chelsea manning trio - there #39;s trouble until
2/1/14 @ lalaland, fayetteville ar intro ends around 2:00.
By: Sam King
The rest is here:
chelsea manning trio - there's trouble until - Video
chelsea manning trio - there #39;s trouble until
2/1/14 @ lalaland, fayetteville ar intro ends around 2:00.
By: Sam King
The rest is here:
chelsea manning trio - there's trouble until - Video
Washington, Feb. 06 : UK spy agency, the GCHQ, allegedly launched cyber attack on hacktivist group Anonymous, documents revealed by whistleblower Edward Snowden have revealed.
The documents state that GCHQ's division, the Joint Threat Research Intelligence Group (JTRIG), carried out the alleged operations.
According to The Verge, JTRIG launched a distributed denial of service (DDoS) attack against the internet relay chat (IRC) rooms used by members of Anonymous, as part of the operation dubbed 'Rolling Thunder'.
It was revealed that the DDoS attack was launched following similar attack by Anonymous in 2011 on PayPal, major credit card companies, and websites of the FBI, CIA, and GCHQ as part of its 'Operation Payback,' staged in protest against the prosecution of Chelsea Manning.
The documents include a presentation titled "Pushing the Boundaries and Action Against Hacktivism" that lists Anonymous, LulzSec, and the Syrian Electronic Army as major hacktivist groups.
Meanwhile, author of the forthcoming book on Anonymous, Gabriella Coleman said that the GCHQ went too far, as its operation amounted to a crackdown on civil disobedience rather than suspected terrorists, implicating a handful of criminals at the expense of thousands.
Former head of the US National Counterterrorism Center, Michael Leiter, echoed similar views as he said that groups shouldn't be targeted for their political beliefs, but he didn't think it should negate the government's ability to identify cybercriminals online, the report added.
--ANI (Posted on 06-02-2014)
Read more:
UK spy agency launched cyber attack on hacktivist group Anonymous
Feb. 7, 2014, 4 a.m.
An 18 year old local man who allegedly tried to run an off-duty police officer off the road, faced Wellington local court yesterday charged with several offences.
An 18 year old local man who allegedly tried to run an off-duty police officer off the road, faced Wellington local court yesterday charged with several offences.
The officer had been driving home on the Mitchell Highway where he was allegedly confronted by the man.
Bradley Manning was already appearing on a number of charges before magistrate Terry Lucas who said police were on duty 24/7 and that it was a serious offence.
He then refused bail for Manning. It is the first time the Wellington man has been charged as an adult.
The man has been charged with: intimidating a police officer in execution of duty, harassing a police officer in execution of duty, behaving in an offensive manner in/near a public place/school, driving a motor vehicle to menace another with intent and knowingly driving a vehicle in a manner that menaces another.
Manning is due to reappear at Wellington Court House via audiovisual link on March 25.
The defence, John Styles of Aboriginal Legal Services said that Mr Manning, who has a partner and nine month-old child, would commit to living near Gulgong, but the prosecuting officer Sergeant Mereika Wilkins said that he should not be out in the community and there was a strong likelihood he would re-offered.
Magistrate Terry Lucas said the allegation was of a serious nature if proven.
View post:
Man at court in Wellington after a run in with police
Edward Snowden, invisible, aurait dj quitt la Russie - 24 061223
By: Arline Nolf
Read the original here:
Edward Snowden, invisible, aurait déjà quitté la Russie - 24 061223 - Video
Who Is Edward Snowden?
Edward Snowden is a 30 year old US citizen, former Intelligence Community officer and whistleblower. The documents he revealed provided a vital public window into the NSA and its international intelligence partners secret mass surveillance programs and capabilities. These revelations generated unprecedented attention around the world on privacy intrusions and digital security, leading to a global debate on the issue.
Snowden worked in various roles within the US Intelligence Community, including serving undercover for the CIA overseas. He most recently worked as an infrastructure analyst at the NSA, through a Booz Allen Hamilton contract, when he left his home and family in Hawaii to blow the whistle in May 2013. After travelling to Hong Kong, Snowden revealed documents to the American public on the NSAs mass surveillance programs, which were shown to be operating without any public oversight and outside the limits of the US Constitution. The US government has charged Snowden with theft of government property, and two further charges under the 1917 Espionage Act. Each charge carries a maximum 10-year prison sentence.
With the US pursuing his extradition, Snowden is now in Russia, where he was formally granted asylum on 1 August 2013. Journalists continue to publish documents from Snowden that reveal the secret and unaccountable systems of modern global surveillance.
For quick access to information on all aspects concerning Edward Snowden and his case, please read our Frequently asked questions page.
Snowden talks at the Sam Adams Award award ceremony in October 2013 about the secret surveillance he revealed and its dangers to democracy.
Here is the original post:
Who Is Edward Snowden?
Deputy Attorney General James Cole testifies on Capitol Hill in Washington Tuesday before the House Judiciary Committee hearing.(Photo: Cliff Owen, AP)
WASHINGTON One of the principal authors of the U.S. Patriot Act, which allowed the bulk collection of virtually all Americans' telephone records, warned Tuesday that the authority would surely end unless the surveillance program was dramatically altered.
Rep. James Sensenbrenner, R-Wis., addressing Deputy Attorney General James Cole at a House Judiciary Committee hearing, said the collection authority "never would have been approved'' had details of the program revealed last year by former National Security Agency contractor Edward Snowden been more widely known.
"The revelations were a shock,'' Sensenbrenner said, adding that the program amounted to a "vacuum cleaner.''
The congressman's remarks represented the latest rebuke to the controversial surveillance program that has been the focus of congressional, judicial and administrative review since its disclosure last June.
Cole continued to defend the program as legal, citing the opinions of more than a dozen judges assigned to the secret Foreign Intelligence Surveillance Court.
"Although we continue to believe the program is lawful,'' Cole said, "we recognize that it has raised significant controversy and legitimate privacy concerns, and as I have said we are working on developing a new approach as (President Obama) has directed.''
Read this article:
NSA spying revelations 'a shock' to Patriot Act author
A group of computer hackers and human rights campaigners in Germany announced Monday that they are suing their government for allegedly breaking the law by aiding foreign spies.
The Chaos Computer Club and the International League for Human Rights submitted a criminal complaint to federal prosecutors claiming that Chancellor Angela Merkel, her government and security officials tolerated and even helped members of the U.S. National Security Agency and Britain's GCHQ to spy on German citizens.
The groups point to documents released by NSA leaker Edward Snowden as evidence that the emails, social media messages and phone calls of ordinary citizens are screened beyond what is allowed under German law.
"With this criminal complaint, we hope to finally initiate investigations by the Federal Prosecutor General against the German government," the Chaos Computer Club said in the statement. The group calls itself Europe's largest association of hackers; it regularly campaigns for greater privacy rights and exposes flaws in electronic security systems.
Federal prosecutors have been considering for months whether to open an investigation of alleged NSA activities. They will now have to consider whether to open an investigation on the basis of the new criminal complaint as well.
While the German government has expressed misgivings about some of the reported allegations and is seeking to negotiate a 'no-spy' agreement with the United States, opposition lawmakers have accused Merkel's administration of failing to put sufficient pressure on Washington for fear of jeopardizing diplomatic relations and intelligence cooperation.
Merkel's spokesman, Steffen Seibert, noted that "everyone in Germany can file a criminal complaint" and declined to comment on the hackers' suit.
See the rest here:
Hackers Sue German Government Over NSA Spying - ABC News
This video is called Federal Judge Rules NSA Spying On All American Phone Calls Unconstitutional.
Tech company transparency reports reveal massive NSA spying
5 February 2014
Major US telecommunications companies released figures this week showing that the National Security Agency has requested data relating to tens of thousands of customer accounts in just the first half of last year. The release of the transparency reports was part of an agreement reached with the Obama administration allowing limited disclosures of information about the massive police-state spying apparatus.
The accounts spied on were targeted as part of the NSAs PRISM surveillance program, which has been in operation since 2007. Using PRISM, the spy agency obtains orders from the Foreign Intelligence Surveillance Court to require telecommunications companies to turn over information. PRISM came to the attention of the public as a result of documents provided by NSA whistle-blower Edward Snowden.
Slides released by Snowden show that PRISM collects email, chat (voice and video), video, photos, stored data, file transfers, video conference data, notifications of target activity and online social networking details from a range of providers including Microsoft, Google, Yahoo, Facebook, PalTalk, YouTube, Skype, AOL, and Apple.
Yahoo said it turned over information on between 30,000 and 30,999 accounts between January and June 2013. Facebook reported 5,000-5,999 requests. Microsoft reported 15,000 to 15,999, and Google reported 9,000-9,999. The figures released by the company show a steady increase over the past several years.
These figures cover only a small aspect of the convoluted network of spy programs. The information released is subject to a six-month delay imposed by the government on all disclosures of data requests.
Despite claims to be increasing transparency, there is in fact very little information included in the reports aside from aggregate figures. The fact that the information reveals spying on the order of tens of thousandsas opposed to the hundreds of millions of records obtained through other programsis also aimed at downplaying the extent of the unconstitutional intrusion into the privacy of citizens and non-citizens alike.
Emma Woollacott, writing for Forbes, noted that the transparency reports do little to improve knowledge of just how much data is being accessed by the NSA. Theyve been described as a tech company PR stuntbut, in fact, they are far more of a PR coup for the government. Permission to release these figures means the government looks more open, a set of comparatively small numbers captures the headlines and attention is diverted away from other types of snooping.
See the original post:
NSA spying scandals continue | Dear Kitty. Some blog
S
You've probably heard the word "encryption" a million times before, but if you still aren't exactly sure what it is, we've got you covered. Here's a basic introduction to encryption, when you should use it, and how to set it up.
Encryption is a method of protecting data from people you don't want to see it. For example, when you use your credit card on Amazon, your computer encrypts that information so that others can't steal your personal data as its being transferred. Similarly, if you have a file on your computer you want to keep secret only for yourself, you can encrypt it so that no one can open that file without the password. It's great for everything from sending sensitive information to securing your email, keeping your cloud storage safe, and even hiding your entire operating system.
Encryption, at its core, is similar to those decoder rings you played with when you were younger. You have a message, you encode it using a secret cipher, and only other people with the cipher can read it. Anyone else just sees gibberish. Obviously, this is an incredibly simplified explanation. The encryption in your computer is far more complexand there are different types of encryption that use multiple "decoder rings"but that's the general idea.
There are also different levels of security when it comes to encryption. Some types, for example, are more secure but take longer to "decode." And few, if any, encryption methods are 100% foolproof. If you want a more thorough explainer on how encryption works, check out this article from the How-To Geek and this article from HowStuffWorks. They explain a few different kinds of encryption and how they keep you safe online.
First of all, a short answer: yes. Things can get stolen even if you don't share your computer. All someone needs is a few minutes in front of the keyboard to retrieve anything they want. A login password won't protect you, eitherbreaking into a password-protected computer is insanely easy.
So should you encrypt your sensitive files? Yes. But it's a bit more to it than that. You have two big choices when it comes to encryption: do you just encrypt the important stuff, or do you encrypt your entire drive? Each has pros and cons:
We generally recommend against average users encrypting their entire drive. Unless you have sensitive files all over your computer, or have other reasons for encrypting the entire thing, it's easier to encrypt the sensitive files and call it a day. Full disk encryption is more secure, but can also much more problematic if you don't put in the work to keep everything backed up safely (and then encrypt those backups as well).
That said, we'll show you how to do both in this guide. and what you do is up to you. We'll talk a bit more about each situation in their individual sections below.
Follow this link:
A Beginner's Guide to Encryption: What It Is and How to ...
ENCRYPTION
"If privacy is outlawed, only outlaws will have privacy. Intelligence agencies have access to good cryptographic technology. So do the big arms and drug traffickers. So do defense contractors, oil companies, and other corporate giants. But ordinary people and grassroots political organizations mostly have not had access to affordable military grade public-key cryptographic technology. Until now.
PGP empowers people to take their privacy into their own hands. There's a growing social need for it. That's why I wrote it.",
Phillip Zimmermann, author of encryption software program, PGP [1]
Introduction
Maintaining privacy in our personal communications is something everyone desires. Encryption is a means to achieve that privacy. It was invented for that very purpose. That makes encryption a good idea, right? But encryption, like most things, can be used for good or evil. And the debate over how to harness this powerful tool rages on as people on both sides see that there are no easy answers. .
What is encryption?
Read the original post:
Encryption - University of Illinois at Urbana–Champaign