FINAL - Part II: Evidence Continues to Emerge #MH17 Is a False Flag Operation | No Limi... - 0 views
-
#15 – Dissecting the Fake Intercept Disseminated by SBU (Ukrainian Security Service) https://www.youtube.com/watch?v=V5E8kDo2n6g Note: Half of the Post Translated; The Remaining Half is Speculative Complete Original of the Post (in Russian) Can Be Found at Eugene-DF LiveJournal In the disseminated intercept, the place from which the missile was allegedly launched is clearly indicated: the checkpoint at the settlement of Chernukhino. Pay close attention at the Alleged Map of the MH17 Catastrophe.
-
And, so, we have the background. Let’s see how the picture unfolds: The launch is alleged to have been made from Chernukhino. The maximum distance of the launch is 16 kilometres. The aircraft fell between Snezhnoye and Torez. That’s 37 kilometres, which is 20 kilometres more than the maximum possible point at which the plain could have been hit. You know, even a plane with turned-off engines can’t glide like that. But the trouble is that the aircraft was not whole. According to the pattern of the spread of fuselage fragments and bodies, the plane was ruptured practically with the first shot. Here it must be mentioned that the high-explosive/fragmentation warhead of the rocket has a mass of approximately 50 kilograms (by the way, Ukrainians have an outdated modification, which is only 40 kilograms).
-
Overall, that’s not too little; however, it must be understood that it detonates not when it sticks into an airplane, but when it is still at a certain, and fairly significant distance. Moreover, the main strike factor is not the blast wave, but far more significantly – the stream of fragments. These fragments are previously prepared rods (and in the earlier versions – little cubes, if I recall correctly). And yes, for a jet fighter, that, in itself, is more than sufficient. However, here we are dealing with a huge airliner. Yes, one rocket will rip the casing, cause depressurization, and will kill a lot of passengers. But it will not break up the airliner into pieces. Given certain conditions, the pilots may even be able to land it. And, in fact, there have been precedents (to be provided in future posts). For example – the very same An-28, which is alleged to have been the first victim of a BUK system; even though it was done for, but the crew was able to successfully catapult out. Which, in some way, symbolizes. An An-28, by the way, is far smaller than a Boeing.
- ...15 more annotations...
Is The US Using Prism To Engage In Commercial Espionage Against Germany And Others? | T... - 1 views
-
Meanwhile, illegal NSA spying is expected to cost USA Cloud Computing companies $35 Billion in lost sales and services. "whistleblower Edward Snowden worked for the CIA, rather than the NSA. Here's the original text in the Guardian: By 2007, the CIA stationed him with diplomatic cover in Geneva, Switzerland. His responsibility for maintaining computer network security meant he had clearance to access a wide array of classified documents. That access, along with the almost three years he spent around CIA officers, led him to begin seriously questioning the rightness of what he saw. He described as formative an incident in which he claimed CIA operatives were attempting to recruit a Swiss banker to obtain secret banking information. Snowden said they achieved this by purposely getting the banker drunk and encouraging him to drive home in his car. When the banker was arrested for drunk driving, the undercover agent seeking to befriend him offered to help, and a bond was formed that led to successful recruitment. In that quotation, there's the nugget of information that the CIA was not targeting terrorists on this occasion, at least not directly, but "attempting to recruit a Swiss banker to obtain secret banking information". That raises an interesting possibility for the heightened interest in Germany, as revealed by Boundless Informant. Given that the NSA is gathering information on a large scale -- even though we don't know exactly how large -- it's inevitable that some of that data will include sensitive information about business activities in foreign countries. That could be very handy for US companies seeking to gain a competitive advantage, and it's not hard to imagine the NSA passing it on in a suitably discreet way. Germany is known as the industrial and economic powerhouse of Europe, so it would make sense to keep a particularly close eye on what people are doing there -- especially if those people happen to work in companies that compete with US firms.
-
Closely related: see http://www.theguardian.com/business/2013/aug/02/telecoms-bt-vodafone-cables-gchq (,) an article on British telecom's collaboration with wiretapping by the UK's counterpart to the NSA, GCHQ. According to an inside source: "The source said analysts used four criteria for determining what was examined: security, terror, organised crime and Britain's economic wellbeing." I also recall that years ago during the furor over the Echelon system, an EU Parliament investigation had concluded that there were concrete instances of commercial intelligence being passed on by NSA to American companies. Specifically, I recall a finding that during development of the AirBus, details of its design had been intercepted by NSA and passed on to Boeing. There was testimony received that more generically discussed the types of economic surveillance conducted. http://cryptome.org/echelon-nh.htm (page search for "economic"). The same researcher stressed that in public statements: "Those targets like terrorism and weapons transport are used as a cover for the traditional areas of spying, the predominant areas of spying, which are political, diplomatic, economic and military."
Irish court peels off gloves, hands Facebook PROBE request to ECJ * The Register - 0 views
-
The High Court in Ireland has referred a review of a complaint against Facebook to Europe's top court. The complaint alleges the social network shared EU users' data with the US National Security Agency.The European Court of Justice is to assess whether EU law needs to be updated in light of the PRISM revelations, which could have a knock-on effect on tech firms from Facebook to Google. <a href="http://pubads.g.doubleclick.net/gampad/jump?iu=/6978/reg_policy/government&amp;sz=300x250%7C300x600&amp;tile=3&amp;c=33U6KvJawQrMoAAAUTy6EAAAJ5&amp;t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" target="_blank"> <img src="http://pubads.g.doubleclick.net/gampad/ad?iu=/6978/reg_policy/government&amp;sz=300x250%7C300x600&amp;tile=3&amp;c=33U6KvJawQrMoAAAUTy6EAAAJ5&amp;t=ct%3Dns%26unitnum%3D3%26unitname%3Dwww_top_mpu%26pos%3Dtop%26test%3D0" alt=""></a> Austrian law student Maximillian Schrems took Facebook to court in Ireland, where the social network’s European HQ is located, over the revelations from NSA whistleblower Edward Snowden that personal data held by tech firms like Facebook was routinely being slurped by US spooks.
-
Schrems first asked the Irish Data Commissioner to investigate the legality of Facebook Ireland sending his info over to the States, where it could be seen by the security services, but when the commissioner refused to investigate, he sought a judicial review at the High Court.The Commissioner had ruled that Schrems didn’t have a case because he couldn’t prove that anyone had slurped his data in particular and anyway, the EU has an agreement with the US under the “Safe Harbour” principle decided way back in 2000. This principle governs data flow from Europe to United States and allows US firms to self-certify themselves as respectful of European data protection rules.High Court Justice Gerard Hogan said Schrems did not need to prove that his own data had been spied upon to make a complaint.“Quite obviously, Mr Schrems cannot say whether his own personal data has ever been accessed or whether it would ever be accessed by the US authorities,” he wrote in his ruling.
-
“But even if this were considered to be unlikely, he is nonetheless certainly entitled to object to a state of affairs where his data are transferred to a jurisdiction which, to all intents and purposes, appears to provide only a limited protection against any interference with that private data by the US security authorities.”However, he said that only the European Court of Justice could decide that individual member states were allowed to look past the Safe Harbour principle or reinterpret its meaning. Hogan said that Schrems, who had filed on behalf of the Europe-v-Facebook group, really had a problem with this principle and acknowledged that there may be an argument for the idea that the rule was outdated.“The Safe Harbour Regime… may reflect a somewhat more innocent age in terms of data protection,” he said. “This Regime came into force prior to the advent of social media and, of course, before the massive terrorist attacks on American soil which took place on September 11th, 2001.”
- ...2 more annotations...
-
If you're in the market to purchase a few cloud server farms located in the U.S., you may want to hold off until the EU Court of Justice rules. Prices could be tumbling shortly afterward. In related news, Reps. Zoe Lofgren and Thomas Massie have introduced a bipartisan amendment to the annual Department of Defense Appropriations bill (H.R. 4870) that would prohibit use of the bill's funds to: 1) Conduct warrantless searches of Americans' communications collected and stored by the NSA under Section 702 of the FISA Amendments Act. 2) Mandate or request that backdoors for surveillance be built into products or services, except those covered under the Communications Assistance for Law Enforcement Act.
N.S.A. Able to Foil Basic Safeguards of Privacy on Web - NYTimes.com - 1 views
-
The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.
-
The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.
-
The N.S.A. hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.
- ...11 more annotations...
China seen probing IBM, Oracle, EMC after Snowden leaks | Reuters - 0 views
-
(Reuters) - China's Ministry of Public Security and a cabinet-level research center are preparing to investigate IBM Corp, Oracle Corp and EMC Corp over security issues, the official Shanghai Securities News said on Friday. The report follows revelations by former U.S. spy agency contractor Edward Snowden of widespread surveillance by the National Security Agency. It also comes as Beijing probes Western drugmakers over allegations of bribery and over-pricing.
-
China has been a focal point for the Snowden case since he stopped in Hong Kong en route to Moscow. He also claimed that the NSA hacked into critical network infrastructure at universities in China and in Hong Kong.Daniel Castro, a senior analyst with the Information Technology & Information Foundation, said he was concerned that a Chinese government probe could result in demands for U.S. companies to provide authorities with the blueprints to their technology so that Beijing can screen them for potential security threats.
-
Some experts have warned that Snowden's leaks could hurt the sales of U.S. technology companies in Asia and Europe, as reports of their complicity with NSA spying programs may lead foreign businesses and governments to purchase equipment and services from non-U.S. suppliers.The foundation, a think tank, last week projected that U.S. cloud computing firms could lose $21.5 billion in sales over the next three years, eventually ceding 10 percent of the foreign market to European and Asian competitors.
Edward Snowden Explains How To Reclaim Your Privacy - 0 views
-
Micah Lee: What are some operational security practices you think everyone should adopt? Just useful stuff for average people. Edward Snowden: [Opsec] is important even if you’re not worried about the NSA. Because when you think about who the victims of surveillance are, on a day-to-day basis, you’re thinking about people who are in abusive spousal relationships, you’re thinking about people who are concerned about stalkers, you’re thinking about children who are concerned about their parents overhearing things. It’s to reclaim a level of privacy. The first step that anyone could take is to encrypt their phone calls and their text messages. You can do that through the smartphone app Signal, by Open Whisper Systems. It’s free, and you can just download it immediately. And anybody you’re talking to now, their communications, if it’s intercepted, can’t be read by adversaries. [Signal is available for iOS and Android, and, unlike a lot of security tools, is very easy to use.] You should encrypt your hard disk, so that if your computer is stolen the information isn’t obtainable to an adversary — pictures, where you live, where you work, where your kids are, where you go to school. [I’ve written a guide to encrypting your disk on Windows, Mac, and Linux.] Use a password manager. One of the main things that gets people’s private information exposed, not necessarily to the most powerful adversaries, but to the most common ones, are data dumps. Your credentials may be revealed because some service you stopped using in 2007 gets hacked, and your password that you were using for that one site also works for your Gmail account. A password manager allows you to create unique passwords for every site that are unbreakable, but you don’t have the burden of memorizing them. [The password manager KeePassX is free, open source, cross-platform, and never stores anything in the cloud.]
-
The other thing there is two-factor authentication. The value of this is if someone does steal your password, or it’s left or exposed somewhere … [two-factor authentication] allows the provider to send you a secondary means of authentication — a text message or something like that. [If you enable two-factor authentication, an attacker needs both your password as the first factor and a physical device, like your phone, as your second factor, to login to your account. Gmail, Facebook, Twitter, Dropbox, GitHub, Battle.net, and tons of other services all support two-factor authentication.]
-
We should armor ourselves using systems we can rely on every day. This doesn’t need to be an extraordinary lifestyle change. It doesn’t have to be something that is disruptive. It should be invisible, it should be atmospheric, it should be something that happens painlessly, effortlessly. This is why I like apps like Signal, because they’re low friction. It doesn’t require you to re-order your life. It doesn’t require you to change your method of communications. You can use it right now to talk to your friends.
- ...4 more annotations...
France Threatens Google With Privacy Fines - ABC News - 0 views
-
France is giving Google three months to be more upfront about the data it collects from users — or be fined. Other European countries aren't far behind.
-
The French agency that regulates information technology says that five other European countries are taking similar steps in a staggered offensive against Google's privacy policy between now and the end of July. It says Google largely ignored earlier recommendations from European regulators.
-
Paris' formal warning gives the company three months to make changes to its privacy practices. They include specifying to users what it is using personal data for, and how long it's held. Regulators also want Google to let users opt out of having their data centralized — for example, when data from online searches, Gmail and YouTube are crunched into a single location.
From Radio to Porn, British Spies Track Web Users' Online Identities - 0 views
-
HERE WAS A SIMPLE AIM at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.” Before long, billions of digital records about ordinary people’s online activities were being stored every day. Among them were details cataloging visits to porn, social media and news websites, search engines, chat forums, and blogs. The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ. The revelations about the scope of the British agency’s surveillance are contained in documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden. Previous reports based on the leaked files have exposed how GCHQ taps into Internet cables to monitor communications on a vast scale, but many details about what happens to the data after it has been vacuumed up have remained unclear.
-
Amid a renewed push from the U.K. government for more surveillance powers, more than two dozen documents being disclosed today by The Intercept reveal for the first time several major strands of GCHQ’s existing electronic eavesdropping capabilities.
-
The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens — all without a court order or judicial warrant
- ...17 more annotations...
Spies and internet giants are in the same business: surveillance. But we can stop them ... - 0 views
-
On Tuesday, the European court of justice, Europe’s supreme court, lobbed a grenade into the cosy, quasi-monopolistic world of the giant American internet companies. It did so by declaring invalid a decision made by the European commission in 2000 that US companies complying with its “safe harbour privacy principles” would be allowed to transfer personal data from the EU to the US. This judgment may not strike you as a big deal. You may also think that it has nothing to do with you. Wrong on both counts, but to see why, some background might be useful. The key thing to understand is that European and American views about the protection of personal data are radically different. We Europeans are very hot on it, whereas our American friends are – how shall I put it? – more relaxed.
-
Given that personal data constitutes the fuel on which internet companies such as Google and Facebook run, this meant that their exponential growth in the US market was greatly facilitated by that country’s tolerant data-protection laws. Once these companies embarked on global expansion, however, things got stickier. It was clear that the exploitation of personal data that is the core business of these outfits would be more difficult in Europe, especially given that their cloud-computing architectures involved constantly shuttling their users’ data between server farms in different parts of the world. Since Europe is a big market and millions of its citizens wished to use Facebook et al, the European commission obligingly came up with the “safe harbour” idea, which allowed companies complying with its seven principles to process the personal data of European citizens. The circle having been thus neatly squared, Facebook and friends continued merrily on their progress towards world domination. But then in the summer of 2013, Edward Snowden broke cover and revealed what really goes on in the mysterious world of cloud computing. At which point, an Austrian Facebook user, one Maximilian Schrems, realising that some or all of the data he had entrusted to Facebook was being transferred from its Irish subsidiary to servers in the United States, lodged a complaint with the Irish data protection commissioner. Schrems argued that, in the light of the Snowden revelations, the law and practice of the United States did not offer sufficient protection against surveillance of the data transferred to that country by the government.
-
The Irish data commissioner rejected the complaint on the grounds that the European commission’s safe harbour decision meant that the US ensured an adequate level of protection of Schrems’s personal data. Schrems disagreed, the case went to the Irish high court and thence to the European court of justice. On Tuesday, the court decided that the safe harbour agreement was invalid. At which point the balloon went up. “This is,” writes Professor Lorna Woods, an expert on these matters, “a judgment with very far-reaching implications, not just for governments but for companies the business model of which is based on data flows. It reiterates the significance of data protection as a human right and underlines that protection must be at a high level.”
- ...2 more annotations...
Trump's freeze on immigrants and refugees plays into the hands of Islamic terror recrui... - 0 views
-
resident Trump is expected to sign orders Friday to temporarily freeze immigration from seven Muslim nations and halt refugee resettlements from everywhere — a classic example of a solution in search of problem, and just the kind of symbolic act that gives weight to radical Islamists when they argue that the U.S. is an enemy of their faith. Trump’s campaign for president was built on a foundation of fear and resentment, and that dark cloud hangs over these putative attempts to bolster national security. Based on a draft version of the executive order, it seems that Trump will impose a 30-day suspension of visas for people from seven predominately Muslim countries — Iran, Iraq, Libya, Somalia, Sudan, Syria and Yemen — while the government reviews and presumably tightens its visa-vetting protocols. He also will direct security officials to determine within 30 days what information they need to evaluate potential visitors, and list the countries around the world that don’t provide it. Countries that don’t correct the error of their ways within 60 days of that report — including the seven affected by the ban — will have their citizens barred until they comply. Worse, Trump apparently plans to suspend U.S. acceptance of all refugees — people fleeing war or oppression for whom returning home is not an option — for 120 days as the government reviews and revises its screening procedures, and he is expected to slash the number of refugees the U.S. would accept through October 2017 from 110,000 (set by President Obama last September) to 50,000. Trump also will prioritize the resettlement of refugees seeking asylum on grounds of religious persecution, officially valuing people oppressed because of their religion over those targeted for political dissent, sexual orientation or other reasons.
-
And Trump wants plans drawn for “safe areas” for Syrians within Syria or nearby nations, which could help the administration at a later point if it wants to institute a longer-term ban on Syrian refugees. But the draft order offers no details on how the safe zones would be secured, or the legal basis for the U.S. establishing control of territory in a sovereign (if war-torn) state. Such efforts to restrict access to the U.S. by people fleeing war-torn parts of the world would be misguided and inhumane. The Migration Policy Institute, a nonpartisan think tank, reported in 2015 that in the 14 years after the 9/11 terror attacks, 784,000 refugees resettled in the U.S. Yet during that time only three resettled refugees were convicted on terror-related charges — two of them for plotting against an overseas target and the third for hatching “plans that were barely credible,” according to the report. The vast majority of refugees allowed into the U.S. are first vetted by the United Nations High Commissioner for Refugees, whose screeners then recommend placements in third countries. When the U.S. gets a referral, it conducts its own security screening before offering resettlement, a process that routinely takes one to two years.
-
What’s more, a study by the New America Foundation shows that 80% of the terrorist attacks in this country since 9/11 have been carried out by American citizens (although some of those perpetrators were naturalized citizens). It is not surprising that some Americans are worried by the hostility directed at them from a small, radicalized segment of the Islamic world. But such fears should not be channeled into a broad, discriminatory retrenchment that is at odds with the best of our humanitarian principles — especially if that retrenchment would likely do little to protect us. The U.S. became a wealthy world power in large part through immigration. And it’s openness has provided a lifeline to the oppressed of the world — the U.S. has formally resettled more refugees than any other country (though at the moment it is not bearing its fair share of the burden of resettling the tens of millions of migrants currently fleeing war zones). Trump’s actions are not only inhumane, they are a betrayal of what the United States stands for.
- ...1 more annotation...
Snowden document shows Canada set up spy posts for NSA - Politics - CBC News - 0 views
-
A top secret document retrieved by American whistleblower Edward Snowden reveals Canada has set up covert spying posts around the world and conducted espionage against trading partners at the request of the U.S. National Security Agency. The leaked NSA document being reported exclusively by CBC News reveals Canada is involved with the huge American intelligence agency in clandestine surveillance activities in “approximately 20 high-priority countries."
-
Sections of the document with the highest classification make it clear in some instances why American spymasters are particularly keen about enlisting their Canadian counterparts, the Communications Security Establishment Canada. "CSEC shares with the NSA their unique geographic access to areas unavailable to the U.S," the document says. The briefing paper describes a "close co-operative relationship" between the NSA and its Canadian counterpart, the Communications Security Establishment Canada, or CSEC — a relationship "both sides would like to see expanded and strengthened. "The intelligence exchange with CSEC covers worldwide national and transnational targets."
-
The briefing notes make it clear that Canada plays a very robust role in intelligence-gathering around the world in a way that has won respect from its American equivalents.
- ...5 more annotations...
-
"'Co-operative efforts include the exchange of liaison officers and integrees,'the document reveals, a reference to CSEC operatives working inside the NSA, and vice-versa." And that fact raises potential U.S. Privacy Act issues. Under the Privacy Act, all U.S. agencies are prohibited from sharing information containing personal identifiers of U.S. citizens with any foreign government and requires that agencies make full disclosure to all persons whose rights are thus violated. The Act also creates a cause of action for redress by the federal courts, with a minimum $1,500 damages plus attorney's fees and litigation expenses. Note that the other NSA documents show that NSA is sharing U.S. citizens' information that includes personal identifiers with Israeli intelligence. The NSA has been by another statute excused from compliance with some portions of the Privacy Act but not those discussed above.
Edward Snowden, a year on: reformers frustrated as NSA preserves its power | World news... - 1 views
-
For two weeks in May, it looked as though privacy advocates had scored a tenuous victory against the widespread surveillance practices exposed by Edward Snowden a year ago. Then came a resurgent intelligence community, armed with pens, and dry, legislative language.During several protracted sessions in secure rooms in the Capitol, intelligence veterans, often backed by the congressional leadership, sparred with House aides to abridge privacy and transparency provisions contained in the first bill rolling back National Security Agency spying powers in more than three decades. The revisions took place in secret after two congressional committees had passed the bill. The NSA and its allies took creative advantage of a twilight legislative period permitting technical or cosmetic language changes.The episode shows the lengths to which the architects and advocates of bulk surveillance have gone to preserve their authorities in the time since the Guardian, 12 months ago today, began disclosing the scope of NSA data collection. That resistance to change, aided by the power and trust enjoyed by the NSA on Capitol Hill, helps explain why most NSA powers remain intact a year after the largest leak in the agency's histo
-
But exactly one year on, the NSA’s greatest wound so far has been its PR difficulties. The agency, under public pressure, has divested itself of exactly one activity, the bulk collection of US phone data. Yet while the NSA will not itself continue to gather the data directly, the major post-Snowden legislative fix grants the agency wide berth in accessing and searching large volumes of phone records, and even wider latitude in collecting other kinds of data.There are no other mandated reforms.
-
Some NSA critics look to the courts for a fuller tally of their victories in the wake of the Snowden disclosures. Judges have begun to permit defendants to see evidence gathered against them that had its origins in NSA email or call intercepts, which could disrupt prosecutions or invalidate convictions. At least one such defendant, in Colorado, is seeking the exclusion of such evidence, arguing that its use in court is illegal.Still other cases challenging the surveillance efforts have gotten beyond the government’s longtime insistence that accusers cannot prove they were spied upon, as the Snowden trove demonstrated a dragnet that presumptively touched every American’s phone records. This week, an Idaho federal judge implored the supreme court to settle the question of the bulk surveillance's constitutionality."The litigation now is about the merits. It’s about the lawfulness of the surveillance program," said Jameel Jaffer, the ACLU’s deputy legal director.
- ...4 more annotations...
Profiled From Radio to Porn, British Spies Track Web Users' Online Identities | Global ... - 0 views
-
One system builds profiles showing people’s web browsing histories. Another analyzes instant messenger communications, emails, Skype calls, text messages, cell phone locations, and social media interactions. Separate programs were built to keep tabs on “suspicious” Google searches and usage of Google Maps. The surveillance is underpinned by an opaque legal regime that has authorized GCHQ to sift through huge archives of metadata about the private phone calls, emails and Internet browsing logs of Brits, Americans, and any other citizens all without a court order or judicial warrant.
-
The power of KARMA POLICE was illustrated in 2009, when GCHQ launched a top-secret operation to collect intelligence about people using the Internet to listen to radio shows. The agency used a sample of nearly 7 million metadata records, gathered over a period of three months, to observe the listening habits of more than 200,000 people across 185 countries, including the U.S., the U.K., Ireland, Canada, Mexico, Spain, the Netherlands, France, and Germany.
-
GCHQ’s documents indicate that the plans for KARMA POLICE were drawn up between 2007 and 2008. The system was designed to provide the agency with “either (a) a web browsing profile for every visible user on the Internet, or (b) a user profile for every visible website on the Internet.” The origin of the surveillance system’s name is not discussed in the documents. But KARMA POLICE is also the name of a popular song released in 1997 by the Grammy Award-winning British band Radiohead, suggesting the spies may have been fans. A verse repeated throughout the hit song includes the lyric, “This is what you’ll get, when you mess with us.”
- ...3 more annotations...
US Troops "Roll Into Poland" In Largest Deployment Since Cold War - 0 views
-
“American soldiers rolled into Poland on Thursday, fulfilling a dream Poles have had since the fall of communism in 1989 to have U.S. troops on their soil as a deterrent against Russia.” That’s how the AP begins its report on the first deployment of US soldiers into the central European country, previewed here earlier in the week as “One Of Largest Deployments Since The Cold War“, even as Russia warned that the move represented a threat to its national security, and the Kremlin said “Russia regarded the move as an aggressive step along its borders.”
-
NATO, however, has ignored Russian concerns and threats of retaliation and as a result soldiers in camouflage with tanks and other vehicles crossed into southwestern Poland on Thursday morning from Germany and headed for Zagan, where they will be based. While in the past the US and other Western nations have carried out exercises on NATO’s eastern flank, this deployment, which includes around 3,500 U.S. troops and 2,800 tanks, trucks and other military equipment, marks the first-ever continuous deployment to the region by a NATO ally. It also represents a commitment by outgoing President Obama to “protect” a region that became deeply nervous over Russia’s response to the CIA-orchestrated presidential coup in Ukraine, the annexation of Crimea, and the resulting proxy war in east Ukraine.
-
Despite the Polish celebrations, clouds hung over the historic moment. As the AP puts it, “there are anxieties that the enhanced security could eventually be undermined by the pro-Kremlin views of President-elect Donald Trump. Meanwhile, Russia appears provoked by the deployment of American troops on its doorstep.”
- ...1 more annotation...
The Neocons and the "deep state" have neutered the Trump Presidency, it's over folks! (... - 0 views
-
Less than a month ago I warned that a ‘color revolution ‘ was taking place in the USA. My first element of proof was the so-called “investigation” which the CIA, FBI, NSA and others were conducting against President Trump’s candidate to become National Security Advisor, General Flynn. Tonight, the plot to get rid of Flynn has finally succeeded and General Flynn had to offer his resignation. Trump accepted it. Now let’s immediately get one thing out of the way: Flynn was hardly a saint or a perfect wise man who would single handedly saved the world. That he was not. However, what Flynn was is the cornerstone of Trump’s national security policy. For one thing, Flynn dared the unthinkable: he dared to declare that the bloated US intelligence community had to be reformed. Flynn also tried to subordinate the CIA and the Joint Chiefs to the President via the National Security Council. Put differently, Flynn tried to wrestle the ultimate power and authority from the CIA and the Pentagon and subordinate them back to the White House. Flynn also wanted to work with Russia. Not because he was a Russia lover, the notion of a Director of the DIA as a Putin-fan is ridiculous, but Flynn was rational, he understood that Russia was no threat to the USA or to Europe and that Russia had the West had common interests. That is another absolutely unforgivable crimethink in Washington DC. The Neocon run ‘deep state’ has now forced Flynn to resign under the idiotic pretext that he had a telephone conversation, on an open, insecure and clearly monitored, line with the Russian ambassador. And Trump accepted this resignation. Ever since Trump made it to the White House, he has taken blow after blow from the Neocon-run Ziomedia, from Congress, from all the Hollywood doubleplusgoodthinking “stars” and even from European politicians. And Trump took each blow without ever fighting back. Nowhere was his famous “you are fired!” to be seen. But I still had hope. I wanted to hope. I felt that it was my duty to hope. But now Trump has betrayed us all.
-
Remember how Obama showed his true face when he hypocritically denounced his friend and pastor Rev. Jeremiah Wright Jr.? Today, Trump has shown us his true face. Instead of refusing Flynn’s resignation and instead of firing those who dared cook up these ridiculous accusations against Flynn, Trump accepted the resignation. This is not only an act of abject cowardice, it is also an amazingly stupid and self-defeating betrayal because now Trump will be alone, completely alone, facing the likes of Mattis and Pence – hard Cold Warrior types, ideological to the core, folks who want war and simply don’t care about reality. Again, Flynn was not my hero. But he was, by all accounts, Trump’s hero. And Trump betrayed him. The consequences of this will be immense. For one thing, Trump is now clearly broken. It took the ‘deep state’ only weeks to castrate Trump and to make him bow to the powers that be. Those who would have stood behind Trump will now feel that he will not stand behind them and they will all move back away from him. The Neocons will feel elated by the elimination of their worst enemy and emboldened by this victory they will push on, doubling-down over and over and over again. It’s over, folks, the deep state has won.
-
Where does all this leave us – the millions of anonymous ‘deplorables’ who try as best we can to resist imperialism, war, violence and injustice? I think that we were right in our hopes because that is all we had – hopes. No expectations, just hopes. But now we objectively have very little reasons left to hope. For one thing, the Washington ‘swamp’ will not be drained. If anything, the swamp has triumphed. We can only find some degree of solace in two undeniable facts: Hillary would have been far worse than any version of a Trump Presidency. In order to defeat Trump, the US deep state has had to terribly weaken the US and the AngloZionist Empire. Just like Erdogan’ purges have left the Turkish military in shambles, the anti-Trump ‘color revolution’ has inflicted terrible damage on the reputation, authority and even credibility of the USA.
- ...2 more annotations...
Eric Schmidt and Jared Cohen says Google data now protected from government spying - Da... - 0 views
-
Google’s Eric Schmidt and Jared Cohen were wide-ranging session at SXSW today and they revealed that Google’s data is now safely protected from the prying eyes of government organizations. In the last few days Google upgraded its security measure following revelations that Britain’s GCHQ had intercepted data being transmitted between Google datacenters, Schmidt said that his company’s upgrades following the incident left him “pretty sure that information within Google is now safe from any government’s prying eyes.” In addition to increased encryption, which Google has discussed publicly to a media, Schmidt said the company had made further undisclosed improvements to its security in recent months.
Spies worry over doomsday cache stashed by ex-NSA contractor Snowden | Reuters - 0 views
-
(Reuters) - British and U.S. intelligence officials say they are worried about a "doomsday" cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud. The cache contains documents generated by the NSA and other agencies and includes names of U.S. and allied intelligence personnel, seven current and former U.S. officials and other sources briefed on the matter said.The data is protected with sophisticated encryption, and multiple passwords are needed to open it, said two of the sources, who like the others spoke on condition of anonymity to discuss intelligence matters.The passwords are in the possession of at least three different people and are valid for only a brief time window each day, they said. The identities of persons who might have the passwords are unknown.
-
One source described the cache of still unpublished material as Snowden's "insurance policy" against arrest or physical harm.U.S. officials and other sources said only a small proportion of the classified material Snowden downloaded during stints as a contract systems administrator for NSA has been made public. Some Obama Administration officials have said privately that Snowden downloaded enough material to fuel two more years of news stories."The worst is yet to come," said one former U.S. official who follows the investigation closely.Snowden, who is believed to have downloaded between 50,000 and 200,000 classified NSA and British government documents, is living in Russia under temporary asylum, where he fled after traveling to Hong Kong. He has been charged in the United States under the Espionage Act.Cryptome, a website which started publishing leaked secret documents years before the group WikiLeaks or Snowden surfaced, estimated that the total number of Snowden documents made public so far is over 500.
-
Snowden's revelations of government secrets have brought to light extensive and previously unknown surveillance of phone, email and social media communications by the NSA and allied agencies. That has sparked several diplomatic rows between Washington and its allies, along with civil liberties debates in Europe, the United States and elsewhere.Among the material which Snowden acquired from classified government computer servers, but which has not been published by media outlets known to have had access to it, are documents containing names and resumes of employees working for NSA's British counterpart, the Government Communications Headquarters (GCHQ), sources familiar with the matter said.The sources said Snowden started downloading some of it from a classified GCHQ website, known as GC-Wiki, when he was employed by Dell and assigned to NSA in 2012.
- ...2 more annotations...
The Sides Are Forming For The Coming Civil War. | Militia News - 1 views
-
America is in the choosing sides phase of the coming civil war. To use a college recruiting phrase, it is accurate to state that the letters of intent to join one side or another have mostly been signed and the commitments offered. However, there is one big uncommitted piece, but very soon the sides will be drawn.
-
The Chess Pieces of Civil War What is going on today in America all about choosing sides. There are clear lines being formed in the United States. The recruiting pool consists of the Department of Homeland Security, the American military, local law enforcement, the Russian troops pouring into the United States, the trickle of Chinese troops coming into the country through Hawaii and, of course, the poor, the middle class and elite. This is the recruiting pool which will form the chess pieces of the coming American Civil War. Even if all parties in this country wanted the country to continue, even in its present mortally wounded state, it would be foolish to believe that it could continue for much longer.
-
Barring a false flag event, US martial law will have a trigger event, which will lead to martial law, that will be financial and it will naturally occur as we are already on a collision course with destiny.
- ...18 more annotations...
-
While I'd be the first to agree that the degree of fiscal mismanagement of this nation's economy is beyond insane and have to admit that I see very little to admire in Barack Obama's presidency, the meme about Executive Order 13603 authorizing confiscation of any property and enslavement of the American public needs to be put to rest. See http://www.archives.gov/federal-register/executive-orders/2012.html#13603 E.O. 13603 is not much more than an updating of similar executive orders issued by prior presidents beginning with Dwight Eisenhower. In fact, in skimming it a few minutes ago, I didn't see anything drastically different from some of the prior related orders. E.g., it reflects that a bunch of agencies that were formerly either independent or under other departments are now under the newish Department of Homeland Security, whose Secretary now gets the authority formerly delegated to other department and agency heads. If blame must be cast, it belongs on the Congress that enacted the Defense Production Act of 1950, 50 U.S.C. 2061, et seq. The executive order does no more than obey that Act's instructions. For example there is a section authorizing pre-emption of manufacturing capacity of critical industries over any existing civilian contracts in the event of a national emergency, but that language is in the statute as well. But that power hasn't had much traction since Harry Truman tried to nationalize the steel industry to break a nationwide strike. The Supreme Court swatted down that effort as an abuse of a power that would be lawful in a true emergency, like another major. But even that semi-radical "survival" power is ameliorated by other provisions of the statute and the order that authorize loan guarantees for companies' construction and maintenance of critical productive capacity. Much of that has been implemented over the years as outright grants. So for example, many chemical manufacturing plants were built with Defense Production Act funds, with
Inside the NSA's War on Internet Security - SPIEGEL ONLINE - 0 views
-
US and British intelligence agencies undertake every effort imaginable to crack all types of encrypted Internet communication. The cloud, it seems, is full of holes. The good news: New Snowden documents show that some forms of encryption still cause problems for the NSA.
‹ Previous
21 - 40 of 50
Next ›
Showing 20▼ items per page