We Gave Up Our Privacy Willingly: Intellectual Property and Privacy – Video


We Gave Up Our Privacy Willingly: Intellectual Property and Privacy
Podcast episode #1 from http://chewingofthecud.blogspot.com In June of 2013, a man named Edward Snowden stepped in to a Hong Kong airport, and the world learned just how little digital privacy...

By: Mike Maxwell

See more here:
We Gave Up Our Privacy Willingly: Intellectual Property and Privacy - Video

NSA Spying: Course and objectives

(Daily Frontier Post (Afghanistan) Via Acquire Media NewsEdge) Though the history of spying and espionage is as old as human civilization but the recent such steps taken by the NSA with the use of modern technology are clear and wide spread infringement and abuse of human rights. This spying on one hand is shameful and on the other a bigger question mark on American sayings and practices as well. USA has even not spared to its old friends and allies proving that there are no permanent friends or foes in international politics but interests. Edward Joseph Snowden, a young computer professional a year ago revealed some important data about NSA spying which has since then where tensed the USA has also alerted the whole world along with protests. Daniel Ellsberg has called it the most significant leaks in the American history. In the words of Snowden, the sole purpose behind this leaking is 'to inform the public as to that which is done in their name and that which is done against them'. From the early Egyptian Pharos till recent past history including the Roman Empires and Middle Ages this fascist cum imperial spying by NSA is not exampled in the last 5 thousand years'. The circumference of surveillance by NSA is the whole globe. It has not left a single person using or have ever experienced communication technologies directly or indirectly. The leaks revealed that US has spied on Brazil, Mexico, Britain, China, Russia, Germany, Spain, France and 35 world leaders notably German chancellor Angela Markel who is under surveillance at least since 2002. In Latin America it has done surveillance of Venezuela, Argentina, Columbia, Ecuador, Panama, Peru and others including information about oil, energy and trade deals struck there. Der Spiegel reports that NSA has spied 122 top world leaders. It has spied on the countries of Middle East, South Asia together with Pakistan and all institutions of the world including IMF, World Bank, IAEA, and International Centre for Theoretical Physics, Italy, UN, OPEC, EU and G8, G20 summits, embassies etc.

The course of NSA spying is very technical, tricky and fiddly as whistle blows Snowden. Upstream is used to intercept data directly from optics fibers whereas PRISM is credited with exploiting details from Google, Yahoo, Facebook, PalTalk, AOL, Skype, Microsoft, Apple and Youtube. NSA hacks network backbones, the internet routers that give them access to the communications of millions of computers. Through XKeyscore NSA explores everything a user performs on the internet. Tailored Access Operations (TAO) is a special team which hacks the computers worldwide when other surveillance methods are failed. Via Dishfire NSA intercepts around 200 million text messages every day world wide. It also links Yahoo and Google data centers to access data.

All phone calls in Afghanistan and Bahamas are intercepted and stored using a program named Mystic. Britain is also assisting US in this regard via its GCHQ. NSA has its corporatepartners to collect data i.e. BLARNEY (AT&T), FAIRVIEW, STORMBREW and DARKSTAR. It has also targeted Tranchulas, a Pakistani computer security company. Websites encryption is rampant by NSA. It has a massive collection of phone calls.

The overt objectives as said by the agency are to intercept and trace out the expected terrorists for the security of Americans but the game is not so simple. As said by Snowden'these programs were never about terrorism: they're about economic spying, social control, and diplomatic manipulation. They're about power'. There are so many covert objectives behind it. By surveillance and spying NSA is able to collect data, gather information, and intercept tapes that can possibly halt in materializing the New World Order, New Great game and the aim of international policing, ruling and superiority. Through spying NSA pre-knows that which government is coming in which country, what the people or contenders in the race of government are thinking and planning and which government can prove better for the Americans. On the other hand which countries are vulnerable in terms of security thus inflaming the situation sale of weapons could be multiplied. And on the other hand how and where American corporate elites can better invest and earn.

FISA, the US Foreign Intelligence Surveillance Act though provides a mechanism to the government to issue warrant of a person but who is actually involved in spying, engaged in terrorism or working as an agent of any foreign country.

But US itself is breaching millions times its own made laws. A country run by the insatiable corporate elites and unbridled Pentagon will hardly stop its spiteful activities as its gluttony tummy will never fill. The motive of creating an evil empire is under progression. But the destruction when starts does not make a distinction as the natural justice also wanders all around.

As was recently known that in Pakistan NSA has spied on PPP and likely chances are that it is currently spying too not only on the PPP but other parties and sensitive places as well.

The American embassy here is a place of all such exercises whose roof reportedly is used for such wicked purposes. For the safety of Pakistan and its citizens such practices must be sternly stopped. As per international law embassies are not supposed to spying. Our government must ensure her sovereignty setting up an example for such any other malevolent and rancorous hand.

NSA spying is in all its forms and types is the breach of basic human rights of privacy, freedom of speech, expression,association, individualism and sovereignty as well as American own Bill of Rights. There is dire need of transparency and accountability of the said organization as well proper message to the American government by the members of UN General Assembly along with protests at embassies and summit level. Restoration of distorted and violated trust is abruptly needed.This eaves dropping and espionage must be stopped to get rid of embarrassment. There remains no difference between the cyber traffickers, hackers and NSA. NSA too is involved in grave cybercrime. Therefore, there is dire need of extensive legislation on cyber rights, responsibilities and security.

[ Back To TMCnet.com's Homepage ]

Link:
NSA Spying: Course and objectives

Germany considering using typewriters to counter NSA spying

BERLIN, July 15 (UPI) --Germany is considering going "old school" in order to counter NSA spying by having their politicians and top officials ditch their computers to use typewriters.

Christian Democrat Patrick Sensburg, the head of the Bundestag's parliamentary inquiry into NSA activity, revealed the possible change during an interview with the Morgenmagazin TV program. On Monday night, the interviewer somewhat jokingly asked whether the government was considering typewriters to protect its communication from electronic surveillance.

"As a matter of fact, we have -- and not electronic models either," Sensburg responded. When pressed for confirmation, Sensburg said, "Yes, no joke."

German media has reported that the revelations brought to light by NSA whistleblower Edward Snowden encouraged politicians and government workers to avoid email, texts and phone calls.

"Those concerned talk less on the phone, prefer to meet in person. More coffees are being drunk and lunches eaten together. Even the walk in the park is increasingly enjoying a revival," reported Die Welt.

Germany is not the only country considering the retro tactic. Russia's Federal Guard Service reportedly spent more than $14,800 on electric typewriters in 2013, just after Snowden started leaking documents.

2014 United Press International, Inc. All Rights Reserved. Any reproduction, republication, redistribution and/or modification of any UPI content is expressly prohibited without UPI's prior written consent.

Read the original post:
Germany considering using typewriters to counter NSA spying

Germany May Switch to Typewriters to Foil NSA Spies

Germany is considering going "old school" in order to counter NSA spying by having their politicians and top officials ditch their computers to use typewriters.

Christian Democrat Patrick Sensburg, the head of the Bundestag's parliamentary inquiry into NSA activity, revealed the possible change during an interview with the Morgenmagazin TV program. On Monday night, the interviewer somewhat jokingly asked whether the government was considering typewriters to protect its communication from electronic surveillance.

"As a matter of fact, we have -- and not electronic models either," Sensburg responded. When pressed for confirmation, Sensburg said, "Yes, no joke."

German media has reported that the revelations brought to light by NSA whistleblower Edward Snowden encouraged politicians and government workers to avoid email, texts and phone calls.

"Those concerned talk less on the phone, prefer to meet in person. More coffees are being drunk and lunches eaten together. Even the walk in the park is increasingly enjoying a revival," reported Die Welt.

Germany is not the only country considering the retro tactic. Russia's Federal Guard Service reportedly spent more than $14,800 on electric typewriters in 2013, just after Snowden started leaking documents.

-----

Original headline: Germany considering using typewriters to counter NSA spying

Visit link:
Germany May Switch to Typewriters to Foil NSA Spies

Open Source Software – What is Free Open Source Software?

Definition: The source code for a software application is basically the programming instructions for the software. Most financial software has a source code that is not openly shared for the purpose of competing for market share. When software is considered to be open source, the source code is available to anyone who wants to use or work with the software, free of charge.

Open source software is can be modified by anyone who downloads the source, and is usually developed with a collaboration of programmers and software users. This collaboration includes testing the software to eliminate bugs in the program code, a process with can cause the software to quickly become more refined and user-friendly.

Open source software is free to the general public and is considered safe to use when the usual precautions are taken (use antivirus software). The only drawback to open source software may be a lack of formal technical support, although most of this software has an online manual to use to learn to use the software and a strong user community which freely provides reliable support to those who have questions. Help documentation is most often found in the software under the Help section at the top of the screen or on the software developer's web site.

See the original post here:
Open Source Software - What is Free Open Source Software?

Everything Is Broken

https://medium.com/message/everything-is-broken-81e5f33a24e1

Everything is Broken

Once upon a time, a friend of mine accidentally took over thousands of computers. He had found a vulnerability in a piece of software and started playing with it. In the process, he figured out how to get total administration access over a network. He put it in a script, and ran it to see what would happen, then went to bed for about four hours. Next morning on the way to work he checked on it, and discovered he was now lord and master of about 50,000 computers. After nearly vomiting in fear he killed the whole thing and deleted all the files associated with it. In the end he said he threw the hard drive into a bonfire. I can’t tell you who he is because he doesn’t want to go to Federal prison, which is what could have happened if he’d told anyone that could do anything about the bug he’d found. Did that bug get fixed? Probably eventually, but not by my friend. This story isn’t extraordinary at all. Spend much time in the hacker and security scene, you’ll hear stories like this and worse.
It’s hard to explain to regular people how much technology barely works, how much the infrastructure of our lives is held together by the IT equivalent of baling wire.
Computers, and computing, are broken.

Continue reading

RESEARCH PROJECT NS2 PERFORMANCE ANALYSIS OF HYBRID CRYPTOGRAPHY FOR SECURED – Video


RESEARCH PROJECT NS2 PERFORMANCE ANALYSIS OF HYBRID CRYPTOGRAPHY FOR SECURED
PG Embedded Systems http://www.pgembeddedsystems.com #197 B, Surandai Road Pavoorchatram,Tenkasi Tirunelveli Tamil Nadu India 627 808 Tel:04633-251200 Mob:+91-98658...

By: GANESAN P

Go here to see the original:
RESEARCH PROJECT NS2 PERFORMANCE ANALYSIS OF HYBRID CRYPTOGRAPHY FOR SECURED - Video