asterisk2a + encryption   116

Redaction error reveals FBI did target Lavabit to spy on Edward Snowden
A redaction oversight by the US government has finally confirmed that the Federal Bureau of Investigation’s targeting of secure email service Lavabit was used specifically to spy on Edward Snowden.

Ladar Levison, creator of the email service, which was founded on a basis of private communications secured by encryption and had 410,000 users, was served a sealed order in 2013 forcing him to aid the FBI in its surveillance of Snowden.

Levison was ordered to install a surveillance package on his company’s servers and later to turn over Lavabit’s encryption keys so that it would give the FBI the ability to read the most secure messages that the company offered. He was also ordered not to disclose the fact to third-parties.
Lavabit  encryption  FBI  Whistleblower  Pentagon  CIA  NSA  Edward  Snowden  Wikileaks  Bradley  Manning  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Patriot  Act  FISA  Court  Secret  Court 
march 2016 by asterisk2a
Investigatory Powers Bill: May defends surveillance powers - BBC News
Mrs May has said Britain's spies must continue to be allowed to hack into foreign computer networks, under so-called "bulk equipment interference warrants", as this was "a key operational requirement for GCHQ".
She told MPs that bulk powers had played a significant role in every major counter-terrorism investigation over the past decade, including seven terror plots foiled in the past 18 months, and in responding to the bulk of cyber attacks against UK interests.
Investigatory  Powers  Bill  Snoopers  Charter  Theresa  May  War  on  Terror  Surveillance-Industrial  Complex  surveillance  surveillance  state  Orwellian  Internet  Privacy  Privacy  encryption  Cryptopocalypse  cryptography  bulk  data  collection  Vorratsdatenspeicherung  Dataretention  Meta  GPS  mobilephone  Big  Meta  profiling  Smartphone  human  rights  backdoors  backdoor  Secret  Courts  MI5  MI6  GCHQ  organised  crime  activism  activist  Tories  Conservative  Party  David  Cameron  cyber  cyber  attack 
march 2016 by asterisk2a
The tone between Apple and the FBI is now openly hostile | The Verge
Apple attorney: "I can only conclude that the DoJ is so desperate at this point that it has thrown all decorum to the winds... Everyone should beware, because it seems like disagreeing with the Department of Justice means you must be evil and anti-American. Nothing could be further from the truth." //&! Apple has accused the US government of trying to "smear" it with "desperate" and "unsubstantiated" claims. - bbc.in/24UbxT5
War  on  Terror  Patriot  Act  Apple  FBI  encryption 
march 2016 by asterisk2a
Security Experts Warn of Orwellian Future in Apple Case | Re/code
[ all without a warrant ] Your Samsung smart TV or Amazon Echo might spy on you next if the government succeeds in forcing Apple to disable security protections on a smartphone to further the FBI’s investigation into the San Bernardino attacks. Security experts from Stanford, Harvard and Rice universities and independent researchers laid out this Orwellian scenario in a court filing today, supporting Apple’s fight against a court order to help investigators hack a smartphone used by one of the assailants in the mass killing. The group of seven experts argues that the judge’s order [...] disturbing possibilities for how law enforcement might turn everyday items into surveillance tools. //&! Amazon Quietly Disabled Encryption in Latest Version of Fire OS - on.recode.net/1TXeXPB //&! Twitter, Airbnb, eBay, Kickstarter, LinkedIn and Square File Brief Supporting Apple - on.recode.net/1LXQ3sG &! Three Industry Trade Groups to File Briefs Supporting Apple - on.recode.net/1oTUdwx
Apple  FBI  Surveillance-Industrial  Complex  surveillance  surveillance  state  Orwellian  Internet  Privacy  Privacy  encryption  Cryptopocalypse  cryptography  War  on  Terror  Patriot  Act  bulk  data  collection  Dataretention  Vorratsdatenspeicherung  Meta  Big  Smartphone  mobile  homescreen  anonymity  human  rights  FISA  Court  FISAAA  Secret  Courts  GCHQ  NSA  Snoopers  Charter  Yahoo!  backdoors  backdoor  GPS  profiling  Facebook  Twitter 
march 2016 by asterisk2a
Why Was a Facebook Executive Arrested in Brazil? Encryption. | Re/code
Case in point: Facebook executive Diego Dzodan was arrested by Brazilian police Tuesday morning on his way to work for the same reason Brazilian authorities succeeded — albeit temporarily — in having WhatsApp banned from the country back in December: Encryption. Dzodan — who is still detained at the time of this writing — was arrested because of Facebook’s “repeated non-compliance with court orders,” according to a police press release. What does that mean? Brazilian authorities have requested that WhatsApp hand over user messages in multiple criminal investigations over the past few months, and WhatsApp repeatedly claims that it can’t hand over those messages because it doesn’t have them.
encryption  Apple  WhatsApp  Facebook  Internet  Privacy  Privacy  Cryptopocalypse  cryptography 
march 2016 by asterisk2a
Here Are the Most Interesting Things Apple and the FBI Said About Encryption | Re/code
on.recode.net/1QsrklN - FBI Director James Comey shifted from his shopworn phrase about “going dark” and instead talked about Apple and other technology companies using encryption to create “warrant-proof spaces in our lives.” Naturally, this is a technological development that law enforcement sees as a giant roadblock to gathering evidence in criminal investigations. He also admitted the bureau screwed up when it changed the Apple ID password on the shooter’s phone.
Apple  FBI  encryption  cryptography  Cryptopocalypse  Internet  Privacy  Privacy 
march 2016 by asterisk2a
Shami Chakrabarti: ‘Who’s the most dangerous person in Britain? David Cameron’ | Voluntary Sector Network | The Guardian
The outgoing Liberty director explains why plans to scrap the Human Rights Act threaten freedom, and why she won’t stop campaigning [...] I ask Chakrabarti – once branded by the Sun as “the most dangerous woman in Britain” – who she thinks deserves the “most dangerous” hallmark now. “Right now? David Cameron.” She says. “Actually, can I have more than one? Then him and that particular group in the cabinet now who are dedicated to scrapping the Human Rights Act. That group. They are an existential threat to the rights and freedoms of the most vulnerable people in our country.” [...] investigatory powers bill. “We wouldn’t let the state impose identity cards, but these,” she holds up her phone, “these we buy.”
UK  USA  David  Cameron  Tories  NSA  GCHQ  Secret  Courts  FISA  Court  FISAAA  Surveillance-Industrial  Complex  surveillance  state  Snoopers  Charter  Patriot  Act  human  rights  Act  Brexit  neoliberalism  neoliberal  neoconservatism  neoconservatives  Theresa  May  Schengen  Agreement  War  on  Terror  Torture  ISIS  far-right  Rechtsruck  Rechtsextremismus  Internet  Privacy  Privacy  Big  Data  Meta  Data  profiling  encryption  Cryptopocalypse  cryptography  backdoors  backdoor 
march 2016 by asterisk2a
Pando: At what point is the convenience of technology outweighed by the constant stress?
Yesterday, I wrote about new proposals to allow the government to trawl the social media accounts of visa applicants before allowing or denying entry to the US.  Specifically, I wrote about my relief, as a visa-carrying foreign worker, at having deleted my social media accounts last year. For all the myriad reasons the government might declare me unworthy of living here -- particularly under President Trump -- at least an old dumb tweet won’t be one of them. [...] Connected technology was supposed to make our lives easier. And of course it has, in countless ways. But what it doesn’t seem to have done is made our lives less stressful...
