Tuesday, June 11, 2013

US spy program to remain







http://m.yahoo.com/w/legobpengine/news/intelligence-official-says-us-spy-program-remain-despite-075136697.html?.b=world%2F%3F.b%3Dphotos%2F%3F.b%3Dindex%2F&.cf3=Jumbotron&.cf4=2&.cf5=The+Canadian+Press&.cf6=%2Fworld%2F&.h=World&.ts=1370972697&.intl=ca&.lang=en-ca

Contractor who leaked NSA files drops out of sight, faces legal battle

By John Whitesides | Reuters – 18 hours agoBy John WhitesidesWASHINGTON (Reuters) - A contractor at the National Security Agency who leaked details of top-secret U.S. surveillance programs dropped out of sight in Hong Kong on Monday ahead of a likely push by the U.S. government to have him sent back to the United States to face charges.Edward Snowden, 29, who provided the information for published reports last week that revealed the NSA's broad monitoring of phone call and Internet data from large companies such as Google and Facebook, checked out of his Hong Kong hotel hours after going public in a video released on Sunday by Britain's Guardian newspaper.The disclosures by Snowden have sent shockwaves across Washington, where several lawmakers called on Monday for the extradition and prosecution of the ex-CIA employee who was behind one of the most significant security leaks in U.S. history.There were some signs, however, that Snowden's stance
against government surveillance and his defense of personal privacy was resonating with at least some Americans.Supporters flocked to Snowden's aid on the Internet - more than 25,000 people signed an online petition urging Obama to pardon Snowden even before he has been charged. A separate effort on Facebook to raise funds for Snowden's legal defense netted nearly $8,000 in just a few hours.In Hong Kong, officials were cautious in discussing a spy drama that could entangle U.S.-China relations just a few days after U.S. President Barack Obama and Chinese President Xi Jinping met at a summit in California where cyber security was a prime topic.Snowden told the Guardian that he went to Hong Kong in hopes it would be a place where he might be able to resist U.S. prosecution attempts, although the former British colony has an extradition treaty with the United States.On Monday, some local officials suggested that Snowden might have miscalculated."We do have
bilateral agreements with the U.S. and we are duty-bound to comply with these agreements. Hong Kong is not a legal vacuum, as Mr. Snowden might have thought," said Regina Ip, a Hong Kong lawmaker and former security secretary.Snowden said he turned over the documents to The Washington Post and the Guardian in order to expose the NSA's vast surveillance of phone and Internet data.The former technical assistant at the CIA, who had been working at the NSA as an employee of contractor Booz Allen Hamilton, said he became disenchanted with Obama for continuing the surveillance policies of George W. Bush, Obama's predecessor."I don't want to live in a society that does these sort of things ... I do not want to live in a world where everything I do and say is recorded," Snowden told the Guardian, which published the video interview with him, dated June 6, on its website.In Washington, several members of Congress and intelligence officials showed little sympathy
for Snowden's argument. The U.S. Justice Department already is in the initial stages of a criminal investigation."Anyone responsible for leaking classified information should be punished to the fullest extent of the law," said Republican Mike Rogers, chairman of the House of Representatives Intelligence Committee.'A SACRED TRUST'James Clapper, the director of national intelligence, told NBC that the leaks "violate a sacred trust for this country. The damage that these revelations incur are huge."Some lawmakers were more cautious, however, saying the surveillance programs revealed by the Guardian and The Post raised concerns not just about citizens' privacy, but also whether the Obama administration had done enough to keep Congress informed about such surveillance, as required by law."The government does not need to know more about what we are doing. We need to know more about what the government is doing," said Ron Paul, a former House member and
