mouthporn.net
#spying – @h4x0r3d on Tumblr
Avatar

through h4x0r3d's eyes

@h4x0r3d / h4x0r3d.tumblr.com

+-------------------------------+ .:[h4x0r3d@Hackerzlair]:. +-------------------------------+ .:[Links]:. > KOPIMI > HACKER EMBLEM > DATALOVE! > CASCADIA > ABOUT.ME #CYBERWHALEWARRIOR #DGR +-------------------------------+
+-------------------------------+
Avatar

#pwnzd

Apology letter written for illegally spying on the senate By CIA accidentally released

The documents of the US government that were expected to remain out of reach in the coming years have been got hold of by Jason Leopold of FOIA staffers. The CIA would have definitely thought that one of the documents would remain its little secret for the coming years.

On July 28, 2014, the CIA director wrote a letter to senators Dianne Feinstein and Saxby Chambliss — the chairwoman of the Senate Intelligence Committee (SSCI) and the panel’s ranking Republican, respectively. In it, he admitted that the CIA’s penetration of the computer network used by committee staffers reviewing the agency’s torture program — a breach for which Feinstein and Chambliss had long demanded accountability — was improper and violated agreements the Intelligence Committee had made with the CIA.

However, the letter was never sent. The CIA threw out its Inspector General’s report on the breach and instead charged the Senate of immodesty and carried out an in-house “investigation” clearing the CIA of illegal behavior.

The letter was never sent or signed by Brennan. In the hope that the letter would never been seen again, it was filed somewhere away in the CIA’s archives. However, it was accidentally handed over to Jason Leopold much to the CIA’s embarrassment resulting in additional humiliation.

After VICE News received the documents, the CIA contacted us and said Brennan’s draft letter had been released by mistake. The agency asked that we refrain from posting it.
We declined the CIA’s request.

No official confirmation has come yet from CIA regarding any wrongdoing (such as the document it did not want to be released but entered into the public record), and still, there’s an acknowledgement of guilt in the hands of the public. Senator Feinstein asserted that everything that could be violated in a single act was violated making it a little difficult to defend actions.

Feinstein wrote to Brennan on January 23, 2014 and told him she consulted with the Senate’s legal counsel, who informed her that the CIA’s search of the Senate’s computer network “may have been inconsistent with the separation of powers principles embodied in the Constitution and essential to effective congressional oversight of intelligence activities.”
“Second,” her letter continued, “the search may have violated the Fourth Amendment, the Speech and Debate Clause of the Constitution, various statutes (including federal criminal statutes, such as the Computer Fraud and Abuse Act and Executive Order 12333,” which says it’s unlawful for the CIA to conduct domestic spying.

It looks like someone in the CIA already knew that what it did was clearly wrong and also probably illegal; however, the top management was persistent on not accepting it, as a result, that it even did not send an apology letter. It would have remained a complete secret had not someone mistakenly goofed up and handed over the unsigned letter in a FOIA response deposit.

Source: Techdirt

Source: techworm.net
Avatar

We are pleased to announce that the Wikimedia Foundation is signing the Necessary and Proportionate Principles on the application of human rights to surveillance.

Privacy on the Internet is closely connected to our mission to disseminate free knowledge.[1] We strive to provide a platform for users from all over the world to exercise their free expression right to share and study educational content. There are circumstances when contributors need to remain anonymous when working on the Wikimedia projects. To that end, the projects allow people to edit under a pseudonym, without providing any personal information, and without even creating an account. We want community members to feel comfortable when working on the projects. And we strongly oppose mass surveillance by any government or entity.

Although the recent conversation about internet surveillance was spurred by the revelation of a US government program, PRISM, a report issued by the United Nations Special Rapporteur on the Freedom of Opinion and Expression makes it clear that surveillance by governments is global, ubiquitous, and generally unchecked. The Necessary and Proportionate Principles are intended to provide a framework for human rights laws to address modern surveillance technologies.[2] They demand that governments respect international law and human rights by complying with basic principles such as:

  • Proportionality: Surveillance of communications is highly intrusive and implicates privacy rights and freedom of expression. This should be carefully weighed against any benefit sought to be achieved.
  • User Notification: Individuals need to know if they will be the subject of surveillance and have enough time and information to appeal the decision.
  • Transparency: Countries must be transparent about the extent of surveillance and the techniques employed.
  • Integrity of Communications and Systems: Governments should not compel ISPs or hardware and software vendors to build monitoring capability into their systems.

The Necessary and Proportionate Principles project was led by several groups, including the Electronic Frontier Foundation, Access, and Privacy International. The principles were developed through a consultation with civil society groups and international experts in communications surveillance law, policy, and technology. So far, the Principles have been advocated by over 400 organizations and many individuals. The signatories include Wikimedia Mexico and several Wikimedians. Today, we are proud to join their efforts.

Yana Welinder Legal Counsel, Wikimedia Foundation[3]

  1. As we previously discussed, the Foundation believes that government surveillance can compromise our values of freedom of speech and access to information.
  2. For more information about the purpose of the Principles, see here.
  3. Special thanks to Roshni Patel, WMF Privacy Fellow, for her work on this blog post.
Avatar

Celebrities against NSA spying. ~ "Stop Watching Us: The Video" #StopTheNSA #F11 #DataLove (by EFForg) ~ StopWatching.us is a coalition of more than 100 public advocacy organizations and companies from across the political spectrum. Join the movement at https://rally.stopwatching.us. This video harnesses the voices of celebrities, activists, legal experts, and other prominent figures in speaking out against mass surveillance by the NSA. Please share widely to help us spread the message that we will not stand for the dragnet surveillance of our communications. The Electronic Frontier Foundation (EFF) is a nonprofit civil liberties law and advocacy center that has been fighting the NSA's unconstitutional spying for years. Learn more at https://eff.org.

Source: youtube.com
Avatar

#NSA #Whistleblower Russ Tice - Where's the Pushback? ~ http://www.accuracy.org/nsa-veterans-and-whistleblowers-respond-to-obama-speech/&session_token=xGlED4uI7gabllRrP--CCc4fRCV8MTM5MjA4NzMwMEAxMzkyMDAwOTAw http://en.wikipedia.org/wiki/Russ_Tice ----------------------------------------­------------------------------------ http://LeakSource.wordpress.com https://twitter.com/LeakSourceNews

Source: youtube.com
Avatar

Identifiable images of bystanders extracted from corneal reflections - @_@

~

http://dx.plos.org/10.1371/journal.po... Animated zoom on the cornea of a high-resolution photographic subject. The zoom begins with a passport photo-style framing of the subject, and ends with a full face close-up of a bystander captured in the subject's corneal reflection. Successive movie frames represent a linear magnification of 6%. Each frame was resized to 720 pixels wide x 540 pixels high using bicubic interpolation to reduce high spatial frequency noise. Contrast was enhanced separately for each frame using the Auto Contrast function in Adobe Photoshop to improve definition. The image sequence was then converted to movie format for viewing.

Source: youtube.com
Avatar

Billions of dollars annually are being used to fund operations conducted by the United States intelligence community, the likes of which allow the government to eavesdrop on emails, listen to world leaders’ phone calls and about everything in-between.

One thing that budget hasn’t bought, however, is subtlety. The US National Reconnaissance Office launched a top-secret surveillance satellite into space Thursday evening, and the official emblem for the spy agency’s latest mission is, well, certainly accurate, to say the least.

The Office of the Director of National Intelligence live-tweeted Thursday’s launch from Vandenberg Air Force Base in California, and throughout the course of the ordeal made no effort to ignore the logo for the NROL-39 mission.

The latest spy satellite to be sent into orbit by the NRO can be recognized by its seal: a malevolent octopus with furrowed brows that also happens to be wrapping its tentacles around all corners of the Earth.

Nothing is beyond our reach,” the NRO boasts on the bottom half of the emblem just below the most sinister-looking cephalopod likely ever to be sent into space.

Along with the National Security Agency and more than a dozen others, the NRO is one of 16 federal offices under the directive of DNI James Clapper and is responsible for building and operating the spy satellites used to collect intelligence around the world. NRO-gathered intelligence was reportedly instrumental in the mission that brought US Navy SEAL’s to the home of former al-Qaeda leader Osama bin Laden in 2011, and decades earlier the agency launched a school-bus sized satellite into orbit to spy on Soviets at the height of the Cold War.

In preparation for launch, the NROL-39 payload, encapsulated within a 5-meter diameter payload faring, is transported and mated to its United Launch Alliance (ULA) Atlas V booster at Vandenberg's Space Launch Complex-3. (Photo from www.ulalaunch.com)

This time around the ODNI says the satellite’s payload is mostly classified, but did admit over Twitter that around a dozen mini satellites funded by both the NRO and NASA will be brought along to orbit as well. Another thing they didn’t bother to acknowledge, of course, is how the lack-of-subtlety apparent in the Earth-strangling octopus emblem could quickly be used by critics of the US intelligence community as fodder to further condemn the government for admitting to their sheer and unmatched ability to control the world’s information.

Thursday’s launch of the latest NRO satellite occurred almost exactly six-month-to-the-day after The Guardian and Washington Post newspapers published the first of what has since been revealed to be a trove of leaked national security document showing proof of the NSA’s widespread and extensive ability to monitor people around the world. On June 6 those papers first disclosed evidence in which the NSA was documented to demand telephony metadata from millions of people daily, and a steady stream of leaked files attributed to former intelligence contractor Edward Snowden have since captivated the world while also raising a number of questions.

A United Launch Alliance (ULA) Atlas V rocket carrying a payload for the National Reconnaissance Office (NRO) lifted off from Space Launch Complex-3 on Dec. 5 at 11:14 p.m. (Photo from www.ulalaunch.com)

For half a year now, leaked NSA documents have let the world learn that the US monitors the phone habits of not just Americans, but also foreigners sitting atop the governments of allied nations.

Reporters with access to the cache of pilfered papers have reportedly released only a sliver of what’s been reported to be 50,000 documents during those six months, but the response has already been widespread. The leaders of countries such as Brazil and Germany have lashed out at the NSA’s behavior, and DNI Clapper and his deputy manning the NSA, Gen. Keith Alexander, have easily become two of the most embattled public figures in Washington.

That being said, you’d think ODNI would reconsider launching a new spy satellite. Or maybe even not put an octopus strangling the Earth on the outside.

"You may want to downplay the massive dragnet spying thing right now,” Chris Soghoian, the chief technologist at the American Civil Liberties Union, tweeted Thursday. “This logo isn't helping."

According to a top-secret budget document released by Snowden and first reported on in August, the NRO is in the midst of modernizing their signals intelligence, geospatial and communications system to replace current capabilities.

Looking at the NROL-39 logo, people could be forgiven for mistaking it for a version of the Lovecraftian elder god Cthulhu, who wants to swallow the Earth whole. But that is not the only National Reconnaissance Office emblem with an interesting spin on the space-spying theme: others include Masonic motifs, superhero ones and a few more that, frankly, defy easy classification.

Avatar

As environmentalists began ratcheting up pressure against Canada's tar sands three years ago, one of the world's biggest strategic consulting firms was tapped to help the North American oil industry figure out how to handle the mounting activism. The resulting document, published online by WikiLeaks, offers another window into how oil and gas companies have been scrambling to deal with unrelenting opposition to their growth plans.

The document identifies nearly two-dozen environmental organizations leading the anti-oil sands movement and puts them into four categories: radicals, idealists, realists and opportunists—with how-to's for managing each. It also reveals that the worst-case scenario presented to industry about the movement's growing influence seems to have come to life.

The December 2010 presentation by Strategic Forecasting, or Stratfor, a global intelligence firm based in Texas, mostly advised oil sands companies to ignore or limit reaction to the then-burgeoning tar sands opposition movement because "activists lack influence in politics." But there was a buried warning for industry under one scenario: Letting the movement grow unopposed may bring about "the most significant environmental campaign of the decade."

"This worst-case scenario is exactly what has happened," partly because opposition to tar sands development has expanded beyond nonprofit groups to include individual activists concerned about climate change, said Mark Floegel, a senior investigator for Greenpeace. "The more people in America see Superstorm Sandys or tornadoes in Chicago, the more they are waking up and joining the fight."

[View the documents at Inside Climate News]

Since the presentation was prepared, civil disobedience and protests against the tar sands have sprung up from coast to coast. The movement has helped delay President Obama's decision on the Keystone XL pipeline—designed to funnel Canada's landlocked oil sands crude to refineries on the Gulf Coast—and has held up another contentious pipeline in Canada, the Northern Gateway to the Pacific Coast.

The Power Point document, titled "Oil Sands Market Campaigns," was recently made public by WikiLeaks, part of a larger release of hacked files from Stratfor, whose clients include the Departments of Homeland Security and Defense, Lockheed Martin, Raytheon and the American Petroleum Institute, the oil industry lobby. It appears to have been created for Calgary-based petroleum giant Suncor Energy, Canada's largest oil sands producer.

The company told InsideClimate News that it did not hire Stratfor and never saw such a presentation. Suncor is mentioned 11 times in the document's 35 pages and all of Stratfor's advice seems to be directed at the energy company. For example, one slide says, "Campaign ends quickly with a resolution along the lines Suncor had wanted." In several emails released by WikiLeaks, Stratfor employees discuss a $14,890 payment Suncor owes the company for two completed projects, though no details were provided.

The presentation is the latest in a series of revelations that suggest energy companies—which for most of their history seemed unfazed by activists—have been looking for ways to dilute environmentalists' growing influence.

Earlier this year, TransCanada, the Canadian energy company behind the Keystone XL, briefed Nebraska law enforcement authorities on how to prosecute demonstrators protesting the 1,200-mile project. In 2011, Range Resources, an oil and gas company, allegedly hired combat veterans with experience in psychological warfare to squash opposition of natural gas drilling.

"The Stratfor presentation isn't a complete surprise," said Scott Parkin, a senior campaigner for the Rainforest Action Network and volunteer organizer for Rising Tide North America, both grassroots environmental groups. "As opposition has grown, coal, oil and gas companies are all starting to put more money into responding—from surveillance to protection to public relations."

Who Was Targeted?

For each of Stratfor's categories of environmental activist—radicals, idealists, realists and opportunists—the presentation explains how their campaigns are structured and how the fossil fuel industry could deal with them.

Three grassroots organizations—Rising Tide North America, Oil Change International and the Indigenous Environmental Network—were labeled radicals. Greenpeace and the Rainforest Action Network were classified as a cross between radicals and idealists. Sierra Club, the nation's largest environmental group, Amnesty International and Communities for a Better Environment, among others, were labeled idealists. Several mainstream environmental groups, including the National Wildlife Federation, World Wildlife Fund, Natural Resources Defense Council and Ceres, a nonprofit that organizes businesses, investors and public interest groups, were called realists.

It then lays out tactics the groups would use to push for change. They include holding demonstrations outside annual meetings and marketing events, generating fear of oil spills and other environmental disasters, targeting CEOs and their families, collaborating with other green groups, and splitting the fossil fuel industry on the issue by praising companies working with activists and publicly shaming those that aren't.

The presentation says that while environmental groups are publicly fighting to stop the expansion of the oil sands, their "real demand" is for fossil fuel companies to adopt a "global code of conduct"—a set of best practices not required by law, but that take into consideration things like greenhouse gas reduction policies and human rights.

The Power Point also describes all the ways fossil fuel companies like Suncor could choose to react to green groups' campaigns, such as limiting contact with the organizations, intentionally delaying negotiations, developing its own environmental initiatives to overshadow activists' demands, or simply not responding. It provides the pros and cons of each public relations decision, as well as the best- and worst-case outcomes for each.

For example, Stratfor said that choosing not to respond could be useful because in 2010, "activists are not stopping oil sands' growth and they have no power in Alberta or Ottawa. Chance of success with U.S. government is slim." The best outcome from a no-response strategy, according to the presentation, is that green "groups move to fracturing [natural gas fracking] or some other venue to press for the first major code of conduct."

Stratfor would not answer questions about the presentation because it has a policy not to comment on any of the WikiLeaks documents.

Several environmental groups named in the Stratfor presentation said they weren't surprised by the consulting firm's assessment of their work, but were disappointed, especially by its assumption that all they wanted was a code of conduct.

"The environmental community has been very united in saying that we need to stop tar sands expansion and clean up the mess already made there," said Susan Casey-Lefkowitz, director of the Natural Resources Defense Council's international program. "That's the only real path forward if we're going to protect not only the health of communities on the ground in the boreal forests near the tar sands region, but also around the world from the impacts of climate change. We're not looking for a code of conduct."

For many, the leaked presentation provided proof that their work was having an impact, boosting their confidence to keep protesting.

"Knowing that groups like Stratfor are targeting us, surveying us, and also analyzing us shows how powerful these movements have become," said Parkin of the Rainforest Action Network and Rising Tide North America. "Obviously this wasn't meant for public consumption, but this doesn't intimidate us. If anything, it emboldens us. It encourages us to push harder."

Avatar
Avatar
h4x0r3d
I have to tell you, though, I’m deeply suspicious some of the NSA’s assertions.
They seem to be claiming that they have cracked nearly everything, and that they have backdoor access to privacy software. But this is practically impossible.
A lot of encryption software used today is actually ‘open source’. This means that the software code is freely available to anyone.
GNU Privacy Guard (GPG) is a great example. GPG is an open-source, free alternative version of Phil Zimmerman’s original PGP software. And it’s widely used to encrypt files and emails.
But because GPG is open-source, the software code is available for anyone to view, inspect, and modify. If there were any backdoor access for the NSA, thousands of people would see this.
Not to mention, to penetrate a single 2048-bit encryption key can take anywhere from thousands of years to tens of millions of years, even with the fastest supercomputers.
Consequently, it’s IMPOSSIBLE for the NSA to have cracked everything. And my assessment is that this is an intimidation campaign.
The NSA wants people to think that they have this capability.
And if everyone thinks that the NSA is Big Brother’s Big Brother, all-seeing and all-knowing, then not only will everyone be terrified, but everyone will simply stop using encryption.
After all, why bother going through the hassle of encrypting/decrypting if the NSA can still read the contents of your email?
It’s in the NSA’s interest for people to think that the agency is almighty. I don’t buy it. These people are seriously vile. But they don’t have superpowers.
When done properly, email encryption is still a good option. And there are a number of open-source tools out there to consider using.

*slow clap*

Avatar
Avatar
emptyage
#SPREADTHIS -> (AMY GOODMAN): 'What are you facing? When you say “the lesser of two evils,” what was the other choice?' * (LADAR LEVISON): 'Unfortunately, I can’t talk about that. I would like to, believe me. I think if the American public knew what our government was doing, they wouldn’t be allowed to do it anymore, which is why I’m here in D.C. today speaking to you.'

I watched an interview about this last weekend. If you don’t know the details, I strongly suggest you read up and be horrified and write letters and vote because holy crap, this is not how the US should be running. (via monkeyfrog)

Avatar

Silent Circle's thing has always been the promise of end-to-end secure communications, and that drive is apparently causing it to shut down the Silent Mail email service. Reasons cited in a blog post by CTO Jon Callas include the insecure nature of email protocols and preemptively avoiding the outside (read:FISA) pressures that prompted Lavabit to close its doors. Silent Circle says it hadn't received any "subpoenas, warrants, security letters, or anything else". Still, CEO Michael Janke tells TechCrunch he believed the government would come knocking due to certain high profile users of the service. Its phone, video and text products remain operational and claim to be "secure as ever", if you're wondering.

Avatar
Avatar
h4x0r3d
In his speech yesterday, Obama said that information available online fuels ‘violent agendas’ through ‘hateful propaganda’ that drives terrorism. Warning that ‘internet materials’ are fueling domestic terror threats and actually causing people to go out and commit mass acts of terrorism, Obama is once again following in the footsteps of his fellow control freak associates in assaulting the openness of the internet that is now a hot spring for alternative news amid the frozen depths of the mainstream media.
In the speech, Obama said:
“Today, a person can consume hateful propaganda, commit themselves to a violent agenda and learn how to kill without leaving their home.”
The simple reality is that the internet is the largest threat to corrupt government officials. It’s how we managed to break open the entire IRS scandal that has blown up in Obama’s face and led to calls for criminal action against top officials responsible for targeting Constitution-based groups with phony financial assaults. It’s also how we know about the truth surrounding Benghazi and what went down there. An event that has also generated serious awareness and even calls for impeachment.
Internet-Based Alt News Growing At Record Levels
So it should come as no surprise to find that Obama and others want the internet to be not only monitored by the government, but regulated as well. By using the ever-looming threat of domestic terrorism, it is simple to trace back extremists to certain internet sites that can be used as catalysts to enact legislation that endangers and annihilates internet freedom. Specifically, people like myself and others can be targeted in these crackdowns in order to give alternative news sources a bad name.
Obama’s latest speech is similar to his previous, in which he warns against those who question what he calls our ‘brave’ new government and warn of tyranny and corruption within it. The bottom line is that Obama is setting the stage here, as he has been for quite a while along with others, for an informational crusade against websites and blogs that dare to criticize government. Already labeled as ‘conspiracy’ and ‘extremist’ websites for even asking the simplest questions of government, the fight against net neutrality and alternative news sources is about to be taken to a whole new level.
Avatar

Illustration: National Institutes of Health

The immigration reform measure the Senate began debating yesterday would create a national biometric database of virtually every adult in the U.S., in what privacy groups fear could be the first step to a ubiquitous national identification system.

Buried in the more than 800 pages of the bipartisan legislation (.pdf)  is language mandating the creation of the innocuously-named “photo tool,” a massive federal database administered by the Department of Homeland Security and containing names, ages, Social Security numbers and photographs of everyone in the country with a driver’s license or other state-issued photo ID.

Employers would be obliged to look up every new hire in the database to verify that they match their photo.

This piece of the Border Security, Economic Opportunity, and Immigration Modernization Act is aimed at curbing employment of undocumented immigrants. But privacy advocates fear the inevitable mission creep, ending with the proof of self being required at polling places, to rent a house, buy a gun, open a bank account, acquire credit, board a plane or even attend a sporting event or log on the internet. Think of it as a government version of Foursquare, with Big Brother cataloging every check-in.

“It starts to change the relationship between the citizen and state, you do have to get permission to do things,” said Chris Calabrese, a congressional lobbyist with the American Civil Liberties Union. “More fundamentally, it could be the start of keeping a record of all things.”

For now, the legislation allows the database to be used solely for employment purposes. But historically such limitations don’t last. The Social Security card, for example, was created to track your government retirement benefits. Now you need it to purchase health insurance.

“The Social Security number itself, it’s pretty ubiquitous in your life,” Calabrese said.

David Bier, an analyst with the Competitive Enterprise Institute, agrees with the ACLU’s fears.

“The most worrying aspect is that this creates a principle of permission basically to do certain activities and it can be used to restrict activities,” he said. “It’s like a national ID system without the card.”

For the moment, the debate in the Senate Judiciary Committee is focused on the parameters of legalization for unauthorized immigrants, a border fence and legal immigration in the future.

The committee is scheduled to resume debate on the package Tuesday.

You are using an unsupported browser and things might not work as intended. Please make sure you're using the latest version of Chrome, Firefox, Safari, or Edge.
mouthporn.net