asterisk2a + cryptography   50

Investigatory Powers Bill: May defends surveillance powers - BBC News
Mrs May has said Britain's spies must continue to be allowed to hack into foreign computer networks, under so-called "bulk equipment interference warrants", as this was "a key operational requirement for GCHQ".
She told MPs that bulk powers had played a significant role in every major counter-terrorism investigation over the past decade, including seven terror plots foiled in the past 18 months, and in responding to the bulk of cyber attacks against UK interests.
Investigatory  Powers  Bill  Snoopers  Charter  Theresa  May  War  on  Terror  Surveillance-Industrial  Complex  surveillance  surveillance  state  Orwellian  Internet  Privacy  Privacy  encryption  Cryptopocalypse  cryptography  bulk  data  collection  Vorratsdatenspeicherung  Dataretention  Meta  GPS  mobilephone  Big  Meta  profiling  Smartphone  human  rights  backdoors  backdoor  Secret  Courts  MI5  MI6  GCHQ  organised  crime  activism  activist  Tories  Conservative  Party  David  Cameron  cyber  cyber  attack 
march 2016 by asterisk2a
Security Experts Warn of Orwellian Future in Apple Case | Re/code
[ all without a warrant ] Your Samsung smart TV or Amazon Echo might spy on you next if the government succeeds in forcing Apple to disable security protections on a smartphone to further the FBI’s investigation into the San Bernardino attacks. Security experts from Stanford, Harvard and Rice universities and independent researchers laid out this Orwellian scenario in a court filing today, supporting Apple’s fight against a court order to help investigators hack a smartphone used by one of the assailants in the mass killing. The group of seven experts argues that the judge’s order [...] disturbing possibilities for how law enforcement might turn everyday items into surveillance tools. //&! Amazon Quietly Disabled Encryption in Latest Version of Fire OS - on.recode.net/1TXeXPB //&! Twitter, Airbnb, eBay, Kickstarter, LinkedIn and Square File Brief Supporting Apple - on.recode.net/1LXQ3sG &! Three Industry Trade Groups to File Briefs Supporting Apple - on.recode.net/1oTUdwx
Apple  FBI  Surveillance-Industrial  Complex  surveillance  surveillance  state  Orwellian  Internet  Privacy  Privacy  encryption  Cryptopocalypse  cryptography  War  on  Terror  Patriot  Act  bulk  data  collection  Dataretention  Vorratsdatenspeicherung  Meta  Big  Smartphone  mobile  homescreen  anonymity  human  rights  FISA  Court  FISAAA  Secret  Courts  GCHQ  NSA  Snoopers  Charter  Yahoo!  backdoors  backdoor  GPS  profiling  Facebook  Twitter 
march 2016 by asterisk2a
Why Was a Facebook Executive Arrested in Brazil? Encryption. | Re/code
Case in point: Facebook executive Diego Dzodan was arrested by Brazilian police Tuesday morning on his way to work for the same reason Brazilian authorities succeeded — albeit temporarily — in having WhatsApp banned from the country back in December: Encryption. Dzodan — who is still detained at the time of this writing — was arrested because of Facebook’s “repeated non-compliance with court orders,” according to a police press release. What does that mean? Brazilian authorities have requested that WhatsApp hand over user messages in multiple criminal investigations over the past few months, and WhatsApp repeatedly claims that it can’t hand over those messages because it doesn’t have them.
encryption  Apple  WhatsApp  Facebook  Internet  Privacy  Privacy  Cryptopocalypse  cryptography 
march 2016 by asterisk2a
Here Are the Most Interesting Things Apple and the FBI Said About Encryption | Re/code
on.recode.net/1QsrklN - FBI Director James Comey shifted from his shopworn phrase about “going dark” and instead talked about Apple and other technology companies using encryption to create “warrant-proof spaces in our lives.” Naturally, this is a technological development that law enforcement sees as a giant roadblock to gathering evidence in criminal investigations. He also admitted the bureau screwed up when it changed the Apple ID password on the shooter’s phone.
Apple  FBI  encryption  cryptography  Cryptopocalypse  Internet  Privacy  Privacy 
march 2016 by asterisk2a
Shami Chakrabarti: ‘Who’s the most dangerous person in Britain? David Cameron’ | Voluntary Sector Network | The Guardian
The outgoing Liberty director explains why plans to scrap the Human Rights Act threaten freedom, and why she won’t stop campaigning [...] I ask Chakrabarti – once branded by the Sun as “the most dangerous woman in Britain” – who she thinks deserves the “most dangerous” hallmark now. “Right now? David Cameron.” She says. “Actually, can I have more than one? Then him and that particular group in the cabinet now who are dedicated to scrapping the Human Rights Act. That group. They are an existential threat to the rights and freedoms of the most vulnerable people in our country.” [...] investigatory powers bill. “We wouldn’t let the state impose identity cards, but these,” she holds up her phone, “these we buy.”
UK  USA  David  Cameron  Tories  NSA  GCHQ  Secret  Courts  FISA  Court  FISAAA  Surveillance-Industrial  Complex  surveillance  state  Snoopers  Charter  Patriot  Act  human  rights  Act  Brexit  neoliberalism  neoliberal  neoconservatism  neoconservatives  Theresa  May  Schengen  Agreement  War  on  Terror  Torture  ISIS  far-right  Rechtsruck  Rechtsextremismus  Internet  Privacy  Privacy  Big  Data  Meta  Data  profiling  encryption  Cryptopocalypse  cryptography  backdoors  backdoor 
march 2016 by asterisk2a
Apple raises concerns over UK's draft surveillance bill - BBC News
The US-based firm has passed on its thoughts to a parliamentary committee scrutinising the legislation. It focuses on three issues: encryption, the possibility of having to hack its own products, and the precedent it would set by agreeing to comply with UK-issued warrants. The Home Secretary Theresa May said last month that the proposed powers were needed to fight crime and terror. [...] But Apple appears to be concerned that the bill's language could still be interpreted more expansively and force the creation of a so-called "backdoor" to provide the authorities with access. Apple argues that the existence of such a backdoor would risk creating a weakness that others then might exploit, making users' data less secure. [...] Overseas warrants A second area of concern relates to the issue of "extra-territoriality". Existing British legislation - and the bill - maintain that companies need to comply with warrants for information wherever they are based and wherever the data resides.