unsuccessful Republican presidential candidate in 2012 who has long said that the U.S. government is too intrusive into Americans' daily lives."We should be thankful for individuals like Edward Snowden," Paul said.At the White House on Monday, Obama spokesman Jay Carney sidestepped questions about Snowden. Responding to questions about the White House's efforts to brief Congress about the NSA's surveillance programs, a senior administration official released a list of 22 briefings that had been conducted for lawmakers over a 14-month span.There will be more briefings on Tuesday, when a half-dozen national security, law enforcement and intelligence officials will meet with House members. The Senate will be briefed on Thursday.Snowden, who the Guardian said had been working at the NSA for four years as a contractor for outside companies, told the Guardian he had copied the secret documents at the NSA office in Hawaii three weeks ago and had told his
supervisor that he needed "a couple of weeks" off for epilepsy treatments. He flew to Hong Kong on May 20.Staff at a luxury hotel in Hong Kong told Reuters that Snowden had checked out at noon on Monday. Ewen MacAskill, a Guardian journalist, said later in the day that Snowden was still in Hong Kong."He didn't have a plan. He thought out in great detail leaking the documents and then deciding rather than being anonymous, he'd go public. So he thought that out in great detail. But his plans after that have always been vague," MacAskill said."I'd imagine there's now going to be a real battle between Washington and Beijing and civil rights groups as to his future," MacAskill said. "He'd like to seek asylum in a friendly country but I'm not sure if that's possible or not."HONG KONG ASYLUM POLICY 'IN LIMBO'Legally speaking, where does Snowden go from here?If Snowden is charged on criminal counts as many lawmakers and officials expect, the focus will turn to
the extradition treaty that the United States and Hong Kong signed in 1996, a year before the former British colony was returned to China.The treaty, which allows for the exchange of criminal suspects in a formal process that also may involve the Chinese government, went into effect in 1998.It says that Hong Kong authorities can hold a U.S. suspect for up to 60 days after the United States submits a request indicating there is probable cause to believe the suspect violated U.S. law. In Snowden's case, such a request could lead Hong Kong authorities to hold him while Washington prepares a formal extradition request.Snowden could try to stay in Hong Kong by seeking political asylum. Simon Young, a professor of law at the University of Hong Kong, said there are strong protections for people making asylum claims under Hong Kong's extradition laws.A decision this year by Hong Kong's High Court requires the government to create a new standard for reviewing
asylum applications, putting the cases on hold until the new system is finished."He's come really at probably the best moment in time because our asylum laws are in a state of limbo," Young said.MORE REVELATIONS TO COME?Snowden's revelations launched a broad national debate on privacy rights and the limits of security programs in the aftermath of the September 11, 2001, attacks in the United States.On Monday, Glenn Greenwald, the Guardian's lead reporter on the Snowden case, used Twitter to chide Clapper for claiming that Snowden's disclosures harmed national security. Greenwald also suggested that there were more revelations to come."Clapper: leaks "literally gut-wrenching" - "huge, grave damage" - save some melodrama and rhetoric for coming stories. You'll need it," Greenwald tweeted.Many members of Congress have expressed support for the surveillance program but raised questions about whether it should be more tightly supervised and scaled back."In
my mind, things that may have been appropriate in the aftermath of 9/11 and in the weeks and months and even years after that, may no longer be appropriate today," Republican Representative Luke Messer of Indiana said on MSNBC.Some officials said the U.S. government might need to reconsider how much it relies on outside defense contractors who are given top security clearances. As of October 2012, about 483,000 government contractors has top-secret security clearances, according to a report issued in January by the Office of the Director of National Intelligence."We do need to take another, closer look at how we control information and how good we are at identifying what people are doing with that information," said Stewart Baker, former general counsel at the NSA and former assistant secretary for policy at the Department of Homeland Security.(Additional reporting by James Pomfret, David Ingram, Mark Hosenball, Susan Heavey, Patricia Zengerle; Editing
by David Lindsey, Jim Loney and Mohammad Zargham)

