freedom  of  press  freepress  Pressefreiheit  free  press  free  speech  Torture  Foreign  Intelligence  Intelligence  Agency  GCHQ  CIA  Warrant  FISAAA  FISA  Court  Europe  China  cyber  war  values  idealism  surveillance  state  Orwellian  moral  beliefs  ethical  machine  ethical  beliefs  corporate  espionage  cyber  espionage  industrial  espionage  espionage  democracy  No  Representation  Privacy  Internet  Privacy  encryption  cryptography  Cryptopocalypse  human  rights  Act  Patriot  Act 
february 2015 by asterisk2a
I challenged hackers to investigate me and what they found out is chilling | PandoDaily
see Planning section; all the vectors of attack // and the weakest component is almost always the human being in some sort of way.
corporate  espionage  cyber  espionage  industrial  espionage  espionage  Foreign  Intelligence  NSA  CIA  surveillance  state  Orwellian  IT  Security  cyber  internet  online  password  cyber  war  cyber  attack  cyber  crime  FISA  Court  Warrant  wiretapping  FISAAA  black  hat  hacker  white  hat  hacker  phishing  phishing  scam 
february 2015 by asterisk2a
With the help of Pinterest, Twitter, and others, a new Facebook platform wants to keep the web secure | PandoDaily
The service is called ThreatExchange, and companies like Yahoo, Twitter, and Pinterest have all agreed to share threat information with each other via the boringly-named tool. But these companies aren’t the only ones worried that information about digital threats isn’t shared as well as it could be. A new agency, the Cyber Threat Intelligence Integration Center, has been formed to facilitate similar sharing amongst various intelligence agencies. ThreatExchange and CTIIT were both formed out of the belief that digital threats are a puzzle whose pieces are held by various groups. The only way to solve that puzzle, then, is to convince everyone to share their pieces. Otherwise the puzzle will always be incomplete. // what if NSA abuses knowledge this org got (of US companies) to abuse the knowledge via FISA Court injunction not to release it to public knowledge - ie to compromise and or steal intelligence from non-US firms.
IT  Security  cyber  encryption  ThreatExchange  Silicon  Valley  internet  online  cryptography  Cryptopocalypse  DDoS  NSA  CIA  BND  Five  Eyes  surveillance  state  Orwellian  Intelligence  Agency  Foreign  Intelligence  transparency  governance  accountability  Europe  China  FISA  Court  FISAAA  ethical  machine  cyber  espionage  corporate  espionage  industrial  espionage  cyber  attack  cyber  war  cyber  crime 
february 2015 by asterisk2a
EFF’s Game Plan for Ending Global Mass Surveillance | Electronic Frontier Foundation
[...] Most people haven’t even heard of it, but Executive Order 12333 is the primary authority the NSA uses to engage in the surveillance of people outside the U.S. While Congress is considering much-needed reforms to the Patriot Act, there’s been almost no debate about Executive Order 12333. [...] [... and its also the private industry as contractor shovelling money for Wall Street shareholders, paid for by tax payer money ...]
EFF  surveillance  state  Orwellian  NSA  encryption  cryptography  Cryptopocalypse  Internet  Privacy  Privacy  Big  Data  metadata  Meta  Data  human  rights  USA  Five  Eyes  Foreign  Intelligence  Intelligence  Agency  GCHQ  backdoor  backdoors  CIA  FBI  cyber  security  cyber  attack  cyber  war  cyber  espionage  corporate  espionage  espionage  FISA  Court  FISAAA  presidency  barackobama  David  Cameron  democracy  governance  transparency  accountability  Career  Politicians  Patriot  Act  Act  Whistleblower 
february 2015 by asterisk2a
Here’s how reporters are reacting to Snowden’s revelations | PandoDaily
The global surveillance programs revealed by Edward Snowden have caused journalists to change how they operate, question what the government knows about them, and consider abandoning investigative reporting, according to a survey from the Pew Research Center. A significant number of the journalists surveyed said they had changed their behavior, whether it’s how they store sensitive files (49 percent), how they communicate with other journalists (29 percent), whether they’ve reached out to a source (13 percent), or pursued a specific story (2 percent). Many are also convinced the government is gathering information about them. Some 64 percent of journalists believed intelligence agencies had “probably collected data” about them. (The other 36 percent, as “InfoSec Taylor Swift” joked, must not read the news.)