USA  Visa  application  Social  Media  Big  Data  bulk  collection  FISAAA  FISA  Court  Patriot  Act  Nationalism  War  on  Terror  NSA  GCHQ  Internet  Privacy  Privacy  self-censorship  Orwellian  State  surveillance  Surveillance-Industrial  Complex  surveillance  neoconservatism  neoconservatives  UK  barackobama  presidency  David  Cameron  Theresa  May  Snoopers  Charter  immigration  migration  Smartphone  Meta  Data  encryption  democracy  free  speech  freedom  of  speech  freedom  of  expression  ISIS  Silicon  Valley 
february 2016 by asterisk2a
Can we really trust judges to protect reporters' confidential sources? | Media | The Guardian
Journalists won’t even be safe to talk email whistleblowers from a coffee shop [...] In stressing that the powers would not be used for mass surveillance, May said the onus would be on the home office to show necessity and proportionality. And who would decide whether that was justified? Judicial commissioners, she said. They would operate a “double-lock” authorisation process on intercept and bulk interception warrants in order to prevent intrusive snooping. [ old boys club with career interests? titles, pensions? ] But will this judicial oversight provide enough protection? That’s the key worry for journalists who now know that there is nowhere for them to conceal their communications with confidential sources. [...] We already know from instances of the police use of the regulation of investigatory powers act (Ripa) //&! Police spying row officers decline Holyrood invitation - http://bbc.in/1RSXQxl
Snoopers  Charter  Theresa  May  Surveillance-Industrial  Complex  surveillance  surveillance  state  Orwellian  free  press  Pressefreiheit  freedom  of  press  investigative  journalism  journalismus  journalism  Whistleblower  accounting  accountability  Career  Politicians  UK  USA  NSA  GCHQ  corporate  scandal  political  scandal  of  Information  Act  FOI  democracy  transparency  oversight  encryption  backdoors  backdoor  Westminster  War  on  Terror  organised  crime  War  on  Drugs  MI6  CIA  Toff  Privileged  Establishment  Edward  Snowden  Julian  Assange  Wikileaks  cablegate  Chelsea  Manning  Pentagon  Police 
january 2016 by asterisk2a
Apple raises concerns over UK's draft surveillance bill - BBC News
The US-based firm has passed on its thoughts to a parliamentary committee scrutinising the legislation. It focuses on three issues: encryption, the possibility of having to hack its own products, and the precedent it would set by agreeing to comply with UK-issued warrants. The Home Secretary Theresa May said last month that the proposed powers were needed to fight crime and terror. [...] But Apple appears to be concerned that the bill's language could still be interpreted more expansively and force the creation of a so-called "backdoor" to provide the authorities with access. Apple argues that the existence of such a backdoor would risk creating a weakness that others then might exploit, making users' data less secure. [...] Overseas warrants A second area of concern relates to the issue of "extra-territoriality". Existing British legislation - and the bill - maintain that companies need to comply with warrants for information wherever they are based and wherever the data resides.
Surveillance-Industrial  Complex  GCHQ  Snoopers  Charter  Internet  Privacy  Privacy  encryption  Cryptopocalypse  cryptography  backdoors  backdoor  Vorratsdatenspeicherung  Dataretention  bulk  data  collection  human  rights  Theresa  May  Tories  nasty  party  Conservative  David  Cameron  George  Osborne  War  on  Terror  organised  crime  austerity  military–industrial  surveillance  state  NSA  propaganda  manufactured  consent  Polarisation  islamic  radicalism  islamic  extremism  ISIS  corporate  state  corporate  media  Lügenpresse  populism  Big  metadata  neoconservatism  neoconservatives  presidency  barackobama 
december 2015 by asterisk2a
Video "Stark: Demokratie durch Überwachung in Gefahr" | Zapp | ARD Mediathek
Der "Spiegel" ist offenbar ins Visier von Geheimdiensten geraten, das Bundeskanzeleramt soll davon seit 2011 gewusst haben. "Spiegel"-Redakteur Stark zeigt sich erschüttert. // freie presse ist pfeiler der demokratie. - 4te gewalt. checks and balances. // mit hilfe von selectoren liste werden journalisten ueberwacht! und ihre bewegung via cellphone tracking. //&! spiegel.de/thema/national_security_agency/ //&! Vorratsdatenspeicherung schreckt Whistleblower ab. "Sammelwut verprellt Informanten." - bit.ly/1lCqrKZ - Vorratsdatenspeicherung hilft nicht bei Verbrechensaufklaerung.
NSA  GCHQ  Whistleblower  surveillance  Surveillance-Industrial  Complex  surveillance  state  BND  Angela  Merkel  journalismus  investigative  journalism  journalism  Big  Data  Edward  Snowden  Wikileaks  democracy  social  democracy  corporate  state  corporate  media  Pressefreiheit  freedom  of  press  Dataretention  Snoopers  Charter  Vorratsdatenspeicherung  Russia  China  bulk  collection  Meta  Data  Internet  Privacy  Privacy  human  rights  presidency  barackobama  Hegemony  USA  War  on  Terror  national  interest  patriotism  Patriot  Act  CIA  FBI  Iraq  War  cablegate  FISA  Court  FISAAA  Secret  Courts  military–industrial  military  intervention  TTIP  TPP  TISA  encryption  Cryptopocalypse  cryptography  Separation  of  powers  Checks  and  Balances  organised  crime  War  on  Drugs  Positioning  framing  PR  spin  doctor 
december 2015 by asterisk2a
Theresa May accused of rushing surveillance bill through back door | Politics | The Guardian
Home secretary gives committee three weeks to study ‘snooper’s charter’, despite having ruled out fast-tracking it after Paris attacks [...] The joint committee that scrutinised the previous “snooper’s charter” bill – the draft communications data bill – in 2012 sat for five months and held 13 public witness sessions over a six-week period. It also took evidence in private from the security services. //&! bit.ly/1lkbLjn - State computer hacking The bill gives powers for security services to hack in to phones, computers and networks worldwide in interests of national security. [ like environmental and animal rights activists ]
Snoopers  Charter  Theresa  May  nasty  party  Tories  Conservative  GCHQ  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Dataretention  bulk  data  collection  democracy  David  Cameron  George  Osborne  Internet  Privacy  Privacy  human  rights  Secret  Courts  oversight  abuse  of  power  accountability  cyber  war  cyber  attack  TOR  Linux  encryption  Cryptopocalypse  cryptography  MI5  MI6 
november 2015 by asterisk2a
Glenn Greenwald on why the CIA is smearing Edward Snowden after the Paris attacks: "The real objective is to depict Silicon Valley as terrorist-helpers for the crime of offering privacy protections to Internet users and to force them to give the U.S. gov
Glenn Greenwald on why the CIA is smearing Edward Snowden after the Paris attacks: "The real objective is to depict Silicon Valley as terrorist-helpers for the crime of offering privacy protections to Internet users and to force them to give the U.S. gov "backdoor" access into communications"
encryption  cryptography  Cryptopocalypse  War  on  Terror  backdoor  backdoors  Edward  Snowden  NSA  GCHQ  Surveillance-Industrial  Complex  surveillance  state  Orwellian  bulk  data  collection  Snoopers  Charter  Vorratsdatenspeicherung  Dataretention 
november 2015 by asterisk2a
Überwachung in Großbritannien: Neues Gesetz vorgestellt - SPIEGEL ONLINE
Die Werbekampagne hat sich gelohnt. Am heutigen Mittwoch veröffentlichte Innenministerin Theresa May einen Gesetzentwurf (hier als PDF), der britischen Geheimdiensten noch mehr Macht verspricht. Die Spione können, sobald die sogenannte Investigatory Powers Bill vom Parlament verabschiedet wird, ganz legal das tun, was sie bislang ohne solide rechtliche Grundlage machten. Gleichzeitig sagte Innenministerin May, sie wolle die Aufsicht über die Geheimdienste stärken. [...] Theresa May betonte im Parlament, dass es nicht darum gehe, den gesamten Browserverlauf zu speichern, sondern nachvollziehen zu können, mit wem Verdächtige kommunizieren. [ jeder ist nun verdaechtig ] [ UK people seem not to care ]
Dataretention  Vorratsdatenspeicherung  Snoopers  Charter  Theresa  May  UK  Tories  Conservative  Party  neoconservatism  neoconservatives  GCHQ  War  on  Terror  extremism  Surveillance-Industrial  Complex  surveillance  state  British  Empire  NSA  human  rights  Internet  Privacy  Privacy  oversight  transparency  Separation  of  powers  injustice  Justice  System  Secret  Courts  Edward  Snowden  USA  encryption  Cryptopocalypse  cryptography  Wertegesellschaft  Orwellian  society  Big  Brother  abuse  of  power  democracy  lobbyist  lobby  Lobbying  military–industrial  profiteer  corporate  espionage  industrial  espionage  cyber  espionage  corporate  state  corporate  media  activists  activism 
november 2015 by asterisk2a
Hacked! - Tech Weekly podcast by Guardian Tech Weekly
book - @War: The Rise of the Military-Internet Complex3 Nov 2015 by Shane Harris // Doomsday Scenarios: breaking the internet, bringing down electricity grid, transportation/infrastructure, nuclear plant, manipulating digital money vault/value exchanges, << low probability - high impact >> distrust/lost trust.