64 comments:

  1. Sounds like Echalon turned inward:

    http://en.m.wikipedia.org/wiki/ECHELON

    ReplyDelete
  2. Spying on Democracy: Government Surveillance, Corporate Power and Public Resistance (Paperback)

    Heidi Boghosian, Lewis Lapham

    ReplyDelete
  3. Big Brother is listening: Andrew Snowden's interview with Guardian : http://m.guardian.co.uk/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video http://ca.news.yahoo.com/report-nsa-contract-worker-newspapers-source-us-government-190518725.html?.tsrc=yahoo

    US telecommunications surveillance program code named "Prism" Andrew Snowden takes on the most powerful intelligence agency in the world. Good on you, Andrew! You're a hero and a true public servant!
    For years the gov't. has denied the existence of this program. No one had the courage to talk about it.
    The " Patriot Act" gave NSA authority to monitor all communications for "security"
    http://ca.news.yahoo.com/blogs/pulseofcanada/internal-government-spying-necessary-stop-terrorism-invasion

    ReplyDelete
  4. Snowden's revelations about NSA spying are not treason,
    The 4th amendment calls for people to be secure in their person, papers, and effects, against unreasonable searches and seizures-- it is treason to violate the Bill of Rights, 

    ReplyDelete
    Replies
    1. The inviolable military:

      Bradley Manni.g sentenced to 35 years by military court for blowing the wbistle on wrongdoing in the military.
      Bradly Ma.ning performed a valuable public sefvice by dizclosing instances of torture a.d civilian deatbs wch tbe govt sought yo keep concealed from tbe public
      He did not sell secrets to anptber govt.(he was acquited on tbe charge of "aiding the enemy")

      Wby is there no outrage in tbe court of public opinion , a.d wby is the disclosed evidence not bei.g used to prosecute a.d punish those responsible for thd revealed atrocities
      If "we tbe people" remain silent a.d condone tbe military's licence to torture a.d murder
      then how can we condemn the actions of otber govts/states wben they commit atrocities

      "When a soldier who shared information with the press and public is punished far more harshly than others who tortured prisoners and killed civilians, something is seriously wrong with our justice system," said Ben Wizner, head of the ACLU's speech and technology project.

      Delete
    2. This harsh precedent-setting sentence
      is meant to be an example to others contemplating taking on tbe govt by leaking "secrets" to the anti-secrecy
      organization "Wikileaks".
      If you leak govt. secrets to the public
      the full weight of the military justice syztem will come down upon you and
      you will be squashed like a bug!


      http://www.whistleblower.org/blog/44-2013/2917-reactions-to-manning-sensitive-jobs-ruling-attacks-civil-service-rights-daily-whistleblower-news

      Delete
  5. Big Brother knows whats best for you

    The govt. picks and chooses wbat information it gives out and what it chooses to keep secret ,....but denies the people the same right.
    All tbe information we access or exchange
    is visible to the prying eyes of govt

    ReplyDelete
  6. NSA’s XKeyscore surveillance programme collects
    nearly everything you do!

    http://m.techcrunch.com/2013/07/31/nsa-project-x-keyscore-collects-nearly-everything-you-do-on-the-internet/

    ReplyDelete
  7. Blackhat 2013


    http://www.zdnet.com/black-hat-usa-2013-day-one-in-pictures-7000018761/

    ReplyDelete
  8. Another US spy program:




    U.S. directs agents to cover up program used to investigate Americans

    By John Shiffman and Kristina Cooke | Reuters 

    http://ca.news.yahoo.com/exclusive-u-directs-agents-cover-program-used-investigate-091643729.html?.tsrc=yahoo

    ReplyDelete
  9. Obama to reform Patriot Act:

    Obama announces new oversight measures to prevent abuse
    of surv eillance programs

    http://video.msnbc.msn.com/rachel-maddow/52719246

    http://firstread.nbcnews.com/_news/2013/08/09/19950803-snowden-revelations-force-obamas-hand-on-surveillance-program?lite

    ReplyDelete
  10. NSA spy program broke rules thousands of times
    (according to audit dated May 2012)


    http://www.cbc.ca/news/technology/story/2013/08/16/nsa-edward-snowden-washington-post.html

    http://news.yahoo.com/report-nsa-spying-broke-privacy-rules-many-times-014248816.html

    ReplyDelete


  11. Secret Court Faulted NSA for Collecting Domestic Data
    The NSA violated the Constitution for three years when it collected tens of thousands of purely domestic communications without sufficient privacy protection, according to a 2011 secret national-security-court ruling.

    A 2011 court decision found actions of NSA "unconstitutional"
    Court ruled that NSA violated
    constitutionally-guaranteed civil liberties
    including "right to privacy"

    http://www.google.ca/m/search?q=Secret+Court+Faulted+NSA+for+Collecting+Domestic+Data+The+NSA+violated+the+Constitution+for+three+years+when+it+collected+tens+of+thousands+of+purely+domestic+communications+without+sufficient+privacy+protection,+according+to+a+2011+secret+national-security-court+ruling.&hl=en&source=android-search-app&rlz=1Y2ECZH_en___CA525&v=141338691&source=univ&tbm=nws&tbo=u&sa=X&ei=qkIWUvCcFq2XiQfaoIGYCA&ved=0CCgQqAI

    ReplyDelete


  12. NSA spied on UN and bugged EU offices and foreign embassies (according to documents released by Edward Snowden):

    U.S. spy agency edges into the light after Snowden
    revelations

    http://www.reuters.com/article/idUSBRE97O08120130825

    ReplyDelete


  13. State intrusion:

    According to information released by Edward Snowden:

    "bullrun"
    (how the NSA pursues the goal of "transparency" ;another meaning of "security breach")
    Nothing "secret" to the NSA (encryption no barrier to the NSA)

    US surveillance agencies routinely use supercomputers to decipher encryption codes thereby decoding/deciphering encrypted private communications including

    -personal emails
    -bank transactions
    -medical records
    -or any other info deemed to be secured by encryption




    http://www.theguardian.com/world/interactive/2013/sep/05/nsa-project-bullrun-classification-guide

    ReplyDelete
  14. specialist in cyber warfare and technology, Charles R. Smith http://www.softwar.net/, joined George Knapp to talk about NSA revelations and their affect on society and the tech industry. "There's panic in the halls of Fort Meade at the moment," as the NSA "would prefer to operate in the darkness...away from the light of the public," he remarked. They're trying to apply damage control to the press, and their political allies, as well as put out disinformation about their capabilities in order to muddle the issue, he continued. Established as a secret military agency by the Truman administration, the NSA performed exemplary espionage during the Cold War, he noted. Yet now, the NSA has become a "bureaucratic behemoth, almost like a dinosaur or Godzilla that has no brain," he commented, "and it will just continue to lumber on," We need to not only pull in the reins, but to dispose of entire missions the NSA has taken on that border on illegality, he
    suggested. A number of years ago the NSA tried to get legislative approval to install a "back door chip" in tech equipment, Smith recounted. But when that failed in Congress, they instead covertly managed to spread a wide variety of back doors in both software and hardware, including flaws in encryption they could exploit throughout the entire tech industry, according to documents released by NSA whistleblower Edward Snowden. More here http://www.wired.com/threatlevel/2013/09/tech-industry-tainted/.

    ReplyDelete
  15. http://www.ae911truth.org/Spying on Democracy:  

    Executive Director of the National Lawyers Guild http://www.nlg.org/and host of the "Law and Disorder" radio show in New York, Heidi Boghosian, addressed the extent to which the US government is actively acquiring personal information on Americans through their phone calls, emails, and Internet usage. She warned that the government now has the means to suppress the most essential tools of democracy. For instance, they have spied on some reporters, and threatened them with charges of espionage and conspiracy. We really have "an affront, not only to the Constitution, but for an open society where we can keep the government in check rather than having them control us," she stated. She cited how multinational corporations have sometimes partnered with the government in their surveillance efforts. For example, a secret program called the Hemisphere Project actually paid AT&T employees to work alongside DEA agents, sharing phone records dating back to 1987,
    without a judicial warrant. "It's a simplistic argument to say that if we don't have anything to hide, we have nothing to worry about," she said. "Because the more we allow spying on various aspects of our lives" (via such technology as drones, RFID, video cameras, and biometrics), our rights are whittled down, and "we have virtually no privacy left." Yet, Boghosian remains hopeful that there's a sea change taking place, among both US citizens and lawmakers, and that the current surveillance overreach will be scaled back.

    ReplyDelete
  16. http://ca.news.yahoo.com/u-spy-agency-used-americans-030337710.html?.tsrc=yahoo

    NSA tracks social connections: report The U.S. spy agency has been using some people's personal information to map their social activities.

    ReplyDelete
  17. the NSA's covert $250-million-a-year program 
    http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security.
    with tech companies to insert weaknesses into the security of their products, so they can more readily break encryption codes. It's pretty unbelievable that a tax payer funded agency is spending this kind of money to make products actually less safe for customers


    the NSA has been intrusively collecting large amounts of data http://www.nytimes.com/2013/09/29/us/nsa-examines-social-networks-of-us-citizens.html

    on US citizens' social connections, who they are interacting with, both online and off, Seaman detailed. We're in a transitional time now, he noted, and a movement is gathering steam against what the NSA has been doing (a non-partisan rally Stop Watching Us

     http://www.youtube.com/davidseamanonline
    is planned for October 26th in Washington DC).https://rally.stopwatching.us/http://newsletter.iheart.com/4/jump/7289010490996104909920131001032026?j=http://ad.doubleclick.net/jump/prnd/prn-coastzone;prntype=newsletter;sz=728x90;ord=104909961049099201310010320267289010490996104909920131001032026

    ReplyDelete
  18. Hiding the Truth

    Canadian digital spying on Brazil:
    It's called "intelligence" -- but today, it doesn't look too smart. The president of Brazil is demanding answers, after leaked documents show Canada spied on the country's natural resources ministry -- and journalist Glenn Greenwald details the allegations.
    The latest leak from NSA contractor Edward Snowden suggests that Canada spied on Brazil's Mines and Energy Department. The Canadian government won't say what it was up to, but we get the scoop from The Guardian reporter who broke Snowden's story on Brazil

    Listen to this 9 minute interview of Glenn Greenwald:

    http://www.cbc.ca/asithappens/mobile/touch/features/2013/10/07/canada-spies-on-brazil/

    http://cds1.yospace.com/access/selector/u/1/1/69968366?f=0

    http://podcast.cbc.ca/mp3/podcasts/asithappens_20131007_18253.mp3

    ReplyDelete

  19. "Ladar Levison interview" on CBC Radio:

    http://www.cbc.ca/thecurrent/mobile/touch/index.html
    http://cds1.yospace.com/access/selector/u/1/1/70251491?f=000020623622&d=so&account=Radio&adcategory=&show=The%20Current&location=iphone&a=true

    Ladar Levison, Edward Snowden's e-mail provider - Oct 11, 2013Oct 11, 2013 12:00:00 AM

    You may not be familiar with Ladar Levison or his email service Lavabit, but you’ve heard of one of its users. Edward Snowden. Today, meet Ladar Levison, who got caught up in the law for having an email service and his fight for privacy.

    " Without privacy a society cannot speak
    freely"

    ReplyDelete
  20. NSA secretly broke into Yahoo, Google data centre links around world

    By Lolita C. Baldor, The Associated Press | The Canadian Press

    http://ca.news.yahoo.com/report-nsa-secretly-broke-yahoo-google-data-centre-175338811--finance.html

    ReplyDelete
    Replies


    1. National Security Agency broke into Yahoo, Google, Facebook, MS Hotmail

      New York Times Oct 31, 2013, 12.07PM IST

      Delete
  21. Michael Enright's interview with Thomas Drake on CBC
    http://www.cbc.ca/thesundayedition/mobile/touch/features/2013/12/08/nsa-whistleblower/

    "Stellarwind" :supersecret domestic surveillance conducted by the NSA.
    justified post-911 in the interest of national security as:
    "extraordinary means in extraordinary times"
    massive state surveillance...in clear violation of the fourth amendment and the constitution. The state's surveillance agency is charged with wrongdoing and illegality.

    Tech compa.ies tired of users being spied
    on. Send letter to Obama to rein in the NSA

    ReplyDelete
  22. Obama urged by tech companies to rein in NSA

    http://www.cbc.ca/m/touch/world/story/1.2467170

    ReplyDelete
  23. Federal judge says NSA's phone surveillance program is likely unconstitutional

    http://rt.com/usa/nsa-surveillance-unconstitutional-judge-338/

    Published time: December 16, 2013

    ReplyDelete

  24. the old is new: they've always been watching you: http://www.thedailybeast.com/articles/2014/01/09/the-burglary-the-last-book-obama-needs-right-now.html

    Activists that robbed an FBI office in 1971, and a reporter who told their story, on privacy threats today. http://podcast.cbc.ca/mp3/podcasts/qpodcast_20140114_39102.mp3

    ReplyDelete
  25. In light of Edward Snowdon's disclosures Obama limits? NSA surveillance powers.

    Would these changes have happened if Edward Snowden hadn't outed the NSA:

    http://ca.news.yahoo.com/ap-source-president-barack-obama-call-ending-nsa-114721105.html

    ReplyDelete
  26. Surveillance & NSA:

    http://click.email.premierenetworks.com/?qs= be39cfc556d41029ec4283fc1a0fda 9ecce4fcdbf8bbf82f148e63bce61f4a8d

    Private investigator specializing in electronic counter-measures, Roger Tolces ,suggested that the massive NSA surveillance of American citizens, as well as in other countries, is a form of electronic harassment.
    This is a demonstration of when a great empire goes into decline, in this case, using surveillance to retain its power, he remarked.
    The NSA's new million-square-foot data center in Utah will process "metadata" from such sources as emails and cell phones, including locations, phone numbers and other details. While they claim not to be listening to the content of calls or reading emails, Tolces believes it's still a violation of 4th amendment rights."It would be as if the government back in 1777 kept an ongoing list of everyone you communicated with in case later on they wanted to form a charge of conspiracy...just based on linking their associations," Tolces commented.
    The NSA's mission was only to deal with foreign intelligence, but they have expanded to the point where they are like a 4th wing of government that was not ever put into place by the Founding Fathers, he continued. He also cited privacy concerns around planned black boxes for new cars that will have an Android platform which will share GPS data with the government. He speculated that the ultimate plan may be to charge drivers a mileage-related fee.

    ReplyDelete
  27. Deplorable intrusion on privacy
    02 FEBRUARY 2014 02:00 EDITORIAL

    http://www.kelownadailycourier.ca/opinions/deplorable-intrusion-of-privacy-2214.html

    The revelation that ordinary Canadians are being spied on in our airports raises all kinds of red flags about personal privacy and to what lengths governments will go in the name of national security.A classified document obtained by whistleblower Edward Snowden revealed this week that Communications Security Establishment Canada exploited the free Wi-Fi at a major national airport to collect metadata from wireless device users.One might deem this acceptable if there had been a security threat or authorities were on the trail of a suspected terrorist. But they weren't.It was a blanket dragnet scooping up information from anyone who happened to be there. The operation was reportedly part of a trial run of powerful new software developed with the assistance of CSEC's counterpart in the United States, the notorious National Security Agency.This is an appalling affront to Canadians' right to privacy - especially when no one involved in the sweep was suspected of anything. And it shows that fears which may have once been considered far-fetched are now coming true.The government can apparently spy on anyone, anytime, anywhere. That's a distopian future we hoped was just the realm of science fiction.Welcome to George Orwell's 1984.The document blows CSEC's claim it does not spy on Canadians out of the water. And, apparently, the organization has been collecting private citizens' metadata for almost a decade.Canadians need to stand up and voice their anger over this deplorable intrusion into their private lives.
    - Managing EditorJon Manchester

    ReplyDelete
    Replies
    1. http://m.thestar.com/#/article/opinion/editorials/2015/02/19/heed-this-call-for-better-oversight-of-canadas-spy-services-editorial.html

       former prime ministers Jean Chrétien, Joe Clark, Paul Martin and John Turner warned this week, Canada has no “robust and integrated accountability regime” for our multiple security agencies. 

      http://cnews.canoe.ca/CNEWS/Canada/2015/02/19/22245496.html

      CSIS oversight urged by ex-PMs as Conservatives rush Bill C-51 debate
      http://www.cbc.ca/m/news/politics/csis-oversight-urged-by-ex-pms-as-conservatives-rush-bill-c-51-debate-1.2963179

      Delete
  28. If Boeing can build an unhackable phone...why not Apple?

    Top Secret:
    Boeing Unveils Secure Smartphone That Can 'Self-Destruct'



    http://ca.news.yahoo.com/top-secret-boeing-unveils-secure-smartphone-self-destruct-131258150.html

    ReplyDelete
  29. 850 million to pay for CSEC operating costs this year.

    4 billiion to buy them a lavish new headquarters that CBC has called the "most expensive government building ever built"

    Learn more at OurPrivacy.ca

    ReplyDelete
  30. http://youtu.be/shuC3H0Wto4

    ReplyDelete
  31. http://mobile.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html

    ReplyDelete
  32. Watch "United States of Secrets" by Michael Kirk

    ReplyDelete
    Replies
    1. Project "Levitation"

      Mass Canadian govt surveillance revealed by Edward Snowdon
      CSE conducting massive wholesale surveillance of internet in search for extremist sympathizers

      https://firstlook.org/theintercept/2015/01/28/canada-cse-levitation-mass-surveillance/

      https://firstlook.org/theintercept/2015/01/28/canada-cse-levitation-mass-surveillance/

      http://www.cbc.ca/m/news/canada

      http://www.cbc.ca/m/news/canada

      https://informationstrategyrsm.wordpress.com/2013/10/13/big-data-is-watching-you/

      https://informationstrategyrsm.wordpress.com/2013/10/13/big-data-is-watching-you/

      Delete
  33. Exposing government illegality

    NEWS | Dec 9, 2014 | 3:37

    Report on CIA use of torture

    Reveals painful details on how the Central Intelligence Agency interrogated terror suspects after 9/11


    THE PASSIONATE EYE | Jan 29, 2015 | 1:03
    Silenced: The War on Whistleblowers - Promo
    Three American whistleblowers reveal the persecution they've faced after they dared to question U.S. National Security policy in post 9/11 America. Directed by Academy nominated James Spione.

    ReplyDelete
    Replies

    1. all communication is being intercepted/monitored by the surveillance state:

      mass surveillance: Stellar Wind program

      https://www.bibliotecapleyades.net/sociopolitica/sociopol_nsa09.htm

      https://gangstalkingmindcontrolcults.com/stellar-wind/

      Edward Snowden interview on cbcradio/the current/sept 26,2019

      https://www.cbc.ca/radio/thecurrent/the-current-for-sept-26-2019-1.5297326/a-simple-clear-case-why-edward-snowden-thinks-u-s-congress-will-support-the-trump-ukraine-whistleblower-1.5297327

      "Permanent Record"--Edward Snowden

      Delete
  34. Nefarious conspiracy between NSA
    and harddrive manufacturers:



    https://ca.news.yahoo.com/did-nsa-embed-spyware-computer-165502598.html

    Did the NSA embed spyware in your computer?

    The United States has figured out how to bug hard drives built by the world’s top computer manufacturers, giving it the ability to spy on and sabotage computers and networks in countries targeted by American intelligence agencies, 



    https://ca.news.yahoo.com/russian-researchers-expose-breakthrough-u-spying-program-194217480--sector.html

    It is not clear how the NSA may have obtained the hard drives' source code. Western Digital spokesman Steve Shattuck said the company "has not provided its source code to government agencies." The other hard drive makers would not say if they had shared their source code with the NSA.

    ReplyDelete
  35. http://mobile.reuters.com/article/idUSKBN0NS1IN20150507

    NSA's phone spying program ruled illegal by appeals court

    By Jonathan StempelNEW YORK | Thu May 7, 2015 4:05pm EDT
    NEW YORK (Reuters) -

    A U.S. spying program that systematically collects millions of Americans' phone records is illegal, a federal appeals court ruled on Thursday, putting pressure on Congress to quickly decide whether to replace or end the controversial anti-terrorism surveillance.Ruling on a program revealed by former government security contractor Edward Snowden, the 2nd U.S. Circuit Court of Appeals in Manhattan said the Patriot Act did not authorize the National Security Agency to collect Americans' calling records in bulk.

    http://mobile.reuters.com/article/idUSKBN0NS1IN20150507

    ReplyDelete
  36. https://www.earthfiles.com/news.php?ID=2316&category=Environment

    ReplyDelete

  37. AT&T helped U.S. NSA in spying on Internet traffic: N.Y. Times



    http://news.yahoo.com/t-helped-u-nsa-spying-internet-traffic-n-184334638--finance.html

    ReplyDelete
  38. CBC launches "SecureDrop" to protect identity of whistleblowers

    in the interest of open communication and free expression(free speech)
    Bringing accountability to conduct that ought to be accountable

    SecureDrop is a new tool for citizens to fight back against the erosion of privacy.
    > It allows people to communicate information to "CBC news network" completely anonynously over encrypted secure channels.
    >
    > securedrop.cbc.ca
    >
    Freedom of information is essential for democracy.An informed public is the cornerstone of liberal democracy.
    Governments seek to control (censor)access to information.
    Are you a government worker prohibited from speaking to the media at threat of losing your job? Do you have sensitive information about wrongdoing within your corporation? You can now do the right thing without placing yourself in jeopardy;i.e.without compromising yoour confidentiality.

    ReplyDelete
  39. FBI vs Apple

    security vs privacy


    FBI orders Apple to provide master key to open all iphones...
    Apple says "No"!

