asterisk2a + power + cyber   33

Draft snooper's charter 'fails on spying powers and privacy protections' | World news | The Guardian
Theresa May’s draft “snooper’s charter” bill fails to cover all the intrusive spying powers of the security agencies and lacks clarity in its privacy protections, a parliamentary committee has said. The intelligence and security committee said the draft legislation published by the home secretary suffered from a lack of sufficient time and preparation. It was evident that even those working on the legislation had not always been clear about what it was intended to achieve, it said.
Snoopers  Charter  Theresa  May  GCHQ  NSA  Five  Eyes  War  on  Terror  War  on  Drugs  organised  crime  cyber  crime  cyber  attack  Secret  Courts  Whistleblower  investigative  journalism  democracy  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Internet  Privacy  Privacy  self-censorship  repression  military–industrial  Hegemony  USA  UK  David  Cameron  Career  Politicians  Tories  neoconservatism  neoconservatives  nasty  party  Conservative  oversight  abuse  of  power  transparency  accountability  Separation  of  powers  Justice  System 
february 2016 by asterisk2a
Theresa May accused of rushing surveillance bill through back door | Politics | The Guardian
Home secretary gives committee three weeks to study ‘snooper’s charter’, despite having ruled out fast-tracking it after Paris attacks [...] The joint committee that scrutinised the previous “snooper’s charter” bill – the draft communications data bill – in 2012 sat for five months and held 13 public witness sessions over a six-week period. It also took evidence in private from the security services. //&! bit.ly/1lkbLjn - State computer hacking The bill gives powers for security services to hack in to phones, computers and networks worldwide in interests of national security. [ like environmental and animal rights activists ]
Snoopers  Charter  Theresa  May  nasty  party  Tories  Conservative  GCHQ  Surveillance-Industrial  Complex  surveillance  state  Orwellian  Dataretention  bulk  data  collection  democracy  David  Cameron  George  Osborne  Internet  Privacy  Privacy  human  rights  Secret  Courts  oversight  abuse  of  power  accountability  cyber  war  cyber  attack  TOR  Linux  encryption  Cryptopocalypse  cryptography  MI5  MI6 
november 2015 by asterisk2a
Überwachung in Großbritannien: Neues Gesetz vorgestellt - SPIEGEL ONLINE
Die Werbekampagne hat sich gelohnt. Am heutigen Mittwoch veröffentlichte Innenministerin Theresa May einen Gesetzentwurf (hier als PDF), der britischen Geheimdiensten noch mehr Macht verspricht. Die Spione können, sobald die sogenannte Investigatory Powers Bill vom Parlament verabschiedet wird, ganz legal das tun, was sie bislang ohne solide rechtliche Grundlage machten. Gleichzeitig sagte Innenministerin May, sie wolle die Aufsicht über die Geheimdienste stärken. [...] Theresa May betonte im Parlament, dass es nicht darum gehe, den gesamten Browserverlauf zu speichern, sondern nachvollziehen zu können, mit wem Verdächtige kommunizieren. [ jeder ist nun verdaechtig ] [ UK people seem not to care ]
Dataretention  Vorratsdatenspeicherung  Snoopers  Charter  Theresa  May  UK  Tories  Conservative  Party  neoconservatism  neoconservatives  GCHQ  War  on  Terror  extremism  Surveillance-Industrial  Complex  surveillance  state  British  Empire  NSA  human  rights  Internet  Privacy  Privacy  oversight  transparency  Separation  of  powers  injustice  Justice  System  Secret  Courts  Edward  Snowden  USA  encryption  Cryptopocalypse  cryptography  Wertegesellschaft  Orwellian  society  Big  Brother  abuse  of  power  democracy  lobbyist  lobby  Lobbying  military–industrial  profiteer  corporate  espionage  industrial  espionage  cyber  espionage  corporate  state  corporate  media  activists  activism 
november 2015 by asterisk2a
Alan Rusbridger takes aim at press over phone hacking and Snowden | Media | The Guardian
Former editor-in-chief of Guardian tells Society of Editors’ conference that use of surveillance powers to discover journalistic sources is ‘greatest scandal of all’ //&! David Cameron urged to reveal when MPs have been spied on Liberal Democrat leader Tim Farron demands to know which politicians have been placed under surveillance by the security services since 1966 - bit.ly/1LjcrhL
UK  USA  corporate  espionage  industrial  espionage  cyber  espionage  freedom  of  press  Pressefreiheit  freedom  of  expression  self-censorship  Surveillance-Industrial  Complex  surveillance  state  Orwellian  NSA  GCHQ  MI5  MI6  corporate  state  Career  Politicians  military–industrial  investigative  journalism  Whistleblower  journalismus  journalism  abuse  of  power 
october 2015 by asterisk2a
Pando: Sec. of Defense to Silicon Valley: “There is no limit to what we can achieve together"
Ash Carter announces a new public-private project and delivers a recruitment pitch. [...] a hawkish focus on his goal: to develop stronger private partnerships in Silicon Valley. // [ defence contractor ] // &! Andreessen: Pentagon Wants to Work With Silicon Startups - youtu.be/PTBV4rowPsg &! youtu.be/_lQWIFi0D4k "nation state wars" &! // &! IT Security needs time in stealth before production ready - youtu.be/VY6TUw3J9FY // &! The Takeaway - youtu.be/HlDfMi9Uzqc - attracting talent & repair relations post-Edward Snowden & 'state-subsidies' for Valley firms (defence/defense contracts) // &! youtu.be/C_qeUCU7N1o - rebuilding bridge between SV and Pentagon // youtube.com/watch?v=0dZs9wzQsZI