investigative  journalism  journalism  journalismus  presidency  barackobama  surveillance  state  Orwellian  encryption  Internet  Privacy  Privacy  Whistleblower  NSA  CIA  FBI  GCHQ  BND  Five  Eyes  Wikileaks  Intelligence  Agency  foreign  relations  foreign  policy  foreign  affairs  Career  Politicians  Politics  David  Cameron  UK  USA  Europe  Espionage  Act  corporate  cyber  FISA  Court  FISAAA  Secret  Courts  leverage  Power  Play  Political  Governance  oversight  accountability  trust  trustagent  confidence  democracy  transparency  No  Representation  short-term  view  short-term  thinking  unintended  consequences  Lügenpresse  Pressefreiheit  freedom  of  press  wiretapping  folly  science  error  distrust  fairness  Law  &  Justice  Justice  System  complexity 
february 2015 by asterisk2a
Today's Uncertain Future Calls For Observation and Patience, Not Boldness and Strategy | BillMoyers.com
Not one of the signature foreign policy initiatives conceived in Obama’s first term has borne fruit. When it came to making a fresh start with the Islamic world, responsibly ending the “dumb” war in Iraq (while winning the “necessary” one in Afghanistan), “resetting” US-Russian relations, and “pivoting” toward Asia, mark your scorecard zero for four. There’s no doubt that when Kerry arrived at the State Department he brought with him some much-needed energy. That he is giving it his all — the department’s website reports that the secretary has already clocked over 682,000 miles of travel — is doubtless true as well. The problem is the absence of results. Remember when his signature initiative was going to be an Israeli-Palestinian peace deal? Sadly, that quixotic plan, too, has come to naught.
presidency  barackobama  foreign  relations  foreign  policy  foreign  affairs  FISAAA  Intelligence  Agency  NSA  surveillance  state  Orwellian  corporate  espionage  Act  cyber  espionage  espionage  Europe  Five  Eyes  Patriot  Act  FISA  Court  Edward  Snowden  cablegate  Wikileaks  Whistleblower  investigative  journalism  Chelsea  Manning  Julian  Assange  Russia  Crimea  Crisis  Asia  China  Gaza-Israel  conflict  Iraq  War  Afghanistan 
february 2015 by asterisk2a
Europarat warnt: “Massenüberwachung ist eine grundlegende Bedrohung der Menschenrechte” | netzpolitik.org
>> Bürger sollen nur überwacht werden dürfen, wenn ein Gerichtsbeschluss und ein begründeter Verdacht vorliegt. [...] Das Ausnutzen von Backdoors, 0-day-exploits oder der Schwächung von Verschlüsselungsstandards soll verboten werden. [...] Whistleblower, die illegale Überwachungsaktivitäten aufdecken, sollen zuverlässig und effektiv geschützt werden – inklusive der Gewährung von Asyl. [...] [...] Die NSA und ihre Partner betreiben vermutlich seit Jahren Wirtschaftsspionage unter dem Deckmantel der Terrorismusabwehr. Anders sind verwanzte Büros, wie etwa die des Industriedienstleisters Ferrostaal, jedenfalls schwer zu erklären. Auch gibt es gezielte Programme zur Sammlung von sensiblen Informationen über politische Gegner, wie etwa deren Pornokonsum.
surveillance  state  Orwellian  NSA  GCHQ  Internet  Privacy  Privacy  human  rights  warrant  Big  Data  metadata  unintended  consequences  freedom  of  press  free  speech  Pressefreiheit  investigative  journalism  journalism  journalismus  BND  Europe  War  on  Terror  War  on  Drugs  organised  crime  backdoor  backdoors  encryption  Whistleblower  Political  Governance  corporate  abuse  of  power  code  of  conduct  self-censorship  corporate  espionage  Act  cyber  espionage  espionage  FISA  Court  FISAAA  Secret  Courts  UK  presidency  barackobama  David  Cameron  USA  Five  Eyes  Career  Politicians  ethical  beliefs  moral  beliefs  Unrechtsstaat 
february 2015 by asterisk2a
NSA-Trojaner Regin: Angriff auf Kanzleramt blieb jahrelang unbemerkt - SPIEGEL ONLINE
(( Existence of Reign was disclosed in August 2014 by Kaspersky Lab and Symantec. )) via - https://news.ycombinator.com/item?id=8952684 // Der Spionageangriff auf eine damalige Referatsleiterin in der Abteilung Europapolitik des Bundeskanzleramtes war offenbar gravierender als bislang angenommen. Untersuchungen des privaten Laptops der Mitarbeiterin ergaben, dass das Computerprogramm Regin spätestens im Februar 2012 eingeschleust wurde. &!&! Source Code Similarities: Experts Unmask 'Regin' Trojan as NSA Tool - Just weeks ago, SPIEGEL published the source code of an NSA malware program known internally as QWERTY. Now, experts have found that it is none other than the notorious trojan Regin, used in dozens of cyber attacks around the world. http://www.spiegel.de/international/world/regin-malware-unmasked-as-nsa-tool-after-spiegel-publishes-source-code-a-1015255.html
NSA  Trojan  Edward  Snowden  surveillance  state  Orwellian  Political  Governance  FISA  Court  FISAAA  presidency  barackobama  Malware  rootkit  foreign  policy  foreign  relations  foreign  affairs  cyber  espionage  Act  corporate  espionage  espionage  cyber  attack  cyber  security  cyber  war  cyber  crime  GCHQ  UK  Five  Eyes  David  Cameron  Stuxnet  Regin  Europe  QWERTY 
february 2015 by asterisk2a
BADASS intelligence program shows there’s no distinction between for-profit and governmental surveillance | PandoDaily
Put another way: so long as government agencies are able to access or intercept data collected by private services, there is no distinction between for-profit surveillance and government spying programs. All the information eventually goes to the same place.
BADASS  PRISM  FISAAA  FISA  Court  USA  surveillance  state  surveillance  Orwellian  NSA  CIA  FBI  tracking  warrant  presidency  barackobama  War  on  Terror  War  on  Drugs  organised  crime  foreign  intelligence  foreign  policy  foreign  relations  foreign  affairs  Europe  UK  GCHQ  Edward  Snowden  Whistleblower  perma-cookies  zombie  cookies 
january 2015 by asterisk2a
The Cloud Conspiracy 2008-2014 [31c3] - YouTube
Deep packet inspection box at every data center/communication knot (USA)!? You can not trust American companies ... ... if it is in the interest of foreign affairs/policy/politics/economy of the USA, it is deemed important to gather, the information. Definition for surveillance, espionage, data collection, systems intrusion/hijacking to obtain foreign intelligence is very very broad. [...] If you have control over your date, and the encryption of it (sw, key, method, no backdoors possible) then you are on the save side. But computation is different, bc computing data needs to happen in plain text. There lies the vector of attack.
PRISM  FISA  Court  Secret  Courts  NSA  GCHQ  Patriot  Act  Espionage  Act  presidency  barackobama  Intelligence  Agency  foreign  information  BND  Europe  UK  USA  War  on  Terror  War  on  Drugs  foreign  affairs  foreign  relations  National  Security  organised  crime  World  Police  surveillance  state  Orwellian  encryption  Political  Governance  corporate  accountability  Career  Politicians  oversight  transparency  No  Representation  trustagent  trust  confidence  democracy  Big  Data  FISAAA 
january 2015 by asterisk2a

related tags

&  1%  2.0  9/11  Aaron  Abu  abuse  accountability  Act  activism  activists  Adolf  advertisement  advice  affairs  Afghanistan  Agency  Agreement  Air  AirBnB  Airbus  al-Qaida  algorithm  Amendment  American  analytics  and  Android  Angela  anonymity  apathy  Apple  application  Archive.org  Asia  aspirational  Assange  attack  awareness  babyboomers  backdoor  backdoors  BADASS  bailout  Balances  bank  banking  barackobama  Basic  Bay  be  beliefs  Bernie  Big  Bill  black  blind  BND  Bombing  book  Boston  Brexit  BRIC  British  budget  Buffer  bulk  business  Bürgertum  cablegate  Cache  Cameron  campaign  capitalism  Career  Carrier  CCC  CCTV  Central  CETA  change  Charter  Checks  Chelsea  China  CIA  CISA  CITIZENFOUR  civil  climate  code  coefficient  cohesion  Cold  collection  communication  complex  complexity  conduct  confidence  conflict  conglomerate  Congress  consent  consequences  Conservative  Constitution  contract  contractor  cookie  cookies  cooperation  Corbyn  corporate  corruption  Council  courage  Court  Courts  crime  Crimea  crisis  crony  Crow  cryptography  Cryptopocalypse  currency  cyber  damage  DARPA  data  Dataretention  David  DDoS  debate  debt  deceiving  deficit  democracy  Dictatorship  discourse  distrust  doctor  dogma  domestic  Dream  DRIPA  Drone  Drugs  Duncan  DWP  Eating  economic  economy  Edward  EFF  efficiency  election  Elizabeth  Empire  encryption  error  espionage  espionagem  ethical  EULA  Eurogroup  Europe  European  exploit  exploitation  exploits  expression  extremism  Eyes  Facebook  fairness  False  far-right  FBI  Fear  fearmongering  fiat  Firmware  First  FISA  FISAAA  Five  Flag  folly  for-profit  foreign  FOSS  framing  FRance  France  free  freedom  freepress  freespeech  Future  G8  gagging  Gap  Gaza-Israel  GCHQ  Gemalto  general  Generationengerechtigkeit  geopolitics  George  Gerechtigkeit  Germany  Gesellschaft  Gestapo  GFC  Ghraib  Gini  Glenn  globalisation  globalization  Gmail  GNU  GNU/Linux  Google  governance  GPL  GPS  Greenwald  GroKo  groups  Guantanamo  gun  hacker  Hacking  Hacktivism  hat  Hegemony  history  Hitler  Holocaust  homescreen  House  human  Iain  idealism  ideology  image  immigration  Imperialism  Income  indifference  industrial  inequality  information  injustice  intelligence  interest  interestgroups  internet  intervention  investigative  Investigatory  Iraq  Iratemonk  Is  ISIL  ISIS  islamic  ISP  Israel  IT  Jeremy  Jim  journalism  journalismus  Judiciary  Julian  Justice  KGB  knowledge  language  Larry  Laura  Law  Leadership  Lessig  lesson  leverage  liberty  Linux  lobby  Lobbying  lobbyist  long-term  Lügenpresse  M  machine  Machtausübung  Machtgehabe  Machtspiele  Makers  Malware  Manning  manufactured  Marathon  Mason  maximisation  May  media  Meinungsfreiheit  Merkel  Met  Meta  metadata  method  MI5  MI6  Microsoft  migration  military  military-intelligence  military–industrial  Millennials  mirror  Misstrauen  mobile  mobilephone  model  monopoly  monopsony  moral  mouth  NAFTA  nasty  national  Nationalism  Nations  neoconservatism  neoconservatives  neoliberal  neoliberalism  Net  netzpolitik  netzpolitik.org  Neutrality  nls_933w.dll  No  NRA  NSA  Occupy  occupywallstreet  of  oligopol  oligopoly  on  online  Open  opinion  Opportunism  opportunist  order  organised  Orwellian  Osborne  outsourcing  oversight  ownership  PAC  Page  Palantir  Palestine  Paris  partnerships  party  password  Patent  Patriot  patriotact  patriotism  Paul  Pentagon  perception  perma  perma-cookie  perma-cookies  phishing  Platform  Play  Poitras  Polarisation  Police  policy  political  Politicians  Politics  Polizeistaat  populism  Positioning  post-capitalism  power  powers  PR  presidency  presidential  press  Pressefreiheit  PRISM  Privacy  profiling  profit  profiteer  promises  Promoter  propaganda  proprietary  protectionism  public  publicrelations  quo  QWERTY  radicalisation  radicalism  radicalization  Rank  Rechtsextremismus  Rechtsruck  record  reform  Regin  Reich  relations  Representation  republican  republicans  Rich  rights  Robert  rootkit  Russia  Sanders  scam  scaremongering  Schengen  science  Score  Search  secret  security  Security-Industrial  securityr  selector  self-censorship  sentiment  Separation  Share  shared  shareholder  short-term  Silicon  SIM  Smartphone  Smith  smoke  smoking  Snoopers  Snowden  social  society  socratic  software  Source  sovereign  speech  spin  spot  Start-Up  Stasi  state  status  Street  Strike  Stuxnet  subsidies  subsidizing  Super  surveillance  Surveillance-Industrial  Swartz  System  Taliban  target  targeting  Tempora  Terror  The  theory  Theresa  thinking  ThreatExchange  TISA  to  Tor  Tories  Torture  TOS  TPM  TPP  tracking  trade  transparency  Trojan  trust  trustagent  TTIP  TTP  turnout  Twitter  Uber  UK  UN  Ungehorsam  unintended  Union  United  Universal  Unix  Unrechtsstaat  USA  USB  user  Valley  value  values  vested  view  violence  Visa  Vorratsdatenspeicherung  voter  VPN  Wall  wants  war  Warfare  warrant  Warren  Warrent  Washington  waste  Wegwerfgesellschaft  WhatsApp  Whisteblower  Whistleblower  white  Wikileaks  win-win  Windows  Wireless  wiretapping  WMD  word  Work  World  WW2  WWI  XKeyscore  Yahoo!  Zivilcourage  Ziviler  Zivilgesellschaft  zombie 

Copy this bookmark:



description:


tags: