Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Directory

Rss Feed Group items tagged

findanotary

Mobile Notary Devices like Smartphones - 1 views

With the advent of mobile devices like smartphones and tablets, trying to find a notary public online has never been easier. And with that, many notaries public have now taken their local notary se...

Notary service

started by findanotary on 02 Jul 12 no follow-up yet
Gary Edwards

Directory of USA Representatives · House.gov - 0 views

  •  
    Full directory of the House of Representatives members, listed by State with distirct.  Includes phone number and address.  No email :(  But the individual congressional web sites are listed along with key committee memberships and party affiliation.
yosefong

What are Online Notary Services? - 3 views

With the advent of mobile devices like smartphones and tablets, trying to find a notary public online has never been easier. And with that, many notaries public have now taken their local notary se...

notary public

started by yosefong on 11 Jun 12 no follow-up yet
Paul Merrell

Use Tor or 'EXTREMIST' Tails Linux? Congrats, you're on the NSA's list * The Register - 0 views

  • Alleged leaked documents about the NSA's XKeyscore snooping software appear to show the paranoid agency is targeting Tor and Tails users, Linux Journal readers – and anyone else interested in online privacy.Apparently, this configuration file for XKeyscore is in the divulged data, which was obtained and studied by members of the Tor project and security specialists for German broadcasters NDR and WDR. <a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7ZK6qwQrMkAACSrTugAAAP1&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" target="_blank"> <img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/6978/reg_security/front&sz=300x250%7C300x600&tile=3&c=33U7ZK6qwQrMkAACSrTugAAAP1&t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" alt=""></a> In their analysis of the alleged top-secret documents, they claim the NSA is, among other things:Specifically targeting Tor directory servers Reading email contents for mentions of Tor bridges Logging IP addresses used to search for privacy-focused websites and software And possibly breaking international law in doing so. We already know from leaked Snowden documents that Western intelligence agents hate Tor for its anonymizing abilities. But what the aforementioned leaked source code, written in a rather strange custom language, shows is that not only is the NSA targeting the anonymizing network Tor specifically, it is also taking digital fingerprints of any netizens who are remotely interested in privacy.
  • These include readers of the Linux Journal site, anyone visiting the website for the Tor-powered Linux operating system Tails – described by the NSA as "a comsec mechanism advocated by extremists on extremist forums" – and anyone looking into combining Tails with the encryption tool Truecrypt.If something as innocuous as Linux Journal is on the NSA's hit list, it's a distinct possibility that El Reg is too, particularly in light of our recent exclusive report on GCHQ – which led to a Ministry of Defence advisor coming round our London office for a chat.
  • If you take even the slightest interest in online privacy or have Googled a Linux Journal article about a broken package, you are earmarked in an NSA database for further surveillance, according to these latest leaks.This is assuming the leaked file is genuine, of course.Other monitored sites, we're told, include HotSpotShield, FreeNet, Centurian, FreeProxies.org, MegaProxy, privacy.li and an anonymous email service called MixMinion. The IP address of computer users even looking at these sites is recorded and stored on the NSA's servers for further analysis, and it's up to the agency how long it keeps that data.The XKeyscore code, we're told, includes microplugins that target Tor servers in Germany, at MIT in the United States, in Sweden, in Austria, and in the Netherlands. In doing so it may not only fall foul of German law but also the US's Fourth Amendment.
  • ...2 more annotations...
  • The nine Tor directory servers receive especially close monitoring from the NSA's spying software, which states the "goal is to find potential Tor clients connecting to the Tor directory servers." Tor clients linking into the directory servers are also logged."This shows that Tor is working well enough that Tor has become a target for the intelligence services," said Sebastian Hahn, who runs one of the key Tor servers. "For me this means that I will definitely go ahead with the project.”
  • While the German reporting team has published part of the XKeyscore scripting code, it doesn't say where it comes from. NSA whistleblower Edward Snowden would be a logical pick, but security experts are not so sure."I do not believe that this came from the Snowden documents," said security guru Bruce Schneier. "I also don't believe the TAO catalog came from the Snowden documents. I think there's a second leaker out there."If so, the NSA is in for much more scrutiny than it ever expected.
Paul Merrell

US v. Comprehensive Drug Testing, Inc., 621 F. 3d 1162 - Court of Appeals, 9th Circuit ... - 0 views

  • Concluding Thoughts
  • The advent of fast, cheap networking has made it possible to store information at remote third-party locations, where it is intermingled with that of other users. For example, many people no longer keep their email primarily on their personal computer, and instead use a web-based email provider, which stores their messages along with billions of messages from and to millions of other people. Similar services exist for photographs, slide shows, computer code and many other types of data. As a result, people now have personal data that are stored with that of innumerable strangers. Seizure of, for example, Google's email servers to look for a few incriminating messages could jeopardize the privacy of millions. It's no answer to suggest, as did the majority of the three-judge panel, that people can avoid these hazards by not storing their data electronically. To begin with, the choice about how information is stored is often made by someone other than the individuals whose privacy would be invaded by the search. Most people have no idea whether their doctor, lawyer or accountant maintains records in paper or electronic format, whether they are stored on the premises or on a server farm in Rancho Cucamonga, whether they are commingled with those of many other professionals 1177*1177 or kept entirely separate. Here, for example, the Tracey Directory contained a huge number of drug testing records, not only of the ten players for whom the government had probable cause but hundreds of other professional baseball players, thirteen other sports organizations, three unrelated sporting competitions, and a non-sports business entity—thousands of files in all, reflecting the test results of an unknown number of people, most having no relationship to professional baseball except that they had the bad luck of having their test results stored on the same computer as the baseball players.
  • This pressing need of law enforcement for broad authorization to examine electronic records, so persuasively demonstrated in the introduction to the original warrant in this case, see pp. 1167-68 supra, creates a serious risk that every warrant for electronic information will become, in effect, a general warrant, rendering the Fourth Amendment irrelevant. The problem can be stated very simply: There is no way to be sure exactly what an electronic file contains without somehow examining its contents—either by opening it and looking, using specialized forensic software, keyword searching or some other such technique. But electronic files are generally found on media that also contain thousands or millions of other files among which the sought-after data may be stored or concealed. By necessity, government efforts to locate particular files will require examining a great many other files to exclude the possibility that the sought-after data are concealed there. Once a file is examined, however, the government may claim (as it did in this case) that its contents are in plain view and, if incriminating, the government can keep it. Authorization to search some computer files therefore automatically becomes authorization to search all files in the same sub-directory, and all files in an enveloping directory, a neighboring hard drive, a nearby computer or nearby storage media. Where computers are not near each other, but are connected electronically, the original search might justify examining files in computers many miles away, on a theory that incriminating electronic data could have been shuttled and concealed there.
  • ...3 more annotations...
  • This case well illustrates both the challenges faced by modern law enforcement in retrieving information it needs to pursue and prosecute wrongdoers, and the threat to the privacy of innocent parties from a vigorous criminal investigation. At the time of Tamura, most individuals and enterprises kept records in their file cabinets or similar physical facilities. Today, the same kind of data is usually stored electronically, often far from the premises. Electronic storage facilities intermingle data, making them difficult to retrieve without a thorough understanding of the filing and classification systems used—something that can often only be determined by closely analyzing the data in a controlled environment. Tamura involved a few dozen boxes and was considered a broad seizure; but even inexpensive electronic storage media today can store the equivalent of millions of pages of information. 1176*1176 Wrongdoers and their collaborators have obvious incentives to make data difficult to find, but parties involved in lawful activities may also encrypt or compress data for entirely legitimate reasons: protection of privacy, preservation of privileged communications, warding off industrial espionage or preventing general mischief such as identity theft. Law enforcement today thus has a far more difficult, exacting and sensitive task in pursuing evidence of criminal activities than even in the relatively recent past. The legitimate need to scoop up large quantities of data, and sift through it carefully for concealed or disguised pieces of evidence, is one we've often recognized. See, e.g., United States v. Hill, 459 F.3d 966 (9th Cir.2006).
  • Second, there are very important benefits to storing data electronically. Being able to back up the data and avoid the loss by fire, flood or earthquake is one of them. Ease of access from remote locations while traveling is another. The ability to swiftly share the data among professionals, such as sending MRIs for examination by a cancer specialist half-way around the world, can mean the difference between death and a full recovery. Electronic storage and transmission of data is no longer a peculiarity or a luxury of the very rich; it's a way of life. Government intrusions into large private databases thus have the potential to expose exceedingly sensitive information about countless individuals not implicated in any criminal activity, who might not even know that the information about them has been seized and thus can do nothing to protect their privacy. It is not surprising, then, that all three of the district judges below were severely troubled by the government's conduct in this case. Judge Mahan, for example, asked "what ever happened to the Fourth Amendment? Was it ... repealed somehow?" Judge Cooper referred to "the image of quickly and skillfully moving the cup so no one can find the pea." And Judge Illston regarded the government's tactics as "unreasonable" and found that they constituted "harassment." Judge Thomas, too, in his panel dissent, expressed frustration with the government's conduct and position, calling it a "breathtaking expansion of the `plain view' doctrine, which clearly has no application to intermingled private electronic data." Comprehensive Drug Testing, 513 F.3d at 1117.
  • Everyone's interests are best served if there are clear rules to follow that strike a fair balance between the legitimate needs of law enforcement and the right of individuals and enterprises to the privacy that is at the heart of the Fourth Amendment. Tamura has provided a workable framework for almost three decades, and might well have sufficed in this case had its teachings been followed. We have updated Tamura to apply to the daunting realities of electronic searches. We recognize the reality that over-seizing is an inherent part of the electronic search process and proceed on the assumption that, when it comes to the seizure of electronic records, this will be far more common than in the days of paper records. This calls for greater vigilance on the part of judicial officers in striking the right balance between the government's interest in law enforcement and the right of individuals to be free from unreasonable searches and seizures. The process of segregating electronic data that is seizable from that which is not must not become a vehicle for the government to gain access to data which it has no probable cause to collect.
  •  
    From a Ninth U.S. Circuit Court of Appeals en banc ruling in 2010. The Court's holding was that federal investigators had vastly overstepped the boundaries of multiple subpoenas and a search warrant --- and the Fourth Amendment --- by seizing records of a testing laboratory and reviewing them for information not described in the warrant or the subpoenas. At issue in this particular case was the government's use of a warrant that found probable cause to believe that the records contained evidence that steroids had been found in the urine of ten major league baseball players but searched the seized records for urine tests of other baseball players. The Court upheld the lower courts' rulings that the government was required to return all records other than those relevant to the ten players identified in the warrant. (The government had instead used the records of other player's urine tests to issue subpoenas for evidence relevant to those players potential use of steroids.) This decision cuts very heavily against the notion that the Fourth Amendment allows the bulk collection of private information about millions of Americans with or without a warrantor court order on the theory that some of the records *may* later become relevant to a lawful investigation.   Or rephrased, here is the en banc decision of the largest federal court of appeals (as many judges as most other federal appellate courts combined), in direct disagreement with the FISA Court orders allowing bulk collection of telephone records and bulk "incidental" collection of Americans' telephone conversations on the theory that the records *might* become relevant to national security investigations. Yet none of the FISA judges in any of the FISA opinions published thus far even cited, let alone distinguished, this Ninth Circuit en banc decision. Which says a lot of the quality of the legal research performed by the FISA Court judges. However, this precedent is front and center in briefs filed with the Ni
Gary Edwards

Is Bank of America Headed for the Glue Factory? » Counterpunch: Tells the Fac... - 0 views

  • The GAO detailed instance after instance of top executives of corporations and financial institutions using their influence as Federal Reserve directors to financially benefit their firms, and, in at least one instance, themselves….
  • The corporate affiliations of Fed directors from such banking and industry giants as General Electric, JP Morgan Chase, and Lehman Brothers pose ‘reputational risks’ to the Federal Reserve System, the report said. Giving the banking industry the power to both elect and serve as Fed directors creates ‘an appearance of a conflict of interest,’ the report added….
  • ‘If we [i.e. the World Bank] had seen a governance structure that corresponds to our Federal Reserve system, we would have been yelling and screaming and saying that country does not deserve any assistance, this is a corrupt governing structure.’” (“Non-Partisan Government Report: Federal Reserve Is Riddled with Corruption and Conflicts of Interest,” Washington’s Blog)
  • ...3 more annotations...
  • this move amounts to a direct transfer from derivatives counterparties of Merrill to the taxpayer, via the FDIC, which would have to make depositors whole after derivatives counterparties grabbed collateral.
  • This move paves the way for another TARP-style shakedown of taxpayers, this time to save depositors. No Congressman would dare vote against that. This move is Machiavellian, and just plain evil.” (Naked Capitalism)
  • Let’s say the second biggest bank in the country is starting to teeter because it’s loaded with all manner of dodgy (toxic?) derivatives that could blow up at any minute and take down the entire global financial system. Would you (a) Wait until the bombshell exploded knowing that the only choice you would then have would be to further expand the Fed’s balance sheet by another couple trillion dollars or (b) Try to sleaze the whole thing off on Uncle Sam and let the taxpayers pick up the tab?
  •  
    Nice catch by Marbux.  A Bloomberg article explains how Bank of America is moving high risk derivatives into the coffers of a federally insured subsidiary.  Meaning, when (not if) the derivatives fail, the tax payers will get stuck with covering the losses and making the Banksters whole. The article also explains the recent GAO audit of the Federal Reserve where it was disclosed that through interlocking directories and shareholdings, the Bankster industry is in control of the Federal Reserve.  Awful, sickening stuff.  But a good catch nevertheless. excerpt: There are two things worth noting in this article. First, according to Bloomberg, "the transfers (of derivatives) are being requested by counterparties." Well, how do you like that? In other words, the investors on the other side of these contracts want Merrill to put them under an insurance umbrella provided by the FDIC. Now, why would that be? The only reason I can come up with, is that they know that a lot of these complex instruments are undercapitalized and ready to implode, so they want to make sure they get their money back any way possible. That means they need to latch on to Uncle Sam without anyone knowing about it. But, like we said, the cat is out of the bag. The other thing worth noting is that the Fed and the FDIC are at loggerheads over the matter. ("The Fed has signaled that it favors moving the derivatives to give relief to the bank holding company, while the FDIC, which would have to pay off depositors in the event of a bank failure, is objecting.") Now, that's not good at all, in fact, it's a big red flag that suggests the Fed trying to pull a fast one on the American people. One does not have to look too far for other examples of Fed misbehavior; the endless bailouts (TARP, QE1 and 2, Operation Twist, ZIRP, etc) In fact, the Fed's history is a tedious chronicle of one shifty deal after another. This is just more of the same; another gift to big finance at the public'
Paul Merrell

Courthouse News Service - 0 views

  •      Her 45-page motion argues that her client's subpoena has fateful repercussions in the age of cloud computing, an umbrella term describing the use of remote databases to store users' private information.     "Personal communications, daily schedules and travel itineraries that you once stored in a desk drawer or dedicated directory on a home computer are now stored for you by your ISP or social-networking site, somewhere in the cloud," the motion states. "The information is still yours. You still have control over it, but both technically and technologically someone else is now its custodian.     "The question this case poses to the court is: What, if anything, does the change in architecture and protocols of the Internet mean for the relationship between the individual and the state?
  •      "From Harris' perspective, not much has changed - only the address of your e-storage locker. Law enforcement is still seeking your information, still has to go to you for it, and still has to get your consent or obtain the information via discovery.     "From the [District Attorney of New York]'s perspective, the rise of e-storage has changed everything. The advent of cloud computing releases the DANY from any obligation to ask you for the information or obtain it from you through discovery. From its perspective, it can deal with the owner of the e-storage locker as though that person were the principal, rather than your agent. Since the owner of the storage locker does not have a proprietary interest or expectation of privacy in the stored information, however, that means there are no meaningful constitutional constraints on law enforcement, and your First and Fourth Amendment rights have vanished."
clariene Austria

Notary Public - 3 views

FindNotary.com is the largest list and online directory of mobile public notaries that exists to help you find a public notary. Search by City, State, Zip, or Metropolitan area.

mobile public notaries

started by clariene Austria on 24 Mar 12 no follow-up yet
Paul Merrell

Stanford Researchers: It Is Trivially Easy to Match Metadata to Real People - Rebecca J... - 0 views

  • In defending the NSA's telephony metadata collection efforts, government officials have repeatedly resorted to one seemingly significant detail: This is just metadata—numbers dialed, lengths of calls. "There are no names, there’s no content in that database," President Barack Obama told Charlie Rose in June. No names; just metadata. New research from Stanford demonstrates the silliness of that distinction. Armed with very sparse metadata, Jonathan Mayer and Patrick Mutchler found it easy—trivially so—to figure out the identity of a caller. <div><a href="http://pubads.g.doubleclick.net/gampad/jump?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drebecca-j-rosen%26title%3Dstanford-researchers-it-is-trivially-easy-to-match-metadata-to-real-people%26pos%3Din-article&sz=300x185&c=387748957&tile=3" title=""><img src="http://pubads.g.doubleclick.net/gampad/ad?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drebecca-j-rosen%26title%3Dstanford-researchers-it-is-trivially-easy-to-match-metadata-to-real-people%26pos%3Din-article&sz=300x185&c=387748957&tile=3" alt="" /></a></div> Mayer and Mutchler are running an experiment which works with volunteers who agree to use an Android app, MetaPhone, that allows the researchers access to their metadata. Now, using that data, Mayer and Mutchler say that it was hardly any trouble at all to figure out who the phone numbers belonged to, and they did it in just a few hours.
  • They write: We randomly sampled 5,000 numbers from our crowdsourced MetaPhone dataset and queried the Yelp, Google Places, and Facebook directories. With little marginal effort and just those three sources—all free and public—we matched 1,356 (27.1%) of the numbers. Specifically, there were 378 hits (7.6%) on Yelp, 684 (13.7%) on Google Places, and 618 (12.3%) on Facebook. What about if an organization were willing to put in some manpower? To conservatively approximate human analysis, we randomly sampled 100 numbers from our dataset, then ran Google searches on each. In under an hour, we were able to associate an individual or a business with 60 of the 100 numbers. When we added in our three initial sources, we were up to 73. How about if money were no object? We don’t have the budget or credentials to access a premium data aggregator, so we ran our 100 numbers with Intelius, a cheap consumer-oriented service. 74 matched.1 Between Intelius, Google search, and our three initial sources, we associated a name with 91 of the 100 numbers.
  • Their results weren't perfect (and they note that the Intelius data was particularly spotty), but they didn't even try all that hard. "If a few academic researchers can get this far this quickly, it’s difficult to believe the NSA would have any trouble identifying the overwhelming majority of American phone numbers," they conclude. It's also difficult to believe they wouldn't try. As federal district judge Richard Leon wrote in his decision last week, "There is also nothing stopping the Government from skipping the [National Security Letter] step altogether and using public databases or any of its other vast resources to match phone numbers with subscribers."
  •  
    Another Obama/NSA lie exposed. 
Paul Merrell

BofA Said to Split Regulators Over Moving Merrill Derivatives to Bank Unit - Bloomberg - 0 views

  • Bank of America Corp. (BAC), hit by a credit downgrade last month, has moved derivatives from its Merrill Lynch unit to a subsidiary flush with insured deposits, according to people with direct knowledge of the situation. The Federal Reserve and Federal Deposit Insurance Corp. disagree over the transfers, which are being requested by counterparties, said the people, who asked to remain anonymous because they weren’t authorized to speak publicly. The Fed has signaled that it favors moving the derivatives to give relief to the bank holding company, while the FDIC, which would have to pay off depositors in the event of a bank failure, is objecting, said the people. The bank doesn’t believe regulatory approval is needed, said people with knowledge of its position.
  • Three years after taxpayers rescued some of the biggest U.S. lenders, regulators are grappling with how to protect FDIC- insured bank accounts from risks generated by investment-banking operations. Bank of America, which got a $45 billion bailout during the financial crisis, had $1.04 trillion in deposits as of midyear, ranking it second among U.S. firms. “The concern is that there is always an enormous temptation to dump the losers on the insured institution,” said William Black, professor of economics and law at the University of Missouri-Kansas City and a former bank regulator. “We should have fairly tight restrictions on that.”
  • Moody’s Investors Service downgraded Bank of America’s long-term credit ratings Sept. 21, cutting both the holding company and the retail bank two notches apiece. The holding company fell to Baa1, the third-lowest investment-grade rank, from A2, while the retail bank declined to A2 from Aa3.
  • ...5 more annotations...
  • The Moody’s downgrade spurred some of Merrill’s partners to ask that contracts be moved to the retail unit, which has a higher credit rating, according to people familiar with the transactions. Transferring derivatives also can help the parent company minimize the collateral it must post on contracts and the potential costs to terminate trades after Moody’s decision, said a person familiar with the matter. Bank of America estimated in an August regulatory filing that a two-level downgrade by all ratings companies would have required that it post $3.3 billion in additional collateral and termination payments, based on over-the-counter derivatives and other trading agreements as of June 30. The figure doesn’t include possible collateral payments due to “variable interest entities,” which the firm is evaluating, it said in the filing.
  • Derivatives are financial instruments used to hedge risks or for speculation. They’re derived from stocks, bonds, loans, currencies and commodities, or linked to specific events such as changes in the weather or interest rates. Dodd-Frank Rules Keeping such deals separate from FDIC-insured savings has been a cornerstone of U.S. regulation for decades, including last year’s Dodd-Frank overhaul of Wall Street regulation. The legislation gave the FDIC, which liquidates failing banks, expanded powers to dismantle large financial institutions in danger of failing. The agency can borrow from the Treasury Department to finance the biggest lenders’ operations to stem bank runs. It’s required to recoup taxpayer money used during the resolution process through fees on the largest firms.
  • Bank of America’s holding company -- the parent of both the retail bank and the Merrill Lynch securities unit -- held almost $75 trillion of derivatives at the end of June, according to data compiled by the OCC. About $53 trillion, or 71 percent, were within Bank of America NA, according to the data, which represent the notional values of the trades. That compares with JPMorgan’s deposit-taking entity, JPMorgan Chase Bank NA, which contained 99 percent of the New York-based firm’s $79 trillion of notional derivatives, the OCC data show.
  • Moving derivatives contracts between units of a bank holding company is limited under Section 23A of the Federal Reserve Act, which is designed to prevent a lender’s affiliates from benefiting from its federal subsidy and to protect the bank from excessive risk originating at the non-bank affiliate, said Saule T. Omarova, a law professor at the University of North Carolina at Chapel Hill School of Law. “Congress doesn’t want a bank’s FDIC insurance and access to the Fed discount window to somehow benefit an affiliate, so they created a firewall,” Omarova said. The discount window has been open to banks as the lender of last resort since 1914. As a general rule, as long as transactions involve high- quality assets and don’t exceed certain quantitative limitations, they should be allowed under the Federal Reserve Act, Omarova said.
  • In 2009, the Fed granted Section 23A exemptions to the banking arms of Ally Financial Inc., HSBC Holdings Plc, Fifth Third Bancorp, ING Groep NV, General Electric Co., Northern Trust Corp., CIT Group Inc., Morgan Stanley and Goldman Sachs Group Inc., among others, according to letters posted on the Fed’s website. The central bank terminated exemptions last year for retail-banking units of JPMorgan, Citigroup, Barclays Plc, Royal Bank of Scotland Plc and Deutsche Bank AG. The Fed also ended an exemption for Bank of America in March 2010 and in September of that year approved a new one. Section 23A “is among the most important tools that U.S. bank regulators have to protect the safety and soundness of U.S. banks,” Scott Alvarez, the Fed’s general counsel, told Congress in March 2008.
  •  
    So according to Bloomberg, JPMorgan's commercial bank was the recipient of 99 percent of JPMorgan's $79 trillion (face value of derivatives) in bad bets. So adding JPMorgan's $78 trillion or so to the $75 trillion in bad bets Bank of America unloaded on its FDIC insured subsidiary, we arrive at $153 trillion in bad bets moved by two investment banks alone under the FDIC umbrella. Meanwhile, FDIC has authority under Dodd-Frank to liquidate these insolvent banks but doesn't, despite several successful lawsuits to recover the value of toxic derivatives that they sold to smaller banks that failed (which implies that FDIC could tell JPMorgan and BoA's investment banksters that they've got to pay off the toxic assets they transferred to their commercial banks, rather than diluting the insurance for normal depositors. Problem: the two big investment banks don't have sufficient assets to absorb those losses, so the too-politically-connected-to-fail factor kicks in. Note that I have not done any legal research in regard to these issues and am basing these observations on what has been stated about legal requirements in various media articles.
Paul Merrell

Exposed: Google's "Smart Home" Surveillance Plans, or, How To Not Be Colonized | TBYP - 0 views

  • Two weeks ago, the New York Times’ truth-humor strip on “The Home of the Future” came on the heels of Google’s purchase of ‘smart thermostat’ manufacturer Nest for $3.2 Billion.  With power utility commissions such as California already stating their intention to “expand third-party access” to in-home data, the perfect storm is brewing for Google’s mission of making you their product – even in your own home. For context, this is the same Google whose executive chairman, Eric Schmidt, told MSNBC: “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.”
  • So where does a ‘smart thermostat’ fit in the current corporatist drive for total in-home surveillance? For the last couple of years, utilities around the globe have all been touting their new metering systems with buzzwords such as ‘smart’, ‘advanced’, ‘upgraded’, or ‘modernized’.  All rhetoric aside, these devices are intended to integrate with all appliances in your home to form an inescapable wireless data-mining dragnet, dubbed as the “home area network”, with your HVAC and likely other in-home systems overseen by spy-giant Google, if they get their way. As we’ve seen, even former CIA director David Patraeus was publicly frothing over having the ability to spy through ‘smart’ appliances, intended to wirelessly report back to the meter continuously, while receiving energy-use dictates from the meter. According to a US Congressional Research Report:
  • “With smart meters, police will have access to data that might be used to track residents’ daily lives and routines while in their homes, including their eating, sleeping, and showering habits, what appliances they use and when, and whether they prefer the television to the treadmill, among a host of other details.” Smart grid planners and working groups have even laid these aims out in their internal roadmaps, citing goals such as “new tools for mining data and intel” and “data mining and analytics to become core competency” (see slide 17).
  • ...3 more annotations...
  • Despite pilot programs indicating no energy savings and mounting opposition now from several hundred activist groups, federal governments such as the US are continuing with their push to incentivize utilities to push forward ‘smart’ grid deployment. Apparently, having a piece of the $11 Billion taxpayer-funded ‘smart’ grid pie, pushed through by the Obama Administration immediately following the 2008 election, is sufficient motivation for utility executives to steamroll forward despite the growing resistance. As an example, PECO, a major utility in Pennsylvania, is slated to receive $200 Million in stimulus funding if they can deploy 600,000 ‘smart’ meters by April 2014. Significantly, anyone can choose to protect their in-home rights by saying no to the deployment of a ‘smart’ meter on their home.  There are no legal requirements in any country or region for an energy customer to accept a ‘smart’ meter.
  • So what can be done to protect rights?  While people cannot vote to prevent corporations from making products such as data-mining thermostats appliances, they do have a voice as utilities try their best to deploy the home-colonizing meters.  Public resistance to ‘smart’ meter deployments has predictably been considerable, as people are learning about not only surveillance capabilities, but also skyrocketing electricity costs, time-of-use billing, risk of fires, home hackability, electrical quality degradation and functional impairments from pulsed microwave radiation — amazingly, all being linked to the new utility metering system.
  • However, utilities are using tactics of intimidation, propaganda, and tacit acceptance – which means that unless you said a clear “no”, they assume a “yes.” In some cases even with a homeowner’s refusal, utilities are forcibly deploying anyway, apparently assuming the liability for doing so, risking litigation. So Google has played their hand with the $3.2 Billion purchase of Nest, desiring to capture the worldwide ‘smart’ home data-mining market, and praying to the all-spying-eye that people will stay tethered to their ‘smart’ wireless toys as their rights roll swiftly towards a cliff.  But will awareness eventually reach a game-changing crescendo?  It seems as though the potential exists. If we want to experience a future other than being ruled by technocrats, now is the time to speak up – even if facing the situation isn’t convenient.  People simply need to know the facts. As stated by former Apple executive Jeffrey Armstrong in our film Take Back Your Power, the question of whether homes will remain free of invasive ‘smart’ metering and appliance technology is “a test case for a technological democracy, if I have ever seen one.” 
Gary Edwards

Sony leaks reveal Hollywood is trying to break DNS, the backbone of the internet | The ... - 0 views

  • You could still type http://www.piratebay.se into your browser, but without a working DNS record, you wouldn't be able to find the site itself. If a takedown notice could blacklist a site from every available DNS provider, the URL would be effectively erased from the internet.
  • No one's ever tried to issue a takedown notice like that, but this latest memo suggests the MPAA is looking into it as a potentially powerful new tool in the fight against piracy. "A takedown notice program, therefore, could threaten ISPs with potential secondary liability in the event that they do not cease connecting users to known infringing material through their own DNS servers," the letter reads. "While not making it impossible for users to reach pirate sites (i.e., a user could still use a third-party DNS server), it could make it substantially more complicated for casual infringers to reach pirate sites if their ISPs decline to assist in the routing of communications to those sites." The full document is embedded below.
  • The MPAA’s legal argument centers on the claim that DNS records are working as an index or directory rather than simply routing data. If that argument holds, then the DNS links could be vulnerable to the same takedown notices used to strike torrent links from Google searches. The net effect would be similar to site-blocking, making it as easy to unplug a URL as it is to take down a YouTube video. It would also cast DNS providers as legally responsible for all the sites on the web, the same way YouTube is responsible for every video uploaded to its network. For many providers, simply managing the flood of notices might create a logistical nightmare.
  •  
    "Most anti-piracy tools take one of two paths: they either target the server that's sharing the files (pulling videos off YouTube or taking down sites like The Pirate Bay) or they make it harder to find (delisting offshore sites that share infringing content). But leaked documents reveal a frightening line of attack that's currently being considered by the MPAA: What if you simply erased any record that the site was there in the first place? A BOLD CHALLENGE TO THE BASIC ENGINEERING OF THE INTERNET To do that, the MPAA's lawyers would target the Domain Name System (DNS) that directs traffic across the internet. The tactic was first proposed as part of the Stop Online Piracy Act (SOPA) in 2011, but three years after the law failed in Congress, the MPAA has been looking for legal justification for the practice in existing law and working with ISPs like Comcast to examine how a system might work technically. If the system works, DNS-blocking could be the key to the MPAA's long-standing goal of blocking sites from delivering content to the US. At the same time, it represents a bold challenge to the basic engineering of the internet, threatening to break the very backbone of the web and drawing the industry into an increasingly nasty fight with Google. The Domain Name System is a kind of phone book for the internet, translating URLs like http://www.theverge.com into IP addresses like 192.5.151.3. Given a URL string, your computer will turn to a DNS server (often run by a local ISP or a third party like Google) to find the IP address of the corresponding server. Much like the phone book, that function is usually treated as a simple an engineering task - but a memo commissioned by the MPAA this August sketches out a legal case for blocking infringing sites from the DNS records entirely, like wiping unsavory addresses out of the phone book. You could still type http://www.piratebay.se into your browser, but without a working DNS record, you wouldn't be able to find the
Paul Merrell

NSA Drops Christmas Eve Surprise - The Intercept - 0 views

  • The National Security Agency on Christmas Eve day released twelve years of internal oversight reports documenting abusive and improper practices by agency employees. The heavily redacted reports to the President’s Intelligence Oversight Board found that NSA employees repeatedly engaged in unauthorized surveillance of communications by American citizens, failed to follow legal guidelines regarding the retention of private information, and shared data with unauthorized recipients. While the NSA has come under public pressure for openness since high-profile revelations by whistleblower Edward Snowden, the release of the heavily redacted internal reports at 1:30PM on Christmas Eve demonstrates limits to the agency’s attempts to demonstrate transparency. Releasing bad news right before a holiday weekend, often called a “Christmas Eve surprise,”  is a common tactic for trying to minimize press coverage.
  • The reports, released in response to a Freedom of Information Act request submitted by the American Civil Liberties Union, offer few revelations, but contain accounts of internal behavior embarrassing to the agency. In one instance an NSA employee “searched her spouse’s personal telephone directory without his knowledge to obtain names and telephone numbers for targeting”, a practice which previous reports have indicated was common enough to warrant the name “LOVEINT”. Many of the reports appear to deal with instances of human error rather than malicious misuse of agency resources. Nonetheless, many of these errors are potentially serious, including entries suggesting that unminimized U.S. telephone numbers were mistakenly disseminated to unauthorized parties and that military personnel were given unauthorized access to raw traffic databases collected under the Foreign Intelligence Services Act.
  • There are also accounts of simple bumbling by NSA employees, including the apparently common mistake of targeting their own communications for surveillance. In one unintentionally amusing passage, an NSA analyst is said to have “targeted his personal cellphone,” because he “mistakenly thought it would be acceptable to [redacted].” Another common example is the practice of NSA analysts accidentally designating their own communications as being those of a foreign intelligence target.
  • ...1 more annotation...
  • Even in their redacted form the reports give insight into the level of power individual agency employees have in ordering surveillance, and the intentional and unintentional abuses that can take place in an environment of minimal oversight. Though NSA officials have repeatedly suggested that the agency has rigorous safeguards in place to prevent individual employees from abusing their powers of surveillance, the agency’s own confidential internal reporting appears to contradict this. “The government conducts sweeping surveillance under this authority -— surveillance that increasingly puts Americans’ data in the hands of the NSA”, Patrick Toomey of the ACLU’s National Security Project said in comments to Bloomberg News. “Despite that fact, this spying is conducted almost entirely in secret and without legislative or judicial oversight.”
  •  
    NSA: not so squeaky clean and careful as it claimed. Surprise, surprise.
Paul Merrell

Hillary Clinton 'furious' with husband Bill's ties to sex offender Jeffrey Epstein - Wa... - 0 views

  • Former Secretary of State Hillary Rodham Clinton is incensed that her husband, former President Bill Clinton, has been tied to sex offender Jeffrey Epstein, who’s also at the heart of an investigation into Prince Andrew’s alleged sexual dalliances with a minor, the New York Post reported.The sources told the Post they witnessed at the funeral of Mario Cuomo an obviously upset Mrs. Clinton “storm” past her husband, who waited for her at the door of St. Ignatius Loyola Church.“Talk in Washington is that Hillary is furious with Bill about all this new information on Jeffrey Epstein,” the source told the newspaper.
  • Court documents related to a suit filed by Virginia Roberts, who alleges Mr. Epstein paid her $15,000 to have sex with the prince, also included several references to Mr. Clinton. The documents from 2011 show that Mr. Epstein had 21 different email and telephone numbers for Mr. Clinton and an aide in his directory.The court documents also show Mr. Clinton “frequently flew” with Mr. Epstein on his private plane between 2002 and 2005. The court documents say that Mr. Clinton “suddenly stopped, raising the suspicion that the friendship abruptly ended, perhaps because of events related to Epstein’s sexual abuse of children,” the Post reported.Mrs. Clinton, widely considered the front-runner for the 2016 Democratic presidential bid, is reportedly outraged that her husband’s name has again popped up in a sex scandal.
  •  
    Hillary putting some distance between herself and Bill? 
Paul Merrell

WikiLeaks Reveals The "Snowden Stopper": CIA Tool To Track Whistleblowers - 0 views

  • As the latest installment of it’s ‘Vault 7’ series, WikiLeaks has just dropped a user manual describing a CIA project known as ‘Scribbles’ (a.k.a. the “Snowden Stopper”), a piece of software purportedly designed to allow the embedding of ‘web beacon’ tags into documents “likely to be stolen.” The web beacon tags are apparently able to collect information about an end user of a document and relay that information back to the beacon’s creator without being detected. Per WikiLeaks’ press release:
  • Today, April 28th 2017, WikiLeaks publishes the documentation and source code for CIA’s “Scribbles” project, a document-watermarking preprocessing system to embed “Web beacon”-style tags into documents that are likely to be copied by Insiders, Whistleblowers, Journalists or others. The released version (v1.0 RC1) is dated March, 1st 2016 and classified SECRET//ORCON/NOFORN until 2066. Scribbles is intended for off-line preprocessing of Microsoft Office documents. For reasons of operational security the user guide demands that “[t]he Scribbles executable, parameter files, receipts and log files should not be installed on a target machine, nor left in a location where it might be collected by an adversary.”
  • The ‘Scribbles’ User Guide explains how the tool generates a random watermark for each document, inserts that watermark into the document, saves all such processed documents in an output directory, and creates a log file which identifies the watermarks inserted into each document. Scribbles can watermark multiple documents in one batch and is designed to watermark several groups of documents.
  • ...1 more annotation...
  • Dr. Martin McHugh, Information Technology Programme chair at Dublin Institute of Technology, gave the RT more details on how the “Scribbles” tool can be used for “bad as well as good.” “Methods of tracking have historically been developed for our protection but have evolved to become used to track us without our knowledge.” “Web beacons typically go unnoticed. A tiny file is loaded as part of a webpage. Once this file is accessed, it records unique information about you, such as your IP address and sends this back to the creator of the beacon.” But, the “Scribbles” user guide notes there is just one small problem with the program…it only works with Microsoft Office products.  So, if end users use other programs such as OpenOffice of LibreOffice then the CIA’s watermarks become visible to the end user and their cover is blown.
1 - 15 of 15
Showing 20 items per page