In Odessa — the same city where the Ukrainian civil war started on 2 May 2014 with a massacre of opponents that had been carefully planned by a team connected to the U.S. White House — there are reported to be two bloggers for the “Voice of Odessa” political site who were seized by the Security Bureau of Ukraine on April 7th, and whose “whereabouts are unknown.” This report appeared in the local Odessa News.
The “Voice of Odessa” site was formed right after the massacre, in order to get an independent investigation and prosecution of the perpetrators of that massacre, in which officially 46 people were burned, shot and clubbed to death, but unofficial estimates run over 200, all victims who have not been heard from since, and some of whom had allegedly even been abducted from hospitals after the massacre.Continue reading »
The U.S. government started keeping secret records of Americans’ international telephone calls nearly a decade before the Sept. 11 terrorist attacks, harvesting billions of calls in a program that provided a blueprint for the far broader National Security Agency surveillance that followed.
For more than two decades, the Justice Department and the Drug Enforcement Administration amassed logs of virtually all telephone calls from the USA to as many as 116 countries linked to drug trafficking, current and former officials involved with the operation said. Continue reading »
There are very few government checks on what America’s sweeping surveillance programs are capable of doing. John Oliver sits down with Edward Snowden to discuss the NSA, the balance between privacy and security, and dick-pics.
In recent months, Facebook has been quietly holding talks with at least half a dozen media companies about hosting their content inside Facebook rather than making users tap a link to go to an external site.
The new proposal by Facebook carries another risk for publishers: the loss of valuable consumer data. When readers click on an article, an array of tracking tools allow the host site to collect valuable information on who they are, how often they visit and what else they have done on the web.
And if Facebook pushes beyond the experimental stage and makes content hosted on the site commonplace, those who do not participate in the program could lose substantial traffic — a factor that has played into the thinking of some publishers. Their articles might load more slowly than their competitors’, and over time readers might avoid those sites.
Last night, I came across an incredibly important article from the New York Times, which described Facebook’s plan to provide direct access to other websites’ content in exchange for some sort of advertising partnership. The implications of this are so huge that at this point I have far more questions than answers.
The exceptionally broad new surveillance bill lets the government do nearly unlimited warrantless mass surveillance, even of lawyer-client privileged communications, and bans warrant canaries, making it an offense to “disclose information about the existence or non-existence” of a warrant to spy on journalists.
Despite that move away from retaining communications metadata by the EU and continuing concerns in the US about the National Security Agency’s bulk phone metadata spying program, the Australian government was able to push through the amendments implementing data retention thanks to the support of the main opposition party. Labor agreed to vote in favor of the Bill once a requirement to use special “journalist information warrants” was introduced for access to journalists’ metadata, with a view to shielding their sources. No warrant is required for obtaining the metadata of other classes of users, not even privileged communications between lawyers and their clients. Even for journalists, the extra protection is weak, and the definition of what constitutes a journalist is rather narrow—bloggers and occasional writers are probably not covered. Continue reading »
Nothing you write, say, text, tweet or share via phone or computer is private anymore. As constitutional law professor Garrett Epps points out, “Big Brother is watching…. Big Brother may be watching you right now, and you may never know. Since 9/11, our national life has changed forever. Surveillance is the new normal.”
This is the reality of the internet-dependent, plugged-in life of most Americans today.Continue reading »
RESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept.
The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released. Continue reading »
The National Vaccine Information Center has issued an alert for Texans to help stop forced vaccination and government coercion in their home state. A total of nine bills are currently pending in the Texas state legislature that threaten medical choice and fundamental human rights.
These laws are the extension of the current wave of vaccine hysteria sweeping America thanks to an aggressive new push toward medical fascism by the mainstream media.
These bills blatantly violate the American Medical Association’s published Code of Ethics which require informed consent for all medical interventions. But medical extremism in America today is not bound by anything resembling medical ethics, and if these Texas lawmakers get their way, every person living in Texas will be tracked like dogs with a government-run vaccine status database that will almost certainly be used to conduct house-to-house SWAT raids and arrests of those who refuse to be vaccinated. Continue reading »
The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world’s computers, according to cyber researchers and former operatives.
That long-sought and closely guarded ability was part of a cluster of spying programs discovered by Kaspersky Lab, the Moscow-based security software maker that has exposed a series of Western cyberespionage operations.
Kaspersky said it found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria. The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, Kaspersky said. (reut.rs/1L5knm0) Continue reading »
Here come the “information sharing and analysis organizations”, or ISAOs.
* * *
In the aftermath of the Snowden whistleblowing scandal which has now all but been forgotten, there was a brief period when it seemed the growth of the US spying apparatus would be halted if not put into reverse. Those days are long forgotten and later today Obama is expected to to sign an executive order “that aims to make it easier for the government to share classified cyberthreat information with companies.”
The spin, as proposed by the WSJ, is that “this will be effort designed to spur collaboration and deter hackers, the White House said.” In reality what Obama’s latest executive order will do, is expand the universe of entities that has access to the trove of private confidential data contained in the vast government spying apparatus, which as has been made all too clear now focuses as much on US citizens as it does on legitimate foreign threats, and further eviscerate the concept of individual privacy in the US. Continue reading »
If Americans were honest with themselves they would acknowledge that the Republic is no more. We now live in a police state. If we do not recognize and resist this development, freedom and prosperity for all Americans will continue to deteriorate. All liberties in America today are under siege.
It didn’t happen overnight. It took many years of neglect for our liberties to be given away so casually for a promise of security from the politicians. The tragic part is that the more security was promised — physical and economic — the less liberty was protected.
With cradle-to-grave welfare protecting all citizens from any mistakes and a perpetual global war on terrorism, which a majority of Americans were convinced was absolutely necessary for our survival, our security and prosperity has been sacrificed.
It was all based on lies and ignorance. Many came to believe that their best interests were served by giving up a little freedom now and then to gain a better life. Continue reading »
Feds’ position on decoy cell-site towers continues anti-privacy theme.
The Federal Bureau of Investigation is taking the position that court warrants are not required when deploying cell-site simulators in public places. Nicknamed “stingrays,” the devices are decoy cell towers that capture locations and identities of mobile phone users and can intercept calls and texts.
The FBI made its position known during private briefings with staff members of Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) and Sen. Chuck Grassley (R-Iowa). In response, the two lawmakers wrote Attorney General Eric Holder and Homeland Security chief Jeh Johnson, maintaining they were “concerned about whether the FBI and other law enforcement agencies have adequately considered the privacy interests” of Americans.
The National Security Agency today released reports on intelligence collection that may have violated the law or U.S. policy over more than a decade, including unauthorized surveillance of Americans’ overseas communications.
The NSA, responding to a Freedom of Information Act lawsuit from the American Civil Liberties Union, released a series of required quarterly and annual reports to the President’s Intelligence Oversight Board that cover the period from the fourth quarter of 2001 to the second quarter of 2013. Continue reading »
The campaign to rein in the surveillance of Americans by the National Security Agency (NSA) has become even more difficult. Instead, Congress has used a set of provisions to expand the agency’s data-gathering power.
By way of two pieces of legislation, Congress maintained and expanded the NSA’s surveillance powers. In a bill now headed for President Barack Obama’s desk, Congress gave the agency what civil liberties advocates argue is an unprecedented authority to collect and store data belonging to American citizens. Continue reading »
Anonymous leaks government communication detailing real-time cell phone surveillance
An audio recording leaked by the hacktivist group Anonymous appears to prove that Chicago police used an IMSI catcher, commonly referred to as a Stingray, to intercept phone calls during an Eric Garner protest Thursday evening.
IMSI catchers, small devices that mimic cell phone towers, give police and government agencies the ability to capture people’s cellular data in real-time. The audio, posted to the official Anonymous Twitter account Friday, reveals a conversation between the CPIC, Chicago’s Homeland Security-run Fusion Center, and a police officer spying on an alleged protest leader.
Chicago police and CPIC discuss cell phone surveillance at 01:05
“Yeah, just uhh, the one of the girls is kind of an organizer here, um, she’s been on her phone a lot,” an unknown government employee told CPIC. “Are you guys picking up any, uh, any, uh, information, uh, where they’re going, possibly?” Continue reading »
Surveillance conducted by British intelligence agency GCHQ does not contravene human rights, a tribunal has heard, despite warnings from civil and internet liberties activists.
The decision was made by the Investigatory Powers Tribunal (IPT), after the case was brought to British courts by a collection of civil liberties groups including Privacy International, Amnesty International and Liberty earlier this year.
According to the IPT, it could only find one area of surveillance procedures that they were concerned about, regarding whether they would breach internet users’ right to privacy. Continue reading »
The U.S. Department of Justice is putting devices that emulate cellphone towers in Cessna aircraft and flying them around the country to track the locations of cell phones, a practice that targets criminal suspects but may also affect thousands of U.S. citizens, according to a news report Thursday.The program is run by the Department of Justice’s U.S. Marshals Service and has been in operation since at least 2007, according to the report in the Wall Street Journal, which cited two unnamed sources. The aircraft are flown out of at least five metropolitan-area airports and can cover most of the U.S. population, it said.
Cell phones are programmed to connect to whichever nearby cell tower has the strongest signal. The fake cell towers trick phones into thinking they have the strongest signal, then read the devices’ unique registration numbers when they connect, the Journal report says. Continue reading »
“But she did learn that Snowden was running more than one Tor exit node, and that he was trying to get some of his buddies at “work”to set up additional Tor nodes…
H’mmm….So Snowden running powerful Tor nodes and trying to get his NSA colleagues to run them, too?
I reached out to Sandvik for comment. She didn’t reply. But Wired’s Poulsen suggested that running Tor nodes and throwing a crypto party was a pet privacy project for Snowden. “Even as he was thinking globally, he was acting locally.”
But it’s hard to imagine a guy with top secret security clearance in the midst of planning to steal a huge cache of secrets would risk running a Tor node to help out the privacy cause. But then, who hell knows what any of this means.
I guess it’s fitting that Tor’s logo is an onion — because the more layers you peel and the deeper you get, the less things make sense and the more you realize that there is no end or bottom to it. It’s hard to get any straight answers — or even know what questions you should be asking.
In that way, the Tor Project more resembles a spook project than a tool designed by a culture that values accountability or transparency.”
That’s how you can easily know that you may be investigating a CIA/NSA project run by TPTB.
Everything with them is utterly and totally compartmentalized.
“The United States government can’t simply run an anonymity system for everybody and then use it themselves only. Because then every time a connection came from it people would say, “Oh, it’s another CIA agent.” If those are the only people using the network.”—Roger Dingledine, co-founder of the Tor Network, 2004
In early July, hacker Jacob Appelbaum and two other security experts published a blockbuster story in conjunction with the German press. They had obtained leaked top secret NSA documents and source code showing that the surveillance agency had targeted and potentially penetrated the Tor Network, a widely used privacy tool considered to be the holy grail of online anonymity. Continue reading »