Pentagon  military–industrial  complex  Surveillance-Industrial  surveillance  state  NSA  FBI  CIA  Orwellian  GCHQ  Five  Eyes  interest  groups  vested  interest  Big  Data  abuse  of  power  technological  progress  Software  Is  Eating  The  World  World  Police  corporate  espionage  cyber  espionage  industrial  espionage  Europe  China  Israel  Russia  Japan  Cold  War  cyber  Drone  Warfare  Drone  Strike  NASA  Department  of  Defense  counter  culture  Silicon  Valley  Wall  Street  profit  maximisation  shareholder  value  Internet  Privacy  Privacy  cyber  attack  cyber  security  Net  Neutrality  IoT  PR  spin  doctor  public  relations  Edward  Snowden  Wikileaks  Whistleblower  Julian  Assange  Career  Politicians  presidency  barackobama  Chelsea  Manning  Defense  Contractor  trust  distrust  trustagent 
august 2015 by asterisk2a
Foreign Affairs Expert Leslie Gelb: Masters in Business (Audio) by Bloomberg View | Free Listening on SoundCloud
Leslie Gelb, wrote Pentagon Papers. Which Ellsberg leaked (Whistleblower) - bit.ly/1Lgsq2D // Back in the days, national interests and force was expressed in war and seldomly in economic embargos (Napoleon tried that against British Empire) and there were economic skirmishes (oil/diesel, rubber) in the run-up to WW2 and the first couple of months before USA officially entered WW2. TODAY! National interests are only expressed in economic terms with trade embargoes, tariffs, trade deals and protectionism. Only little military skirmishes here and there and when, the nation tries to hide them from the publics eye (through rouge nations for hire army/special forces, a nations secret services supplying the underground arms trade that doesn't show up on its balance sheet or one of their nations manufacturers. West excluded Russia from recent G8 summit in Munich and made it G7. Russia/Europe/USA playing game of chicken of economic escalation. Or using corporate actors & new cyber war!
Russia  protectionism  embargo  Iran  nuclear  power  USA  Latin  America  corporate  state  national  interest  Nationalism  Europe  UK  cyber  crime  cyber  war  NSA  GCHQ  Surveillance-Industrial  Complex  surveillance  state  Orwellian  corporate  espionage  industrial  espionage  cyber  espionage  Crimea  Crimea  Crisis  presidency  barackobama  vladimirputin  Putin  China  Asia  Pakistan  Drone  Strike  Drone  Warfare  Africa  history  foreign  affairs  foreign  policy  foreign  relations  Afghanistan  Irak  Israel  Gaza-Israel  conflict  Germany  Ukraine  Ukrain  Angela  Merkel  Pentagon  CIA  MI6  Japan  SouthChinaSea  South  Korea  military–industrial  military  intervention  IT  Security  collateral  damage  international  relations  Security  False  Flag  on  Terror  ISIS  al-Qaida  book  G7  G8  United  Nations  Security  Council  NATO  OPEC  Oil  price  Saudi  Arabia  Arab  League  Cuba  Vietnam  WMD  smoking  gun  Syria  Syrien 
august 2015 by asterisk2a
Pressure mounts over claims Police Scotland breached rules over spying on journalists (From Herald Scotland)
PRESSURE is mounting on ministers to take action on Police Scotland amid further criticism of the force over claims it illegally spied on a journalist to uncover sources. The force's elite Counter Corruption Unit (CCU) is said to have snooped on the reporter without getting judicial approval - a tactic which was banned on March 25 following a row over officers using the Regulation of Investigatory Powers Act (Ripa) to access journalists’ phone records, texts and emails. // [ endemic and systemic! you are not safe. period. ] // &! bbc.in/1OQEaGJ - Ministers questioned over Police Scotland 'spying' claims // &! bbc.in/1KUFPu9 &! bbc.in/1Maojno << time to get their story right!?
Met  Police  GCHQ  freedom  of  press  UK  journalismus  investigative  journalism  journalism  corporate  state  corporate  media  media  conglomerate  Pressefreiheit  Lügenpresse  Five  Eyes  NSA  Career  Politicians  No  Representation  democracy  Surveillance-Industrial  Complex  surveillance  state  Orwellian  military–industrial  2015  human  rights  Internet  Privacy  Privacy  Snoopers  Charter  Vorratsdatenspeicherung  abuse  of  power  corruption  manufactured  consent  populism  War  on  Terror  False  Flag  organised  crime  cyber  cyber  crime  Cryptopocalypse  cryptography  encryption  backdoors  backdoor  propaganda  Intelligence  Agency  Foreign  Intelligence  corporate  espionage  industrial  espionage  cyber  espionage  Nationalism  national  interest  domestic  affairs  affairs  policy  relations  MI5  MI6  Secret  Courts  FISA  Court  FISAAA 
august 2015 by asterisk2a
Sicherheitshysterie nach britischem Urteil gegen Vorratsdatenspeicherung: „Tausende Leben in Gefahr“ | netzpolitik.org
Die Notwendigkeit der technisierten Überwachung wird gar nicht mehr hinterfragt, die gerichtlichen Backpfeifen an die britische Regierung stattdessen in grotesker Weise kommentiert. So titelt beispielhaft der Telegraph in Anlehnung an eine Aussage der britischen Innenministerin Theresa May: Thousands of lives at risk after High Court rules snooping powers unlawful. // theguardian.com/world/surveillance - bit.ly/1fa4mQP // &! bit.ly/1CMnrUg &! bit.ly/1DoKqiZ - Why appeasing governments over encryption will never work. David Cameron & the director of the FBI have both asked for ‘backdoors’ to be included in encryption software [...] Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications, is worth reading in full. It concludes that proposals for backdoors are “unworkable in practice, raise enormous legal and ethical questions, and would undo progress on security at a time when internet vulnerabilities are causing extreme economic harm”.
Snoopers  Charter  Vorratsdatenspeicherung  DRIPA  data  retention  law  bulk  data  collection  propaganda  surveillance  surveillance  state  Orwellian  False  Flag  War  on  Terror  ISIS  ISIL  Surveillance-Industrial  Complex  military–industrial  UK  GCHQ  MI5  Met  Police  abuse  of  power  transparency  accountability  democracy  Secret  Courts  Five  Eyes  British  Empire  populism  Lügenpresse  manufactured  consent  corporate  state  NSA  Career  Politicians  Tony  Blair  presidency  barackobama  David  Cameron  society  Gesellschaft  European  Union  Internet  Privacy  Privacy  human  rights  self-censorship  encryption  Cryptopocalypse  backdoors  backdoor  FBI  MI6  cyber  corporate  espionage  industrial  espionage  cyber  espionage  Intelligence  Agency  Foreign  Intelligence  national  interest  protectionism  economic  damage  IT  Security  policy  folly  policy  error 
july 2015 by asterisk2a
Totale Kontrolle (ARTE Doku) - YouTube
"angriff auf das privatleben." // false feeling of safety. true criminals (not opportunists) are not fended off with personal surveillance installations. // Security is very wish wash and can not be easily defined. // False Flag organised crime, war on terror, ... to take step by step away some kind of remaining privacy and freedom. // NSA & Co sell their programs as reasonable and efficient (able to prevent X). No transparency. No accountability. // automatic verdaechdig // Chris Hedges & Noam Chomsky - Corporate State //
surveillance  state  Orwellian  Privacy  Internet  Privacy  human  rights  society  Stasi  2.0  Career  Politicians  Big  Data  democracy  abuse  of  power  False  Flag  vested  interest  interest  groups  Meta  Data  metadata  self-censorship  military–industrial  complex  NSA  Five  Eyes  freedom  bulk  collection  UK  USA  Europe  Germany  corporate  state  War  on  Terror  civil  liberty  Gesellschaft  National  Security  interest  Cryptopocalypse  cyber  encryption  Patriot  Act  corporate  espionage  industrial  espionage  GCHQ  BND  organised  crime  cyber  espionage  FISA  Court  Secret  Courts  Pentagon  Police  World  Police  Imperialism  Empire  Drone  Strike  Drone  Warfare  Totalitarianism 
june 2015 by asterisk2a
Chris Hedges - Our Only Hope Will Come Through Rebellion - 29th March 2014 - YouTube
military industrial complex does what it wants and asks and gets what it wants. // Truth is hidden. Decent is criminalised. // things are only to get worse. // protect corporate state and spy on other corporate states and corporate entities. // for-profit military industrial complex // 9/11 opportunist, false flag, to profit from program X to protect our nation // no warrent needed - https://en.wikipedia.org/wiki/Warrant_(law) // the corporate state has no incentive to give up Stasi 2.0 // >> = Totalitarian state // we have totalitarian structures! period. // reform can not come from those who are in the center of power and a implicit of the status quo ... meaning only a revolution through rebellion is the option. defying the law and opting for civil disobedience. moral and physical courage needed.
surveillance  state  NSA  GCHQ  Stasi  2.0  Orwellian  Five  Eyes  Cold  War  civil  liberty  Constitution  FISA  Court  FISAAA  Patriot  Act  military–industrial  complex  Whistleblower  democracy  oversight  transparency  accountability  Intelligence  Agency  abuse  of  power  Separation  of  powers  Career  Politicians  No  Representation  Congress  Washington  lobbyist  lobby  Lobbying  National  Security  False  Flag  Privacy  Internet  Privacy  USA  UK  Warrent  metadata  KGB  WMD  Iraq  War  War  on  Drugs  War  on  Terror  organised  crime  Politics  of  Fear  history  Empire  Drone  Strike  Drone  Warfare  Palestine  Gaza-Israel  conflict  Foreign  Intelligence  World  Police  World  G8  Europe  corporate  espionage  industrial  espionage  cyber  espionage  Cryptopocalypse  encryption  Edward  Snowden  Wikileaks  Julian  Assange  Torture  Pressefreiheit  Lügenpresse  media  conglomerate  presidency  barackobama  Angela  Merkel  opportunist  Opportunism  Wall  Street  trust  trustagent  Secret  Courts  Chelsea  Manning  corruption  self-censorship 
june 2015 by asterisk2a
Noam Chomsky: US is world's biggest terrorist - YouTube
self-inflicted extinction event. USA and Israel rouge states, and greatest threats to world peace. // // Greece debt owed to EU banks - advocates for haircut/debt jubilee. // Europes problems - no actual political and fiscal union. - technocrats failoure as well as leadership, policy and career politicians failure - symptoms; Protest Partei and no solidarity and "everyone for himself" mentality // Europe racist!!! xenophobic and antisemitic, // hope only in form by Syriza and Podemos, << protest party and rechtsruck right wingers wins in European Election 2014.
ecological  disaster  environmental  disaster  climate  change  crony  capitalism  Nuclear  War  geopolitics  climate  crisis  global  warming  Noam  Chomsky  extinction  AI  artificial  intelligence  democracy  Career  Politicians  short-term  thinking  short-term  view  Wall  Street  stakeholder  shared  economic  interest  shareholder  value  profit  maximisation  No  Representation  USA  Israel  Middle  East  World  Police  foreign  affairs  foreign  policy  foreign  relations  Europe  Russia  vladimirputin  Putin  disarmament  deterrent  Iran  India  Pakistan  Nuclear  weapon  power  Gaza-Israel  conflict  Drone  Strike  Drone  Warfare  ISIS  False  Flag  War  on  Terror  al-Qaida  military–industrial  complex  Torture  Syria  Syrien  presidency  Iraq  War  WMD  barackobama  China  cyberwar  cyber  cyber  espionage  Five  Eyes  NSA  UK  GCHQ  NATO  Ukraine  Ukrain  Cold  War  Iron  Curtain  Crimea  European  History  European  Union  Greece  PIGS 
june 2015 by asterisk2a
Danny Boyle: the Olympic opening ceremony would be done differently in 2015 - Newsnight - YouTube
do we want to give them the data, our lives?! it seems positive and benign, but it changes our lives in the long-term and we are only seen as data pools. // dave eggers novel the circle
Internet  Privacy  book  Facebook  Google  Big  Data  perma  cookie  Orwellian  State  surveillance  FISA  Court  FISAAA  Secret  Courts  NSA  GCHQ  Foreign  Intelligence  Intelligence  Agency  corruption  abuse  of  power  Privacy  human  rights  analytics  Vorratsdatenspeicherung  Five  Eyes  False  Flag  War  on  Terror  cyber  cyber  espionage  corporate  espionage  industrial  espionage  Microsoft  backdoors  backdoor  encryption  cryptography  Cryptopocalypse 
may 2015 by asterisk2a
Cyberangriff auf Bundestag: Offenbar auch Rechner von Regierungsmitgliedern betroffen - SPIEGEL ONLINE
[ if they were able to install a trojan/malware/bot - it is most likely to be the case of highly customized targeted phishing attack on peoples email address. could be gov backed. most likely (Israel, China, USA, UK, Russia, ...) New/customized, not recognizable by existing signatures known - thus antivirus useless, only recognizable by looking at logs and co. ] Fachleute halten es sogar für möglich, dass weite Teile der Bundestags-IT komplett neu konfiguriert werden müssen. [...] Sicherheitshalber wurden Ende vergangener Woche Teile des Bundestags-Systems zeitweise heruntergefahren. Darunter fielen offenbar auch Laufwerke des Parlamentarischen Untersuchungsausschusses zur Aufklärung der BND/NSA-Spionageaffäre. <<< [ Frage fuer die BPK wie kompetent sind Bundestagsabgeordnete? Sicherheitstraining? ] // 1 Tag spaeter bit.ly/1IPJmK7 Ermittler vermuten Geheimdienst hinter Cyberangriff &! bit.ly/1LcaCBI Die Bundesregierung zerstört aktiv [...] vertrauen. &! tcrn.ch/1R4xrLu bit.ly/1LpTngO
cyber  war  corporate  espionage  industrial  espionage  cyber  espionage  cyber  crime  cyber  security  cyber  attack  Germany  DAU  phishing  IT  password  security  GroKo  Career  Politicians  Angela  Merkel  trust  confidence  No  Representation  Vorratsdatenspeicherung  surveillance  state  Orwellian  BND  Internet  Privacy  Privacy  corruption  abuse  of  power  apathy  Protest  Kultur  short-term  thinking  short-term  view 
may 2015 by asterisk2a
Law changed to allow GCHQ hacking ... just as GCHQ hauled into court for hacking • The Register
[ unaccountable, free for all to hack anything that is in the domestic interest, can be corporate intelligence, trade secrets, patents, corporate documents & communications; Russia, China, Germany, Brazil, India. The NEW COLD WAR. see also 2015 BND affair with selectors. ] Government legislation to exempt GCHQ from prosecution on charges of illegal hacking has been passed and come into effect – apparently torpedoing an ongoing claim against the surveillance agency being heard by the Investigatory Powers Tribunal. Last July, a coalition of internet service providers and international organisations teamed up with Privacy International to take legal action against GCHQ. Their claim, which arrived in court today, has been hobbled by what the privacy warriors said was the revelation that the government had quietly ushered through legislation amending the Computer Misuse Act to exempt GCHQ and law enforcement from prosecution, and did so while the case was ongoing.
cyber  war  cyber  attack  GCHQ  on  Terror  organised  crime  on  Drugs  accountability  surveillance  state  Orwellian  2015  corporate  espionage  industrial  espionage  cyber  espionage  NSA  USA  UK  presidency  barackobama  David  Cameron  encryption  Europe  trade  secret  corporate  intelligence  Airbus  Five  Eyes  Agency  domestic  interest  abuse  of  power  corruption  FISA  Court  FISAAA  Patriot  Act  Act  Courts  Cold  Cold  2.0  BND  selector  Wall  Street  Internet  Privacy  IT  Security  geopolitics  Foreign  National  Security  globalisation  globalization 
may 2015 by asterisk2a
Sauerland-Zelle: Mutmaßlicher CIA-Mann war "der Chef" - Panorama | STERN.DE
Die Hintergründe der "Sauerland-Gruppe", die 2007 Terroranschläge in Deutschland geplant haben soll, werden immer mysteriöser: Ein mutmaßlicher Kontaktmann des US-Geheimdienstes CIA spielte bei der Attentatsvorbereitung eine größere Rolle als bislang bekannt. Von Rainer Nübel // history doesn't repeat, it rhymes --- http://en.wikipedia.org/wiki/Gulf_of_Tonkin_incident
False  Flag  CIA  NSA  Five  Eyes  War  on  Terror  BND  surveillance  state  Orwellian  Double  Agent  presidency  barackobama  USA  gwbush  georgewbush  history  World  Police  Middle  East  9/11  WMD  Foreign  Intelligence  corporate  espionage  industrial  espionage  cyber  espionage  geopolitics  Super  Power  affairs  policy 
may 2015 by asterisk2a
BBC iPlayer - HARDtalk - Dr Richard Haass - President of the Council on Foreign Relations
Sarah Montague speaks to Dr Richard Haass, president of the Council on Foreign Relations. He has worked in the State Department and advised US presidents, and he now believes we are witnessing the end of one era of world history and the dawn of another. A new 'era of disorder' - more chaotic and more dangerous than any time in a generation. He says American foreign policy is partly to blame and US authority has been diminished. So how dangerous is the world now? And what can be done about it? // http://downloads.bbc.co.uk/podcasts/worldservice/ht/ht_20150504-0830a.mp3 // &! Geopolitical thought leader Ian Bremmer issues a clarion call to America: redefine your place in the world, or the world will define it for you - Superpower: Three Choices for America's Role in the World Paperback – 28 May 2015 - http://www.amazon.co.uk/Superpower-Three-Choices-Americas-World/dp/024121677X/
foreign  relations  foreign  policy  USA  World  Police  War  on  Terror  nuclear  power  Middle  East  North  Korea  Iran  Europe  China  Russia  Iraq  War  Lybia  Intelligence  NSA  GCHQ  Five  Eyes  surveillance  state  Orwellian  cyber  cyber  attack  cyber  espionage  geopolitics 
may 2015 by asterisk2a
Kommentar: Warum die aktuellen Erkenntnisse über das Versagen des Kanzleramtes bei BND-Aufsicht schon lange abzusehen waren | netzpolitik.org
"Beihilfe." // &! Eiertanz: Viele, viele naive Fragen zum BND-Skandal - youtu.be/y9pRz5KQ6vo // &! Wirtschaftsspionage für Amerika? "Das Ganze ist ein Riesenskandal", sagt Hans-Christian Ströbele (Grüne) zur BND-Spitzelaffäre. - on.fb.me/1GznzV8 profiling of EU politicians, policy makers as well as EADS, EuroCopter and other stuff, shows that War on Terror, Drugs, and organised crime as a pretence is wrong to a certain extent, it shows that power corrupts and absolute power corrupts absolutely. // &! Der BND-Skandal - Worum geht's eigentlich? youtu.be/pcGzfv-Fndc // &! on.fb.me/1POvdPJ - Was ist mit der Bundeskanzlerin? Wann spricht sie zum BND-Skandal? // German intelligence agency knew NSA was spying on European leaders as early as 2008 - bit.ly/1DEvH3h "It was too worried about the NSA retaliating by limiting the information it shares." Stockholm Syndrome. No Leadership. Only Career Politicians.
surveillance  state  Orwellian  NSA  BND  cyber  espionage  corporate  espionage  industrial  espionage  Five  Eyes  GCHQ  Angela  Merkel  barackobama  presidency  GroKo  Career  Politicians  transparency  democracy  No  Representation  FBI  Torture  accountability  profiling  military–industrial  complex  cyber  crime  cyber  security  cyber  war  Foreign  Intelligence  policy  affairs  USA  World  Police  relations  corruption  abuse  of  power  Edward  Snowden  Privacy  Internet  Privacy  encryption  IT  National  security  cybersecurity  online  security 
april 2015 by asterisk2a
John Oliver Edward Snowden Interview - YouTube
language shapes thoughts. how you communicate and on what level. US elected official talk is always about "keeping America and Americans, safe." what % of baby boomers or millennial do knows what meda data, profiling, and big data is or do or how it can be leveraged. they know what a selfie and a selfie stick is. That's why Career Politicians and Lobby organisations hire PR people. CORPORATE (Wall Street) PR PEOPLE!!! Talking 5 minutes to the nation and saying nothing at all of concrete notion, IS CORPORATE PR SPEAK. Setting the tone for the public discourse, its sort of art and honed down to a science. // &! Last Week Tonight with John Oliver: Government Surveillance (HBO) >> https://youtu.be/XEVlyP4_11M >> Section 215 - bulk collection // principle, no to self-censorship
Edward  Snowden  surveillance  state  Orwellian  public  discourse  public  awareness  public  interest  public  perception  communication  language  Internet  Privacy  Privacy  Career  Politicians  No  Representation  Five  Eyes  public  relations  interest  groups  lobbyist  Lobbying  lobby  presidency  barackobama  public  opinion  publicrelations  Policy  Makers  social  cohesion  Millennials  short-term  thinking  short-term  view  crony  capitalism  Wall  Street  FISA  Court  FISAAA  Patriot  Act  War  on  Terror  False  Flag  military–industrial  complex  metadata  Vorratsdatenspeicherung  Intelligence  Agency  Foreign  Intelligence  World  Police  abuse  of  power  USA  UK  Imperialism  National  Security  vested  interest  interest  bulk  collection  reform  Constitution  corporate  espionage  industrial  espionage  cyber  espionage  Europe  Empire  British  Empire  CIA  self-censorship 
april 2015 by asterisk2a
Ideas at the House: Panel - The War on Whistleblowers and Their Publishers - YouTube
warrentless spying on journalists, including wiretapping, espionage, and hacking into accounts. -//- &! Glenn Greenwald's Infamous Battle with NPR's Dina Temple-Raston - https://www.youtube.com/watch?v=C2RxQpESxoI &! &!
Whistleblower  investigative  journalism  journalism  journalismus  barackobama  presidency  surveillance  state  Orwellian  NSA  CIA  White  House  Washington  freedom  of  press  of  Information  Act  FISA  Court  FISAAA  First  Amendment  Information  wants  to  be  free  cyber  war  Separation  of  powers  abuse  of  power  Career  Politicians  Law  &  Justice  Justice  System  Judiciary  on  Terror  Drone  Warfare  on  Drugs  organised  crime  human  rights  Privacy  Internet  Privacy  Secret  Courts 
february 2015 by asterisk2a
President Obama: The Re/code Interview - YouTube
slick downplay, comparing cyber war & industrial, coroporate cyber espionage (breaking in into Gemalto for SIM encryption keys) with basketball. And also tapping the phone of Angela Merkel ... &! http://youtu.be/td7Dcsco-WY "Obama on the state of the world: the extended Vox conversation" - is he a realist or just a coward!? /// >> http://www.bbc.co.uk/news/technology-31545050 &! http://www.spiegel.de/netzwelt/netzpolitik/nsa-und-gchq-haben-sim-karten-schluessel-von-gemalto-erbeutet-a-1019515.html &! Silicon Valley subbed him on his proposals and road show 20 min away from their door, is a tell tale what they think of him saying one thing and what the NSA&Co put them through and demands (see Yahoo!'s case with the FISA Court) - tcrn.ch/17ovyqD &! If it were a private person were hack into and steal Gemalto encryption keys, the person would be thrown in jail FOREVER! youtu.be/bIpNXh9Nh9k?t=16m32s &! NSA, GCHQ, Five Eyes like to bully people to do X for them & drop possible charges.
presidency  barackobama  NSA  USA  Gemalto  SIM  encryption  cyber  war  GCHQ  governance  on  Terror  Cryptopocalypse  cryptography  corporate  espionagem  industrial  espionage  espionage  cyber  espionage  UK  Five  Eyes  Internet  Privacy  Privacy  human  rights  Stasi  Stasi  2.0  organised  crime  on  Drugs  ethical  machine  Checks  and  Balances  Separation  of  powers  democracy  abuse  of  power  David  Cameron  cyber  crime  cyber  attack  cyber  securityr  IT  Security  surveillance  state  Orwellian  FISA  Court  FISAAA  Secret  Courts  Silicon  Valley 
february 2015 by asterisk2a
The NSA Reportedly Stole Millions Of SIM Encryption Keys To Gather Private Data | TechCrunch
The American National Security Agency (NSA), and the British Government Communications Headquarters (GCHQ), similar clandestine intelligence agencies, stole SIM card encryption keys from a manufacturer, allowing the groups to decrypt global cellular communications data. [...] “NSA and GCHQ basically have the keys to decyrpting mobile communications anywhere in the world, even without the participation of local communication carriers (which, even if not much, acts as some check on intelligence agency behavior). It’s the equivalent of these agencies having printed doorkeys for the front doors to millions or even billions of homes around the world, just in case they one day decided they needed to get in. Frankly, people should have no faith in the security of global mobile communications.” >> CLU’s Christopher Soghoian - "Steal millions of crypto keys and then complain publicly that encryption is a problem. The UK and US govs are shameless."
NSA  GCHQ  governance  War  on  Terror  encryption  Cryptopocalypse  cryptography  corporate  espionage  industrial  espionage  espionage  cyber  espionage  USA  UK  Five  Eyes  Internet  Privacy  Privacy  human  rights  Stasi  Stasi  2.0  presidency  barackobama  organised  crime  War  on  Drugs  ethical  machine  Checks  and  Balances  Separation  of  powers  democracy  abuse  of  power  David  Cameron  Gemalto  cyber  crime  cyber  attack  cyber  security  cyber  IT  surveillance  state  Orwellian 
february 2015 by asterisk2a
Linux Journal - Wikipedia, the free encyclopedia
In early July 2014 it was revealed that the NSA's XKeyscore program targeted readers of Linux Journal, which the NSA considers an "extremist forum". // &! NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance - http://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance // &! NSA targets the privacy-conscious - http://daserste.ndr.de/panorama/aktuell/NSA-targets-the-privacy-conscious,nsa230.html "Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA." - visiting site X puts you on watch list/collect data list - ie Wikileaks, Tor, Linux Journal, CCC unter anderem !+& bit.ly/1sZSWV9 >> leads to self-censorship like in East Germany.
NSA  Internet  Privacy  Privacy  human  rights  XKeyscore  Linux  CCC  activism  activists  Hacktivism  target  targeting  GCHQ  encryption  cryptography  Cryptopocalypse  IT  Security  cyber  cyber  war  cyber  espionage  corporate  espionage  industrial  espionage  espionage  FISA  Court  FISAAA  Foreign  Intelligence  Five  Eyes  presidency  barackobama  Stasi  Stasi  2.0  history  backdoor  backdoors  abuse  of  power  surveillance  state  Orwellian  Big  Data  Meta  Data  Unix  Google  Search  Tor  VPN  anonymity  self-censorship  free  speech  freedom  of  press  freespeech  free  press  Pressefreiheit  Meinungsfreiheit  Information  wants  to  be  free  knowledge  M 
february 2015 by asterisk2a
President Obama Is Waging a War on Hackers | WIRED
war on whistleblower and investigative journalism. // "In next week’s State of the Union address, President Obama will propose new laws against hacking that could make either retweeting or clicking on the above (fictional) link illegal. The new laws make it a felony to intentionally access unauthorized information even if it’s been posted to a public website. The new laws make it a felony to traffic in information like passwords, where “trafficking” includes posting a link. [...] But they are blunt political solutions which reflect no technical understanding of the problem." // &! huffingtonpost.com/2015/01/20/obama-hackers_n_6511700.html &! entrepreneur.com/article/242099 &! america.aljazeera.com/opinions/2015/1/in-obamas-war-on-hackers-everyone-loses.html "Both steps would not only be ineffective at improving cybersecurity in any practical sense but also further empower the government to go after activists and journalists such as Barrett Brown,
Anti-Hacking  Legislation  presidency  barackobama  cyber  war  Whistleblower  investigative  journalism  journalism  journalismus  Barrett  Brown  Aaron  Swartz  STEM  Career  Politicians  policy  error  policy  folly  NSA  CIA  surveillance  state  Orwellian  free  speech  freedom  of  press  Information  wants  to  be  free  Pressefreiheit  Meinungsfreiheit  white  hat  hacker  free  press  Checks  and  Balances  Separation  of  powers  democracy  accountability  Political  Governance  corporate  oversight  abuse  of  power  Foreign  Intelligence  Five  Eyes  GCHQ 
february 2015 by asterisk2a
UK government asks: How's our hacking?
UK gov releases equipment interference guidelines for spy & law enforcement agencies; the guidelines never calls it hacking but 'interference activities; Deputy Director @ Privacy International Eric King (@e3i5) says it's the UK gov's attempt to grant itself some of the most intrusive powers. // "This is the first time that the agencies have admitted that they are in the hacking business," Eric King, the deputy director of London-based digital rights watchdog Privacy International, told Mashable. King said that it amounts to a belated attempt to give these activities a scrap of legal basis, in the face of a lawsuit filed by his group last year, which challenged the legality of the UK intelligence service GCHQ's hacking activities, revealed by Edward Snowden documents. For King, the document is basically an attempt by the UK government to grant itself "some of the most invasive and intrusive" powers it has at its disposal.
UK  GCHQ  David  Cameron  surveillance  state  Orwellian  cyber  espionage  corporate  espionage  espionage  Intelligence  Agency  Foreign  Intelligence  presidency  barackobama  NSA  CIA  FBI  relations  policy  affairs  Politics  Political  Governance  corporate  ethical  machine  Europe  Five  Eyes  Career  Politicians  abuse  of  power  transparency  accountability  trust  trustagent  confidence  democracy  unintended  consequences  Internet  Privacy  Privacy  human  rights  War  on  Terror  War  on  Drugs  organised  crime  encryption  backdoor  backdoors  wiretapping  interdiction 
february 2015 by asterisk2a
Here’s how reporters are reacting to Snowden’s revelations | PandoDaily
The global surveillance programs revealed by Edward Snowden have caused journalists to change how they operate, question what the government knows about them, and consider abandoning investigative reporting, according to a survey from the Pew Research Center. A significant number of the journalists surveyed said they had changed their behavior, whether it’s how they store sensitive files (49 percent), how they communicate with other journalists (29 percent), whether they’ve reached out to a source (13 percent), or pursued a specific story (2 percent). Many are also convinced the government is gathering information about them. Some 64 percent of journalists believed intelligence agencies had “probably collected data” about them. (The other 36 percent, as “InfoSec Taylor Swift” joked, must not read the news.)
investigative  journalism  journalism  journalismus  presidency  barackobama  surveillance  state  Orwellian  encryption  Internet  Privacy  Privacy  Whistleblower  NSA  CIA  FBI  GCHQ  BND  Five  Eyes  Wikileaks  Intelligence  Agency  foreign  relations  foreign  policy  foreign  affairs  Career  Politicians  Politics  David  Cameron  UK  USA  Europe  Espionage  Act  corporate  cyber  FISA  Court  FISAAA  Secret  Courts  leverage  Power  Play  Political  Governance  oversight  accountability  trust  trustagent  confidence  democracy  transparency  No  Representation  short-term  view  short-term  thinking  unintended  consequences  Lügenpresse  Pressefreiheit  freedom  of  press  wiretapping  folly  science  error  distrust  fairness  Law  &  Justice  Justice  System  complexity 
february 2015 by asterisk2a
Europarat warnt: “Massenüberwachung ist eine grundlegende Bedrohung der Menschenrechte” | netzpolitik.org
>> Bürger sollen nur überwacht werden dürfen, wenn ein Gerichtsbeschluss und ein begründeter Verdacht vorliegt. [...] Das Ausnutzen von Backdoors, 0-day-exploits oder der Schwächung von Verschlüsselungsstandards soll verboten werden. [...] Whistleblower, die illegale Überwachungsaktivitäten aufdecken, sollen zuverlässig und effektiv geschützt werden – inklusive der Gewährung von Asyl. [...] [...] Die NSA und ihre Partner betreiben vermutlich seit Jahren Wirtschaftsspionage unter dem Deckmantel der Terrorismusabwehr. Anders sind verwanzte Büros, wie etwa die des Industriedienstleisters Ferrostaal, jedenfalls schwer zu erklären. Auch gibt es gezielte Programme zur Sammlung von sensiblen Informationen über politische Gegner, wie etwa deren Pornokonsum.
surveillance  state  Orwellian  NSA  GCHQ  Internet  Privacy  Privacy  human  rights  warrant  Big  Data  metadata  unintended  consequences  freedom  of  press  free  speech  Pressefreiheit  investigative  journalism  journalism  journalismus  BND  Europe  War  on  Terror  War  on  Drugs  organised  crime  backdoor  backdoors  encryption  Whistleblower  Political  Governance  corporate  abuse  of  power  code  of  conduct  self-censorship  corporate  espionage  Act  cyber  espionage  espionage  FISA  Court  FISAAA  Secret  Courts  UK  presidency  barackobama  David  Cameron  USA  Five  Eyes  Career  Politicians  ethical  beliefs  moral  beliefs  Unrechtsstaat 
february 2015 by asterisk2a

related tags

&  2.0  9/11  Aaron  abuse  accountability  Act  activism  activists  affairs  Afghanistan  Africa  Agency  Agent  AI  Airbus  al-Qaida  Amendment  America  analytics  and  Angela  anonymity  Anti-Hacking  apathy  Arab  Arabia  artificial  Asia  Assange  attack  awareness  backdoor  backdoors  Balances  barackobama  Barrett  be  beliefs  Big  Blair  blind  BND  book  British  Brother  Brown  bulk  cablegate  Cameron  capitalism  Career  CCC  change  Charter  Checks  Chelsea  China  Chomsky  CIA  civil  climate  code  cohesion  Cold  collateral  collection  communication  complex  complexity  conduct  confidence  conflict  conglomerate  Congress  consent  consequences  Conservative  Constitution  Contractor  cookie  corporate  corruption  Council  counter  Court  Courts  crime  Crimea  crisis  crony  cryptography  Cryptopocalypse  Cuba  culture  Curtain  cyber  cybersecurity  cyberwar  damage  data  Dataretention  DAU  David  Defense  democracy  Department  deterrent  disarmament  disaster  discourse  distrust  doctor  domestic  Double  DRIPA  Drone  Drugs  East  Eating  ecological  economic  Edward  efficiency  embargo  Empire  encryption  environmental  error  espionage  espionagem  ethical  Europe  European  Europol  exploits  expression  extinction  extremism  Eyes  Facebook  fairness  False  FBI  Fear  First  FISA  FISAAA  Five  Flag  folly  foreign  free  freedom  freespeech  G7  G8  Gaza-Israel  GCHQ  Gemalto  geopolitics  George  georgewbush  Germany  Gesellschaft  global  globalisation  globalization  Google  governance  Greece  GroKo  groups  gun  gwbush  hacker  Hacktivism  hat  Hegemony  history  House  human  Imperialism  India  industrial  Information  injustice  intelligence  interdiction  interest  international  Internet  Interpol  intervention  investigative  IoT  Irak  Iran  Iraq  Iron  Is  ISIL  ISIS  ISP  Israel  IT  Japan  journalism  journalismus  Judiciary  Julian  Justice  KGB  knowledge  Korea  Kultur  language  Latin  law  League  Legislation  leverage  liberty  Linux  lobby  Lobbying  lobbyist  Lybia  Lügenpresse  M  machine  Makers  Manning  manufactured  maximisation  May  media  Meinungsfreiheit  Merkel  Met  Meta  metadata  MI5  MI6  Microsoft  Middle  military  military–industrial  Millennials  moral  NASA  nasty  national  Nationalism  Nations  NATO  neoconservatism  neoconservatives  Net  Neutrality  No  Noam  North  NSA  nuclear  of  Oil  on  online  OPEC  opinion  Opportunism  opportunist  organised  Orwellian  Osborne  oversight  Pakistan  Palestine  party  password  Patriot  patriotact  Pentago  Pentagon  perception  perma  phishing  PIGS  Play  Police  policy  political  Politicians  Politics  populism  power  powers  PR  presidency  press  Pressefreiheit  price  Privacy  Profile  profiling  profit  profiteer  progress  propaganda  protectionism  Protest  public  publicrelations  Putin  Reaktionismus  reform  relations  Representation  repression  retention  rights  Russia  Saudi  science  Search  secret  security  securityr  selector  self-censorship  Separation  shared  shareholder  short-term  Silicon  SIM  smoking  Snoopers  Snowden  social  society  Software  South  SouthChinaSea  speech  spin  spot  stakeholder  Stasi  state  STEM  Street  Strike  Super  surveillance  Surveillance-Industrial  Swartz  Syria  Syrien  System  Taliban  target  targeting  technological  Tempora  Terror  The  theory  Theresa  thinking  TISA  to  Tony  Tor  TOR  Tories  Torture  Totalitarianism  TPP  trade  transparency  trust  trustagent  TTIP  UK  Ukrain  Ukraine  unintended  Union  United  Unix  Unrechtsstaat  USA  Valley  value  vested  Vietnam  view  vladimirputin  Vorratsdatenspeicherung  VPN  Wall  wants  war  Warfare  warming  warrant  Warrent  Washington  waste  weapon  Wertegesellschaft  Whistleblower  white  Wikileaks  wiretapping  WMD  World  XKeyscore 

Copy this bookmark:



description:


tags: