Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged cars

Rss Feed Group items tagged

Gary Edwards

Revealed: Obama's Immense Shadow Army & Its Shocking Takeover Plan - 1 views

  •  
    Is the ObamaCare train wreck a wreck by design? Another notch in the Bankster belt marking another step in the bankrupting of America? Revealed: Obama's Immense Shadow Army & Its Shocking Takeover Plan October 26, 2013  //  By: Eric Odom  //   The ObamaCare train wreck - it's awful, possibly purposeful, certainly useful for team Obama and its growing army of community activists and organizers. In a previous report, we explored the question, "What if the ObamaCare debacle is really a diversion, using a military term a "feint" - a tactical distraction to draw our attention, our focus and our fire away from the real point of attack on liberty?" Remember that horrible train wreck in Spain not long ago, captured on video? As tragic as it was, watching the crash and its gruesome aftermath was almost irresistible, wasn't it? Well, what if the disastrous rollout of the President's signature legislative achievement - what if this spectacular slow motion ObamaCare train wreck has been and is being allowed to happen so that what's going on around the bend from the fiery crash site gets little attention, from the public, from the media or from Congressional investigators? Think about it, friends. How could Barack Obama and his celebrated team of incredibly proficient, plugged in techies - the team that twice got him elected - be behind the utterly disastrous launch of the ObamaCare online storefront, healthcare.gov - arguably the biggest website failure in history? How could so much money have been spent to produce such a problem-plagued site that apparently was doomed in its developmental confusion? And how to fix this monumental mess, well, there doesn't seem to be any clear plan…other than hope. And now we learn that many, if not most, of the people actually signing up for ObamaCare through the website are enrolling in Medicaid, not signing up for private insurance policies they pay for, but adding their names onto government roll
  •  
    There is no doubt in my mind that corporations (and their Chamber of Commerce boot licking lackys) believe that employer provided healthcare benefits was a HUGE MISTAKE. The key feature of ObamaCare is that of ENDING the HMO-Employee Healthcare profit draining quagmire these corporations somehow stumbled into. (Hint: they traded healthcare benefits for wide open government assisted Globalization - the new world order Merchantilism). IMHO, the insurance companies know full well that the entire HMO-Employee Healthcare bandwagon is going to end. Not because of socialism; because of profit hungry out of control mercantilism. So they are trying to cut the best deal possible with the government. The merchantilist doesn't care that their employees are going to suffer. They only care that this cost and the blame for losing the benefit is moved from their books to the government. Nor does the merchantilist care about protecting our borders. They want cheap labor. Even if the social cost of that cheap labor lands on the government and destroys the nation. That's why the merchantilist and his Bankster financiers support Open Borders. The merchantilist could care less about the trade deficit and the massive transfer of American manufacturing jobs overseas. As long as they can sell their junk back into the USA market without a 33% import tax these bastardos are happy to destroy their country. I wonder whose army and navy will secure their investments when the USA no longer can? Are their private armies enough? Just wondering.
Paul Merrell

IETF Begins To Work On Designing A Surveillance-Resistant Net | Techdirt - 0 views

  • Edward Snowden's leaks show that the NSA and GCHQ have been systematically subverting key technologies that underlie the Internet. That betrayal of trust has prompted some soul-searching by the Net engineering community, which realizes that it needs to come up with more surveillance-resistant approaches. This story from Radio Netherlands Worldwide (RNW) provides information about the kind of thing they are working on in one key group, the Internet Engineering Task Force (IETF). It reports on a speech given by the IETF's chair, Jari Arkko, at the recent Internet Governance Forum in Bali, Indonesia.
  • Firstly, the IETF wants to eventually apply encryption to all web traffic. "Today, security only gets switched on for certain services like banking," Arkko explained, referring to IETF-developed standards like SSL -- the little lock that appears in the upper left corner of your browser to secure online purchases. "If we work hard, we can make [the entire internet] secure by default." To this end, the IETF might make encryption mandatory for HTTP 2.0, a new version of the basic web protocol. Secondly, the IETF plans to remove weak algorithms and strengthen existing algorithms behind encryption. This means that the US National Security Agency and other surveillors will find it harder to crack current forms of encryption.
  • Putting that in context, Axl Pavlik, the managing director of Europe's Internet Registry (RIPE NCC), notes that you can never stop surveillance completely, but you can make it more expensive: "You and I have limited resources, and the surveillor has limited resources -- maybe more than we have -- but if millions of users of the internet raise the bar a little bit, the requirements to surveil every little bit of internet traffic would be much higher," he explained to RNW. Mandatory use of encryption helps do that. And here's another good reason for adopting it: The IETF's plans also benefit people who are already encrypting their online activities themselves, argued Marco Hogewoning, technical adviser to RIPE NCC. According to him, these people currently stick out like a sore thumb to the very surveillors they hope to evade.
  • ...1 more annotation...
  • He has a great analogy: "If you see an armoured car now on the street, you know there must be something valuable inside," Hogewoning explained. "If everybody drives around in an armoured car, I can go around and put a lot of effort into breaking into each and every car, and hope I get lucky and find something valuable inside, but it might be empty. If everybody encrypts everything, all you can see is armoured cars." However, valuable as these moves will be in raising the cost of surveillance, there is always the problem of the endpoints: While the IETF might be able to secure the pipes through which users' data travel, users must also be able to trust the parties where their data is stored: software, hardware and services such as Cisco, Gmail and Facebook. These parties can hand over user data directly to government agencies. To address that, technical improvements aren't enough -- we need political solutions, too. Unfortunately, those are rather more difficult to engineer.
  •  
    Oh, goody some more!
Paul Merrell

Violence in Israel and the Palestinian territories - the Guardian briefing | News | The... - 0 views

  • Israel and the occupied Palestinian territories have been convulsed by a wave of escalating violence in recent days. The lethal tensions ratcheted up sharply last Thursday when a married couple, Jewish settlers from Neria in the northern West Bank, were shot and killed in a car in front of their four children near Beit Furik, allegedly by members of a five-man Hamas cell who were subsequently arrested. Two more Israelis were stabbed and killed in Jerusalem’s Old City on Saturday by a Palestinian youth, who was shot dead at the scene. On Sunday, an 18-year-old Palestinian was shot dead by Israeli forces in clashes near the West Bank town of Tulkarem. The mounting friction has seen attacks by settlers on Palestinians, clashes between Palestinians and Israeli security forces and attempted attacks continue. On Wednesday. there were incidents in Jerusalem, where a Palestinian woman stabbed an Israeli man who then shot and seriously wounded her in the Old City, the southern Israeli city of Kiryat Gat, where a Palestinian was killed after reportedly trying to seize a gun from a soldier and stabbing him, and when a female Israeli settler’s car was stoned near Beit Sahour, which adjoins Bethlehem, in an incident in which it appears other settlers fired on Palestinians, seriously injuring a youth.
  • On the Palestinian side, anger escalated earlier this week after a 13-year-old boy in Bethlehem’s Aida refugee camp was shot and killed by an Israeli sniper in an incident the Israeli military has claimed was “unintentional” as soldiers were aiming at another individual.
  • Jerusalem has remained tense now for almost a year. Most analysts blame the recent heightened tension on several factors. Key among them has been the issue of the religious site in Jerusalem known to Muslims as al-Haram al-Sharif, or the Noble Sanctuary, and Jews as the Temple Mount. A long-running campaign by some fundamentalist Jews and their supporters for expanding their rights to worship in the Al-Aqsa mosque compound on the Temple Mount, supported by rightwing members of Israeli prime minister Binyamin Netanyahu’s own cabinet, has raised the suspicion – despite repeated Israeli denials – that Israel intends to change the precarious status quo for the site, which has been governed under the auspices of the Jordanian monarchy since 1967.
  • ...6 more annotations...
  • Recent Israeli police actions at the site scandalised the Muslim world and raised tensions. Israel has also banned two volunteer Islamic watch groups – male and female – accusing them of harassing Jews during the hours they are allowed to visit. That has combined with the lack of a peace process and growing resentment and frustration in Palestinian society aimed at both Israel and the Palestinian president, Mahmoud Abbas, and the Palestinian Authority. Israel has complained in recent weeks of an increase in stone throwing and molotov cocktail attacks on West Bank roads and in areas adjoining mainly Palestinian areas of Jerusalem, where an elderly motorist died after crashing his car during an alleged stoning attack. In response, Netanyahu and his cabinet have loosened live-fire regulations over the use of .22 calibre bullets on Palestinian demonstrators. Although described by Israel as “less lethal”, it is this type of ammunition that killed 13-year-old Abdul Rahman Shadi on Monday.
  • Part of the problem is the leadership on both sides. Netanyahu leads a rightwing/far-right coalition with the smallest of majorities. Several cabinet ministers support the settler movement and have publicly criticised him for not cracking down harder on Palestinian protest. Netanyahu’s weakness is reflected on the Palestinian side, where the ageing Abbas is seen as isolated, frustrated and increasingly out of step with other members of the Palestinian leadership, who would like a tougher line against Israel over continued settlement building and the absence of any peace process.
  • In his recent speech to the UN general assembly, Abbas went further than he had ever done before in threatening to end what he claims is Palestine’s unilateral adherence to the Oslo accords, which he said Israel refuses to honour. “We cannot continue to be bound by these signed agreements with Israel and Israel must assume fully its responsibilities of an occupying power,” he said. Abbas, however, stopped short of ending security cooperation between Israel and Palestinian security forces – mainly aimed at Hamas on the West Bank – and asked the UN for international protection. His speech at the United Nations has been seen as a move to placate growing discontents in Palestinian society. Both Abbas and Netanyahu are now both engaged in a delicate balancing act, trying to avoid further escalation that would be detrimental to both while trying not to lose the support of key constituencies. On Abbas’s side, that has meant ordering Palestinian factions and security forces to desist from joining the conflict, while on Netanyahu’s side it has seen numerous warnings of harsh measures – many of which have been repeatedly announced.
  • Nentanyahu does not want to risk a position where Abbas ends security cooperation and in the local jargon “hands back the keys” – in other words revokes the Oslo accords and insists on Israel once again taking full responsibility for administering the occupied territories. For his part, Abbas is said to see a limited popular uprising as useful because of the message it delivers to both Israel and the international community of the mounting risks of a moribund peace process and how serious things could become if security cooperation were to end.
  • At the end of the last round of the peace process last year, US diplomats warned about this potential outcome and Washington has largely withdrawn from a guiding role, exhausted by the lack of progress and frustrated with Netanyahu. Despite the Palestinian desire for a new multilateral international approach, it has failed to materialise as have any US guarantees to Abbas that they intend to advance the peace process. While Syria, migration and Russia are preoccupying western governments, Israel and Palestine have been largely left to their own devices.
  • Flare-ups of violence have a habit of coming and going but hopes that this one is coming to an end appear premature for now. However, the likelihood of the current violence fading away still remains the strongest bet. The biggest risk is a miscalculation by either side, which is out of the hands of either leader, that would alter the dynamics. Individuals on both sides have led some of the worst attacks: Jewish extremists in the summer burning three members of a Palestinian family to death, and “lone wolf attacks” launched by Palestinians angry about al-Aqsa and other issues. With neither side having a clear exit strategy, there is a risk is that Netanyahu and Abbas are being led by events rather than leading.
Paul Merrell

Fanatic Israeli Settlers attack Cars of US Diplomats | nsnbc international - 0 views

  • A number of extremist Israeli settlers hurled stones at cars of an American diplomatic delegation who drove along with Israeli police vehicles to an area near the central West Bank city of Ramallah on Friday. The delegation was on its way to inspect vandalism by Israeli settlers that had targeted hundreds of Palestinian olive trees.
  • The police confirmed that the attackers are from the illegal settlements, and that an investigation is underway; no arrests were made. According to Reuters, an Israeli settler told its correspondent that the US delegates, in two cars, came within some 50 yards from the settlement, accompanied by Palestinian civilians, and alleged that a member of the delegation also withdrew his weapon. The settler told the reporter that he and other settlers then began attacking the delegation. But the Israeli police challenged that account, saying that no one from the U.S. delegation had drawn a weapon, and the consular representatives were attacked by the settlers without provocation. The settlement in question, Adi-Ad, is known as a site of frequent attacks by Israeli settlers against Palestinian civilians. It was established by armed Israeli militias on stolen Palestinian land, and is now home to 40 Israeli families, who live under the protection of armed Israeli soldiers and militias, and frequently invade the surrounding Palestinian villages to attack the unarmed Palestinian civilians who live there.
Paul Merrell

Turkey accuses US of arming Kurdish 'terrorists' - ITV News - 0 views

  • Turkey accused Barack Obama of arming “terrorists” in a Kurdish militant group in Syria which it has blamed for a deadly car bombing which claimed at least 28 lives on Wednesday.
  • The Turkish President Recep Tayyip Erdoğan has accused the US-supported Kurdish rebel group YPG of carrying out the attack in Ankara. America has supported the YPG fighters - linked to the political PYD group - in their fight against Islamic State in Syria but Turkey insists they are terrorists. Erdoğan said he tell Mr Obama that plane loads of weapons sent from the US had aided Kurdish group - and had also ended up in the hands of Isis. "Three plane loads arrived, half of them ended up in the hands of Daesh (Islamic State), and half of them in the hands of the PYD," he said
  •  
    Many reporters have suggested that the car bombing in Ankara was a false flag attack designed to justify Turkey's announced intent to seize a 10-mile strip of Syria to block formation of an independent  Kurdish territory on Turkey's border.  
Paul Merrell

ICE has struck a deal to track license plates across the US - The Verge - 0 views

  • The Immigration and Customs Enforcement (ICE) agency has officially gained agency-wide access to a nationwide license plate recognition database, according to a contract finalized earlier this month. The system gives the agency access to billions of license plate records and new powers of real-time location tracking, raising significant concerns from civil libertarians. The source of the data is not named in the contract, but an ICE representative said the data came from Vigilant Solutions, the leading network for license plate recognition data. “Like most other law enforcement agencies, ICE uses information obtained from license plate readers as one tool in support of its investigations,” spokesperson Dani Bennett said in a statement. “ICE is not seeking to build a license plate reader database, and will not collect nor contribute any data to a national public or private database through this contract.”
  • While it collects few photos itself, Vigilant Solutions has amassed a database of more than 2 billion license plate photos by ingesting data from partners like vehicle repossession agencies and other private groups. Vigilant also partners with local law enforcement agencies, often collecting even more data from camera-equipped police cars. The result is a massive vehicle-tracking network generating as many as 100 million sightings per month, each tagged with a date, time, and GPS coordinates of the sighting.
  • ICE agents would be able to query that database in two ways. A historical search would turn up every place a given license plate has been spotted in the last five years, a detailed record of the target’s movements. That data could be used to find a given subject’s residence or even identify associates if a given car is regularly spotted in a specific parking lot. “Knowing the previous locations of a vehicle can help determine the whereabouts of subjects of criminal investigations or priority aliens to facilitate their interdiction and removal,” an official privacy assessment explains. “In some cases, when other leads have gone cold, the availability of commercial LPR data may be the only viable way to find a subject.” ICE agents can also receive instantaneous email alerts whenever a new record of a particular plate is found — a system known internally as a “hot list.” (The same alerts can also be funneled to the Vigilant’s iOS app.) According to the privacy assessment, as many as 2,500 license plates could be uploaded to the hot list in a single batch, although the assessment does not detail how often new batches can be added. With sightings flooding in from police dashcams and stationary readers on bridges and toll booths, it would be hard for anyone on the list to stay unnoticed for long. Those powers are particularly troubling given ICE’s recent move to expand deportations beyond criminal offenders, fueling concerns of politically motivated enforcement. In California, state officials have braced for rumored deportation sweeps targeted at sanctuary cities. In New York, community leaders say they’ve been specifically targeted for deportation as a result of their activism. With automated license plate recognition, that targeting would only grow more powerful. For civil liberties groups, the implications go far beyond immigration.
  • ...1 more annotation...
  • The new license plate reader contract comes after years of internal lobbying by the agency. ICE first tested Vigilant’s system in 2012, gauging how effective it was at locating undocumented immigrants. Two years later, the agency issued an open solicitation for the technology, sparking an outcry from civil liberties group. Homeland Security secretary Jeh Johnson canceled the solicitation shortly afterward, citing privacy concerns, although two field offices subsequently formed rogue contracts with Vigilant in apparent violation of Johnson’s policy. In 2015, Homeland Security issued another call for bids, although an ICE representative said no contract resulted from that solicitation. As a result, this new contract is the first agency-wide contract ICE has completed with the company, a fact that is reflected in accompanying documents. On December 27th, 2017, Homeland Security issued an updated privacy assessment of license plate reader technology, a move it explained was necessary because “ICE has now entered into a contract with a vendor.” The new system places some limits on ICE surveillance, but not enough to quiet privacy concerns. Unlike many agencies, ICE won’t upload new data to Vigilant’s system but simply scan through the data that’s already there. In practical terms, that means driving past a Vigilant-linked camera might flag a car to ICE, but driving past an ICE camera won’t flag a car to everyone else using the system. License plates on the hot list will also expire after one year, and the system retains extensive audit logs to help supervisors trace back any abuse of the system. Still, the biggest concern for critics is the sheer scale of Vigilant’s network, assembled almost entirely outside of public accountability. “If ICE were to propose a system that would do what Vigilant does, there would be a huge privacy uproar and I don’t think Congress would approve it,” Stanley says. “But because it’s a private contract, they can sidestep that process.”
Paul Merrell

Asia Times Online :: Orwell does America - 0 views

  • Welcome to the sweet abyss of an Orwellian vortex. 2013 increasingly looks like 1984. In two previous articles, for RT RT and for Asia Times Online I have looked into the superimposed levels of blowback implied by the Boston bombing. With still so many unanswered questions regarding what took place on the ground in Boston after the bombing, it's time to look at an extra, possible Top Ten list of lingering absurdities. And this without sidestepping other unanswered crucial questions, such as why a bomb drill - organized by Craft - was going on during the marathon at which the bombing took place; and why it was <a href='http://asianmedia.com/GAAN/www/delivery/ck.php?n=a9473bc7&cb=%n' target='_blank'><img src='http://asianmedia.com/GAAN/www/delivery/avw.php?zoneid=36&cb=%n&n=a9473bc7&ct0=%c' border='0' alt='' ></a> vehemently denied that a bomb drill was going on. For this current set of questions, I'm grateful for the help of Asia Times Online's Bostonian readers.
  • 2. Since 9/11, the preferred FBI modus operandi is to use informants to lure ''potential'' terra-rists to act. See for example the Fast and Furious<-style Iran cum Mexican cartel plot. There's a strong possibility the Tsarnaev brothers were set up. In this case, is there anyone anywhere among the vast US intel apparatus investigating the FBI investigators?
  • 4. A Saudi student, injured at the bombing, who was in the US via a legal student visa, is suddenly deported on ''national security grounds'', even as investigators found ''unusual burns'' on his hand inconsistent with the injuries of other victims. He may have been a member of a Saudi clan notorious for its al-Qaeda connections. The FBI ''investigation'' is suddenly dropped shortly after the Saudi ambassador in the US held an unscheduled meeting with President Barack Obama. Add to it that even before the smoke had cleared, the Israel Lobby and the notorious disinformation website DEBKA were pointing their fingers at ''domestic terrorists with Middle East connections''.
  • ...3 more annotations...
  • 9. The whole law enforcement apparatus insisted that there was a heavy exchange of gunfire with Dzokhar while he was hiding in a boat, before his arrest. That is false. He was unarmed, barely moving and the hail of bullets towards the boat came from the police.
  • 5. The description of the car hijacked by the brothers, a Mercedes E350 SUV, matches the description of their car left at a service station in Cambridge for two weeks prior to the bombing. A mechanic in Cambridge said Dzhokhar, Tamerlan's brother, picked up his "black Mercedes SUV" on Tuesday, the day after the marathon. The two cars may be one and the same; that blows up the whole official ''carjacking'' narrative. 6. Additionally, there's a media blackout on the owner of the allegedly hijacked Mercedes, who in theory managed to escape and call the police, who maintains that the brothers went to three ATMs and withdrew US$800 from his account - not before telling him they were the ''marathon bombers and had killed an MIT police''. The driver said he was let off at a gas station on Memorial Drive in Cambridge. But some witnesses saw Dzhokhar at the station's convenience store - without any driver. Then the narrative of the brothers robbing a convenience store was revealed to be false. Police scanners referred to a "black top" person. Still, the official narrative is that the Tsarnaev brothers were at the same place and the same time of the robbery.
  • Do the martial dance What the day-long delay in Dzhokhar's arrest indeed made possible was to turn Watertown into a monster dry run for urban martial law - euphemized as ''lockdown'' - in a very near future. As total militarization of civilian life goes - featuring, for instance, Homeland Security running amok with hundreds of armored vehicles - this was a major success. Meanwhile, on the ''legal'' front, the White House and the Justice Department are firmly on track to finally suppress the Miranda warning; that went into effect already two years ago, when an Obama secret executive order ruled the Miranda warning would not apply to suspected terrorists. Dzhokhar is a ''suspected'' terrorist - now charged with using and conspiring to use a weapon of mass destruction, yet already convicted by corporate media. Welcome to Police State USA - where at least everyone still has the right to go out shopping. For now.
Gary Edwards

Jim Douglass: A Letter to the American People (and Myself in Particular) On the Unspeak... - 0 views

  • “But if they’re not [authentic], then you have something of a magnitude beyond common experience that would reflect so devastatingly on our society as a whole and its corruptibility that you don’t know how to deal with it.”[4]
  • Since I began researching the assassinations of Martin Luther King, Malcolm X, and John and Robert Kennedy, I have been shocked by the obvious signature that is written across all four of them. It is the signature of what President Eisenhower identified as the military-industrial complex of our government.[6] We can read that signature at once in Dallas in the identity of the scapegoat Lee Harvey Oswald.
  • When Lee Harvey Oswald was arrested in Dallas after the assassination, he was carrying a Department of Defense ID card that is routinely issued to U.S. intelligence agents abroad. The FBI later obliterated the card by “testing” it but writer Mary La Fontaine discovered a copy of it in l992 in a Dallas Police Department photo. Oswald had been a radar operator for the CIA’s U-2 spy plane while he was a Marine stationed at Atsugi Naval Air Station in Japan. The Atsugi base served as the CIA’s center for its Far East operations. His fellow Marines David Bucknell and James Botelho said that when Oswald “defected” to the Soviet Union, he did so under the direction of U.S. intelligence.[8] The professed traitor Oswald was given a U.S.-government loan to assist his return from the USSR. When he settled in Dallas, his closest friend and mentor was longtime U.S. intelligence operative George DeMohrenschildt.
  • ...10 more annotations...
  • Fidel Castro recognized “CIA” written all over Lee Harvey Oswald and the press releases on him that were being sent around the world within minutes of the assassination. The whole Dallas set-up was obvious to someone as familiar with CIA assassination plots as Fidel Castro was.
  • The more one investigates the assassination of John Kennedy, the more one becomes immersed in the depths of U.S. intelligence. The American intelligence community was the sea around Lee Harvey Oswald, Jack Ruby, and the host of anti-Castro Cuban exiles and gun runners with whom Oswald and Ruby worked closely.
  • By the Fall of l963 John Kennedy had also decided to withdraw from Vietnam.[14] Robert McNamara in his memoir In Retrospect[15] has described the contentious October 2, l963, National Security Council meeting at which Kennedy decided, against the arguments of most of his advisors: to withdraw all U.S. forces from Vietnam by the end of l965; to withdraw l,000 U.S. troops by the end of l963; to announce this policy publicly “to set it in concrete,” which Press Secretary Pierre Salinger did at a press conference when the meeting was over.[16]
  • After JFK’s assassination, his withdrawal policy was quietly voided.[18] In light of the future consequences of Dallas, it was not only John Kennedy who was crucified on November 22, l963, but 58,000 other Americans and over three million Vietnamese, Laotians, and Cambodians.
  • Clifton Baird was a Louisville, Kentucky, police officer in l965 when he was asked to help kill Martin Luther King. On September l8, l965, Baird gave a ride home in his car to fellow Louisville officer Arlie Blair after their 3-ll pm shift. Baird parked his car in Blair’s driveway, and the two men talked. Alarmed at what Blair was saying, Clifton Baird secretly turned on a microphone hidden under his seat that was connected to a recorder in a rear speaker. What Baird taped was an offer to engage in a conspiracy to kill Dr. King. He later shared the information with author William F. Pepper who included it in his book on the King assassination Orders to Kill.[32] Blair told Baird that an organization he belonged to was willing to pay $500,000 for the death of King. Would Baird be willing to participate? Baird said he definitely would not. He urged Blair to stay away from it, too.
  • The next day at a Louisville police station, Clifton Baird saw Arlie Blair conferring with a group of police officers and FBI agents. The FBI agents had, over a period of sixteen years or more, developed a close relationship with members of the Louisville police force.
  • On September 20, l965, Baird taped a second car conversation with Blair. Blair again brought up the $500,000 bounty for King, which Baird had now connected with the FBI.
  • Myron Billett was another witness to the truth. By undergoing a conversion in his own life, Myron Billett was able to reveal that in January l968 FBI and CIA agents offered a New York Mafia leader a $l million contract to kill Martin Luther King.
  • After Dr. King was assassinated on April 4, Sam Giancana gave Myron Billett $30,000 and told him to start running: They both knew too much and were going to be killed. Giancana was in fact murdered in his Chicago home in June l975, just before he was scheduled to testify before the Church Committee concerning assassination plots. His killing took the form of a symbolic warning to other possible assassination witnesses. Giancana was shot seven times in a circle around his mouth.
  • In his Canadian Broadcasting Corporation lectures at the end of l967 (later published as The Trumpet of Conscience[39]), King’s vision went beyond even these overwhelming concerns. He saw the next step as a global nonviolent movement using escalating acts of massive civil disobedience to disrupt the entire international order and block economic and political exploitation across borders.
Paul Merrell

If GCHQ wants to improve national security it must fix our technology | Technology | th... - 0 views

  • In a recent column, security expert Bruce Schneier proposed breaking up the NSA – handing its offensive capabilities work to US Cyber Command and its law enforcement work to the FBI, and terminating its programme of attacking internet security. In place of this, Schneier proposed that “instead of working to deliberately weaken security for everyone, the NSA should work to improve security for everyone.” This is a profoundly good idea for reasons that may not be obvious at first blush.People who worry about security and freedom on the internet have long struggled with the problem of communicating the urgent stakes to the wider public. We speak in jargon that’s a jumble of mixed metaphors – viruses, malware, trojans, zero days, exploits, vulnerabilities, RATs – that are the striated fossil remains of successive efforts to come to grips with the issue. When we do manage to make people alarmed about the stakes, we have very little comfort to offer them, because Internet security isn’t something individuals can solve.
  • I remember well the day this all hit home for me. It was nearly exactly a year ago, and I was out on tour with my novel Homeland, which tells the story of a group of young people who come into possession of a large trove of government leaks that detail a series of illegal programmes through which supposedly democratic governments spy on people by compromising their computers.
  • I explained the book’s premise, and then talked about how this stuff works in the real world. I laid out a parade of awfuls, including a demonstrated attack that hijacked implanted defibrillators from 10 metres’ distance and caused them to compromise other defibrillators that came into range, implanting an instruction to deliver lethal shocks at a certain time in the future. I talked about Cassidy Wolf, the reigning Miss Teen USA, whose computer had been taken over by a “sextortionist” who captured nude photos of her and then threatened to release them if she didn’t perform live sex shows for him. I talked about the future of self-driving cars, smart buildings, implanted hearing aids and robotic limbs, and explained that the world is made out of computers that we put our bodies into, and that we put inside our bodies.These computers are badly secured. What’s more, governments and their intelligence agencies are actively working to undermine the security of our computers and networks. This was before the Snowden revelations, but we already knew that governments were buying “zero-day vulnerabilities” from security researchers. These are critical bugs that can be leveraged to compromise entire systems. Until recently, the normal response to the discovery of one of these “vulns” was to report them to the vendor so they could be repaired.
  • ...6 more annotations...
  • But spy-agencies and law-enforcement have created a bustling marketplace for “zero-days,” which are weaponised for the purpose of attacking the computers and networks of “bad guys”. The incentives have shifted, and now a newly discovered bug had a good chance of remaining unpatched and live in the field because governments wanted to be able to use it to hack their enemies.
  • Last year, when I finished that talk in Seattle, a talk about all the ways that insecure computers put us all at risk, a woman in the audience put up her hand and said, “Well, you’ve scared the hell out of me. Now what do I do? How do I make my computers secure?”And I had to answer: “You can’t. No one of us can. I was a systems administrator 15 years ago. That means that I’m barely qualified to plug in a WiFi router today. I can’t make my devices secure and neither can you. Not when our governments are buying up information about flaws in our computers and weaponising them as part of their crime-fighting and anti-terrorism strategies. Not when it is illegal to tell people if there are flaws in their computers, where such a disclosure might compromise someone’s anti-copying strategy.But: If I had just stood here and spent an hour telling you about water-borne parasites; if I had told you about how inadequate water-treatment would put you and everyone you love at risk of horrifying illness and terrible, painful death; if I had explained that our very civilisation was at risk because the intelligence services were pursuing a strategy of keeping information about pathogens secret so they can weaponise them, knowing that no one is working on a cure; you would not ask me ‘How can I purify the water coming out of my tap?’”
  • Because when it comes to public health, individual action only gets you so far. It doesn’t matter how good your water is, if your neighbour’s water gives him cholera, there’s a good chance you’ll get cholera, too. And even if you stay healthy, you’re not going to have a very good time of it when everyone else in your country is striken and has taken to their beds.If you discovered that your government was hoarding information about water-borne parasites instead of trying to eradicate them; if you discovered that they were more interested in weaponising typhus than they were in curing it, you would demand that your government treat your water-supply with the gravitas and seriousness that it is due.The public health analogy is suprisingly apt here. The public health threat-model is in a state of continuous flux, because our well-being is under continuous, deliberate attack from pathogens for whom we are, at best, host organisms, and at worst, dinner. Evolution drives these organisms to a continuously shifting array of tactics to slide past our defenses.Public health isn’t just about pathogens, either – its thorniest problems are about human behaviour and social policy. HIV is a blood-borne disease, but disrupting its spread requires changes to our attitudes about sex, pharmaceutical patents, drugs policy and harm minimisation. Almost everything interesting about HIV is too big to fit on a microscope slide.
  • And so it is for security: crypto is awesome maths, but it’s just maths. Security requires good password choice, good password management, good laws about compelled crypto disclosure, transparency into corporate security practices, and, of course, an end to the governmental practice of spending $250M/year on anti-security sabotage through the NSA/GCHQ programmes Bullrun and Edgehill.
  • But for me, the most important parallel between public health and internet security is their significance to our societal wellbeing. Everything we do today involves the internet. Everything we do tomorrow will require the internet. If you live near a nuclear power plant, fly in airplanes, ride in cars or trains, have an implanted pacemaker, keep money in the bank, or carry a phone, your safety and well-being depend on a robust, evolving, practice of network security.This is the most alarming part of the Snowden revelations: not just that spies are spying on all of us – that they are actively sabotaging all of our technical infrastructure to ensure that they can continue to spy on us.There is no way to weaken security in a way that makes it possible to spy on “bad guys” without making all of us vulnerable to bad guys, too. The goal of national security is totally incompatible with the tactic of weakening the nation’s information security.
  • “Virus” has been a term of art in the security world for decades, and with good reason. It’s a term that resonates with people, even people with only a cursory grasp of technology. As we strive to make the public and our elected representatives understand what’s at stake, let’s expand that pathogen/epidemiology metaphor. We’d never allow MI5 to suppress information on curing typhus so they could attack terrorists by infecting them with it. We need to stop allowing the NSA and GCHQ to suppress information on fixing bugs in our computers, phones, cars, houses, planes, and bodies.If GCHQ wants to improve the national security of the United Kingdom – if the NSA want to impove the American national security – they should be fixing our technology, not breaking it. The technology of Britons and Americans is under continuous, deadly attack from criminals, from foreign spies, and from creeps. Our security is better served by armouring us against these threats than it is by undermining security so that cops and spies have an easier time attacking “bad guys.”
Paul Merrell

The Government Can No Longer Track Your Cell Phone Without a Warrant | Motherboard - 0 views

  • The government and police regularly use location data pulled off of cell phone towers to put criminals at the scenes of crimes—often without a warrant. Well, an appeals court ruled today that the practice is unconstitutional, in one of the strongest judicial defenses of technology privacy rights we've seen in a while.  The United States Court of Appeals for the Eleventh Circuit ruled that the government illegally obtained and used Quartavious Davis's cell phone location data to help convict him in a string of armed robberies in Miami and unequivocally stated that cell phone location information is protected by the Fourth Amendment. "In short, we hold that cell site location information is within the subscriber’s reasonable expectation of privacy," the court ruled in an opinion written by Judge David Sentelle. "The obtaining of that data without a warrant is a Fourth Amendment violation."
  • In Davis's case, police used his cell phone's call history against him to put him at the scene of several armed robberies. They obtained a court order—which does not require the government to show probable cause—not a warrant, to do so. From now on, that'll be illegal. The decision applies only in the Eleventh Circuit, but sets a strong precedent for future cases.
  • Indeed, the decision alone is a huge privacy win, but Sentelle's strong language supporting cell phone users' privacy rights is perhaps the most important part of the opinion. Sentelle pushed back against several of the federal government's arguments, including one that suggested that, because cell phone location data based on a caller's closest cell tower isn't precise, it should be readily collectable.  "The United States further argues that cell site location information is less protected than GPS data because it is less precise. We are not sure why this should be significant. We do not doubt that there may be a difference in precision, but that is not to say that the difference in precision has constitutional significance," Sentelle wrote. "That information obtained by an invasion of privacy may not be entirely precise does not change the calculus as to whether obtaining it was in fact an invasion of privacy." The court also cited the infamous US v. Jones Supreme Court decision that held that attaching a GPS to a suspect's car is a "search" under the Fourth Amendment. Sentelle suggested a cell phone user has an even greater expectation of location privacy with his or her cell phone use than a driver does with his or her car. A car, Sentelle wrote, isn't always with a person, while a cell phone, these days, usually is.
  • ...2 more annotations...
  • "One’s cell phone, unlike an automobile, can accompany its owner anywhere. Thus, the exposure of the cell site location information can convert what would otherwise be a private event into a public one," he wrote. "In that sense, cell site data is more like communications data than it is like GPS information. That is, it is private in nature rather than being public data that warrants privacy protection only when its collection creates a sufficient mosaic to expose that which would otherwise be private." Finally, the government argued that, because Davis made outgoing calls, he "voluntarily" gave up his location data. Sentelle rejected that, too, citing a prior decision by a Third Circuit Court. "The Third Circuit went on to observe that 'a cell phone customer has not ‘voluntarily’ shared his location information with a cellular provider in any meaningful way.' That circuit further noted that 'it is unlikely that cell phone customers are aware that their cell phone providers collect and store historical location information,'” Sentelle wrote.
  • "Therefore, as the Third Circuit concluded, 'when a cell phone user makes a call, the only information that is voluntarily and knowingly conveyed to the phone company is the number that is dialed, and there is no indication to the user that making that call will also locate the caller,'" he continued.
  •  
    Another victory for civil libertarians against the surveillance state. Note that this is another decision drawing guidance from the Supreme Court's decision in U.S. v. Jones, shortly before the Edward Snowden leaks came to light, that called for re-examination of the Third Party Doctrine, an older doctrine that data given to or generated by third parties is not protected by the Fourth Amendment.   
Paul Merrell

Continuing violence in Israel forces Netanyahu to cancel German trip | World news | The... - 0 views

  • Binyamin Netanyahu has cancelled a trip to Germany amid continuing violence between Palestinians and Israelis. A number of incidents on Wednesday scotched hopes the situation might be calming, after almost a week in which tensions have spiked amid clashes and lethal attacks. The postponement of Thursday’s summit, which was to mark 50 years of diplomatic ties between Israel and Germany, came as Netanyahu convened his top security advisers to discuss the worsening situation. Wednesday saw three separate serious incidents: in Jerusalem, outside Bethlehem, and in the southern Israeli city of Kiryat Gat, where a Palestinian reportedly stabbed an Israeli soldier and tried to take his weapon before fleeing into a building where he was shot dead.
  • Video footage showed armed police and soldiers running towards a building, and then in a room standing over a body lying in a pool of blood. According to police, the suspect had approached an armed Israel Defence Forces soldier after stepping off a bus and attempted to snatch his weapon. The Kiryat Gat incident will be especially worrying for Israelis, suggesting that the recent tensions – which had been largely confined to Jerusalem and the occupied territories – may be spreading to other parts of Israel. It followed clashes on Tuesday night at a demonstration in support of the al-Aqsa mosque in the seaside town of Jaffa by Israelis of Palestinian origin. The Kiryat Gat incident followed an alleged attempted stabbing by an 18-year-old Palestinian woman who was shot by an Israeli man during the incident, which took place in Jerusalem’s Old City, close to where two Israelis were stabbed to death at the weekend. In the third incident, a female Israeli settler’s car was stoned near Beit Sahour, which adjoins Bethlehem, and other settlers apparently fired on Palestinians, seriously injuring a youth. The settler attacked in her car said that a group of Palestinian youths had tried to pull her from the vehicle at the time the shooting took place. According to the Ma’an news agency, which interviewed locals, the youth who was shot was a student involved in the attack on the car. German government sources disclosed the cancellation of Netanyahu’s trip, which had already been heavily curtailed because of the situation in Israel and the occupied Palestinian territories. An Israeli official confirmed the cancellation. Elsewhere, clashes between Palestinian demonstrators and Israeli security forces across the West Bank led to dozens of injuries among Palestinians, according to the Palestinian Red Crescent.
Gary Edwards

Works and Days » Zero Jobs 101 - the Psychology of Alienating Employers - 0 views

  • Here is the lament I heard: the near $5 trillion in borrowing in just three years, the radical growth in the size of the federal government and its regulatory zeal, ObamaCare, the Boeing plant closure threat, the green jobs sweet-heart deals and Van Jones-like “Millions of Green Jobs” nonsense, the vast expansion in food stamps and unemployment pay-outs, the reversal of the Chrysler creditors, politically driven interference in the car industry, the failed efforts to get card check and cap and trade, the moratoria on new drilling in the Gulf, the general antipathy to new fossil fuel exploitation coupled with new finds of vast new reserves, the new financial regulations, an aggressive EPA oblivious to the effects of its advocacy on jobs, the threatened close-down of energy plants, the support for idling thousands of acres of irrigated farmland due to environmental regulations, the constant talk of higher taxes, the needlessly provocative rhetoric of “fat cat”, “millionaires and billionaires,” “corporate jet owners,” etc. juxtaposed, in hypocritical fashion, to Martha’s Vineyard, Costa del Sol, and Vail First Family getaways — all of these isolated strains finally are becoming a harrowing opera to business people.
  • “This bunch doesn’t like me much and I’m going to hunker down, hoard my cash, and sit out the next year and a half until they are gone.”
  • And the administration’s efforts to counteract these symbols and impressions by courting a high-profile, hyper-capitalist Warren Buffett, or a GE CEO Jeffrey Immelt have proven even more ironic:
  • ...3 more annotations...
  • the former calls for higher taxes that his firms seek to avoid, or targets his post-mortem wealth to (more efficient?) private foundations that rob the Treasury of billions in lost inheritance taxes, or knows higher taxes won’t much matter to his tens of billions in net worth;
  • the latter’s firm paid no 2010 U.S. income taxes on many of its profits and outsourced jobs overseas.
  • Borrow another $5 trillion?
  •  
    Nobody lays it out so quickly and too the point as VDH..... awesome summary of sweeping reach.  I've been hesitant to apply the term "crony capitalism" to Obama even though his Bankster relationships and continuing bailouts scream loudly.  It seems to me that the term "crony socialism" better fits the full range of fascist power brokering Obama engages in.  Big Government, Big Banksters, Big Unions, Big Media, Big Education.  If anything, Obammunism is BIG! VDH excerpt: Here is the lament I heard: the near $5 trillion in borrowing in just three years, the radical growth in the size of the federal government and its regulatory zeal, ObamaCare, the Boeing plant closure threat, the green jobs sweet-heart deals and Van Jones-like "Millions of Green Jobs" nonsense, the vast expansion in food stamps and unemployment pay-outs, the reversal of the Chrysler creditors, politically driven interference in the car industry, the failed efforts to get card check and cap and trade, the moratoria on new drilling in the Gulf, the general antipathy to new fossil fuel exploitation coupled with new finds of vast new reserves, the new financial regulations, an aggressive EPA oblivious to the effects of its advocacy on jobs, the threatened close-down of energy plants, the support for idling thousands of acres of irrigated farmland due to environmental regulations, the constant talk of higher taxes, the needlessly provocative rhetoric of "fat cat", "millionaires and billionaires," "corporate jet owners," etc. juxtaposed, in hypocritical fashion, to Martha's Vineyard, Costa del Sol, and Vail First Family getaways - all of these isolated strains finally are becoming a harrowing opera to business people.
Paul Merrell

U.S. spies on millions of cars - The Wall Street Journal - MarketWatch - 0 views

  • The Justice Department has been building a national database to track in real time the movement of vehicles around the U.S., a secret domestic intelligence-gathering program that scans and stores hundreds of millions of records about motorists, according to current and former officials and government documents. The primary goal of the license-plate tracking program, run by the Drug Enforcement Administration, is to seize cars, cash and other assets to combat drug trafficking, according to one government document. But the database’s use has expanded to hunt for vehicles associated with numerous other potential crimes, from kidnappings to killings to rape suspects, say people familiar with the matter. Officials have publicly said that they track vehicles near the border with Mexico to help fight drug cartels. What hasn’t been previously disclosed is that the DEA has spent years working to expand the database “throughout the United States,’’ according to one email reviewed by The Wall Street Journal.
  • Many state and local law-enforcement agencies are accessing the database for a variety of investigations, according to people familiar with the program, putting a wealth of information in the hands of local officials who can track vehicles in real time on major roadways. The database raises new questions about privacy and the scope of government surveillance. The existence of the program and its expansion were described in interviews with current and former government officials, and in documents obtained by the American Civil Liberties Union through a Freedom of Information Act request and reviewed by The Wall Street Journal. It is unclear if any court oversees or approves the intelligence-gathering.
  •  
    Note that this parallels another national surveillance capability of facial recognition fueled by driver-license, jail booking, and other  photos, being developed by the FB I. 
Paul Merrell

Victory for Users: Librarian of Congress Renews and Expands Protections for Fair Uses |... - 0 views

  • The new rules for exemptions to copyright's DRM-circumvention laws were issued today, and the Librarian of Congress has granted much of what EFF asked for over the course of months of extensive briefs and hearings. The exemptions we requested—ripping DVDs and Blurays for making fair use remixes and analysis; preserving video games and running multiplayer servers after publishers have abandoned them; jailbreaking cell phones, tablets, and other portable computing devices to run third party software; and security research and modification and repairs on cars—have each been accepted, subject to some important caveats.
  • The exemptions are needed thanks to a fundamentally flawed law that forbids users from breaking DRM, even if the purpose is a clearly lawful fair use. As software has become ubiquitous, so has DRM.  Users often have to circumvent that DRM to make full use of their devices, from DVDs to games to smartphones and cars. The law allows users to request exemptions for such lawful uses—but it doesn’t make it easy. Exemptions are granted through an elaborate rulemaking process that takes place every three years and places a heavy burden on EFF and the many other requesters who take part. Every exemption must be argued anew, even if it was previously granted, and even if there is no opposition. The exemptions that emerge are limited in scope. What is worse, they only apply to end users—the people who are actually doing the ripping, tinkering, jailbreaking, or research—and not to the people who make the tools that facilitate those lawful activities. The section of the law that creates these restrictions—the Digital Millennium Copyright Act's Section 1201—is fundamentally flawed, has resulted in myriad unintended consequences, and is long past due for reform or removal altogether from the statute books. Still, as long as its rulemaking process exists, we're pleased to have secured the following exemptions.
  • The new rules are long and complicated, and we'll be posting more details about each as we get a chance to analyze them. In the meantime, we hope each of these exemptions enable more exciting fair uses that educate, entertain, improve the underlying technology, and keep us safer. A better long-terms solution, though, is to eliminate the need for this onerous rulemaking process. We encourage lawmakers to support efforts like the Unlocking Technology Act, which would limit the scope of Section 1201 to copyright infringements—not fair uses. And as the White House looks for the next Librarian of Congress, who is ultimately responsible for issuing the exemptions, we hope to get a candidate who acts—as a librarian should—in the interest of the public's access to information.
Paul Merrell

M of A - Ankara Bombing Fails To Achive Strategic Changes - 0 views

  • The bombing in Ankara yesterday killed 27 mostly military people. It was a big car bomb and a suicide attack.The Turkish government claims that the person who did this was one Saleh Nejar and also claims that he is connected to the Syrian Kurdish group YPG. There is no way to verify this. But the YPG has so fare never used any car bombs or done any suicide attacks. It never touched any target in Turkey. It officially denied to have taken any part in it. The Turkish group PKK has done vehicle bomb attacks and a few suicide attacks but not in Ankara or any other major west-Turkish city. Its attacks are usually operational, not strategic like this one. In the last Turkish version of its magazine the Islamic State had called for attacks in Turkey and on Turkish soldiers. It is the entity that has most to win through such an attack that would predictably be blamed on the Kurds. It is the most plausible culprit. The attack could also have been arranged by the Turkish secret service MIT. But the number and type of casualties seems to be too high and valuable for a stage-managed false flag attack.
  • The Turkish government called in the ambassadors of the permanent members of the UN Security Council to present its evidence. A "western diplomat" told the Wall Street Journal that the evidence shown was "not conclusive". That is the diplomatese expression for "bullshit". The Turkish attempt to use the attack to change the U.S. and EU relations to the YPK failed. The YPK and its associated Arab and Turkmen forces is a very valuable asset for the U.S. to fight the Islamic State. It will refrain from condemning it as long as that is the case. The YPG groups in west Syria are fighting together with others under the label Syrian Democratic Forces. These and the mysterious additional attendants are pressing Jihadi forces in the Azaz pocket at the Turkish border. They are now seeing more resistance. The Turks use artillery to protect the Jihadis in Azaz and the number of enemies has grown. One "rebel" tells Reuters that 2,000 "rebels" with some tanks came from Idleb through Turkey to Azaz. That number is dubious. The British MI6 outlet SOHR as well as a Turkish pro government daily put the numbers at 350 on Monday and another 500 on Wednesday. To transport the tanks through Turkey would likely have been too much a hassle. I doubt that any reached Azaz.
  • I suspect that many of these "rebels" in Azaz are actually Turks of some radical nationalist and Islamist faction as well as Grey Wolf fascists which have strong connections to the MIT. Pictures show such "rebels" in Latakia with Turkish and Islamic State flags and in Azaz with their typical Grey Wolf hand sign.
Paul Merrell

The All Writs Act, Software Licenses, and Why Judges Should Ask More Questions | Just S... - 0 views

  • Pending before federal magistrate judge James Orenstein is the government’s request for an order obligating Apple, Inc. to unlock an iPhone and thereby assist prosecutors in decrypting data the government has seized and is authorized to search pursuant to a warrant. In an order questioning the government’s purported legal basis for this request, the All Writs Act of 1789 (AWA), Judge Orenstein asked Apple for a brief informing the court whether the request would be technically feasible and/or burdensome. After Apple filed, the court asked it to file a brief discussing whether the government had legal grounds under the AWA to compel Apple’s assistance. Apple filed that brief and the government filed a reply brief last week in the lead-up to a hearing this morning.
  • We’ve long been concerned about whether end users own software under the law. Software owners have rights of adaptation and first sale enshrined in copyright law. But software publishers have claimed that end users are merely licensees, and our rights under copyright law can be waived by mass-market end user license agreements, or EULAs. Over the years, Granick has argued that users should retain their rights even if mass-market licenses purport to take them away. The government’s brief takes advantage of Apple’s EULA for iOS to argue that Apple, the software publisher, is responsible for iPhones around the world. Apple’s EULA states that when you buy an iPhone, you’re not buying the iOS software it runs, you’re just licensing it from Apple. The government argues that having designed a passcode feature into a copy of software which it owns and licenses rather than sells, Apple can be compelled under the All Writs Act to bypass the passcode on a defendant’s iPhone pursuant to a search warrant and thereby access the software owned by Apple. Apple’s supplemental brief argues that in defining its users’ contractual rights vis-à-vis Apple with regard to Apple’s intellectual property, Apple in no way waived its own due process rights vis-à-vis the government with regard to users’ devices. Apple’s brief compares this argument to forcing a car manufacturer to “provide law enforcement with access to the vehicle or to alter its functionality at the government’s request” merely because the car contains licensed software. 
  • This is an interesting twist on the decades-long EULA versus users’ rights fight. As far as we know, this is the first time that the government has piggybacked on EULAs to try to compel software companies to provide assistance to law enforcement. Under the government’s interpretation of the All Writs Act, anyone who makes software could be dragooned into assisting the government in investigating users of the software. If the court adopts this view, it would give investigators immense power. The quotidian aspects of our lives increasingly involve software (from our cars to our TVs to our health to our home appliances), and most of that software is arguably licensed, not bought. Conscripting software makers to collect information on us would afford the government access to the most intimate information about us, on the strength of some words in some license agreements that people never read. (And no wonder: The iPhone’s EULA came to over 300 pages when the government filed it as an exhibit to its brief.)
  • ...1 more annotation...
  • The government’s brief does not acknowledge the sweeping implications of its arguments. It tries to portray its requested unlocking order as narrow and modest, because it “would not require Apple to make any changes to its software or hardware, … [or] to introduce any new ability to access data on its phones. It would simply require Apple to use its existing capability to bypass the passcode on a passcode-locked iOS 7 phone[.]” But that undersells the implications of the legal argument the government is making: that anything a company already can do, it could be compelled to do under the All Writs Act in order to assist law enforcement. Were that the law, the blow to users’ trust in their encrypted devices, services, and products would be little different than if Apple and other companies were legally required to design backdoors into their encryption mechanisms (an idea the government just can’t seem to drop, its assurances in this brief notwithstanding). Entities around the world won’t buy security software if its makers cannot be trusted not to hand over their users’ secrets to the US government. That’s what makes the encryption in iOS 8 and later versions, which Apple has told the court it “would not have the technical ability” to bypass, so powerful — and so despised by the government: Because no matter how broadly the All Writs Act extends, no court can compel Apple to do the impossible.
ashkif as

Best Iridium spark plug Manufacturers in India - NGK Spark Plugs - 0 views

  •  
    Check out the best iridium spark plugs online at NGK spark plugs. We offer iridium spark plugs for cars and motorcycles with various advantages like excellent acceleration with increased mileage. For more info visit: https://www.ngkntk.in/iridium-plugs/Tweet$(document).ready(function() {var media = $('img[src*=\'oc-content/uploads/\']').attr('src'); if(media==undefined) { media = ''; $('.pinterest').remove(); } else { media = '&media='+escape(media); };$('.pinterest').find('a').attr('href','http...
‹ Previous 21 - 40 of 140 Next › Last »
Showing 20 items per page