cyber  war  industrial  espionage  scam  phishing  scam  corporate  espionage  cyber  espionage  USA  UK  Cina  Russia  Israel  Five  Eyes  NSA  GCHQ  Surveillance-Industrial  Complex  surveillance  state  military–industrial  foreign  affairs  Hegemony  foreign  policy  Intelligence  foreign  relations  book  Smart  Grid  encryption  Cryptopocalypse  cryptography  cyber  security  IT  password  security  energy  security 
october 2015 by asterisk2a
TalkTalk cyber attack: Company admits it could have done more to protect customers' information | Crime | News | The Independent
The attack exposed the latest security failure for the company, which was forced to admit it had not encrypted some personal details of customers. The hackers appeared to have stolen details that amount to a full toolkit for fraud including names, addresses and bank account information.
cyber  attack  encryption  phishing  scam  phishing  cyber  crime  cyber  security  cyber  war 
october 2015 by asterisk2a
Markus Beckedahl, Andre Meister: Kontrolle ist gut. #Landesverrat ist besser. - YouTube
// Statement von Georg Restle zu der Anzeige wegen Landesverrat gegen die Journalisten Markus Beckedahl und Andre Meister von Netzpolitik.org. - youtu.be/bLuu4ekznT8 // Verschwörung gegen die Freiheit (Doku, ZDF 2014) - youtu.be/HoTW5c2MEYQ // &! O-Ton GroKo - youtu.be/y9pRz5KQ6vo - Eiertanz: Viele, viele naive Fragen zum BND-Skandal // &! http://www.dctp.tv/filme/markus-beckedahl-netzpolitik-org/
netzpolitik  Pressefreiheit  Lügenpresse  Angela  Merkel  GroKo  Surveillance-Industrial  Complex  military–industrial  NSA  GCHQ  Five  Eyes  surveillance  state  Orwellian  BND  corporate  espionage  industrial  espionage  cyber  espionage  cyber  war  USA  Europe  UK  Germany  Vorratsdatenspeicherung  Dataretention  Snoopers  Charter  bulk  data  collection  FISA  Court  FISAAA  Patriot  Act  presidency  barackobama  David  Cameron  encryption  Cryptopocalypse  cryptography  False  Flag  on  Terror  IT  Security  cyber  netzpolitik.org  freedom  of  press  of  Information  Act  National  Security  interest  on  Drugs  organised  crime  cyber  crime  investigative  journalism  journalismus  journalism  Whistleblower  Career  Politicians  No  Representation  social  contract  political  theory  Internet  Privacy  Privacy  Meta  metadata  Big  Wikileaks  Edward  Snowden  Julian  Assange  Secret  Courts  Glenn  Greenwald 
august 2015 by asterisk2a
U.K. ‘Emergency’ Surveillance Law Ruled Unlawful By High Court | TechCrunch
In a high profile win for civil liberties in the U.K., surveillance legislation rushed through the national parliament in a matter of days last year has today been declared unlawful under European Human Rights law. Two MPs, Tom Watson (Labour) and David Davis (Conservative), along with civil rights campaign group Liberty, took the government to the High Court last month, challenging the Data Retention and Investigatory Powers Act (DRIPA) on privacy and data protection grounds. Today the High Court agreed with their challenge. [...] the European Court of Justice ruling that had, months earlier, struck down EU data retention powers as disproportionate. [...] [abuse] The court also ruled section 2 unlawful because it does not build in limits to accessing this data by requiring access be authorized by a court or independent body. // Part of Tories 2015 manifesto; Scrap the Human Rights Act, and introduce a British Bill of Rights - bbc.in/1JJI1U4
UK  human  rights  Tories  Conservative  Party  general  election  2015  election  campaign  promises  David  Cameron  Snoopers  Charter  NSA  GCHQ  Five  Eyes  Dataretention  bulk  data  collection  encryption  Cryptopocalypse  cryptography  ISIS  False  Flag  War  on  Terror  Surveillance-Industrial  Complex  surveillance  surveillance  state  Orwellian  DRIPA  Internet  Privacy  Privacy  FISA  Court  FISAAA  presidency  barackobama  Pentagon  military–industrial  oversight  transparency  abuse  of  power  accountability  Vorratsdatenspeicherung  Europe  populism  propaganda  manufactured  consent  corporate  state  corporate  media  PR  spin  doctor 
august 2015 by asterisk2a
Harvest of Facebook user data prompts calls for tighter privacy settings | Technology | The Guardian
[ It's not free, you are not the customer, you are the ware, your experience and your date is not their first priority - except keeping you on facebook scrolling, consuming, clicking ... ads. ] Software developer exploits loophole to obtain thousands of names, pictures and locations of users who link their mobile phone number with account
Facebook  API  encryption  TOS  Big  Data  Internet  Privacy  Privacy  user  IT  Security  abuse  abuse  of  power 
august 2015 by asterisk2a
Russia will fork Sailfish OS to shut out pesky Western spooks
Paranoia over NSA tampering spurs de-Westernisation drive // well only the Paranoid survive. [...] Russia’s Minister of Communications and Mass Media, Nikolai Nikiforov, has taken part in talks to form a consortium that will aid Russia in developing a custom mobile OS, reportedly a forked version of Jolla’s Sailfish OS, to lessen its dependence on Western technology. Nikiforov held a working meeting last week with the leadership of Hong Kong-based Sailfish Holdings, developer of the quietly admired Sailfish OS. Alongside other participants, the parties involved discussed the use of open-source software in the public and private sectors, taking into account technical, economic and political factors, the latter of which is expected to include United States’ interference with exported technologies.
Open  Source  Russia  corporate  espionage  industrial  espionage  cyber  espionage  NSA  Five  Eyes  Nationalism  barackobama  presidency  Europe  GCHQ  UK  Foreign  Intelligence  affairs  relations  2015  cyber  war  encryption  Angela  Merkel  Leadership  Career  Politicians  No  Representation  human  rights  Privacy  Internet  Privacy  Cryptopocalypse  cryptography  national  interest  False  Flag  on  Terror  on  Drugs  organised  crime  backdoors  backdoor  IT  Security  exploit  Germany  FRance  surveillance  Surveillance-Industrial  Complex  surveillance  state  Orwellian  corporate  state  manufactured  consent  Cold  propaganda  populism  Pressefreiheit  Lügenpresse  Vorratsdatenspeicherung  Snoopers  Charter  investigative  journalism  Whistleblower  tracking  bulk  data  collection  democracy  freedom  freedom  of  press  Secret  Courts  FISA  Court  FISAAA  BND  military–industrial 
august 2015 by asterisk2a
Pressure mounts over claims Police Scotland breached rules over spying on journalists (From Herald Scotland)
PRESSURE is mounting on ministers to take action on Police Scotland amid further criticism of the force over claims it illegally spied on a journalist to uncover sources. The force's elite Counter Corruption Unit (CCU) is said to have snooped on the reporter without getting judicial approval - a tactic which was banned on March 25 following a row over officers using the Regulation of Investigatory Powers Act (Ripa) to access journalists’ phone records, texts and emails. // [ endemic and systemic! you are not safe. period. ] // &! bbc.in/1OQEaGJ - Ministers questioned over Police Scotland 'spying' claims // &! bbc.in/1KUFPu9 &! bbc.in/1Maojno << time to get their story right!?
Met  Police  GCHQ  freedom  of  press  UK  journalismus  investigative  journalism  journalism  corporate  state  corporate  media  media  conglomerate  Pressefreiheit  Lügenpresse  Five  Eyes  NSA  Career  Politicians  No  Representation  democracy  Surveillance-Industrial  Complex  surveillance  state  Orwellian  military–industrial  2015  human  rights  Internet  Privacy  Privacy  Snoopers  Charter  Vorratsdatenspeicherung  abuse  of  power  corruption  manufactured  consent  populism  War  on  Terror  False  Flag  organised  crime  cyber  cyber  crime  Cryptopocalypse  cryptography  encryption  backdoors  backdoor  propaganda  Intelligence  Agency  Foreign  Intelligence  corporate  espionage  industrial  espionage  cyber  espionage  Nationalism  national  interest  domestic  affairs  affairs  policy  relations  MI5  MI6  Secret  Courts  FISA  Court  FISAAA 
august 2015 by asterisk2a
Windows 10: Microsoft under attack over privacy | Technology | The Guardian
>> It is not Free. Period! Stupid. << // &! Get Tracked with Windows 10 | Tech Talk Today 198 - youtu.be/Gh0y5drKwAE &! http://www.jupiterbroadcasting.com/85697/get-tracked-with-windows-10-ttt-198/ &! Microsoft’s new small print – how your personal data is (ab)used - https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/ &! &! bit.ly/1eNKQJm - Mit Windows 10 wird alles besser - sagt Microsoft. Viele Neuerungen funktionieren aber nur, weil der Konzern auf Nutzerdaten zugreift. Wir zeigen, wie Sie die Datensammelei sinnvoll einschränken. [ einschraenken, nicht abschaltbar - selling you out ] &! bit.ly/1g2TLHN - Like all proprietary software, Windows 10 puts those that use it under the thumb of its owner. [...] Windows is an open window onto you &! bit.ly/1SFoXhT &! Linux: The OS of the Future - youtu.be/cTpujBq1Zi0 // &! bit.ly/1MUDxeB &! youtu.be/ULq1ajA1Jek
TOS  Microsoft  Platform  Internet  Privacy  Privacy  Big  Data  advertisement  advertisement  targeting  user  Facebook  Windows  10  business  model  Free  perma-cookie  ISP  Google  Wireless  Carrier  Android  Apple  human  rights  Linux  Open  Source  Twitter  backdoors  backdoor  Cryptopocalypse  encryption  NSA  FISA  Court  FISAAA  corporate  espionage  industrial  espionage  cyber  espionage  national  interest  Nationalism  Five  Eyes  GCHQ  Secret  Courts  cryptography  FOSS  GNU  GNU/Linux  GPL 
august 2015 by asterisk2a
How NSA and GCHQ spied on the Cold War world - BBC News
American and British intelligence used a secret relationship with the founder of a Swiss encryption company to help them spy during the Cold War, newly released documents analysed by the BBC reveal.
Cold  War  NSA  GCHQ  MI5  MI6  surveillance  state  Surveillance-Industrial  Complex  military–industrial  history  European  Orwellian  encryption  Cryptopocalypse  cryptography  Enigma  WW2  USA  UK 
july 2015 by asterisk2a
Sicherheitshysterie nach britischem Urteil gegen Vorratsdatenspeicherung: „Tausende Leben in Gefahr“ | netzpolitik.org
Die Notwendigkeit der technisierten Überwachung wird gar nicht mehr hinterfragt, die gerichtlichen Backpfeifen an die britische Regierung stattdessen in grotesker Weise kommentiert. So titelt beispielhaft der Telegraph in Anlehnung an eine Aussage der britischen Innenministerin Theresa May: Thousands of lives at risk after High Court rules snooping powers unlawful. // theguardian.com/world/surveillance - bit.ly/1fa4mQP // &! bit.ly/1CMnrUg &! bit.ly/1DoKqiZ - Why appeasing governments over encryption will never work. David Cameron & the director of the FBI have both asked for ‘backdoors’ to be included in encryption software [...] Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications, is worth reading in full. It concludes that proposals for backdoors are “unworkable in practice, raise enormous legal and ethical questions, and would undo progress on security at a time when internet vulnerabilities are causing extreme economic harm”.
Snoopers  Charter  Vorratsdatenspeicherung  DRIPA  data  retention  law  bulk  data  collection  propaganda  surveillance  surveillance  state  Orwellian  False  Flag  War  on  Terror  ISIS  ISIL  Surveillance-Industrial  Complex  military–industrial  UK  GCHQ  MI5  Met  Police  abuse  of  power  transparency  accountability  democracy  Secret  Courts  Five  Eyes  British  Empire  populism  Lügenpresse  manufactured  consent  corporate  state  NSA  Career  Politicians  Tony  Blair  presidency  barackobama  David  Cameron  society  Gesellschaft  European  Union  Internet  Privacy  Privacy  human  rights  self-censorship  encryption  Cryptopocalypse  backdoors  backdoor  FBI  MI6  cyber  corporate  espionage  industrial  espionage  cyber  espionage  Intelligence  Agency  Foreign  Intelligence  national  interest  protectionism  economic  damage  IT  Security  policy  folly  policy  error 
july 2015 by asterisk2a
Totale Kontrolle (ARTE Doku) - YouTube
"angriff auf das privatleben." // false feeling of safety. true criminals (not opportunists) are not fended off with personal surveillance installations. // Security is very wish wash and can not be easily defined. // False Flag organised crime, war on terror, ... to take step by step away some kind of remaining privacy and freedom. // NSA & Co sell their programs as reasonable and efficient (able to prevent X). No transparency. No accountability. // automatic verdaechdig // Chris Hedges & Noam Chomsky - Corporate State //
surveillance  state  Orwellian  Privacy  Internet  Privacy  human  rights  society  Stasi  2.0  Career  Politicians  Big  Data  democracy  abuse  of  power  False  Flag  vested  interest  interest  groups  Meta  Data  metadata  self-censorship  military–industrial  complex  NSA  Five  Eyes  freedom  bulk  collection  UK  USA  Europe  Germany  corporate  state  War  on  Terror  civil  liberty  Gesellschaft  National  Security  interest  Cryptopocalypse  cyber  encryption  Patriot  Act  corporate  espionage  industrial  espionage  GCHQ  BND  organised  crime  cyber  espionage  FISA  Court  Secret  Courts  Pentagon  Police  World  Police  Imperialism  Empire  Drone  Strike  Drone  Warfare  Totalitarianism 
june 2015 by asterisk2a
NSA und GCHQ spähen Anti-Viren-Hersteller wie Kaspersky aus - SPIEGEL ONLINE
[ Washington, even Obama doesn't know about the true extent. NSA, Five Eyes, for profit military and intelligence complex is an entity that is OVER Washington. Because telling Washington would be a National Security risk. ] Frisch veröffentlichte Snowden-Unterlagen zeigen, wie der amerikanische und der britische Geheimdienst gezielt Anti-Viren-Software austricksen und deren Hersteller ausforschen. In den Dokumenten taucht auch ein deutscher Anbieter auf. [...] Der britische Geheimdienst GCHQ und die amerikanische NSA haben gezielt Anti-Viren-Hersteller ausspioniert. Ziel war es offenbar, Wege zu finden, die Virenschutzprogramme auszutricksen: Die Schadsoftware der Geheimdienste sollte von den Programmen unentdeckt bleiben.
NSA  GCHQ  Five  Eyes  surveillance  state  Cryptopocalypse  encryption  backdoors  backdoor  TrueCrypt  Edward  Snowden  Reverse  Engineering  FISA  Court  Secret  Courts  UK  USA  presidency  barackobama  Stasi  2.0  Imperialism  False  Flag  corporate  espionage  industrial  espionage  cyber  espionage  cyber  war  IT  Security  cyber  crime  cyber  cyber  attack  Privacy  Internet  Privacy  Antivirus  Orwellian  Empire  vested  interest  interest  groups  national  interest  military–industrial  complex  Intelligence  Agency  Foreign  Intelligence  Cold  relations  policy  affairs  Wikileaks  cablegate  Career  Politicians  No  Representation  Totalitarian  Despotism  oligarchy  oversight  transparency  democracy  Washington  Security 
june 2015 by asterisk2a
Chris Hedges - Our Only Hope Will Come Through Rebellion - 29th March 2014 - YouTube
military industrial complex does what it wants and asks and gets what it wants. // Truth is hidden. Decent is criminalised. // things are only to get worse. // protect corporate state and spy on other corporate states and corporate entities. // for-profit military industrial complex // 9/11 opportunist, false flag, to profit from program X to protect our nation // no warrent needed - https://en.wikipedia.org/wiki/Warrant_(law) // the corporate state has no incentive to give up Stasi 2.0 // >> = Totalitarian state // we have totalitarian structures! period. // reform can not come from those who are in the center of power and a implicit of the status quo ... meaning only a revolution through rebellion is the option. defying the law and opting for civil disobedience. moral and physical courage needed.
surveillance  state  NSA  GCHQ  Stasi  2.0  Orwellian  Five  Eyes  Cold  War  civil  liberty  Constitution  FISA  Court  FISAAA  Patriot  Act  military–industrial  complex  Whistleblower  democracy  oversight  transparency  accountability  Intelligence  Agency  abuse  of  power  Separation  of  powers  Career  Politicians  No  Representation  Congress  Washington  lobbyist  lobby  Lobbying  National  Security  False  Flag  Privacy  Internet  Privacy  USA  UK  Warrent  metadata  KGB  WMD  Iraq  War  War  on  Drugs  War  on  Terror  organised  crime  Politics  of  Fear  history  Empire  Drone  Strike  Drone  Warfare  Palestine  Gaza-Israel  conflict  Foreign  Intelligence  World  Police  World  G8  Europe  corporate  espionage  industrial  espionage  cyber  espionage  Cryptopocalypse  encryption  Edward  Snowden  Wikileaks  Julian  Assange  Torture  Pressefreiheit  Lügenpresse  media  conglomerate  presidency  barackobama  Angela  Merkel  opportunist  Opportunism  Wall  Street  trust  trustagent  Secret  Courts  Chelsea  Manning  corruption  self-censorship 
june 2015 by asterisk2a
UN: Government efforts to undermine encryption threaten basic human rights | PandoDaily
The report also focuses on schemes from the United Kingdom and the US to force tech companies to include backdoors in their products, thus giving these governments unfettered access to what consumers believe is private data.
encryption  backdoors  backdoor  cryptography  Cryptopocalypse  Internet  Privacy  Privacy  human  rights  surveillance  state  Orwellian  Dataretention  Vorratsdatenspeicherung  UK  USA  Europe  Postgeheimnis 
may 2015 by asterisk2a
The government's data law - an attack on encryption? - BBC News
The row over forcing internet service providers (ISPs) to hold on to far more data about their users' online activities has stretched over three parliaments. The idea first came up under the last Labour government, when it was quashed by Conservative and Liberal Democrat opposition. Then it was resurrected by the Coalition, with Theresa May's plans - immediately dubbed the Snooper's Charter - blocked by her Liberal Democrat partners. // &! "radicalisation" http://www.bbc.co.uk/news/uk-politics-32714802 &! http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/11630495/Muslim-Council-hits-back-at-top-cops-Marks-and-Spencer-radicalisation-comments.html https://youtu.be/slOe_4zxQCI
Snoopers  Charter  UK  Vorratsdatenspeicherung  GCHQ  surveillance  state  Orwellian  War  on  Terror  War  on  Drugs  organised  crime  False  Flag  Privacy  Internet  Privacy  human  rights  Conservative  Party  David  Cameron  Theresa  May  backdoors  backdoor  encryption  cryptography  Cryptopocalypse 
may 2015 by asterisk2a
Danny Boyle: the Olympic opening ceremony would be done differently in 2015 - Newsnight - YouTube
do we want to give them the data, our lives?! it seems positive and benign, but it changes our lives in the long-term and we are only seen as data pools. // dave eggers novel the circle
Internet  Privacy  book  Facebook  Google  Big  Data  perma  cookie  Orwellian  State  surveillance  FISA  Court  FISAAA  Secret  Courts  NSA  GCHQ  Foreign  Intelligence  Intelligence  Agency  corruption  abuse  of  power  Privacy  human  rights  analytics  Vorratsdatenspeicherung  Five  Eyes  False  Flag  War  on  Terror  cyber  cyber  espionage  corporate  espionage  industrial  espionage  Microsoft  backdoors  backdoor  encryption  cryptography  Cryptopocalypse 
may 2015 by asterisk2a
Jung & Naiv - Bundesinnenminister de Maizière hat sich über die "digitale Sorglosigkeit" von euch beklagt
Bundesinnenminister de Maizière hat sich über die "digitale Sorglosigkeit" von euch beklagt. Ihr würdet so viel Privates öffentlich posten! Uns hat heute interessiert: Warum traut er sich von “digitaler Sorglosigkeit” bei Dingen, die wir öffentlich posten, zu reden, wenn gerade er jemand ist, der selbst die Dinge wissen will, die wir nicht öffentlich digital mitteilen? (Vorratsdatenspeicherung)
encryption  cryptography  Cryptopocalypse  Privacy  Internet  Privacy  surveillance  state  Orwellian  BND  Career  Politicians  GroKo  NSA  Selectors  Vorratsdatenspeicherung  human  rights 
may 2015 by asterisk2a
Snowden documents show spy agencies exploiting issues with China’s most popular browser | PandoDaily
New reports from CBC News and the Intercept show that intelligence agencies in Canada, the United States, Australia, the United Kingdom, and New Zealand exploited vulnerabilities in Alibaba’s UC Browser to surveil 500 million people. The agencies also planned to use various app stores to distribute their spyware. The reports indicate that UC Browser offered up all kinds of information about its users. This is notable because it’s the most popular Web browser in China and has an estimated 500 million users, making it a valuable target for spying. The problems are said to be limited to the Android version of the Web browser.
Five  Eyes  NSA  Alibaba  Edward  Snowden  War  on  Terror  surveillance  state  Orwellian  False  Flag  GCHQ  Intelligence  Agency  Foreign  Intelligence  cyber  encryption  cryptography  Cryptopocalypse  Internet  Privacy  Privacy  human  rights  presidency  barackobama  corporate  espionage  industrial  espionage  cyber  espionage  cyber  attack 
may 2015 by asterisk2a
Law changed to allow GCHQ hacking ... just as GCHQ hauled into court for hacking • The Register
[ unaccountable, free for all to hack anything that is in the domestic interest, can be corporate intelligence, trade secrets, patents, corporate documents & communications; Russia, China, Germany, Brazil, India. The NEW COLD WAR. see also 2015 BND affair with selectors. ] Government legislation to exempt GCHQ from prosecution on charges of illegal hacking has been passed and come into effect – apparently torpedoing an ongoing claim against the surveillance agency being heard by the Investigatory Powers Tribunal. Last July, a coalition of internet service providers and international organisations teamed up with Privacy International to take legal action against GCHQ. Their claim, which arrived in court today, has been hobbled by what the privacy warriors said was the revelation that the government had quietly ushered through legislation amending the Computer Misuse Act to exempt GCHQ and law enforcement from prosecution, and did so while the case was ongoing.
cyber  war  cyber  attack  GCHQ  on  Terror  organised  crime  on  Drugs  accountability  surveillance  state  Orwellian  2015  corporate  espionage  industrial  espionage  cyber  espionage  NSA  USA  UK  presidency  barackobama  David  Cameron  encryption  Europe  trade  secret  corporate  intelligence  Airbus  Five  Eyes  Agency  domestic  interest  abuse  of  power  corruption  FISA  Court  FISAAA  Patriot  Act  Act  Courts  Cold  Cold  2.0  BND  selector  Wall  Street  Internet  Privacy  IT  Security  geopolitics  Foreign  National  Security  globalisation  globalization 
may 2015 by asterisk2a
Kommentar: Warum die aktuellen Erkenntnisse über das Versagen des Kanzleramtes bei BND-Aufsicht schon lange abzusehen waren | netzpolitik.org
"Beihilfe." // &! Eiertanz: Viele, viele naive Fragen zum BND-Skandal - youtu.be/y9pRz5KQ6vo // &! Wirtschaftsspionage für Amerika? "Das Ganze ist ein Riesenskandal", sagt Hans-Christian Ströbele (Grüne) zur BND-Spitzelaffäre. - on.fb.me/1GznzV8 profiling of EU politicians, policy makers as well as EADS, EuroCopter and other stuff, shows that War on Terror, Drugs, and organised crime as a pretence is wrong to a certain extent, it shows that power corrupts and absolute power corrupts absolutely. // &! Der BND-Skandal - Worum geht's eigentlich? youtu.be/pcGzfv-Fndc // &! on.fb.me/1POvdPJ - Was ist mit der Bundeskanzlerin? Wann spricht sie zum BND-Skandal? // German intelligence agency knew NSA was spying on European leaders as early as 2008 - bit.ly/1DEvH3h "It was too worried about the NSA retaliating by limiting the information it shares." Stockholm Syndrome. No Leadership. Only Career Politicians.
surveillance  state  Orwellian  NSA  BND  cyber  espionage  corporate  espionage  industrial  espionage  Five  Eyes  GCHQ  Angela  Merkel  barackobama  presidency  GroKo  Career  Politicians  transparency  democracy  No  Representation  FBI  Torture  accountability  profiling  military–industrial  complex  cyber  crime  cyber  security  cyber  war  Foreign  Intelligence  policy  affairs  USA  World  Police  relations  corruption  abuse  of  power  Edward  Snowden  Privacy  Internet  Privacy  encryption  IT  National  security  cybersecurity  online  security 
april 2015 by asterisk2a
Box CEO Aaron Levie Talks IPO Delay And Growth Strategies | TechCrunch
He pointed to the recent Enterprise Key Management (EKM) announcement, which enables customers to control their own encryption keys. That takes Box out of the equation, which is just where any cloud company wants to be. If government or law enforcement comes knocking, Box can legitimately tell them they can’t share the company’s content because they can’t unlock the encryption. That move alone opened up whole new markets for Box, and it wasn’t a coincidence it announced a financial vertical package just a couple of weeks later. Financial services was a prime market they could attack armed with this type of functionality. [...] By tying Box’s destiny to ECM, he was moving into far more sophisticated enterprise software territory where companies needed a range of services including security, governance, workflow, metadata libraries and so forth.
Cloudstorage  Box  encryption  IPO  Aaron  Levie  differentiation  differentiate  productivity  Google  Drive  Google  for  Business  Dropbox  Microsoft  Google  Amazon 
march 2015 by asterisk2a
Europol chief warns on computer encryption - BBC News
disproportionate spying on ordinary civilians, and officials like Angela Merkel.
encryption  War  on  Terror  backdoor  backdoors  organised  crime  War  on  Drugs  surveillance  state  Orwellian  NSA  GCHQ  Five  Eyes 
march 2015 by asterisk2a
President Obama: The Re/code Interview - YouTube
slick downplay, comparing cyber war & industrial, coroporate cyber espionage (breaking in into Gemalto for SIM encryption keys) with basketball. And also tapping the phone of Angela Merkel ... &! http://youtu.be/td7Dcsco-WY "Obama on the state of the world: the extended Vox conversation" - is he a realist or just a coward!? /// >> http://www.bbc.co.uk/news/technology-31545050 &! http://www.spiegel.de/netzwelt/netzpolitik/nsa-und-gchq-haben-sim-karten-schluessel-von-gemalto-erbeutet-a-1019515.html &! Silicon Valley subbed him on his proposals and road show 20 min away from their door, is a tell tale what they think of him saying one thing and what the NSA&Co put them through and demands (see Yahoo!'s case with the FISA Court) - tcrn.ch/17ovyqD &! If it were a private person were hack into and steal Gemalto encryption keys, the person would be thrown in jail FOREVER! youtu.be/bIpNXh9Nh9k?t=16m32s &! NSA, GCHQ, Five Eyes like to bully people to do X for them & drop possible charges.
presidency  barackobama  NSA  USA  Gemalto  SIM  encryption  cyber  war  GCHQ  governance  on  Terror  Cryptopocalypse  cryptography  corporate  espionagem  industrial  espionage  espionage  cyber  espionage  UK  Five  Eyes  Internet  Privacy  Privacy  human  rights  Stasi  Stasi  2.0  organised  crime  on  Drugs  ethical  machine  Checks  and  Balances  Separation  of  powers  democracy  abuse  of  power  David  Cameron  cyber  crime  cyber  attack  cyber  securityr  IT  Security  surveillance  state  Orwellian  FISA  Court  FISAAA  Secret  Courts  Silicon  Valley 
february 2015 by asterisk2a
The NSA Reportedly Stole Millions Of SIM Encryption Keys To Gather Private Data | TechCrunch
The American National Security Agency (NSA), and the British Government Communications Headquarters (GCHQ), similar clandestine intelligence agencies, stole SIM card encryption keys from a manufacturer, allowing the groups to decrypt global cellular communications data. [...] “NSA and GCHQ basically have the keys to decyrpting mobile communications anywhere in the world, even without the participation of local communication carriers (which, even if not much, acts as some check on intelligence agency behavior). It’s the equivalent of these agencies having printed doorkeys for the front doors to millions or even billions of homes around the world, just in case they one day decided they needed to get in. Frankly, people should have no faith in the security of global mobile communications.” >> CLU’s Christopher Soghoian - "Steal millions of crypto keys and then complain publicly that encryption is a problem. The UK and US govs are shameless."
NSA  GCHQ  governance  War  on  Terror  encryption  Cryptopocalypse  cryptography  corporate  espionage  industrial  espionage  espionage  cyber  espionage  USA  UK  Five  Eyes  Internet  Privacy  Privacy  human  rights  Stasi  Stasi  2.0  presidency  barackobama  organised  crime  War  on  Drugs  ethical  machine  Checks  and  Balances  Separation  of  powers  democracy  abuse  of  power  David  Cameron  Gemalto  cyber  crime  cyber  attack  cyber  security  cyber  IT  surveillance  state  Orwellian 
february 2015 by asterisk2a
Linux Journal - Wikipedia, the free encyclopedia
In early July 2014 it was revealed that the NSA's XKeyscore program targeted readers of Linux Journal, which the NSA considers an "extremist forum". // &! NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance - http://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance // &! NSA targets the privacy-conscious - http://daserste.ndr.de/panorama/aktuell/NSA-targets-the-privacy-conscious,nsa230.html "Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA." - visiting site X puts you on watch list/collect data list - ie Wikileaks, Tor, Linux Journal, CCC unter anderem !+& bit.ly/1sZSWV9 >> leads to self-censorship like in East Germany.
NSA  Internet  Privacy  Privacy  human  rights  XKeyscore  Linux  CCC  activism  activists  Hacktivism  target  targeting  GCHQ  encryption  cryptography  Cryptopocalypse  IT  Security  cyber  cyber  war  cyber  espionage  corporate  espionage  industrial  espionage  espionage  FISA  Court  FISAAA  Foreign  Intelligence  Five  Eyes  presidency  barackobama  Stasi  Stasi  2.0  history  backdoor  backdoors  abuse  of  power  surveillance  state  Orwellian  Big  Data  Meta  Data  Unix  Google  Search  Tor  VPN  anonymity  self-censorship  free  speech  freedom  of  press  freespeech  free  press  Pressefreiheit  Meinungsfreiheit  Information  wants  to  be  free  knowledge  M 
february 2015 by asterisk2a
Kaspersky claims US spies can infect computers with malware that is almost impossible to detect | PandoDaily
NSA has found a way to infect computers targeted for surveillance with malware that is almost impossible to detect and even harder to remove. Kaspersky Lab says in its report that a threat actor known as the Equation Group made this possible by infecting firmware used in hard drives made by the world’s top manufacturers. // &! Reddit - bit.ly/1ATpm6v >> According to Kaspersky, getting the malicious code into a drive’s firmware is not an easy task, and can’t be done with help of public tools, meaning that the NSA had to have access to source codes for hard drives produced by these companies. [meaning they asked for access (and or intercepted orders) when OEM orders came from targeted countries/firms? or spoof hw vendor sites and let them download the manipulated firmware] &! bit.ly/19vzSpI - ie Iran and Russia.
NSA  CIA  surveillance  state  Orwellian  Foreign  Intelligence  corporate  espionage  cyber  espionage  espionage  industrial  espionage  GCHQ  Five  Eyes  backdoor  backdoors  corporate  values  corporate  governance  ethical  machine  FISA  Court  FISAAA  Regin  Whistleblower  rootkit  cyber  war  Iratemonk  Firmware  nls_933w.dll  USB  Air  Gap  cyber  security  cyber  attack  cyber  crime  USA  presidency  barackobama  Stuxnet  organised  crime  human  rights  cryptography  Cryptopocalypse  encryption  IT  on  Terror  Malware  Internet  Privacy  Privacy 
february 2015 by asterisk2a
Start Ups Should Prioritize Security, Even at the Earliest Stages - YouTube
>> weakest link is human being in the middle - thus need advisory/consulting/one person hire whose sole focus is it to make the org and tech secure and the people savvy. &! &! Five Easy Steps to Secure Your Startup - https://www.youtube.com/watch?v=SBWHWCFm9xQ - 1. get rid of MS Office - use Google Docs or other secure online secure office docs replacement / 2. Use ONE dedicated machine for online banking/finance (netbook) / 3. two-factor authentication - especially email / 4. do background checks / 5. plus teach savvyness in password choice and tools, general awareness and general security issues ie targeted phishing etc etc - on regular (updated) basis ... "most if not all attacks start with phishing"
IT  Security  Start-Up  lesson  Start-Up  advice  cyber  war  cyber  attack  DDoS  encryption  cryptography  Cryptopocalypse  cyber  cyber  crime  internet  online  password  phishing  phishing  scam  two-factor  authentication 
february 2015 by asterisk2a
TimesTalks - Laura Poitras, Glenn Greenwald and Edward Snowden with David Carr
Don’t miss this special opportunity to hear the director of CITIZENFOUR – the film nominated for the Academy Award for Best Documentary Feature – the first journalist to write about Snowden’s revelations and Snowden himself (via live video) in conversation with New York Times media columnist David Carr about the film and the issues it raises. // min 43 --- presidency barack obama worst administration ever for clamping down on freedom of press, whistleblowers, against transparency, governance, seperation of powers/checks and balances (NSA/CIA), - Obama got the executive power to close guantanamo, shut off surveillance without warrants. // subverts democracy. &! &! U.S. DROPS TO 49TH IN WORLD PRESS FREEDOM RANKINGS, WORST SINCE OBAMA BECAME PRESIDENT - bit.ly/1zaIdVO
CITIZENFOUR  Edward  Snowden  Laura  Poitras  Glenn  Greenwald  presidency  barackobama  transparency  NSA  governance  oversight  accountability  Whistleblower  freedom  of  press  freepress  Pressefreiheit  free  press  free  speech  Torture  Foreign  Intelligence  Intelligence  Agency  GCHQ  CIA  Warrant  FISAAA  FISA  Court  Europe  China  cyber  war  values  idealism  surveillance  state  Orwellian  moral  beliefs  ethical  machine  ethical  beliefs  corporate  espionage  cyber  espionage  industrial  espionage  espionage  democracy  No  Representation  Privacy  Internet  Privacy  encryption  cryptography  Cryptopocalypse  human  rights  Act  Patriot  Act 
february 2015 by asterisk2a
With the help of Pinterest, Twitter, and others, a new Facebook platform wants to keep the web secure | PandoDaily
The service is called ThreatExchange, and companies like Yahoo, Twitter, and Pinterest have all agreed to share threat information with each other via the boringly-named tool. But these companies aren’t the only ones worried that information about digital threats isn’t shared as well as it could be. A new agency, the Cyber Threat Intelligence Integration Center, has been formed to facilitate similar sharing amongst various intelligence agencies. ThreatExchange and CTIIT were both formed out of the belief that digital threats are a puzzle whose pieces are held by various groups. The only way to solve that puzzle, then, is to convince everyone to share their pieces. Otherwise the puzzle will always be incomplete. // what if NSA abuses knowledge this org got (of US companies) to abuse the knowledge via FISA Court injunction not to release it to public knowledge - ie to compromise and or steal intelligence from non-US firms.
IT  Security  cyber  encryption  ThreatExchange  Silicon  Valley  internet  online  cryptography  Cryptopocalypse  DDoS  NSA  CIA  BND  Five  Eyes  surveillance  state  Orwellian  Intelligence  Agency  Foreign  Intelligence  transparency  governance  accountability  Europe  China  FISA  Court  FISAAA  ethical  machine  cyber  espionage  corporate  espionage  industrial  espionage  cyber  attack  cyber  war  cyber  crime 
february 2015 by asterisk2a
Data stolen in Anthem data breach was not encrypted
The Health Insurance Portability and Accountability Act (HIPAA) states that health insurance companies such as Anthem are not required to encrypt the data stored on their servers. Encryption is recommended if the health insurer believes it will mitigate risk, but ultimately the lack of requirements leaves it down to each organization to decide whether or not they encrypt data. Anthem spokeswoman Kristin Binns told The Wall Street Journal that the company encrypts personal data when it’s moved in or out of the database but not when it’s stored, a practice she said is common in the industry.
encryption  cyber  security  IT  corporate  governance  ethical  machine  HIPAA  self-regulation  regulators  regulation 
february 2015 by asterisk2a
EFF’s Game Plan for Ending Global Mass Surveillance | Electronic Frontier Foundation
[...] Most people haven’t even heard of it, but Executive Order 12333 is the primary authority the NSA uses to engage in the surveillance of people outside the U.S. While Congress is considering much-needed reforms to the Patriot Act, there’s been almost no debate about Executive Order 12333. [...] [... and its also the private industry as contractor shovelling money for Wall Street shareholders, paid for by tax payer money ...]
EFF  surveillance  state  Orwellian  NSA  encryption  cryptography  Cryptopocalypse  Internet  Privacy  Privacy  Big  Data  metadata  Meta  Data  human  rights  USA  Five  Eyes  Foreign  Intelligence  Intelligence  Agency  GCHQ  backdoor  backdoors  CIA  FBI  cyber  security  cyber  attack  cyber  war  cyber  espionage  corporate  espionage  espionage  FISA  Court  FISAAA  presidency  barackobama  David  Cameron  democracy  governance  transparency  accountability  Career  Politicians  Patriot  Act  Act  Whistleblower 
february 2015 by asterisk2a
Security Nightmares 2014 [31c3] mit Frank Rieger & Ron - YouTube
see last 2 minutes, regular change of passwords and encryption method. &! Black Hat USA 2013 - The Factoring Dead: Preparing for the Cryptopocalypse - http://youtu.be/33RbRid1deo
encryption  password  integrity  password  security  cryptography  cryptowar  cryptopocalypse  internet  security  cyber  security  online  security  Five  Eyes  NSA  GCHQ  surveillance  state  Orwellian 
february 2015 by asterisk2a
UK government asks: How's our hacking?
UK gov releases equipment interference guidelines for spy & law enforcement agencies; the guidelines never calls it hacking but 'interference activities; Deputy Director @ Privacy International Eric King (@e3i5) says it's the UK gov's attempt to grant itself some of the most intrusive powers. // "This is the first time that the agencies have admitted that they are in the hacking business," Eric King, the deputy director of London-based digital rights watchdog Privacy International, told Mashable. King said that it amounts to a belated attempt to give these activities a scrap of legal basis, in the face of a lawsuit filed by his group last year, which challenged the legality of the UK intelligence service GCHQ's hacking activities, revealed by Edward Snowden documents. For King, the document is basically an attempt by the UK government to grant itself "some of the most invasive and intrusive" powers it has at its disposal.
UK  GCHQ  David  Cameron  surveillance  state  Orwellian  cyber  espionage  corporate  espionage  espionage  Intelligence  Agency  Foreign  Intelligence  presidency  barackobama  NSA  CIA  FBI  relations  policy  affairs  Politics  Political  Governance  corporate  ethical  machine  Europe  Five  Eyes  Career  Politicians  abuse  of  power  transparency  accountability  trust  trustagent  confidence  democracy  unintended  consequences  Internet  Privacy  Privacy  human  rights  War  on  Terror  War  on  Drugs  organised  crime  encryption  backdoor  backdoors  wiretapping  interdiction 
february 2015 by asterisk2a
Here’s how reporters are reacting to Snowden’s revelations | PandoDaily
The global surveillance programs revealed by Edward Snowden have caused journalists to change how they operate, question what the government knows about them, and consider abandoning investigative reporting, according to a survey from the Pew Research Center. A significant number of the journalists surveyed said they had changed their behavior, whether it’s how they store sensitive files (49 percent), how they communicate with other journalists (29 percent), whether they’ve reached out to a source (13 percent), or pursued a specific story (2 percent). Many are also convinced the government is gathering information about them. Some 64 percent of journalists believed intelligence agencies had “probably collected data” about them. (The other 36 percent, as “InfoSec Taylor Swift” joked, must not read the news.)
investigative  journalism  journalism  journalismus  presidency  barackobama  surveillance  state  Orwellian  encryption  Internet  Privacy  Privacy  Whistleblower  NSA  CIA  FBI  GCHQ  BND  Five  Eyes  Wikileaks  Intelligence  Agency  foreign  relations  foreign  policy  foreign  affairs  Career  Politicians  Politics  David  Cameron  UK  USA  Europe  Espionage  Act  corporate  cyber  FISA  Court  FISAAA  Secret  Courts  leverage  Power  Play  Political  Governance  oversight  accountability  trust  trustagent  confidence  democracy  transparency  No  Representation  short-term  view  short-term  thinking  unintended  consequences  Lügenpresse  Pressefreiheit  freedom  of  press  wiretapping  folly  science  error  distrust  fairness  Law  &  Justice  Justice  System  complexity 
february 2015 by asterisk2a
Europarat warnt: “Massenüberwachung ist eine grundlegende Bedrohung der Menschenrechte” | netzpolitik.org
>> Bürger sollen nur überwacht werden dürfen, wenn ein Gerichtsbeschluss und ein begründeter Verdacht vorliegt. [...] Das Ausnutzen von Backdoors, 0-day-exploits oder der Schwächung von Verschlüsselungsstandards soll verboten werden. [...] Whistleblower, die illegale Überwachungsaktivitäten aufdecken, sollen zuverlässig und effektiv geschützt werden – inklusive der Gewährung von Asyl. [...] [...] Die NSA und ihre Partner betreiben vermutlich seit Jahren Wirtschaftsspionage unter dem Deckmantel der Terrorismusabwehr. Anders sind verwanzte Büros, wie etwa die des Industriedienstleisters Ferrostaal, jedenfalls schwer zu erklären. Auch gibt es gezielte Programme zur Sammlung von sensiblen Informationen über politische Gegner, wie etwa deren Pornokonsum.
surveillance  state  Orwellian  NSA  GCHQ  Internet  Privacy  Privacy  human  rights  warrant  Big  Data  metadata  unintended  consequences  freedom  of  press  free  speech  Pressefreiheit  investigative  journalism  journalism  journalismus  BND  Europe  War  on  Terror  War  on  Drugs  organised  crime  backdoor  backdoors  encryption  Whistleblower  Political  Governance  corporate  abuse  of  power  code  of  conduct  self-censorship  corporate  espionage  Act  cyber  espionage  espionage  FISA  Court  FISAAA  Secret  Courts  UK  presidency  barackobama  David  Cameron  USA  Five  Eyes  Career  Politicians  ethical  beliefs  moral  beliefs  Unrechtsstaat 
february 2015 by asterisk2a
Apple may have compromised everyone’s security for access to China | PandoDaily
But if Apple really did provide access to the iPhone operating system’s source code, it should admit as much so people know the degree to which their security may be compromised, all for the sake of Apple’s business ambitions.
Appel  iPhone  China  cyber  security  internet  security  Wall  Street  Don't  be  evil  corporate  governance  surveillance  state  surveillance  Privacy  Privacy  USA  encryption  backdoor  man-in-the-middle  Whistleblower 
january 2015 by asterisk2a
« earlier      
per page:    204080120160

related tags

&  2.0  3D  4chan  9/11  Aaron  Absolute  abuse  accountability  accounting  Act  activism  activist  activists  advertisement  advice  AES  affairs  Agency  Agent  Agreement  AI  Air  Airbus  al-Qaida  Alan  algorithm  Alibaba  Amazon  Amendment  analytics  and  Android  Angela  Annie  AnonIB  anonymity  Anonymous  Antivirus  API  Appel  Appelbaum  Apple  application  artificial  Assange  attack  augmented  austerity  authentication  automation  awareness  AWS  backdoor  backdoors  backroom  Balances  barackobama  Barrett  be  beliefs  Bernie  Big  Bill  Bitdefender  black  Blair  blind  BND  book  Box  Bradley  Brexit  bribery  British  Brother  Brown  brute  buffer  Bug  bulk  business  cablegate  Cameron  campaign  Career  Carrier  CCC  CCTV  Celeb  Celebgate  Celebrity  censorship  Charter  Checks  Chelsea  Chilling  China  CIA  Cina  CITIZENFOUR  civic  civil  Clinton  cloud  Cloudstorage  code  Cold  collection  common  Communications  complex  complexity  computer  computing  conduct  confidence  conflict  conforming  conglomerate  Congress  consent  consequences  Conservative  Constitution  contract  cookie  copyright  corporate  corporatism  corruption  Court  Courts  Creative  Creatives  crime  cryptography  cryptopocalypse  cryptowar  culture  cyber  cyberattack  cyberespionage  cybersecurity  cyberwar  damage  Dark  data  Dataretention  DAU  David  davidcameron  DDoS  dealings  democracy  Democratic  democrats  denominator  Despotism  differentiate  differentiation  digital  digitalnatives  diplomacy  disarmament  disrupting  disruption  distrust  DNC  doctor  dogma  domestic  Don't  door  Dotcom  Double  Draft  Drake  DRIPA  Drive  Drone  Dropbox  Drugs  Eating  ECHELON  economic  Edward  EFF  Effect  election  Elizabeth  eMail  Empire  encryption  energy  engineering  Enigma  entrepeneurship  entrepreneur  entrepreneurial  entrepreneurship  entropy  Erdogan  error  espionage  espionagem  Establishment  ethical  ethics  Europe  European  Europol  evil  exploit  exploits  expression  extremism  Eyes  Facebook  factor  fairness  False  far-right  FBI  Fear  fearmongering  Firmware  First  FISA  FISAAA  Five  Flag  FOI  folly  for  force  forecast  foreign  foreignaffairs  FOSS  framing  FRance  free  freedom  freepress  freespeech  Future  G  G8  Game  Gap  Gaza-Israel  GCHQ  Gemalto  general  geopolitics  George  Germany  gesellschaft  Glenn  globalisation  globalization  Gmail  GNU  GNU/Linux  Google  gossip  governance  GPL  GPS  Greenwald  Grid  GroKo  groups  gun  gwbush  hacker  Hacking  Hacktivism  hat  Hater  Haters  Heartbleed  Hegemony  Hillary  HIPAA  history  Hollywood  homescreen  human  iCloud  idealism  ideology  image  imgur  immigration  Imperialism  industrial  Industry  information  infringement  injustice  innovation  innovator  integrity  intelligence  interdiction  interest  internet  Interpol  intervention  investigative  Investigatory  iPhone  IPO  Iraq  Iratemonk  Is  ISIL  ISIS  islamic  ISP  Israel  IT  Jacob  Jesselyn  journalism  journalismus  Julian  Justice  Kaspersky  KGB  Kim  knowledge  Laura  Lavabit  law  Leadership  leak  Lenovo  lesson  leverage  Levie  liberty  Linux  LLC  lobby  Lobbying  lobbyist  London  lowest  Lvabit  Lügenpresse  M  machine  Machon  Mail  Makers  malware  man-in-the-middle  Manning  manufactured  Manufacturing  markets  May  MD4  MD5  media  Meinungsfreiheit  Merkel  Met  Meta  metadata  Metropolitan  MI5  MI6  Microsoft  migration  military  military–industrial  mirror  mobile  mobilephone  model  moral  MPAA  Music  n00d  nasty  national  Nationalism  natives  neoconservatism  neoconservatives  neoliberal  neoliberalism  Net  netzpolitik  netzpolitik.org  Neutrality  nls_933w.dll  No  NRA  NSA  OAuth  objectification  of  oligarchy  on  online  Open  OpenSSL  Opportunism  opportunist  organised  Orwellian  Osborne  overflow  oversight  ownership  Palestine  party  password  passwords  Patriot  patriotact  patriotism  Pentago  Pentagon  perception  perma  perma-cookie  personal  PGP  phishing  Piracy  Platform  Play  pluralism  Poitras  Polarisation  Police  policy  political  Politicians  Politics  populism  Positioning  Postgeheimnis  power  powers  PR  prediction  predictions  presidency  presidential  press  Pressefreiheit  printing  PRISM  Privacy  Privileged  Process  productivity  Profile  profiling  profiteer  progress  promises  propaganda  protectionism  public  quantum  Radack  radicalism  RC4  Reaktionismus  Rechtsextremismus  Rechtsruck  recognition  Reddit  Regin  regulation  regulators  relations  Representation  republican  republicans  retention  Reverse  revolving  rights  Ring  rippers  Robotics  rootkit  RSA  Russia  S3  Sanders  scam  scandal  Scene  Schengen  Schmitz  science  Search  secret  security  securityr  selector  Selectors  self-censorship  self-regulation  sensitive  sentiment  Separation  Sexual  SHA-2  SHA4  short-term  Silicon  SIM  Skype  Smart  Smartphone  smoke  smoking  Snoopers  Snowden  social  society  Software  SOPA  Source  speech  spin  spot  SSH  ssl  Start-up  Start-Up  Stasi  state  Street  strenght  Strike  study  stuxnet  Sum  SuperFish  surveillance  Surveillance-Industrial  Swartz  System  Taliban  target  targeting  Tempora  Terror  The  TheFappening  theory  Theresa  thinking  Thomas  ThreatExchange  TISA  to  Toff  Tony  toobigtofail  Tor  TOR  Tories  torture  TOS  Totalitarian  Totalitarianism  TPM  TPP  tracking  trade  Trading  tragedy  transparency  Troll  Trolls  TrueCrypt  trust  trustagent  TTIP  Turing  Turkey  Twitter  two  two-factor  UK  unintended  Union  Unix  unknown  unknowns  unkown  unrecht  Unrechtsstaat  USA  USB  user  Valley  values  verification  vested  view  violence  Visa  Vorratsdatenspeicherung  VPN  Wall  wants  war  Warfare  warrant  Warren  Warrent  Washington  Watch  Wertegesellschaft  Westminster  WhatsApp  Whisper  Whisteblower  Whistleblower  white  Wikileaks  Windows  Wireless  wiretapping  WMD  Work  World  WW2  XKeyscore  Yahoo!  You  Zero  Zivilgesellschaft 

Copy this bookmark:



description:


tags: