On Monday the Supreme Court declined to hear a petition from the Electronic Privacy Information Center (EPIC) that sought to force the Department of Homeland Security to release details of a secret “killswitch” protocol to shut down cellphone and internet service during emergencies.
EPIC has been fighting since 2011 to release the details of the program, which is known as Standard Operating Procedure 303. EPIC writes, “On March 9, 2006, the National Communications System (‘NCS’) approved SOP 303, however it was never released to the public. This secret document codifies a ‘shutdown and restoration process for use by commercial and private wireless networks during national crisis.’” Continue reading »
In 2015, the iron fist of power clamped down on humanity, from warfare to terrorism (I repeat myself) to surveillance, police brutality, and corporate hegemony. The environment was repeatedly decimated, the health of citizens was constantly put at risk, and the justice system and media alike were perverted to serve the interests of the powers that be.
However, while 2015 was discouraging for more reasons than most of us can count, many of the year’s most underreported stories evidence not only a widespread pattern that explicitly reveals the nature of power, but pushback from human beings worldwide on a path toward a better world.
1. CISA Pushed Through the Senate, Effectively Clamping Down on Internet Freedom: For years, Congress has attempted to legalize corporate and state control of the internet. In 2011, they attempted to pass PIPA and SOPA, companion bills slammed by internet and tech companies and ultimately defeated after overwhelming public outcry. Then they passed CISPA — which the president threatened to veto, having caught wind of the public’s opposition to heavy regulation of the internet (earlier this year, Obama reversed his position). However, corporate interests, like Hollywood’s studio monopoly, kept lawmakers’ tenacity afloat. Continue reading »
Tags: 1984, 9/11, Activism, Barack Obama, Brain cancer, Cancer, Cannabis, Children, CIA, CISA, Corporate Media, DIA, Dictatorship, Drugs, Environment, Fascism, George Orwell, Global News, Government, Internet, ISIL, ISIS, Journalism, Law, Marijuana, Military, Nestle, New World Order, Obama administration, Pentagon, Politics, Society, Surveillance, Terrorism, TPP, U.S., Water, water wars
Last week, Congress passed CISA by hiding it in the middle of a sure-to-pass spending bill, and Obama signed it into law … even though the Department of Homeland Security had previously said that the bill will HURT national security and destroy privacy (numerous experts agreed).
And – just like with previous spying laws – the government has a secret interpretation of CISA which will make it even worse.
So why was the bill passed? Continue reading »
Tags: 1984, Barack Obama, Big Brother, CIA, CISA, Dictatorship, Fascism, FBI, George Orwell, Global News, Government, Internet, Law, New World Order, NSA, Obama administration, Politics, Society, Surveillance, U.S.
Update: CISA is now the law: OBAMA SIGNS SPENDING, TAX BILL THAT REPEALS OIL EXPORT BAN
* * *
Back in 2014, civil liberties and privacy advocates were up in arms when the government tried to quietly push through the Cybersecurity Information Sharing Act, or CISA, a law which would allow federal agencies – including the NSA – to share cybersecurity, and really any information with private corporations “notwithstanding any other provision of law.” The most vocal complaint involved CISA’s information-sharing channel, which was ostensibly created for responding quickly to hacks and breaches, and which provided a loophole in privacy laws that enabled intelligence and law enforcement surveillance without a warrant.
Ironically, in its earlier version, CISA had drawn the opposition of tech firms including Apple, Twitter, Reddit, as well as the Business Software Alliance, the Computer and Communications Industry Association and many others including countless politicians and, most amusingly, the White House itself. Continue reading »
Tags: 1984, Barack Obama, Big Brother, CIA, CISA, Dictatorship, Fascism, FBI, George Orwell, Global News, Government, Internet, Law, New World Order, NSA, Obama administration, Politics, Surveillance, U.S.
The controversial Cybersecurity Information Sharing Act (CISA) may be added as a provision in the looming government budget bill.
(TRUTHINMEDIA) The Cybersecurity Information Sharing Act (CISA) was officially approved by the Senate back in October. Since that time, the bill has languished in committee as lawmakers sought to align the Senate bill with the versions passed by the House of Representatives in April.
CISA is designed to allow private companies to easily share threat intelligence with government agencies. Sharing of intelligence is supposed to be voluntary. Critics of the bill say the provisions will only increase the indiscriminate monitoring of legal activity by giving companies immunity from lawsuits for sharing information with the government. Continue reading »
The Pentagon has been given formal approval to start an online propaganda campaign against the Islamic State following a recent push by the US Department of Defense (DoD).
Congress approved the National Defense Authorization Act for 2016 last week and included in it a whole section (1056) on “Information operations and engagement technology demonstrations.”
The section states that the Secretary of Defense “should develop creative and agile concepts, technologies, and strategies across all available media to most effectively reach target audiences, and to counter and degrade the ability of adversaries and potential adversaries to persuade, inspire, and recruit inside areas of hostilities or in other areas in direct support of the objectives of commanders.”
“The Islamic State has grown that strong due to the irresponsible policy of the United States,” exclaimed Russian PM Dmitry Medvedev this morning, demanding that “really consolidated efforts” are needed to counter ISIS’ terrorist threats. This comes just hours after President Obama toughened his rhetoric, vowing that the global coalition formed to destroy ISIS “will not relent,” adding, rather oddly, that the group responsible for the Paris terror attacks is “a bunch of killers with good social media.”
Obama toughens up…
Obama was hit with a wave of criticism in the wake of the terrorists’ attacks in France and Lebanon, which left hundreds dead, having described that burst of violence as a “setback” in the battle against ISIS. So now, as CNN reports, U.S. President Barack Obama toughened his rhetoric against ISIS at a weekend press conference in Malaysia… Continue reading »
Get off Facebook NOW, and NEVER hit anyone elses profile or click a like again, EVER, Facebook is now BANNED for anyone with an ounce of awareness
Via a bug Facebook installs when you visit their web site or click a like, even if you have no account with facebook Facebook can keep on monitoring visitors permanently forever after, including all phone numbers, PASSWORDS TO OTHER WEB SITES, every site you ever visit ever again, and more.
There has been a new development with Facebook. Facebook now plants a bug on your computer that hands them your phone numbers, browsing history, and tracks all future history as well as all photos and anything else you do on your computer if you ever hit the web site or ever click a like, even if you have no facebook account. Facebook has gone full hostile, AVOID FACEBOOK LIKE THE PLAGUE.
How do I know this? Easy, Belgium ordered them to stop doing it, and published the court case. Continue reading »
The following story exemplifies the human spirit at its best, and provides an example of the kinds of things communities can achieve when they bound together to overcome adversity. The sky really is the limit, and as Doe Bay Internet Users Association founder, Chris Sutton, defiantly proclaims:
I think relying on corporate America to come save us all is just not going to happen, but if we all get together and share our resources, communities can do this themselves and be more resilient.
Here are excerpts from the excellent ArsTechnica article, How a Group of Neighbors Created Their Own Internet Service: Continue reading »
In the wake of Edward Snowden’s revelations detailing pervasive secretive and unconstitutional government spying, many tech companies have taken steps to secure users privacy via end-to-end encryption.
Of all the world’s “leaders,” one person has stood out from the crowd by consistently advocating the most destructive, ignorant and authoritarian solutions. That man is UK Prime Minister David Cameron.
I’ve highlighted this fact time and time again here at Liberty Blitzkrieg. Here are a few examples in case you need some context: Continue reading »
Police are to be given the power to view everyone’s entire internet history in a new surveillance bill to be published next week, according to reports.
The proposed legislation will make it a legal requirement for telecoms and internet service providers to retain all of the web browsing history for all customers for a period of 12 months, according to the Daily Telegraph.
Authorities such as the police, intelligence services and the National Crime Agency would be able to access specific web addresses people had visited, but would need approval from a judge to view the content of websites, emails and social media messages. Continue reading »
There’s a privacy destroying bill moving through Congress called the Cybersecurity Information Sharing Act, or CISA, and it’s imperative that the American public stop it in its tracks. Here are a few bullet points on the bill from Fight for the Future:
- All privacy policies effectively null and void. Companies can share any private user data with the government, without a warrant, as long as the government says it is being used for a “cybersecurity” purpose.
- In exchange, companies are given blanket immunity from civil and criminal laws, like fraud, money laundering, or illegal wiretapping (if a violation was committed or exposed in the process of sharing data).
- Data is shared with a wide array of government agencies, from the FBI and NSA, to the IRS and local law enforcement. Many of these agencies have been breached within the last year and have outdated security systems, opening up the doors to even more cyber attacks.
- Companies that play along can get otherwise classified intelligence data from the government, including private information about their competitors.
While the Constitution protects Americans from the federal government, private companies don’t care about your 4th Amendment rights, particularly if you waive them in a “terms of service” agreement. CISA would essentially allow the U.S. government to violate the U.S. Constitution by coercing companies to provide them with data on American citizens it would not otherwise be allowed to collect on its own.
You know things are not well in the world when you hear claims that the Prime Minister of Great Britain had sex with a dead pig’s head and you barely flinch. That’s because sexual relations with farm animal carcasses simply pales in comparison to the man’s disastrous, authoritarian political positions.
In his latest act of verbal diarrhea, David Cameron has gone on the offensive…against Twitter. Little did he know it, but he’s actually quite late in his perceived “insight” into those who use the social media platform. For instance, it was over two years ago when Saudi authorities made their position quite clear. Here’s a excerpt from the post, Saudi Religious Police Chief Goes on the Attack…Against Twitter: Continue reading »
The very foundation of the free Internet is under severe threat from copyright laws that could ban independent media outlets, according to Matt Drudge. “I had a Supreme Court Justice tell me it’s over for me,” said Drudge, warning web users that they were being pushed “pawn-like” into the cyber “ghettos” of Twitter, Facebook and Instagram.
On Monday, we learned that global “leaders” had come to an agreement on the infamous Trans Pacific Partnership, or TPP. While discouraging, this doesn’t mean the game is over – far from it.
Although politicians have come to a secret agreement, this democracy killing, corporate monstrosity still has to pass the U.S. Congress. So it’s now up to all of us to create an insurmountable degree of opposition and make sure this thing is dead on arrival. Continue reading »
British intelligence has been running a secret programme ‘Karma Police’ to track the browsing activity of internet users around the world. It analyses users’ online habits, helps to build a person’s web profile and identify suspicious activities.
The United Nations has disgraced itself immeasurably over the past month or so.
In case you missed the following stories, I suggest catching up now:
Fresh off the scene from those two epic embarrassments, the UN now wants to tell governments of the world how to censor the internet. I wish I was kidding.
Published on Sep 6, 2015
Mozilla yesterday detailed a security attack on its bug tracker and testing tool Bugzilla, as well as the steps it is taking to mitigate a repeat incident. In short, a hacker compromised the service, stole security-sensitive information, and used it to attack Firefox users.
Bugzilla is open-source software that has been adopted by a variety of organizations in addition to Mozilla: WebKit, the Linux kernel, FreeBSD, Gnome, KDE, Apache, Red Hat, Eclipse, and LibreOffice. While Bugzilla is mostly public, access to security-sensitive information is restricted so that only certain privileged users can access it. Following the attack, Mozilla has now beefed up security on those accounts.
This British gentlemen does not even have an internet connection, because he knows that the government can (and does!) upload child porn unto computers of unwanted people and then come knocking at their door:
Highly recommended to listen to what he has to say.
Nov 13, 2013
Following reports that someone was trying to set-up WeAreChange’s Luke Rudkowski and OathKeepers’ Stewart Rhodes, as well as an eerie e-mail from a group calling themselves “Political Hackerz Squad” claiming that it was trying to set-up dozens of alternative media figures with child porn (and claiming credit for attacks on Rudkowski/Rhodes), Truthstream Media was alerted that email attachments are being sent to prominent people posing as “Melissa Melton” and appearing to request an interview before attaching alleged child porn sent out by unknown provocateurs. These agents declared that they were “soldiers in a digital war”; in the case of Truthstream, they used an e-mail that doesn’t belong to our site but appears to as it used Melissa’s name. Please know that we are under attack; we need your prayers and support.
And what could possibly go wrong?
– The Cyber Wars Begin: Obama Says US “Must Retaliate” Against China For Historic Data Breach (ZeroHedge, Aug 1, 2015):
On Friday, we highlighted a “secret” NSA map which purports to show every Chinese cyber attack on US targets over the past five years. “The prizes that China pilfered during its ‘intrusions’ included everything from specifications for hybrid cars to formulas for pharmaceutical products to details about U.S. military and civilian air traffic control systems,” intelligence sources told NBC, who broke the story.
The release of the map marked the culmination of a cyber attack propaganda campaign which began with accusations that North Korea had attempted to sabotage Sony, reached peak absurdity when Penn State claimed Chinese spies had taken control of the campus engineering department, and turned serious when Washington blamed China for what was deemed “the largest theft of US government data ever.” “Whether all of this is cause for the Pentagon to activate the ‘offensive’ component of its brand new cyber strategy remains to be seen,” we said yesterday.
As it turns out, the Office of Personnel Management breach will indeed be used to justify a cyber “retaliation”against China, because as The New York Times notes, “the hacking attack was so vast in scope and ambition that the usual practices for dealing with traditional espionage cases [do] not apply.” Here’s more:
The Obama administration has determined that it must retaliate against China for the theft of the personal information of more than 20 million Americans from the databases of the Office of Personnel Management, but it is still struggling to decide what it can do without prompting an escalating cyberconflict. Continue reading »
– Facebook’s solar-powered internet plane looks like a stealth bomber (The Verge, July 30, 2015):
Meet the flying ISP
Facebook’s plans to become a flying internet service provider for the developing world are coming to fruition. The company today introduced Aquila, a high-flying, long-endurance plane that will bring basic internet access to the developing world. A working model of the plane is now ready for testing, Facebook said.
Facebook’s shallow, V-shaped plane has the wingspan of a Boeing 737. But even fully loaded down with communications gear, Aquila only weighs between 880 to 1,000 lbs — about a third the weight of a Prius. “When deployed, it will be able to circle a remote region for up to 90 days, beaming connectivity down to people from an altitude of 60,000 to 90,000 [feet],” the company said in a blog post. This means the planes will be flying at an altitude above commercial aircraft, and even above the weather. Continue reading »
– Ashley Madison Hacked: America’s 37 Million ‘Cheaters’ About To Be Exposed (ZeroHedge, July 19, 2015):
Two months ago, AdultFriendFinder was hacked, exposing
fuck buddyfriend-finding federal employees among its 3.5 million user ‘exposure’. Today, as KrebsOnSecurity reports, large caches of data stolen from online cheating site AshleyMadison.com have been posted online by an individual or group that claims to have completely compromised the company’s user databases, financial records and other proprietary information (including profiles with all the customers’ secret sexual fantasies). The hacker group “The Impact Team” manifesto concludes, “too bad for those [37 million] men, they’re cheating dirtbags and deserve no such discretion.”
(Pictured: Proxyham by Benjamin Caudill / Rhino Security Labs)
Data collection and invasive monitoring of American citizens has been at the forefront of government activities for decades. After revelations by Edward Snowden in recent years, the fringe conspiracy theorists who warned of Big Brother surveillance and had been laughed at by the general population were finally proven right.But despite the literal hundreds of thousands of pages of information about government snooping and the Congressional “investigations” that followed, nothing has been done to curb the unabated violations of Americans’ Constitutional rights to be secure in their homes and personal effects.
Thus, as always, the free market began developing its own solutions. Earlier this year an inventor by the name of Benjamin Caudill announced a device he dubbed the ProxyHam which was going to literally change everything about how those concerned with privacy could connect to the internet: Continue reading »
– Top Computer Security Expert Warns – David Cameron’s Plan to Ban Encryption Would “Destroy the Internet” (Liberty Blitzkrieg, July 10, 2015):
BUSINESS INSIDER: What was your immediate reaction to Cameron’s proposals?
Bruce Schneier: My immediate reaction was disbelief, followed by confusion and despair. When I first read about Cameron’s remarks, I was convinced he had no idea what he was really proposing. The idea is so preposterous that it was hard to imagine it being seriously suggested. But while Cameron might not understand what he’s saying, surely he has advisers that do. Maybe he didn’t listen to them. Maybe they aren’t capable of telling him that what he’s saying doesn’t make sense. I don’t understand UK politics sufficiently well to know what was going on in the background. I don’t know anything about Cameron’s tech background. But the only possibly explanation is that he didn’t realize the full extent of what he was saying.
Then I wondered why he would even wish for such a thing? Does he realize that this is the sort of thing that only authoritarian governments do? Again, my knowledge of the UK is limited, but I assume they are a free country that champions liberty.
– From the Business Insider article: David Cameron’s Proposed Encryption Ban Would ‘Destroy the Internet’
I’ve discussed UK Prime Minister David Cameron’s idiotic, futile and extremely dangerous scheme to ban encryption previously here at Liberty Blitzkrieg. Most recently, in the post, Britain’s “War on Terror” Insanity Continues – David Cameron Declares War on Encryption, in which I explained how Cameron immediately seized upon the terrorist attacks in France to propose more fascist nonsense: Continue reading »
– Thousands queue for ‘most exclusive website’ to see… (RT, July 4, 2015):
Thanks to curiosity, something mysterious known as the “most exclusive website” has made international headlines recently. Thousands of people are waiting in line to be allowed onto a website which only serves one person at a time, for 60 seconds.
As of Friday, almost 1.5 million minutes were “spent waiting to be exclusive” on the page created by Justin Foley of Ohio. Millions still have no idea what’s contained on the website – until their ticket comes up.
May 5, 2015
Without this epic stockpiling of non-farm inventory which will have to be liquidated at some point (and at a very low price) Q1 GDP would have been -2.5%.
Tags: Banking, Barack Obama, Bonds, Collapse, Debt, Economy, EU, Europe, Fed, Federal Reserve, Global News, Gold, Government, Greece, Healthcare, Internet, Obama administration, Obamacare, Politics, Silver, U.S.
Dr. Paul Craig Roberts was Assistant Secretary of the Treasury during President Reagan’s first term. He was Associate Editor of the Wall Street Journal. He has held numerous academic appointments, including the William E. Simon Chair, Center for Strategic and International Studies, Georgetown University, and Senior Research Fellow, Hoover Institution, Stanford University.
– Truth Is Washington’s Enemy — Paul Craig Roberts (April 21, 2015):
US Representative Ed Royce (R, CA) is busy at work destroying the possibility of truth being spoken in the US. On April 15 at a hearing before the House Committee on Foreign Affairs of which Royce is chairman, Royce made use of two minor presstitutes to help him redefine all who take exception to Washington’s lies as “threats” who belong to a deranged pro-Russian propaganda cult.
Washington’s problem is that whereas Washington controls the print and TV media in the US and its vassal states in Europe, Canada, Australia, Ukraine, and Japan, Washington does not control Internet sites, such as this one, or media, such as RT, of non-vassal states. Consequently, Washington’s lies are subject to challenge, and as people lose confidence in Western print and TV media because of the propaganda content, Washington’s agendas, which depend on lies, are experiencing rougher sledding. Continue reading »
Tags: Barack Obama, Bloggers, Blogs, DHS, FEMA Camps, Global News, Government, Halliburton, Homeland Security, Internet, Journalism, New World Order, Obama administration, Paul Craig Roberts, Politics, propaganda, Society, Terrorism, U.S., Ukraine