Surveillance-Industrial  Complex  GCHQ  Snoopers  Charter  Internet  Privacy  Privacy  encryption  Cryptopocalypse  cryptography  backdoors  backdoor  Vorratsdatenspeicherung  Dataretention  bulk  data  collection  human  rights  Theresa  May  Tories  nasty  party  Conservative  David  Cameron  George  Osborne  War  on  Terror  organised  crime  austerity  military–industrial  surveillance  state  NSA  propaganda  manufactured  consent  Polarisation  islamic  radicalism  islamic  extremism  ISIS  corporate  state  corporate  media  Lügenpresse  populism  Big  metadata  neoconservatism  neoconservatives  presidency  barackobama 
december 2015 by asterisk2a
Video "Stark: Demokratie durch Überwachung in Gefahr" | Zapp | ARD Mediathek
Der "Spiegel" ist offenbar ins Visier von Geheimdiensten geraten, das Bundeskanzeleramt soll davon seit 2011 gewusst haben. "Spiegel"-Redakteur Stark zeigt sich erschüttert. // freie presse ist pfeiler der demokratie. - 4te gewalt. checks and balances. // mit hilfe von selectoren liste werden journalisten ueberwacht! und ihre bewegung via cellphone tracking. //&! spiegel.de/thema/national_security_agency/ //&! Vorratsdatenspeicherung schreckt Whistleblower ab. "Sammelwut verprellt Informanten." - bit.ly/1lCqrKZ - Vorratsdatenspeicherung hilft nicht bei Verbrechensaufklaerung.
NSA  GCHQ  Whistleblower  surveillance  Surveillance-Industrial  Complex  surveillance  state  BND  Angela  Merkel  journalismus  investigative  journalism  journalism  Big  Data  Edward  Snowden  Wikileaks  democracy  social  democracy  corporate  state  corporate  media  Pressefreiheit  freedom  of  press  Dataretention  Snoopers  Charter  Vorratsdatenspeicherung  Russia  China  bulk  collection  Meta  Data  Internet  Privacy  Privacy  human  rights  presidency  barackobama  Hegemony  USA  War  on  Terror  national  interest  patriotism  Patriot  Act  CIA  FBI  Iraq  War  cablegate  FISA  Court  FISAAA  Secret  Courts  military–industrial  military  intervention  TTIP  TPP  TISA  encryption  Cryptopocalypse  cryptography  Separation  of  powers  Checks  and  Balances  organised  crime  War  on  Drugs  Positioning  framing  PR  spin  doctor 
december 2015 by asterisk2a
Theresa May accused of rushing surveillance bill through back door | Politics | The Guardian
Home secretary gives committee three weeks to study ‘snooper’s charter’, despite having ruled out fast-tracking it after Paris attacks [...] The joint committee that scrutinised the previous “snooper’s charter” bill – the draft communications data bill – in 2012 sat for five months and held 13 public witness sessions over a six-week period. It also took evidence in private from the security services. //&! bit.ly/1lkbLjn - State computer hacking The bill gives powers for security services to hack in to phones, computers and networks worldwide in interests of national security. [ like environmental and animal rights activists ]
Snoopers  Charter  Theresa  May  nasty  party  Tories  Conservative  GCHQ  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Dataretention  bulk  data  collection  democracy  David  Cameron  George  Osborne  Internet  Privacy  Privacy  human  rights  Secret  Courts  oversight  abuse  of  power  accountability  cyber  war  cyber  attack  TOR  Linux  encryption  Cryptopocalypse  cryptography  MI5  MI6 
november 2015 by asterisk2a
Glenn Greenwald on why the CIA is smearing Edward Snowden after the Paris attacks: "The real objective is to depict Silicon Valley as terrorist-helpers for the crime of offering privacy protections to Internet users and to force them to give the U.S. gov
Glenn Greenwald on why the CIA is smearing Edward Snowden after the Paris attacks: "The real objective is to depict Silicon Valley as terrorist-helpers for the crime of offering privacy protections to Internet users and to force them to give the U.S. gov "backdoor" access into communications"
encryption  cryptography  Cryptopocalypse  War  on  Terror  backdoor  backdoors  Edward  Snowden  NSA  GCHQ  Surveillance-Industrial  Complex  surveillance  state  Orwellian  bulk  data  collection  Snoopers  Charter  Vorratsdatenspeicherung  Dataretention 
november 2015 by asterisk2a
Überwachung in Großbritannien: Neues Gesetz vorgestellt - SPIEGEL ONLINE
Die Werbekampagne hat sich gelohnt. Am heutigen Mittwoch veröffentlichte Innenministerin Theresa May einen Gesetzentwurf (hier als PDF), der britischen Geheimdiensten noch mehr Macht verspricht. Die Spione können, sobald die sogenannte Investigatory Powers Bill vom Parlament verabschiedet wird, ganz legal das tun, was sie bislang ohne solide rechtliche Grundlage machten. Gleichzeitig sagte Innenministerin May, sie wolle die Aufsicht über die Geheimdienste stärken. [...] Theresa May betonte im Parlament, dass es nicht darum gehe, den gesamten Browserverlauf zu speichern, sondern nachvollziehen zu können, mit wem Verdächtige kommunizieren. [ jeder ist nun verdaechtig ] [ UK people seem not to care ]
Dataretention  Vorratsdatenspeicherung  Snoopers  Charter  Theresa  May  UK  Tories  Conservative  Party  neoconservatism  neoconservatives  GCHQ  War  on  Terror  extremism  Surveillance-Industrial  Complex  surveillance  state  British  Empire  NSA  human  rights  Internet  Privacy  Privacy  oversight  transparency  Separation  of  powers  injustice  Justice  System  Secret  Courts  Edward  Snowden  USA  encryption  Cryptopocalypse  cryptography  Wertegesellschaft  Orwellian  society  Big  Brother  abuse  of  power  democracy  lobbyist  lobby  Lobbying  military–industrial  profiteer  corporate  espionage  industrial  espionage  cyber  espionage  corporate  state  corporate  media  activists  activism 
november 2015 by asterisk2a
Hacked! - Tech Weekly podcast by Guardian Tech Weekly
book - @War: The Rise of the Military-Internet Complex3 Nov 2015 by Shane Harris // Doomsday Scenarios: breaking the internet, bringing down electricity grid, transportation/infrastructure, nuclear plant, manipulating digital money vault/value exchanges, << low probability - high impact >> distrust/lost trust.
cyber  war  industrial  espionage  scam  phishing  scam  corporate  espionage  cyber  espionage  USA  UK  Cina  Russia  Israel  Five  Eyes  NSA  GCHQ  Surveillance-Industrial  Complex  surveillance  state  military–industrial  foreign  affairs  Hegemony  foreign  policy  Intelligence  foreign  relations  book  Smart  Grid  encryption  Cryptopocalypse  cryptography  cyber  security  IT  password  security  energy  security 
october 2015 by asterisk2a
Markus Beckedahl, Andre Meister: Kontrolle ist gut. #Landesverrat ist besser. - YouTube
// Statement von Georg Restle zu der Anzeige wegen Landesverrat gegen die Journalisten Markus Beckedahl und Andre Meister von Netzpolitik.org. - youtu.be/bLuu4ekznT8 // Verschwörung gegen die Freiheit (Doku, ZDF 2014) - youtu.be/HoTW5c2MEYQ // &! O-Ton GroKo - youtu.be/y9pRz5KQ6vo - Eiertanz: Viele, viele naive Fragen zum BND-Skandal // &! http://www.dctp.tv/filme/markus-beckedahl-netzpolitik-org/
netzpolitik  Pressefreiheit  Lügenpresse  Angela  Merkel  GroKo  Surveillance-Industrial  Complex  military–industrial  NSA  GCHQ  Five  Eyes  surveillance  state  Orwellian  BND  corporate  espionage  industrial  espionage  cyber  espionage  cyber  war  USA  Europe  UK  Germany  Vorratsdatenspeicherung  Dataretention  Snoopers  Charter  bulk  data  collection  FISA  Court  FISAAA  Patriot  Act  presidency  barackobama  David  Cameron  encryption  Cryptopocalypse  cryptography  False  Flag  on  Terror  IT  Security  cyber  netzpolitik.org  freedom  of  press  of  Information  Act  National  Security  interest  on  Drugs  organised  crime  cyber  crime  investigative  journalism  journalismus  journalism  Whistleblower  Career  Politicians  No  Representation  social  contract  political  theory  Internet  Privacy  Privacy  Meta  metadata  Big  Wikileaks  Edward  Snowden  Julian  Assange  Secret  Courts  Glenn  Greenwald 
august 2015 by asterisk2a
U.K. ‘Emergency’ Surveillance Law Ruled Unlawful By High Court | TechCrunch
In a high profile win for civil liberties in the U.K., surveillance legislation rushed through the national parliament in a matter of days last year has today been declared unlawful under European Human Rights law. Two MPs, Tom Watson (Labour) and David Davis (Conservative), along with civil rights campaign group Liberty, took the government to the High Court last month, challenging the Data Retention and Investigatory Powers Act (DRIPA) on privacy and data protection grounds. Today the High Court agreed with their challenge. [...] the European Court of Justice ruling that had, months earlier, struck down EU data retention powers as disproportionate. [...] [abuse] The court also ruled section 2 unlawful because it does not build in limits to accessing this data by requiring access be authorized by a court or independent body. // Part of Tories 2015 manifesto; Scrap the Human Rights Act, and introduce a British Bill of Rights - bbc.in/1JJI1U4
UK  human  rights  Tories  Conservative  Party  general  election  2015  election  campaign  promises  David  Cameron  Snoopers  Charter  NSA  GCHQ  Five  Eyes  Dataretention  bulk  data  collection  encryption  Cryptopocalypse  cryptography  ISIS  False  Flag  War  on  Terror  Surveillance-Industrial  Complex  surveillance  surveillance  state  Orwellian  DRIPA  Internet  Privacy  Privacy  FISA  Court  FISAAA  presidency  barackobama  Pentagon  military–industrial  oversight  transparency  abuse  of  power  accountability  Vorratsdatenspeicherung  Europe  populism  propaganda  manufactured  consent  corporate  state  corporate  media  PR  spin  doctor 
august 2015 by asterisk2a
Russia will fork Sailfish OS to shut out pesky Western spooks
Paranoia over NSA tampering spurs de-Westernisation drive // well only the Paranoid survive. [...] Russia’s Minister of Communications and Mass Media, Nikolai Nikiforov, has taken part in talks to form a consortium that will aid Russia in developing a custom mobile OS, reportedly a forked version of Jolla’s Sailfish OS, to lessen its dependence on Western technology. Nikiforov held a working meeting last week with the leadership of Hong Kong-based Sailfish Holdings, developer of the quietly admired Sailfish OS. Alongside other participants, the parties involved discussed the use of open-source software in the public and private sectors, taking into account technical, economic and political factors, the latter of which is expected to include United States’ interference with exported technologies.
Open  Source  Russia  corporate  espionage  industrial  espionage  cyber  espionage  NSA  Five  Eyes  Nationalism  barackobama  presidency  Europe  GCHQ  UK  Foreign  Intelligence  affairs  relations  2015  cyber  war  encryption  Angela  Merkel  Leadership  Career  Politicians  No  Representation  human  rights  Privacy  Internet  Privacy  Cryptopocalypse  cryptography  national  interest  False  Flag  on  Terror  on  Drugs  organised  crime  backdoors  backdoor  IT  Security  exploit  Germany  FRance  surveillance  Surveillance-Industrial  Complex  surveillance  state  Orwellian  corporate  state  manufactured  consent  Cold  propaganda  populism  Pressefreiheit  Lügenpresse  Vorratsdatenspeicherung  Snoopers  Charter  investigative  journalism  Whistleblower  tracking  bulk  data  collection  democracy  freedom  freedom  of  press  Secret  Courts  FISA  Court  FISAAA  BND  military–industrial 
august 2015 by asterisk2a
Pressure mounts over claims Police Scotland breached rules over spying on journalists (From Herald Scotland)
PRESSURE is mounting on ministers to take action on Police Scotland amid further criticism of the force over claims it illegally spied on a journalist to uncover sources. The force's elite Counter Corruption Unit (CCU) is said to have snooped on the reporter without getting judicial approval - a tactic which was banned on March 25 following a row over officers using the Regulation of Investigatory Powers Act (Ripa) to access journalists’ phone records, texts and emails. // [ endemic and systemic! you are not safe. period. ] // &! bbc.in/1OQEaGJ - Ministers questioned over Police Scotland 'spying' claims // &! bbc.in/1KUFPu9 &! bbc.in/1Maojno << time to get their story right!?
Met  Police  GCHQ  freedom  of  press  UK  journalismus  investigative  journalism  journalism  corporate  state  corporate  media  media  conglomerate  Pressefreiheit  Lügenpresse  Five  Eyes  NSA  Career  Politicians  No  Representation  democracy  Surveillance-Industrial  Complex  surveillance  state  Orwellian  military–industrial  2015  human  rights  Internet  Privacy  Privacy  Snoopers  Charter  Vorratsdatenspeicherung  abuse  of  power  corruption  manufactured  consent  populism  War  on  Terror  False  Flag  organised  crime  cyber  cyber  crime  Cryptopocalypse  cryptography  encryption  backdoors  backdoor  propaganda  Intelligence  Agency  Foreign  Intelligence  corporate  espionage  industrial  espionage  cyber  espionage  Nationalism  national  interest  domestic  affairs  affairs  policy  relations  MI5  MI6  Secret  Courts  FISA  Court  FISAAA 
august 2015 by asterisk2a
Windows 10: Microsoft under attack over privacy | Technology | The Guardian
>> It is not Free. Period! Stupid. << // &! Get Tracked with Windows 10 | Tech Talk Today 198 - youtu.be/Gh0y5drKwAE &! http://www.jupiterbroadcasting.com/85697/get-tracked-with-windows-10-ttt-198/ &! Microsoft’s new small print – how your personal data is (ab)used - https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/ &! &! bit.ly/1eNKQJm - Mit Windows 10 wird alles besser - sagt Microsoft. Viele Neuerungen funktionieren aber nur, weil der Konzern auf Nutzerdaten zugreift. Wir zeigen, wie Sie die Datensammelei sinnvoll einschränken. [ einschraenken, nicht abschaltbar - selling you out ] &! bit.ly/1g2TLHN - Like all proprietary software, Windows 10 puts those that use it under the thumb of its owner. [...] Windows is an open window onto you &! bit.ly/1SFoXhT &! Linux: The OS of the Future - youtu.be/cTpujBq1Zi0 // &! bit.ly/1MUDxeB &! youtu.be/ULq1ajA1Jek
TOS  Microsoft  Platform  Internet  Privacy  Privacy  Big  Data  advertisement  advertisement  targeting  user  Facebook  Windows  10  business  model  Free  perma-cookie  ISP  Google  Wireless  Carrier  Android  Apple  human  rights  Linux  Open  Source  Twitter  backdoors  backdoor  Cryptopocalypse  encryption  NSA  FISA  Court  FISAAA  corporate  espionage  industrial  espionage  cyber  espionage  national  interest  Nationalism  Five  Eyes  GCHQ  Secret  Courts  cryptography  FOSS  GNU  GNU/Linux  GPL 
august 2015 by asterisk2a
How NSA and GCHQ spied on the Cold War world - BBC News
American and British intelligence used a secret relationship with the founder of a Swiss encryption company to help them spy during the Cold War, newly released documents analysed by the BBC reveal.
Cold  War  NSA  GCHQ  MI5  MI6  surveillance  state  Surveillance-Industrial  Complex  military–industrial  history  European  Orwellian  encryption  Cryptopocalypse  cryptography  Enigma  WW2  USA  UK 
july 2015 by asterisk2a
UN: Government efforts to undermine encryption threaten basic human rights | PandoDaily
The report also focuses on schemes from the United Kingdom and the US to force tech companies to include backdoors in their products, thus giving these governments unfettered access to what consumers believe is private data.
encryption  backdoors  backdoor  cryptography  Cryptopocalypse  Internet  Privacy  Privacy  human  rights  surveillance  state  Orwellian  Dataretention  Vorratsdatenspeicherung  UK  USA  Europe  Postgeheimnis 
may 2015 by asterisk2a
The government's data law - an attack on encryption? - BBC News
The row over forcing internet service providers (ISPs) to hold on to far more data about their users' online activities has stretched over three parliaments. The idea first came up under the last Labour government, when it was quashed by Conservative and Liberal Democrat opposition. Then it was resurrected by the Coalition, with Theresa May's plans - immediately dubbed the Snooper's Charter - blocked by her Liberal Democrat partners. // &! "radicalisation" http://www.bbc.co.uk/news/uk-politics-32714802 &! http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/11630495/Muslim-Council-hits-back-at-top-cops-Marks-and-Spencer-radicalisation-comments.html https://youtu.be/slOe_4zxQCI
Snoopers  Charter  UK  Vorratsdatenspeicherung  GCHQ  surveillance  state  Orwellian  War  on  Terror  War  on  Drugs  organised  crime  False  Flag  Privacy  Internet  Privacy  human  rights  Conservative  Party  David  Cameron  Theresa  May  backdoors  backdoor  encryption  cryptography  Cryptopocalypse 
may 2015 by asterisk2a
Danny Boyle: the Olympic opening ceremony would be done differently in 2015 - Newsnight - YouTube
do we want to give them the data, our lives?! it seems positive and benign, but it changes our lives in the long-term and we are only seen as data pools. // dave eggers novel the circle
Internet  Privacy  book  Facebook  Google  Big  Data  perma  cookie  Orwellian  State  surveillance  FISA  Court  FISAAA  Secret  Courts  NSA  GCHQ  Foreign  Intelligence  Intelligence  Agency  corruption  abuse  of  power  Privacy  human  rights  analytics  Vorratsdatenspeicherung  Five  Eyes  False  Flag  War  on  Terror  cyber  cyber  espionage  corporate  espionage  industrial  espionage  Microsoft  backdoors  backdoor  encryption  cryptography  Cryptopocalypse 
may 2015 by asterisk2a
Jung & Naiv - Bundesinnenminister de Maizière hat sich über die "digitale Sorglosigkeit" von euch beklagt
Bundesinnenminister de Maizière hat sich über die "digitale Sorglosigkeit" von euch beklagt. Ihr würdet so viel Privates öffentlich posten! Uns hat heute interessiert: Warum traut er sich von “digitaler Sorglosigkeit” bei Dingen, die wir öffentlich posten, zu reden, wenn gerade er jemand ist, der selbst die Dinge wissen will, die wir nicht öffentlich digital mitteilen? (Vorratsdatenspeicherung)
encryption  cryptography  Cryptopocalypse  Privacy  Internet  Privacy  surveillance  state  Orwellian  BND  Career  Politicians  GroKo  NSA  Selectors  Vorratsdatenspeicherung  human  rights 
may 2015 by asterisk2a
Snowden documents show spy agencies exploiting issues with China’s most popular browser | PandoDaily
New reports from CBC News and the Intercept show that intelligence agencies in Canada, the United States, Australia, the United Kingdom, and New Zealand exploited vulnerabilities in Alibaba’s UC Browser to surveil 500 million people. The agencies also planned to use various app stores to distribute their spyware. The reports indicate that UC Browser offered up all kinds of information about its users. This is notable because it’s the most popular Web browser in China and has an estimated 500 million users, making it a valuable target for spying. The problems are said to be limited to the Android version of the Web browser.
Five  Eyes  NSA  Alibaba  Edward  Snowden  War  on  Terror  surveillance  state  Orwellian  False  Flag  GCHQ  Intelligence  Agency  Foreign  Intelligence  cyber  encryption  cryptography  Cryptopocalypse  Internet  Privacy  Privacy  human  rights  presidency  barackobama  corporate  espionage  industrial  espionage  cyber  espionage  cyber  attack 
may 2015 by asterisk2a
President Obama: The Re/code Interview - YouTube
slick downplay, comparing cyber war & industrial, coroporate cyber espionage (breaking in into Gemalto for SIM encryption keys) with basketball. And also tapping the phone of Angela Merkel ... &! http://youtu.be/td7Dcsco-WY "Obama on the state of the world: the extended Vox conversation" - is he a realist or just a coward!? /// >> http://www.bbc.co.uk/news/technology-31545050 &! http://www.spiegel.de/netzwelt/netzpolitik/nsa-und-gchq-haben-sim-karten-schluessel-von-gemalto-erbeutet-a-1019515.html &! Silicon Valley subbed him on his proposals and road show 20 min away from their door, is a tell tale what they think of him saying one thing and what the NSA&Co put them through and demands (see Yahoo!'s case with the FISA Court) - tcrn.ch/17ovyqD &! If it were a private person were hack into and steal Gemalto encryption keys, the person would be thrown in jail FOREVER! youtu.be/bIpNXh9Nh9k?t=16m32s &! NSA, GCHQ, Five Eyes like to bully people to do X for them & drop possible charges.
presidency  barackobama  NSA  USA  Gemalto  SIM  encryption  cyber  war  GCHQ  governance  on  Terror  Cryptopocalypse  cryptography  corporate  espionagem  industrial  espionage  espionage  cyber  espionage  UK  Five  Eyes  Internet  Privacy  Privacy  human  rights  Stasi  Stasi  2.0  organised  crime  on  Drugs  ethical  machine  Checks  and  Balances  Separation  of  powers  democracy  abuse  of  power  David  Cameron  cyber  crime  cyber  attack  cyber  securityr  IT  Security  surveillance  state  Orwellian  FISA  Court  FISAAA  Secret  Courts  Silicon  Valley 
february 2015 by asterisk2a
The NSA Reportedly Stole Millions Of SIM Encryption Keys To Gather Private Data | TechCrunch
The American National Security Agency (NSA), and the British Government Communications Headquarters (GCHQ), similar clandestine intelligence agencies, stole SIM card encryption keys from a manufacturer, allowing the groups to decrypt global cellular communications data. [...] “NSA and GCHQ basically have the keys to decyrpting mobile communications anywhere in the world, even without the participation of local communication carriers (which, even if not much, acts as some check on intelligence agency behavior). It’s the equivalent of these agencies having printed doorkeys for the front doors to millions or even billions of homes around the world, just in case they one day decided they needed to get in. Frankly, people should have no faith in the security of global mobile communications.” >> CLU’s Christopher Soghoian - "Steal millions of crypto keys and then complain publicly that encryption is a problem. The UK and US govs are shameless."
NSA  GCHQ  governance  War  on  Terror  encryption  Cryptopocalypse  cryptography  corporate  espionage  industrial  espionage  espionage  cyber  espionage  USA  UK  Five  Eyes  Internet  Privacy  Privacy  human  rights  Stasi  Stasi  2.0  presidency  barackobama  organised  crime  War  on  Drugs  ethical  machine  Checks  and  Balances  Separation  of  powers  democracy  abuse  of  power  David  Cameron  Gemalto  cyber  crime  cyber  attack  cyber  security  cyber  IT  surveillance  state  Orwellian 
february 2015 by asterisk2a
Linux Journal - Wikipedia, the free encyclopedia
In early July 2014 it was revealed that the NSA's XKeyscore program targeted readers of Linux Journal, which the NSA considers an "extremist forum". // &! NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance - http://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance // &! NSA targets the privacy-conscious - http://daserste.ndr.de/panorama/aktuell/NSA-targets-the-privacy-conscious,nsa230.html "Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA." - visiting site X puts you on watch list/collect data list - ie Wikileaks, Tor, Linux Journal, CCC unter anderem !+& bit.ly/1sZSWV9 >> leads to self-censorship like in East Germany.
NSA  Internet  Privacy  Privacy  human  rights  XKeyscore  Linux  CCC  activism  activists  Hacktivism  target  targeting  GCHQ  encryption  cryptography  Cryptopocalypse  IT  Security  cyber  cyber  war  cyber  espionage  corporate  espionage  industrial  espionage  espionage  FISA  Court  FISAAA  Foreign  Intelligence  Five  Eyes  presidency  barackobama  Stasi  Stasi  2.0  history  backdoor  backdoors  abuse  of  power  surveillance  state  Orwellian  Big  Data  Meta  Data  Unix  Google  Search  Tor  VPN  anonymity  self-censorship  free  speech  freedom  of  press  freespeech  free  press  Pressefreiheit  Meinungsfreiheit  Information  wants  to  be  free  knowledge  M 
february 2015 by asterisk2a
Kaspersky claims US spies can infect computers with malware that is almost impossible to detect | PandoDaily
NSA has found a way to infect computers targeted for surveillance with malware that is almost impossible to detect and even harder to remove. Kaspersky Lab says in its report that a threat actor known as the Equation Group made this possible by infecting firmware used in hard drives made by the world’s top manufacturers. // &! Reddit - bit.ly/1ATpm6v >> According to Kaspersky, getting the malicious code into a drive’s firmware is not an easy task, and can’t be done with help of public tools, meaning that the NSA had to have access to source codes for hard drives produced by these companies. [meaning they asked for access (and or intercepted orders) when OEM orders came from targeted countries/firms? or spoof hw vendor sites and let them download the manipulated firmware] &! bit.ly/19vzSpI - ie Iran and Russia.
NSA  CIA  surveillance  state  Orwellian  Foreign  Intelligence  corporate  espionage  cyber  espionage  espionage  industrial  espionage  GCHQ  Five  Eyes  backdoor  backdoors  corporate  values  corporate  governance  ethical  machine  FISA  Court  FISAAA  Regin  Whistleblower  rootkit  cyber  war  Iratemonk  Firmware  nls_933w.dll  USB  Air  Gap  cyber  security  cyber  attack  cyber  crime  USA  presidency  barackobama  Stuxnet  organised  crime  human  rights  cryptography  Cryptopocalypse  encryption  IT  on  Terror  Malware  Internet  Privacy  Privacy 
february 2015 by asterisk2a
Start Ups Should Prioritize Security, Even at the Earliest Stages - YouTube
>> weakest link is human being in the middle - thus need advisory/consulting/one person hire whose sole focus is it to make the org and tech secure and the people savvy. &! &! Five Easy Steps to Secure Your Startup - https://www.youtube.com/watch?v=SBWHWCFm9xQ - 1. get rid of MS Office - use Google Docs or other secure online secure office docs replacement / 2. Use ONE dedicated machine for online banking/finance (netbook) / 3. two-factor authentication - especially email / 4. do background checks / 5. plus teach savvyness in password choice and tools, general awareness and general security issues ie targeted phishing etc etc - on regular (updated) basis ... "most if not all attacks start with phishing"
IT  Security  Start-Up  lesson  Start-Up  advice  cyber  war  cyber  attack  DDoS  encryption  cryptography  Cryptopocalypse  cyber  cyber  crime  internet  online  password  phishing  phishing  scam  two-factor  authentication 
february 2015 by asterisk2a
TimesTalks - Laura Poitras, Glenn Greenwald and Edward Snowden with David Carr
Don’t miss this special opportunity to hear the director of CITIZENFOUR – the film nominated for the Academy Award for Best Documentary Feature – the first journalist to write about Snowden’s revelations and Snowden himself (via live video) in conversation with New York Times media columnist David Carr about the film and the issues it raises. // min 43 --- presidency barack obama worst administration ever for clamping down on freedom of press, whistleblowers, against transparency, governance, seperation of powers/checks and balances (NSA/CIA), - Obama got the executive power to close guantanamo, shut off surveillance without warrants. // subverts democracy. &! &! U.S. DROPS TO 49TH IN WORLD PRESS FREEDOM RANKINGS, WORST SINCE OBAMA BECAME PRESIDENT - bit.ly/1zaIdVO
CITIZENFOUR  Edward  Snowden  Laura  Poitras  Glenn  Greenwald  presidency  barackobama  transparency  NSA  governance  oversight  accountability  Whistleblower  freedom  of  press  freepress  Pressefreiheit  free  press  free  speech  Torture  Foreign  Intelligence  Intelligence  Agency  GCHQ  CIA  Warrant  FISAAA  FISA  Court  Europe  China  cyber  war  values  idealism  surveillance  state  Orwellian  moral  beliefs  ethical  machine  ethical  beliefs  corporate  espionage  cyber  espionage  industrial  espionage  espionage  democracy  No  Representation  Privacy  Internet  Privacy  encryption  cryptography  Cryptopocalypse  human  rights  Act  Patriot  Act 
february 2015 by asterisk2a
With the help of Pinterest, Twitter, and others, a new Facebook platform wants to keep the web secure | PandoDaily
The service is called ThreatExchange, and companies like Yahoo, Twitter, and Pinterest have all agreed to share threat information with each other via the boringly-named tool. But these companies aren’t the only ones worried that information about digital threats isn’t shared as well as it could be. A new agency, the Cyber Threat Intelligence Integration Center, has been formed to facilitate similar sharing amongst various intelligence agencies. ThreatExchange and CTIIT were both formed out of the belief that digital threats are a puzzle whose pieces are held by various groups. The only way to solve that puzzle, then, is to convince everyone to share their pieces. Otherwise the puzzle will always be incomplete. // what if NSA abuses knowledge this org got (of US companies) to abuse the knowledge via FISA Court injunction not to release it to public knowledge - ie to compromise and or steal intelligence from non-US firms.
IT  Security  cyber  encryption  ThreatExchange  Silicon  Valley  internet  online  cryptography  Cryptopocalypse  DDoS  NSA  CIA  BND  Five  Eyes  surveillance  state  Orwellian  Intelligence  Agency  Foreign  Intelligence  transparency  governance  accountability  Europe  China  FISA  Court  FISAAA  ethical  machine  cyber  espionage  corporate  espionage  industrial  espionage  cyber  attack  cyber  war  cyber  crime 
february 2015 by asterisk2a
EFF’s Game Plan for Ending Global Mass Surveillance | Electronic Frontier Foundation
[...] Most people haven’t even heard of it, but Executive Order 12333 is the primary authority the NSA uses to engage in the surveillance of people outside the U.S. While Congress is considering much-needed reforms to the Patriot Act, there’s been almost no debate about Executive Order 12333. [...] [... and its also the private industry as contractor shovelling money for Wall Street shareholders, paid for by tax payer money ...]
EFF  surveillance  state  Orwellian  NSA  encryption  cryptography  Cryptopocalypse  Internet  Privacy  Privacy  Big  Data  metadata  Meta  Data  human  rights  USA  Five  Eyes  Foreign  Intelligence  Intelligence  Agency  GCHQ  backdoor  backdoors  CIA  FBI  cyber  security  cyber  attack  cyber  war  cyber  espionage  corporate  espionage  espionage  FISA  Court  FISAAA  presidency  barackobama  David  Cameron  democracy  governance  transparency  accountability  Career  Politicians  Patriot  Act  Act  Whistleblower 
february 2015 by asterisk2a
Security Nightmares 2014 [31c3] mit Frank Rieger & Ron - YouTube
see last 2 minutes, regular change of passwords and encryption method. &! Black Hat USA 2013 - The Factoring Dead: Preparing for the Cryptopocalypse - http://youtu.be/33RbRid1deo
encryption  password  integrity  password  security  cryptography  cryptowar  cryptopocalypse  internet  security  cyber  security  online  security  Five  Eyes  NSA  GCHQ  surveillance  state  Orwellian 
february 2015 by asterisk2a
Die offizielle Linie der Bundesregierung zur Verschlüsselung | netzpolitik.org
In der Bundespressekonferenz ging es heute um die Frage, inwiefern die Bundesregierung sich an den Cryptowars beteiligt und Hintertüren in Verschlüsselungsfragen und beim Staatstrojaner vorantreibt. Die offizielle Linie der Bundesregierung ist, dass sie da nichts vorantreibt. Unser Informationen sind da andere. Aber hier ist das Transcribt aus der Bundespressekonferenz. &! https://netzpolitik.org/2015/wegen-snowden-eu-beauftragter-will-it-anbieter-zu-hintertueren-fuer-verschluesselte-kommunikation-verpflichten/ &! &! The UK and USA have same line - http://blogs.wsj.com/digits/2015/01/16/obama-sides-with-cameron-in-encryption-fight/ Obama about Google, Facebook, Apple & Co “They’re patriots.” thus have to build in backdoors. &! http://techcrunch.com/2015/01/16/political-crypto-decrypted/ &! http://techcrunch.com/2015/01/13/clearly-an-idiot/ &! http://tcrn.ch/1z4vw19
encryption  Five  Eyes  surveillance  state  Orwellian  War  on  Terror  War  on  Drugs  Internet  Privacy  Privacy  oversight  Political  Governance  cryptography  TrueCrypt  NSA  USA  presidency  barackobama  Justice  System  Law  &  Justice  Angela  Merkel  GCHQ  BND  torture  Patriot  Act  cyber  attack  cyber  security  cyber  espionage  corporate  espionage  China  Germany  Europe  Act  espionage  foreign  affairs  foreign  relations  diplomacy  cablegate  cyber  cyber  crime  organised  crime  Career  Politicians  Leadership  investigative  journalism  journalismus  journalism  backdoor  backdoors  Apple  Google  Microsoft  Twitter  Facebook  TOS  Secret  Courts  FISA  Court  UK  Vorratsdatenspeicherung  Snoopers  Charter  Draft  Communications  Data  Bill  Europol  Interpol  Edward  Snowden  Wikileaks  accountability  No  Representation  trust  trustagent  confidence 
january 2015 by asterisk2a
Bad news for whistleblowers. Secret is far less secret than you think | PandoDaily
Only DAU thinks Secret or Whisper or any other consumer grade app, on a consumer grade tablet or phone, promising keeping them anonymity, uses these apps to 'blow the whistle.' ahhm troll, hate and gossip or even leak stuff. I thought Silicon Valley ppl are smart. No they just know how to code & design ... "to make the world better" ... sort of. “A court order without probable cause or even a subpoena may be enough for law enforcement or for a civil litigant to demand records.“ Conley went on to say that anonymous app companies need to make sure their backend data practices line up with the advertised purpose of their product: “They need to think through their own process. If you are offering a service that is about providing anonymous communication, then if you are retaining their identity and tying it to their communication, then you are kind of undermining the whole purpose of your service.”
Secret  Whisper  anonymity  Internet  Privacy  DAU  Whistleblower  Troll  Trolls  Haters  Hater  culture  VPN  Tor  cryptography  encryption  PGP  TrueCrypt  Smartphone  mobilephone  Silicon  Valley  lowest  common  denominator  social  science  social  study  civic  society  civil  society  Zivilgesellschaft  gossip  culture  gossip  social  society 
june 2014 by asterisk2a
Exclusive: Security enthusiasts may revive encryption tool after mystery shutdown | Reuters
Speculation has mounted over the cause of the reversal, with some suggesting that the developers had tired of the decade-long project and others guessing that U.S. authorities had demanded a back-door key from the programmers, as happened with anonymous email provider Lavabit.
Lavabit  TrueCrypt  NSA  backdoor  backdoors  cryptography  Edward  Snowden  Whistleblower  encryption  Privacy  Internet  Privacy 
may 2014 by asterisk2a
CCC-TV - Kryptographie nach Snowden
Die Verwendung von mittelmäßiger Kryptographie scheint gegen Angreifer mit Milliarden-Etat komplett versagt zu haben. Namentlich RC4, MD5 und SHA1 scheinen praxisrelevant brechbar.
encryption  Cryptography  RC4  MD5  SHA4  NSA  AES  MD4  SHA-2  stuxnet  RSA  Security  LLC  Skype  backdoor  Microsoft  FBI  cybersecurity  cyberespionage  cyberwar  cyberattack  Windows  8  corporate  governance  corporatism  conglomerate  Linux  Apple  transparency  oversight  Privacy  Lvabit  Edward  Snowden  Wikileaks  SSL  digital  natives  digitalnatives 
december 2013 by asterisk2a

related tags

&  2.0  9/11  abuse  accountability  Act  activism  activist  activists  advertisement  advice  AES  affairs  Agency  Agreement  Air  al-Qaida  Alan  Alibaba  analytics  and  Android  Angela  anonymity  Apple  Assange  attack  austerity  authentication  awareness  backdoor  backdoors  Balances  barackobama  be  beliefs  Bernie  Big  Bill  blind  BND  book  Brexit  British  Brother  bulk  business  cablegate  Cameron  campaign  Career  Carrier  CCC  CCTV  Charter  Checks  Chelsea  China  CIA  Cina  CITIZENFOUR  civic  civil  Clinton  Cold  collection  common  Communications  complex  confidence  conglomerate  consent  Conservative  Constitution  contract  cookie  corporate  corporatism  corruption  Court  Courts  crime  cryptography  cryptopocalypse  cryptowar  culture  cyber  cyberattack  cyberespionage  cybersecurity  cyberwar  data  Dataretention  DAU  David  DDoS  democracy  democrats  denominator  digital  digitalnatives  diplomacy  DNC  doctor  dogma  domestic  Draft  DRIPA  Drugs  economic  Edward  EFF  election  Elizabeth  Empire  encryption  energy  Enigma  error  espionage  espionagem  ethical  Europe  European  Europol  exploit  exploits  extremism  Eyes  Facebook  False  far-right  FBI  Fear  fearmongering  Firmware  FISA  FISAAA  Five  Flag  folly  foreign  FOSS  framing  FRance  free  freedom  freepress  freespeech  Gap  GCHQ  Gemalto  general  George  Germany  Glenn  Gmail  GNU  GNU/Linux  Google  gossip  governance  GPL  GPS  Greenwald  Grid  GroKo  gun  Hacktivism  Hater  Haters  Hegemony  Hillary  history  homescreen  human  idealism  ideology  industrial  Information  injustice  integrity  Intelligence  interest  internet  Interpol  intervention  investigative  Investigatory  Iraq  Iratemonk  ISIL  ISIS  islamic  ISP  Israel  IT  journalism  journalismus  Julian  Justice  knowledge  Laura  Lavabit  Law  Leadership  lesson  Linux  LLC  lobby  Lobbying  lobbyist  lowest  Lvabit  Lügenpresse  M  machine  Malware  Manning  manufactured  May  MD4  MD5  media  Meinungsfreiheit  Merkel  Met  Meta  metadata  MI5  MI6  Microsoft  military  military–industrial  mirror  mobile  mobilephone  model  moral  nasty  national  Nationalism  natives  neoconservatism  neoconservatives  neoliberal  neoliberalism  netzpolitik  netzpolitik.org  nls_933w.dll  No  NRA  NSA  of  on  online  Open  organised  Orwellian  Osborne  oversight  ownership  party  password  Patriot  patriotact  patriotism  Pentago  Pentagon  perception  perma  perma-cookie  PGP  phishing  Platform  Poitras  Polarisation  Police  policy  political  Politicians  populism  Positioning  Postgeheimnis  power  powers  PR  presidency  presidential  press  Pressefreiheit  PRISM  Privacy  profiling  profiteer  promises  propaganda  public  radicalism  RC4  Rechtsextremismus  Rechtsruck  Regin  relations  Representation  republican  republicans  rights  rootkit  RSA  Russia  Sanders  scam  Schengen  science  Search  Secret  security  securityr  Selectors  self-censorship  sentiment  Separation  SHA-2  SHA4  short-term  Silicon  SIM  Skype  Smart  Smartphone  smoke  smoking  Snoopers  Snowden  social  society  Source  speech  spin  spot  SSL  Start-Up  Stasi  state  Street  study  stuxnet  surveillance  Surveillance-Industrial  System  Taliban  target  targeting  Tempora  Terror  The  theory  Theresa  thinking  ThreatExchange  TISA  to  TOR  Tor  Tories  torture  TOS  TPP  tracking  transparency  Troll  Trolls  TrueCrypt  trust  trustagent  TTIP  Turing  Twitter  two-factor  UK  Union  Unix  USA  USB  user  Valley  values  view  violence  Vorratsdatenspeicherung  VPN  Wall  wants  war  Warrant  Warren  Wertegesellschaft  WhatsApp  Whisper  Whisteblower  Whistleblower  Wikileaks  Windows  Wireless  WMD  World  WW2  XKeyscore  Yahoo!  Zivilgesellschaft 

Copy this bookmark:



description:


tags: