Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Valley

Rss Feed Group items tagged

Paul Merrell

Web's Reach Binds N.S.A. and Silicon Valley Leaders - NYTimes.com - 0 views

  • When Max Kelly, the chief security officer for Facebook, left the social media company in 2010, he did not go to Google, Twitter or a similar Silicon Valley concern. Instead the man who was responsible for protecting the personal information of Facebook’s more than one billion users from outside attacks went to work for another giant institution that manages and analyzes large pools of data: the National Security Agency. Mr. Kelly’s move to the spy agency, which has not previously been reported, underscores the increasingly deep connections between Silicon Valley and the agency and the degree to which they are now in the same business. Both hunt for ways to collect, analyze and exploit large pools of data about millions of Americans. The only difference is that the N.S.A. does it for intelligence, and Silicon Valley does it to make money.
  • Yet technology experts and former intelligence officials say the convergence between Silicon Valley and the N.S.A. and the rise of data mining — both as an industry and as a crucial intelligence tool — have created a more complex reality. Silicon Valley has what the spy agency wants: vast amounts of private data and the most sophisticated software available to analyze it. The agency in turn is one of Silicon Valley’s largest customers for what is known as data analytics, one of the valley’s fastest-growing markets. To get their hands on the latest software technology to manipulate and take advantage of large volumes of data, United States intelligence agencies invest in Silicon Valley start-ups, award classified contracts and recruit technology experts like Mr. Kelly. “We are all in these Big Data business models,” said Ray Wang, a technology analyst and chief executive of Constellation Research, based in San Francisco. “There are a lot of connections now because the data scientists and the folks who are building these systems have a lot of common interests.” Although Silicon Valley has sold equipment to the N.S.A. and other intelligence agencies for a generation, the interests of the two began to converge in new ways in the last few years as advances in computer storage technology drastically reduced the costs of storing enormous amounts of data — at the same time that the value of the data for use in consumer marketing began to rise. “These worlds overlap,” said Philipp S. Krüger, chief executive of Explorist, an Internet start-up in New York. The sums the N.S.A. spends in Silicon Valley are classified, as is the agency’s total budget, which independent analysts say is $8 billion to $10 billion a year.
  • Despite the companies’ assertions that they cooperate with the agency only when legally compelled, current and former industry officials say the companies sometimes secretly put together teams of in-house experts to find ways to cooperate more completely with the N.S.A. and to make their customers’ information more accessible to the agency. The companies do so, the officials say, because they want to control the process themselves. They are also under subtle but powerful pressure from the N.S.A. to make access easier.
  • ...1 more annotation...
  • Skype, the Internet-based calling service, began its own secret program, Project Chess, to explore the legal and technical issues in making Skype calls readily available to intelligence agencies and law enforcement officials, according to people briefed on the program who asked not to be named to avoid trouble with the intelligence agencies. Project Chess, which has never been previously disclosed, was small, limited to fewer than a dozen people inside Skype, and was developed as the company had sometimes contentious talks with the government over legal issues, said one of the people briefed on the project. The project began about five years ago, before most of the company was sold by its parent, eBay, to outside investors in 2009. Microsoft acquired Skype in an $8.5 billion deal that was completed in October 2011. A Skype executive denied last year in a blog post that recent changes in the way Skype operated were made at the behest of Microsoft to make snooping easier for law enforcement. It appears, however, that Skype figured out how to cooperate with the intelligence community before Microsoft took over the company, according to documents leaked by Edward J. Snowden, a former contractor for the N.S.A. One of the documents about the Prism program made public by Mr. Snowden says Skype joined Prism on Feb. 6, 2011. Microsoft executives are no longer willing to affirm statements, made by Skype several years ago, that Skype calls could not be wiretapped. Frank X. Shaw, a Microsoft spokesman, declined to comment.
Gary Edwards

Silicon Valley represents an entirely new political category | Gregory Ferenstein | Lin... - 0 views

  •  
    "Silicon Valley represents an entirely new political category" Over the last decade, Silicon Valley has become an extraordinary force in politics, but they've bewildered the DC establishment with their bizarre loyalties. Tech titans are the arch nemesis of labor unions on a series of fronts, from high-skilled immigration and the taxi industry to free trade and their aggressive funding of union-less public charter schools. And, yet, tech CEOs are arguably the Democrats' biggest cheerleaders: in the 2012 presidential election, 83% of employee donations from top tech firms went to Obama. "Most of Silicon Valley, most of the executives, tend to be Democrats," PayPal co-Founder, Peter Thiel, told me." Very interesting article based on interviews and surveys of Silicon Valley technology leaders.
Paul Merrell

Porter Ranch Methane Leak Spreads Across LA's San Fernando Valley - 0 views

  • It now looks like the catastrophic Porter Ranch gas leak, which has spewed more than 83,000 metric tons of noxious methane for nearly three months, has spread across Los Angeles’s San Fernando Valley. On Wednesday, Los Angeles City Councilman Mitchell Englander called on the Southern California Gas Co. to extend residential relocation assistance to residents in Granada Hills, Chatsworth and Northridge who live near the Aliso Canyon gas leak above Porter Ranch. These residents reported symptoms related to the exposure of natural gas such as nausea, vomiting, headaches and respiratory problems.
  • This latest development compounds with a new analysis from Home Energy Efficiency Team (HEET). The Cambridge-based nonprofit sent Boston University Professor Nathan Phillips and Bob Ackley of Gas Safety to take methane measurements around the San Fernando Valley for several days and their findings were disturbing. As the Los Angeles Daily News wrote, “the researchers recorded elevated levels of the main ingredient in natural gas—10 miles away from the nation’s largest gas leak.” “It’s not just in Porter Ranch, it’s going all the way across the [San Fernando] Valley,” Ackley told Inside Climate News. According to HEET, the researchers drove a high precision GIS-enabled natural gas analyzer down the roads around the gas leak to create a comprehensive map of the leak around San Fernando Valley. The red on the map indicates where they drove and the levels of methane they found is shown by the height of the peaks. Their monitors showed methane levels at 3.4 parts per billion, about twice the level of natural clean air, the Los Angeles Daily News reported. Another measurement showed 127 ppm, or an astounding 67 times above normal. “Whatever else may be in the gas—benzene, toluene, xylene—that is what people may be breathing,” Phillips told Inside Climate News. “Even though we’re not measuring things other than methane, there is a legitimate concern that there is that other nasty stuff in there.”
Paul Merrell

American Surveillance Now Threatens American Business - The Atlantic - 0 views

  • What does it look like when a society loses its sense of privacy? <div><a href="http://pubads.g.doubleclick.net/gampad/jump?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drobinson-meyer%26title%3Damerican-surveillance-now-threatens-american-business%26pos%3Din-article&sz=300x250&c=285899172&tile=1" title=""><img style="border:none;" src="http://pubads.g.doubleclick.net/gampad/ad?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drobinson-meyer%26title%3Damerican-surveillance-now-threatens-american-business%26pos%3Din-article&sz=300x250&c=285899172&tile=1" alt="" /></a></div>In the almost 18 months since the Snowden files first received coverage, writers and critics have had to guess at the answer. Does a certain trend, consumer complaint, or popular product epitomize some larger shift? Is trust in tech companies eroding—or is a subset just especially vocal about it? Polling would make those answers clear, but polling so far has been… confused. A new study, conducted by the Pew Internet Project last January and released last week, helps make the average American’s view of his or her privacy a little clearer. And their confidence in their own privacy is ... low. The study's findings—and the statistics it reports—stagger. Vast majorities of Americans are uncomfortable with how the government uses their data, how private companies use and distribute their data, and what the government does to regulate those companies. No summary can equal a recounting of the findings. Americans are displeased with government surveillance en masse:   
  • A new study finds that a vast majority of Americans trust neither the government nor tech companies with their personal data.
  • What does it look like when a society loses its sense of privacy? <div><a href="http://pubads.g.doubleclick.net/gampad/jump?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drobinson-meyer%26title%3Damerican-surveillance-now-threatens-american-business%26pos%3Din-article&sz=300x250&c=285899172&tile=1" title=""><img style="border:none;" src="http://pubads.g.doubleclick.net/gampad/ad?iu=%2F4624%2FTheAtlanticOnline%2Fchannel_technology&t=src%3Dblog%26by%3Drobinson-meyer%26title%3Damerican-surveillance-now-threatens-american-business%26pos%3Din-article&sz=300x250&c=285899172&tile=1" alt="" /></a></div>In the almost 18 months since the Snowden files first received coverage, writers and critics have had to guess at the answer. Does a certain trend, consumer complaint, or popular product epitomize some larger shift? Is trust in tech companies eroding—or is a subset just especially vocal about it? Polling would make those answers clear, but polling so far has been… confused. A new study, conducted by the Pew Internet Project last January and released last week, helps make the average American’s view of his or her privacy a little clearer. And their confidence in their own privacy is ... low. The study's findings—and the statistics it reports—stagger. Vast majorities of Americans are uncomfortable with how the government uses their data, how private companies use and distribute their data, and what the government does to regulate those companies. No summary can equal a recounting of the findings. Americans are displeased with government surveillance en masse:   
  • ...3 more annotations...
  • “It’s clear the global community of Internet users doesn’t like to be caught up in the American surveillance dragnet,” Senator Ron Wyden said last month. At the same event, Google chairman Eric Schmidt agreed with him. “What occurred was a loss of trust between America and other countries,” he said, according to the Los Angeles Times. “It's making it very difficult for American firms to do business.” But never mind the world. Americans don’t trust American social networks. More than half of the poll’s respondents said that social networks were “not at all secure. Only 40 percent of Americans believe email or texting is at least “somewhat” secure. Indeed, Americans trusted most of all communication technologies where some protections has been enshrined into the law (though the report didn’t ask about snail mail). That is: Talking on the telephone, whether on a landline or cell phone, is the only kind of communication that a majority of adults believe to be “very secure” or “somewhat secure.”
  • According to the study, 70 percent of Americans are “at least somewhat concerned” with the government secretly obtaining information they post to social networking sites. Eighty percent of respondents agreed that “Americans should be concerned” with government surveillance of telephones and the web. They are also uncomfortable with how private corporations use their data: Ninety-one percent of Americans believe that “consumers have lost control over how personal information is collected and used by companies,” according to the study. Eighty percent of Americans who use social networks “say they are concerned about third parties like advertisers or businesses accessing the data they share on these sites.” And even though they’re squeamish about the government’s use of data, they want it to regulate tech companies and data brokers more strictly: 64 percent wanted the government to do more to regulate private data collection. Since June 2013, American politicians and corporate leaders have fretted over how much the leaks would cost U.S. businesses abroad.
  • (That may seem a bit incongruous, because making a telephone call is one area where you can be almost sure you are being surveilled: The government has requisitioned mass call records from phone companies since 2001. But Americans appear, when discussing security, to differentiate between the contents of the call and data about it.) Last month, Ramsey Homsany, the general counsel of Dropbox, said that one big thing could take down the California tech scene. “We have built this incredible economic engine in this region of the country,” said Homsany in the Los Angeles Times, “and [mistrust] is the one thing that starts to rot it from the inside out.” According to this poll, the mistrust has already begun corroding—and is already, in fact, well advanced. We’ve always assumed that the great hurt to American business will come globally—that citizens of other nations will stop using tech companies’s services. But the new Pew data shows that Americans suspect American businesses just as much. And while, unlike citizens of other nations, they may not have other places to turn, they may stop putting sensitive or delicate information online.
Paul Merrell

Netanyahu's Coalition of the Unwilling « LobeLog - 0 views

  • After Benjamin Netanyahu’s surprising victory in Israel’s national elections in March, he took until the last possible minute to complete the process of forming the government for his fourth term as Israel’s prime minister. For all the time he invested, despite making it just under the wire, Netanyahu ended up with a fragile, ultra-right-wing coalition and more work ahead of him to bring in at least one more party. The government Netanyahu presented to Israeli President Reuven Rivlin was a bare majority of 61 seats out of the 120-seat Knesset. There are no fig leafs in this coalition, no Tzipi Livni or Ehud Barak for Netanyahu to send to talk fruitlessly with the Palestinians. One might think this would make the coalition more stable, since it consists entirely of the right wing. In this, one would be wrong.
  • Netanyahu is, in fact, desperate to add another party to the coalition because there is so much tension in the current majority, most visibly between Netanyahu’s Likud party and Naftali Bennett’s HaBayit HaYehudi. Likud leaders, including Netanyahu, feel that Bennett essentially held the coalition hostage to his demands. They are quite right about that, but the gambit paid off handsomely for Bennett. HaBayit HaYehudi holds a mere eight seats in the Knesset. Yet Bennett and his party will get four ministries, the deputy defense minister post, as well as the chairs of two key Knesset committees dealing with Israel’s legal system. That is what you get when you play hardball with Netanyahu, a man who likes to talk tough but who is a political creature first and foremost and quickly backs off from a high-stakes fight he is not sure he can win. As things stand, this coalition might not last the year. That is why, after Avigdor Lieberman quit his post as foreign minister and took his greatly diminished party into the opposition, Netanyahu left the post open by keeping that portfolio for himself. In reality, Netanyahu has been the foreign minister all along, so it is not an added burden for him.
  • On the day that Netanyahu was supposed to present his government, he was still eight seats short of a majority. Luckily for Bennett, that was the exact number of seats he controlled and he let Netanyahu know just how lucky he was. Bennett played a game of chicken with Netanyahu, pushing for more and more power within the government and knowing that Bibi was going to have a hard time saying no to anything. Bennett won, and the spoils were vast. The far-right HaBayit HaYehudi party now controls the ministries of education, agriculture, justice, and diaspora affairs. The position of deputy defense minister will also be theirs. It is even worse than it sounds. With the ministry of agriculture comes control over the World Zionist Organization’s Settlement Division, which funds the expansion of settlements. Uri Ariel, perhaps the most extreme pro-settler member of the Knesset, will have that portfolio.
  • ...3 more annotations...
  • Shaked is certain to work hard to undermine Israel’s fragile legal system. She will also be heading the powerful Ministerial Committee for Legislation and the Judicial Appointments Committee, giving her even more leverage to eliminate a legal system that she sees as a bastion of the left. Moreover, she is very likely to be minister of justice when the next attorney general is appointed. Uri Ariel can be equally certain to press hard for as much settlement expansion—all over the West Bank and, especially, in East Jerusalem—as the available shekels and the defense minister, who will still be Moshe Ya’alon, will allow. I would rather not even think about what Bennett, the new minister of education, is going to do to the minds of Israeli students. Academia is also thought of as a bastion of the left in Israel, and the climate for free thought in Israeli institutions is certainly threatened now.
  • A Question of Longevity The real question about all of this is how long it will last. An ultra-right government like this one is not going to get along well with the Obama administration or most of Europe, although the Republican-led Congress is likely to fall in love with it. Some may hope that this will be a case of things getting so bad that political pressure for improvement must come. Sadly, such is not the history of Israel or of this conflict. Netanyahu will be spending the next few months trying to woo Isaac Herzog into the government, and this is what the whole game comes down to. If Herzog joins and creates a national unity government of 85 seats, this government will survive. The Labor Party, which makes up most of the Zionist Union, is unlikely to provide much of a counter to the right-wing majority. Much more likely is that, as has happened in the past, many of Labor’s Knesset members and other leaders will bolt the party rather than serve as a fig leaf for such a far-right government.
  • If Herzog does not join the government, this fourth Netanyahu government will not outlast Barack Obama’s presidency, and might not even come close. The right wing does not play well together, and it will take nothing more than a few well-timed votes of no-confidence to take down this government even if none of the parties bolts. Even that scenario, however, offers little hope. The last elections were hailed as a comeback for Labor, but the center and left still cannot form a coalition without the Joint List (a coalition of mostly Arab parties), and that remains anathema in Israeli politics. In fact, little changed in the left-right balance in the last elections, and that is showing no signs of turning around. It has never been clearer that positive change in Israel is going to require some sort of meaningful action by the United States and/or Europe. If that does not come, and it does not seem to be on the horizon, disaster looms.
  •  
    The dust settles quickly in Israel. Already -- -- A bill is moving through the Knesset and is expected to pass, permanently annexing the entire Jordan Valley and the Syrian Golan Heights.   --  The Israeli military is conducting large-scale maneuvers in the West Bank. Palestinians are seeing it as prelude to a mass eviction of Palestinians from the Jordan Valley.   -- A large section of East Jerusalem has been walled off with an iron gate, prelude to annexation and expulsion of its Palestinian residents. -- Netanyahu is so desperate for posts to offer another party in the national government that he has introduced legislation in the Knesset which would suspend, until the next government is formed, the limit on the number of cabinet ministers and deputy ministers and to allow ministers without portfolio. The centrist Yesh Atid party has served notice of intent to sue to block the legislation.  
Paul Merrell

Silicon Valley spars with Obama over 'backdoor' surveillance | TheHill - 0 views

  • Silicon Valley and a bipartisan group of lawmakers are lining up against the Obama administration, criticizing what they see as a lack of support for total online privacy.The steady rise of sophisticated privacy techniques such as encryption and anonymity software has put the government in a difficult position — trying to support the right to privacy while figuring out how to prevent people from evading law enforcement.ADVERTISEMENT“The technologies are evolving in ways that potentially make this trickier,” President Obama said during a January news conference with British Prime Minister David Cameron.The conundrum has led to a heated debate in Washington: Should law enforcement have guaranteed access to data?
  • The Obama administration — from officials with FBI and the National Security Agency (NSA) to the president himself — has come out in favor of some form of guaranteed access while still endorsing strong encryption.“If we get into a situation in which the technologies do not allow us at all to track somebody that we're confident is a terrorist,” Obama said, “that's a problem.”What shape that access takes, however, is unclear.“The dialogue that we're engaged in is designed to make sure that all of us feel confident that if there is an actual threat out there, our law enforcement and our intelligence officers can identify that threat and track that threat at the same time that our governments are not going around phishing into whatever text you might be sending on your smartphone,” Obama said. “And I think that's something that can be achieved.”Privacy hawks on Capitol Hill aren’t buying it.
  • “I don’t think much of that,” Rep. Joe Barton (R-Texas), co-founder of the Congressional Bipartisan Privacy Caucus, told The Hill. “We have a huge homeland security apparatus with almost unlimited authority to — with some sort of a reasonable suspicion — check almost any type of communication, whether it’s voice, Internet, telephonic, electronic, you name it.”“Those were positions that did not receive rave reviews here in Silicon Valley,” said Rep. Zoe Lofgren (D-Calif.), whose district includes parts of tech-heavy San Jose.Many believe the administration’s stance is inherently at odds with robust digital protection.“In order to fully implement what he's suggesting, you would need one of two things,” Lofgren said.One would be installing so-called “backdoors” in encryption — an access point known only to law enforcement agencies. Security experts find this concept abhorrent, since cyber crooks or foreign intelligence agencies would likely exploit it.
  • ...1 more annotation...
  • The second would be to have a third-party company hold all user data, with some sort of agreement to disclose information to the government, Lofgren said.“I think actually the trend line is in a different direction, which is encryption that is not accessible to the companies that provide it, either,” she added.  Major tech companies like Apple have done exactly that, claiming that even they can’t unlock data on newer devices.
Paul Merrell

Bush calls for broader government surveillance | TheHill - 0 views

  • Republican presidential candidate Jeb Bush on Wednesday said he favors broader government surveillance of Americans, calling for private tech firms to cooperate better with federal agencies to “make sure that evildoers aren’t in our midst.”  "There's a place to find common ground between personal civil liberties and [the National Security Agency] doing its job," the former Florida governor said. "I think the balance has actually gone the wrong way." ADVERTISEMENTAt a national security forum in South Carolina on Tuesday, the presidential hopeful addressed the ongoing battle between Silicon Valley and the Obama administration over whether law enforcement officials should have guaranteed access to encrypted customer data at major tech firms. Bush said encryption “makes it harder for the American government to do its job” and called for “a new arrangement with Silicon Valley” to address what he termed as a “dangerous situation.”
Paul Merrell

Privacy board report last straw on NSA surveillance program, lawmakers say | TheHill - 0 views

  • Lawmakers are renewing their calls for an end to a controversial surveillance program that collects data about virtually all American phone calls, citing the newest recommendations from a government privacy board.This newest set of recommendations “spells the final end of the government's bulk collection” of phone call data, Rep. Adam Schiff (D-Calif.) said in a statement.The Privacy and Civil Liberties Oversight Board — tasked with overseeing the country’s surveillance activities — released its first report on the controversial surveillance programs made public by former National Security Agency contractor Edward Snowden last year.
  • The board recommended that the government end the phone data program, questioning its efficacy and saying that it “lacks a viable legal foundation” and “raises serious threats to privacy and civil liberties as a policy matter, and has shown only limited value.”Last week, President Obama outlined changes he plans to make to the surveillance program, including requiring intelligence agencies to get court approval before accessing the phone data.Critics of the NSA and its phone data program say Obama didn’t go far enough in his speech and are now pointing to the privacy board’s report as evidence that more needs to be done.“The president's recommendations last week did not go far enough to rein in the out-of-control National Security Agency,” Sen. Bernie Sanders (I-Vt.) — who has questioned the intelligence community on whether it spies on officials — said in a statement.
  • “This report underscores that the collection of records on virtually every phone call made in the United States is an unconstitutional violation of the privacy rights guaranteed by the Fourth Amendment,” he said, calling on Congress to “pass strong legislation to protect the privacy and civil liberties of the American people.”Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.), co-author of the USA Freedom Act, which would end bulk surveillance programs, said the report highlights the need for congressional action.“The report appropriately calls into question the legality and constitutionality of the program, and underscores the need to change the law to rein in the government’s overbroad interpretation” of its surveillance authority, he said in a statement.Schiff called for congressional action before next year’s sunset of a surveillance-enabling national security law.“Congress will not re-authorize bulk collection of this data when it expires next year, but Congress should not wait for the program to expire on its own,” he said. “Rather we should work to restructure the program now.”
  • ...2 more annotations...
  • House Judiciary Committee Chairman Bob Goodlatte (R-Va.) vowed to consider the report as his committee looks at the phone data program, which “is in need of significant reform.”In his statement, Goodlatte said he plans to hold a hearing “soon” to examine Obama’s announced plans to rein in surveillance, as well as the recommendations from the privacy board and a White House-convened group of privacy and intelligence experts.Rep. Mike Rogers (R-Mich.), chairman of the House Intelligence Committee and an ardent defender of the NSA, slammed the report, accusing the privacy board of overstepping its boundaries. 
  • Rogers pointed to the 17 federal judges who, in 38 cases, “examined this issue and found the telephone metadata program to be legal, concluding this program complies with both the statutory text and with the U.S. Constitution.”The privacy board should “advise policymakers on civil liberties and privacy aspects of national security programs, and not partake in unwarranted legal analysis” or “go outside its expertise to opine on the effectiveness of counterterrorism programs,” Rogers said in a statement. 
Paul Merrell

Glassholes: A Mini NSA on Your Face, Recorded by the Spy Agency | Global Research - 0 views

  • eOnline reports: A new app will allow total strangers to ID you and pull up all your information, just by looking at you and scanning your face with their Google Glass. The app is called NameTag and it sounds CREEPY. The “real-time facial recognition” software “can detect a face using the Google Glass camera, send it wirelessly to a server, compare it to millions of records, and in seconds return a match complete with a name, additional photos and social media profiles.” The information listed could include your name, occupation, any social media profiles you have set up and whether or not you have a criminal record (“CRIMINAL HISTORY FOUND” pops up in bright red letters according to the demo).
  • Since the NSA is tapping into all of our digital communications, it is not unreasonable to assume that all of the info from your digital glasses – yup, everything – may be recorded by the spy agency. Are we going to have millions of mini NSAs walking around recording everything … glassholes? It doesn’t help inspire confidence that America’s largest police force and Taser are beta-testing Google Glasses. Postscript: I love gadgets and tech, and previously discussed the exciting possibilities of Google Glasses. But the NSA is ruining the fun, just like it’s harming U.S. Internet business.
  •  
    Thankfully, there's buddying technology to block computer facial-recognition algorithms. http://tinyurl.com/mzfyfra On the other hand, used Hallowe'en masks can usually be purchased inexpensively from some nearby school kids at this time of year. Now if I could just put together a few near-infrared LEDs to fry a license plate-scanner's view ...  
Gary Edwards

You Won't BELIEVE What's Going On with Government Spying on Americans - BlackListedNews... - 1 views

  •  
    "New Revelations Are Breaking Every Day" This web page is very well sourced and filled with links where you will get lost for hours. Excellent reference document ............................ Revelations about the breathtaking scope of government spying are coming so fast that it's time for an updated roundup: - Just weeks after NSA boss Alexander said that a review of NSA spying found not even one violation, the Washington Post published an internal NSA audit showing that the agency has broken its own rules thousands of times each year - 2 Senators on the intelligence committee said the violations revealed in the Post article were just the "tip of the iceberg" - Glenn Greenwald notes:  "One key to the WashPost story: the reports are internal, NSA audits, which means high likelihood of both under-counting & white-washing".(Even so, the White House tried to do damage control by retroactively changing on-the-record quotes) - The government is spying on essentially everything we do. It is not just "metadata" … although that is enough to destroy your privacy - The government has adopted a secret interpretation of the Patriot Act which allows it to pretend that "everything" is relevant … so it spies on everyone - NSA whistleblowers say that the NSA collects all of our conversations word-for-word - It's not just the NSA … Many other agencies, like the FBI and IRS - concerned only with domesticissues - spy on Americans as well - The information gained through spying is shared with federal, state and local agencies, and they are using that information to prosecute petty crimes such as drugs and taxes.  The agencies are instructed to intentionally "launder" the information gained through spying, i.e. to pretend that they got the information in a more legitimate way … and to hide that from defense attorneys and judges - Top counter-terror experts say that the government's mass spying doesn't keep us
Paul Merrell

Exclusive: John McAfee vows to make Internet 'impossible to hack' in Silicon Valley ret... - 0 views

  • Anti-virus software pioneer John McAfee, who buried himself in the sand to hide from police in Belize, faked a heart attack in a Guatemalan detention center and admits playing the "crazy card," says he's now ready for his next adventure: a return to Silicon Valley. At age 67, McAfee is promising to launch a new cybersecurity company that will make the Internet safer for everyone. "My new technology is going to provide a new type of Internet, a decentralized, floating and moving Internet that is impossible to hack, impossible to penetrate and vastly superior in terms of its facility and neutrality. It solves all of our security concerns," McAfee said in an interview with the San Jose Mercury News.
Paul Merrell

Dr. Joseph Bonneau Wins NSA Award, Criticizes NSA | Electronic Frontier Foundation - 0 views

  • "Like many in the community of cryptographers and security engineers, I’m sad that we haven’t better informed the public about the inherent dangers and questionable utility of mass surveillance. And like many American citizens I’m ashamed we’ve let our politicians sneak the country down this path." -- Bonneau On July 18th, Dr. Joseph Bonneau, a software engineer at Google, received the National Security Agency’s award for the best scientific cybersecurity paper.  According to its stated mission, the competition was created to help broaden the scientific foundations of cybersecurity needed in the development of systems that are resilient to cyber attacks. But Bonneau was deeply conflicted about receiving the award, noting on his blog that even though he was flattered to receive the award he didn’t condone the mass surveillance programs run by the NSA:  “Simply put, I don’t think a free society is compatible with an organisation like the NSA in its current form." Bonneau elaborated on his feelings in a Twitter discussion as well as in an interview with Animal during which he said: "I’d rather have it [the NSA] abolished than persist in its current form. I think there’s a question about whether it’s possible to reform the NSA into something that’s more reasonable."
  • Engineers and researchers like Bonneau have a unique and important role to play in fighting back against NSA oversteps. As Michael Hirsh noted in the Atlantic last month, "The government's massive data collection and surveillance system was largely built not by professional spies or Washington bureaucrats but by Silicon Valley and private defense contractors."  As Hirsh explained, tech companies have contributed enormously to wiring up Big Brother -- companies like Palantir Technologies, Eagle Alliance (of Computer Sciences Corp. and Northrup Grumman) and Booz Allen Hamilton. The only way the government gets to spy on everyone is when people who are intelligent and innovative enough to build scalable surveillance technologies decide to help them.
  •  
    A courageous stand.
Paul Merrell

Stand Firm, John Kerry - Zbigniew Brzezinski and Frank Carlucci and Lee Hamilton and Ca... - 0 views

  • By ZBIGNIEW BRZEZINSKI, FRANK CARLUCCI, LEE HAMILTON, CARLA A. HILLS, THOMAS PICKERING and HENRY SIEGMAN
  • e commend Secretary of State John Kerry’s extraordinary efforts to renew Israeli-Palestinian talks and negotiations for a framework for a peace accord, and the strong support his initiative has received from President Barack Obama. We believe these efforts, and the priority Kerry has assigned to them, have been fully justified. However, we also believe that the necessary confidentiality that Secretary Kerry imposed on the resumed negotiations should not preclude a far more forceful and public expression of certain fundamental U.S. positions: Settlements: U.S. disapproval of continued settlement enlargement in the Occupied Territories by Israel’s government as “illegitimate” and “unhelpful” does not begin to define the destructiveness of this activity. Nor does it dispel the impression that we have come to accept it despite our rhetorical objections. Halting the diplomatic process on a date certain until Israel complies with international law and previous agreements would help to stop this activity and clearly place the onus for the interruption where it belongs.
  • Palestinian incitement: Prime Minister Benjamin Netanyahu’s charge that various Palestinian claims to all of historic Palestine constitute incitement that stands in the way of Israel’s acceptance of Palestinian statehood reflects a double standard. The Likud and many of Israel’s other political parties and their leaders make similar declarations about the legitimacy of Israel’s claims to all of Palestine, designating the West Bank “disputed” rather than occupied territory. Moreover, Israeli governments have acted on those claims by establishing Jewish settlements in East Jerusalem and throughout the West Bank. Surely the “incitement” of Palestinian rhetoric hardly compares to the incitement of Israel’s actual confiscations of Palestinian territory. If the United States is not prepared to say so openly, there is little hope for the success of these talks, which depends far more on the strength of America’s political leverage and its determination to use it than on the good will of the parties.
  • ...4 more annotations...
  • The Jewishness of the state of Israel: Israel is a Jewish state because its population is overwhelmingly Jewish, Jewish religious and historical holidays are its national holidays, and Hebrew is its national language. But Israeli demands that Palestinians recognize that Israel has been and remains the national homeland of the Jewish people is intended to require the Palestinians to affirm the legitimacy of Israel’s replacement of Palestine’s Arab population with its own. It also raises Arab fears of continuing differential treatment of Israel’s Arab citizens. Israelis are right to demand that Palestinians recognize the fact of the state of Israel and its legitimacy, which Palestinians in fact did in 1988 and again in 1993. They do not have the right to demand that Palestinians abandon their own national narrative, and the United States should not be party to such a demand. That said, Palestinian recognition of Israel as a Jewish state, provided it grants full and equal rights to its non-Jewish citizens, would not negate the Palestinian national narrative.
  • Israeli security: The United States has allowed the impression that it supports a version of Israel’s security that entails Israeli control of all of Palestine’s borders and part of its territory, including the Jordan Valley. Many former heads of Israel’s top intelligence agencies, surely among the best informed in the country about the country’s security needs, have rejected this version of Israel’s security. Meir Dagan, a former head of the Mossad, dismissed it as “nothing more than manipulation.” Israel’s confiscation of what international law has clearly established as others’ territory diminishes its security. Illegal West Bank land grabs only add to the Palestinian and the larger Arab sense of injustice that Israel’s half-century-long occupation has already generated, and fuels a revanchismthat sooner or later will trigger renewed violence. No Palestinian leader could or would ever agree to a peace accord that entails turning over the Jordan Valley to Israeli control, either permanently or for an extended period of time, thus precluding a peace accord that would end Israel’s occupation. The marginal improvement in Israel’s security provided by these expansive Israeli demands can hardly justify the permanent subjugation and disenfranchisement of a people to which Israel refuses to grant citizenship in the Jewish state.
  • The terms for a peace accord advanced by Netanyahu’s government, whether regarding territory, borders, security, resources, refugees or the location of the Palestinian state’s capital, require compromises of Palestinian territory and sovereignty on the Palestinian side of the June 6, 1967, line. They do not reflect any Israeli compromises, much less the “painful compromises” Netanyahu promised in his May 2011 speech before a joint meeting of Congress. Every one of them is on the Palestinian side of that line. Although Palestinians have conceded fully half of the territory assigned to them in the U.N.’s Partition Plan of 1947, a move Israel’s president, Shimon Peres, has hailed as unprecedented, they are not demanding a single square foot of Israeli territory beyond the June 6, 1967, line. Netanyahu’s unrelenting efforts to establish equivalence between Israeli and Palestinian demands, insisting that the parties split the difference and that Israel be granted much of its expansive territorial agenda beyond the 78 percent of Palestine it already possesses, are politically and morally unacceptable. The United States should not be party to such efforts, not in Crimea nor in the Palestinian territories. We do not know what progress the parties made in the current talks prior to their latest interruption, this time over the issue of the release of Palestinian prisoners. We are nevertheless convinced that no matter how far apart the parties may still be, clarity on America’s part regarding the critical moral and political issues in dispute will have a far better chance of bringing the peace talks to a successful conclusion than continued ambiguity or silence.
  • The co-authors, senior advisers to the U.S./Middle East Project, are, respectively, former national security adviser, former U.S. secretary of defense; former chair of the House Foreign Affairs Committee; former U.S. trade representative; former under secretary of state for political affairs, and president, U.S./Middle East Project.
  •  
    Brzezinski and other high former foreign relations officials publicly criticizing the Israeli position and calling for a hardened U.S. position that Israel must halt enlargement of settlements in East Jerusalem and the West Bank before negotiations will resume to "clearly place the onus for the interruption where it belongs," whew! Times are definitely changing. 
Paul Merrell

WikiLeaks' Julian Assange warns: Google is not what it seems - 1 views

  • Back in 2011, Julian Assange met up with Eric Schmidt for an interview that he considers the best he’s ever given. That doesn’t change, however, the opinion he now has about Schmidt and the company he represents, Google.In fact, the WikiLeaks leader doesn’t believe in the famous “Don’t Be Evil” mantra that Google has been preaching for years.Assange thinks both Schmidt and Google are at the exact opposite spectrum.“Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation. But Google has always been comfortable with this proximity,” Assange writes in an opinion piece for Newsweek.
  • “Long before company founders Larry Page and Sergey Brin hired Schmidt in 2001, their initial research upon which Google was based had been partly funded by the Defense Advanced Research Projects Agency (DARPA). And even as Schmidt’s Google developed an image as the overly friendly giant of global tech, it was building a close relationship with the intelligence community,” Assange continues.Throughout the lengthy article, Assange goes on to explain how the 2011 meeting came to be and talks about the people the Google executive chairman brought along - Lisa Shields, then vice president of the Council on Foreign Relationship, Jared Cohen, who would later become the director of Google Ideas, and Scott Malcomson, the book’s editor, who would later become the speechwriter and principal advisor to Susan Rice.“At this point, the delegation was one part Google, three parts US foreign-policy establishment, but I was still none the wiser.” Assange goes on to explain the work Cohen was doing for the government prior to his appointment at Google and just how Schmidt himself plays a bigger role than previously thought.In fact, he says that his original image of Schmidt, as a politically unambitious Silicon Valley engineer, “a relic of the good old days of computer science graduate culture on the West Coast,” was wrong.
  • However, Assange concedes that that is not the sort of person who attends Bilderberg conferences, who regularly visits the White House, and who delivers speeches at the Davos Economic Forum.He claims that Schmidt’s emergence as Google’s “foreign minister” did not come out of nowhere, but it was “presaged by years of assimilation within US establishment networks of reputation and influence.” Assange makes further accusations that, well before Prism had even been dreamed of, the NSA was already systematically violating the Foreign Intelligence Surveillance Act under its director at the time, Michael Hayden. He states, however, that during the same period, namely around 2003, Google was accepting NSA money to provide the agency with search tools for its rapidly-growing database of information.Assange continues by saying that in 2008, Google helped launch the NGA spy satellite, the GeoEye-1, into space and that the search giant shares the photographs from the satellite with the US military and intelligence communities. Later on, 2010, after the Chinese government was accused of hacking Google, the company entered into a “formal information-sharing” relationship with the NSA, which would allow the NSA’s experts to evaluate the vulnerabilities in Google’s hardware and software.
  • ...1 more annotation...
  • “Around the same time, Google was becoming involved in a program known as the “Enduring Security Framework” (ESF), which entailed the sharing of information between Silicon Valley tech companies and Pentagon-affiliated agencies at network speed.’’Emails obtained in 2014 under Freedom of Information requests show Schmidt and his fellow Googler Sergey Brin corresponding on first-name terms with NSA chief General Keith Alexander about ESF,” Assange writes.Assange seems to have a lot of backing to his statements, providing links left and right, which people can go check on their own.
  •  
    The "opinion piece for Newsweek" is an excerpt from Assange's new book, When Google met Wikileaks.  The chapter is well worth the read. http://www.newsweek.com/assange-google-not-what-it-seems-279447
Gary Edwards

What Happens Next Will Amaze You - by Maciej Cegłowski - 1 views

  • But there's something very fishy about California capitalism. Investing has become the genteel occupation of our gentry, like having a country estate used to be in England. It's a class marker and a socially acceptable way for rich techies to pass their time. Gentlemen investors decide what ideas are worth pursuing, and the people pitching to them tailor their proposals accordingly. The companies that come out of this are no longer pursuing profit, or even revenue. Instead, the measure of their success is valuation—how much money they've convinced people to tell them they're worth. There's an element of fantasy to the whole enterprise that even the tech elite is starting to find unsettling.
  • We had people like this back in Poland, except instead of venture capitalists we called them central planners. They too were in charge of allocating vast amounts of money that didn't belong to them. They too honestly believed they were changing the world, and offered the same kinds of excuses about why our day-to-day life bore no relation to the shiny, beautiful world that was supposed to lie just around the corner.
  • So what kinds of ideas do California central planners think are going to change the world? Well, right now, they want to build space rockets and make themselves immortal. I wish I was kidding.
  •  
    One of the best reads have had in a long time. Excellent commentary on life, society, the Internet, emerging technologies, privacy and Silicon Valley. A must read if ever there was one. Maciej Cegłowski has also posted a collection of his talks here: http://idlewords.com/talks/
Gary Edwards

Where The Bailout Was Born: One Year Ago, at Stanford - March 10th, 2008 - 0 views

  •  
    We just passed the first anniversary of an important, if little noted, meeting where the plans for what would become the government's attempted bailout of the banking system were first hatched. One year ago, a group of venture capitalists, Silicon Valley executives and professors at the Stanford Institute for Economic Policy Research met to discuss the looming crisis in finance and debate a possible bailout. It was early for such talk. Bear Stearns had not yet collapsed. Hank Paulson was still deriding the notion of a bailout and knotting his brow about moral hazard. But the group gathered at Stanford, which included Larry Summers and Long-Term Capital Management veteran and Nobel laureate Myron Scholes, saw what was coming: the government would eventually spend a lot of tax payer money in an attempt to clean up the credit mess.
Gary Edwards

American Thinker: The Re-Establishment of America - 0 views

  •  
    Nails it.  This is exactly what is happening in my neighborhood.  And i'm at the epicenter of Silicon Valley;  about as liberal, far-left, marxist-statist-socialist as it gets.  Yet here we are.  As Lady Thatcher famously once said, " 'The trouble with socialism is that eventually you run out of other people's money".  "Eventually" has arrived.   excerpt:  America is on the verge of something unprecedented in history: the peaceful, constitutional replacement of our country's entire political establishment. This is what lies behind the decisions of so many elected officials, at every level, to step aside rather than fight for reelection. And it explains how the Tea Party movement can exert so much political leverage without nominating its own candidates or even without formally choosing its own leaders. Most of the time, we Americans don't pay much attention to politics. We focus all of our energy on our jobs, our families, and our faith. We work hard, play by the rules, and wish only to be left alone. We love our country, consider ourselves blessed to be living here, and ask little from the men and women we elect except to keep from screwing things up. But in just the last decade, Americans were shocked by two catastrophes we hadn't imagined our political establishment would allow to happen. The first was 9-11, when nineteen terrorists successfully attacked our homeland, and by doing so revealed that for years, al-Qaeda and its allies had been waging holy war against us. The second was the 2008 financial crash, which revealed that our economy is a house of cards built on a pile of debt so high we cannot possibly repay it.
Gary Edwards

Bill of Rights: Alexander Hamilton, Federalist, no. 84, 575--81 - 0 views

  • The most considerable of these remaining objections is, that the plan of the convention contains no bill of rights. Among other answers given to this, it has been upon different occasions remarked, that the constitutions of several of the states are in a similar predicament.
  • It has been several times truly remarked, that bills of rights are in their origin, stipulations between kings and their subjects, abridgments of prerogative in favor of privilege, reservations of rights not surrendered to the prince.
  • It is evident, therefore, that according to their primitive signification, they have no application to constitutions professedly founded upon the power of the people, and executed by their immediate representatives and servants.
  • ...6 more annotations...
  • the people surrender nothing, and as they retain every thing, they have no need of particular reservations.
  • I will not contend that such a provision would confer a regulating power; but it is evident that it would furnish, to men disposed to usurp, a plausible pretence for claiming that power.
  • I go further, and affirm that bills of rights, in the sense and in the extent in which they are contended for, are not only unnecessary in the proposed constitution, but would even be dangerous. They would contain various exceptions to powers which are not granted; and on this very account, would afford a colourable pretext to claim more than were granted.
  • For why declare that things shall not be done which there is no power to do? Why for instance, should it be said, that the liberty of the press shall not be restrained, when no power is given by which restrictions may be imposed?
  • "We the people of the United States, to secure the blessings of liberty to ourselves and our posterity, do ordain and establish this constitution for the United States of America."
  • The truth is, after all the declamation we have heard, that the constitution is itself in every rational sense, and to every useful purpose, A BILL OF RIGHTS
  •  
    University of Chicago publication on the Web of all Federalist Papers.  The question i was researching had to do with Michael Hickens comparison of Hamilton to FDR (Franklin Delano Roosevelt).  I was looking for some are where there might be some measure of "agreement" between Hamilton and FDR. Hamilton of course is known as a great defender of personal liberty, LIMITED government, and the importance of ENUMERATED powers in the Constitution.  In this paper he argues that the call for a Bill of Rights added to the proposed Constitution is uneccessary exactly because the people did not grant to the government the powers to infringe or take away any freedoms/rights to begin with.  He further argues that enumerating these "rights" would suggest that somehow the federal government would have this power!  Even though it's enumerated in the Constitution.  So why write an enumerated Constitution if you have to further enumerate the rights of the people beyond the limits of government? FDR of course is the great statist/socialist who believed that the Constitution doesn't go far enough in it's obligations to CARE for the people's needs.  So FDR proposed a second Bill of Rights that expanded the governments responsibilities and POWER to provide for damn near every physical and material need a person might ever have.   Two interesting "value statements" to consider.  Guess which one would be supported by that great Federalist, Hamilton.  And which by that great statist/socialist, FDR? Karl Marx: "From each, according to his ability; to each, according to his need" The Declaration of Independence: "We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness. - That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed, " And then there's t
Gary Edwards

Jenkins: Obama vs. the 1980s - WSJ.com - 0 views

  • "World Tax Reform: A Progress Report," his 1988 volume showed how country after country was following the U.S. in adopting Reagan-style rate-flattening and tax simplification.
  • Mr. Obama now craves a federal infrastructure bank, apparently still unable to see how growth might emerge except by bureaucrats bossing around tax dollars.
  • Simpson-Bowles Commission—proposed a Reagan-style tax reform
  •  
    excerpt:  Instead of a "stimulus" to create jobs by financing useful investments that would have paid a growth dividend in the future, we got a debt-fueled permanent expansion of entitlements and the size of government. In health care, instead of reforms to encourage competent consumers not to treat health care as a free lunch, we got a doubling down on health-care free lunchism. In banking, instead of new incentives to cause creditors to pull in the reins on risk-taking banks, we got a formalization of too big to fail. All economic crises begin differently-this one began in housing-but eventually they morph into the same old crisis of forgetting what works. Think about the last big crisis of faith in American capitalism in the early 1980s. The panic was eventually crystallized in dueling Harvard Business Review articles by George Gilder and Charles Ferguson. Mr. Ferguson, an MIT-based consultant, argued the U.S was dooming itself to vassalage unless Washington brushed aside small, poorly-funded entrepreneurs and concentrated regulatory favors and subsidies on giant firms like IBM, AT&T, Digital Equipment and Kodak. Mr. Gilder championed the then-emerging Silicon Valley paradigm. He quoted technologist Carver Mead: "We depend on the innovations of the citizens of a free economy to keep ahead of the bureaucrats and the people who make a living on control and planning. In the long term, it's the element of surprise that gives us the edge over more controlled economies." Who won hardly needs to be belabored except that it apparently does need to be belabored. Almost everything Mr. Obama understands as pro-growth consists of bets on "bureaucrats and the people who make a living on control and planning."
Paul Merrell

Sorry for letting them snoop? Dell apologizes for 'inconvenience' caused by NSA backdoo... - 0 views

  • Security researcher Jacob Appelbaum dropped a bombshell of sorts earlier this week when he accused American tech companies of placing government-friendly backdoors in their devices. Now Texas-based Dell Computers is offering an apology. Or to put it more accurately, Dell told an irate customer on Monday that they “regret the inconvenience” caused by selling to the public for years a number of products that the intelligence community has been able to fully compromise in complete silence up until this week. Dell, Apple, Western Digital and an array of other Silicon Valley-firms were all name-checked during Appelbaum’s hour-long presentation Monday at the thirtieth annual Chaos Communication Congress in Hamburg, Germany. As RT reported then, the 30-year-old hacker-cum-activist unveiled before the audience at the annual expo a collection of never-before published National Security Agency documents detailing how the NSA goes to great lengths to compromise the computers and systems of groups on its long list of adversaries.
  • Spreading viruses and malware to infect targets and eavesdrop on their communications is just one of the ways the United States’ spy firm conducts surveillance, Appelbaum said. Along with those exploits, he added, the NSA has been manually inserting microscopic computer chips into commercially available products and using custom-made devices like hacked USB cables to silently collect intelligence. One of the most alarming methods of attack discussed during his address, however, comes as a result of all but certain collusion on the part of major United States tech companies. The NSA has information about vulnerabilities in products sold by the biggest names in the US computer industry, Appelbaum said, and at the drop off a hat the agency has the ability of launching any which type of attack to exploit the flaws in publically available products.
  • The NSA has knowledge pertaining to vulnerabilities in computer servers made by Dell and even Apple’s highly popular iPhone, among other devices, Appelbaum told his audience. “Hey Dell, why is that?” Appelbaum asked. “Love to hear your statement about that.”
  • ...4 more annotations...
  • Appelbaum didn’t leave Dell off the hook after revealing just that one exploit known to the NSA, however. Before concluding his presentation, he displayed a top-secret document in which the agency makes reference to a hardware implant that could be manually installed onto Dell PowerEdge servers to exploit the JTAG debugging interface on its processor — a critical circuitry component that apparently contains a vulnerability known to the US government. “Why did Dell leave a JTAG debugging interface on these servers?” asked Appelbaum. “Because it’s like leaving a vulnerability in. Is that a bugdoor, or a backdoor or just a mistake? Well hopefully they will change these things or at least make it so that if you were to see this, you would know that you have some problems. Hopefully Dell will release some information about how to mitigate this advance persistent threat.” Appelbaum also provoked Apple by acknowledging that the NSA boasts of being able to hack into any of their mobile devices running the iOS operating system. “Either they have a huge collection of exploits that work against Apple products — meaning they are hoarding information about critical systems American companies product and sabotaging them — or Apple sabotages it themselves,” he said.
  • @DellCares @dellcarespro Inconvenience? You got to be F*ckin kidding me! You place an NSA bug in our servers and call it an inconvenience? — Martijn Wismeijer (@twiet) December 31, 2013
  • TechDirt reporter Mike Masnick noticed early Tuesday that Dell’s official customer service Twitter account opted to issue a cookie-cutter response that drips of insincerity. “Thanks you for reaching out and regret the inconvenience,” the Dell account tweeted to Wismeijer. “Our colleagues at @DellCaresPro will be able to help you out.” “Inconvenience? You got to be F*ckin kidding me!” Wismeijer responded. “You place an NSA bug in our servers and call it an inconvenience?”
  • Security researcher Jacob Appelbaum dropped a bombshell of sorts earlier this week when he accused American tech companies of placing government-friendly backdoors in their devices. Now Texas-based Dell Computers is offering an apology. Or to put it more accurately, Dell told an irate customer on Monday that they “regret the inconvenience” caused by selling to the public for years a number of products that the intelligence community has been able to fully compromise in complete silence up until this week. Dell, Apple, Western Digital and an array of other Silicon Valley-firms were all name-checked during Appelbaum’s hour-long presentation Monday at the thirtieth annual Chaos Communication Congress in Hamburg, Germany. As RT reported then, the 30-year-old hacker-cum-activist unveiled before the audience at the annual expo a collection of never-before published National Security Agency documents detailing how the NSA goes to great lengths to compromise the computers and systems of groups on its long list of adversaries.
1 - 20 of 53 Next › Last »
Showing 20 items per page