    Tim Cook refuses to give FBI access to iphones

    http://mobile.nytimes.com/2016/02/18/technology/apple-timothy-cook-fbi-san-bernardino.html

    > SAN FRANCISCO — Apple said on Wednesday that it would oppose and challenge a federal court order to help the F.B.I. unlock an iPhone used by one of the two attackers who killed 14 people in San Bernardino, Calif., in December.
    >
    > On Tuesday, in a significant victory for the government, Magistrate Judge Sheri Pym of the Federal District Court for the District of Central California ordered Apple to bypass security functions on an iPhone 5c.
    >
    > But hours later, in a statement by its chief executive, Timothy D. Cook, Apple announced its refusal to comply. The move sets up a legal showdown between the company, which says it is eager to protect the privacy of its customers, and the law enforcement authorities, who say that new encryption technologies hamper their ability to prevent and solve crime.

    ReplyDelete
    Replies

    1. FBI drops legal action against Apple.

      FBI did not need Apple's cooperation to hack into terrorist's Apple phone!
      What does that say about the security of Apple phones!
      It is also telling that the President does not use an Apple phone;he uses a Blackberry!
      (not that Blackberry would refuse a court order to bypass its security features)

      Israel company "Celebritte" has device for unlocking phones.

      http://m.slashdot.org/story/308977

      http://www.raggiolaw.com/the-fbi-is-using-an-israeli-firm-cellebrite-to-unlock-shooters-iphone/

      Delete
  40. "Stingray" device allows police to monitor cellphone calls
    Big Brother is listening to your phone conversations

    http://www.globalresearch.ca/new-hi-tech-police-surveillance-the-stingray-cell-phone-spying-device/5331165

    http://www.wired.com/2015/10/stingray-government-spy-tools-can-record-calls-new-documents-confirm/

    ReplyDelete

  41. Microsoft sues US Justice Department

    http://www.wsj.com/articles/microsoft-sues-justice-department-over-secret-customer-data-searches-1460649720

    Microsoft Sues US Justice Department, Asks Court To Declare Secrecy Orders Unconstitutional

    from the fighting-for-your-rights dept.
    http://m.slashdot.org/story/309947

    http://www.wsj.com/articles/microsoft-sues-justice-department-over-secret-customer-data-searches-1460649720

    ReplyDelete
  42. global encryption key allows RCMP access to Blackberry messages.

    http://www.theverge.com/2016/4/14/11434926/blackberry-encryption-master-key-broken-canada-rcmp-surveillance

    http://motherboard.vice.com/read/rcmp-blackberry-project-clemenza-global-encryption-key-canada

    ReplyDelete
  43. http://www.cbc.ca/podcasting/includes/day6.xml

    cbc.ca/daysix : surveillance

    Episode 328: How the CIA leaks reveal hidden threats to our devices

    http://podcast.cbc.ca/mp3/podcasts/day6_20170310_83513.mp3

    ReplyDelete
  44. Amazon's facial recognition technology sold to law enforcement agencies to enhance surveillance:

    http://thehill.com/policy/technology/389467-lawmakers-sound-alarm-over-amazon-face-recognition-software

    https://www.washingtonpost.com/news/the-switch/wp/2018/05/22/amazon-is-selling-facial-recognition-to-law-enforcement-for-a-fistful-of-dollars/?utm_term=.981533ea1f6c&noredirect=on

    ReplyDelete
  45. How our phones are spying on us:

    https://www.anonews.co/edward-snowden-tells-joe-rogan-how-our-cellphones-spy-on-us/

    ReplyDelete
  46. Welcome to the world of surveillance capitalism!

    Surveillance capitalism is the practice of Big Data to collect/mine and use our personal information to classify us,predict our behaviour,and sell us products. It is the use of digital technology by corporations to exploit humans.



    marketing has become very sophisticated.



    smart marketers collect personal data to better understand what the consumer needs/wants so they can create products to meet tnat demand.

    They create psychographic profiles based on the behavior of. people. who viisit their website and tney use AI to predict whst the consumer is looking for based on their past behaviour.

    It is thus used to customize advertizing to specific consumers.



    the ethicity of marketing leaves much to be desired:

    It is full of deceit,fraud,and outright lies-- all perpetrated in the pursuit of profit/money!



    We all want to believe that we are too smart to be manipulated by advertizing. We mistakenly think that we're resistant to marketing.

    No one likes to believe they are gullible and not in control of their lives ,that they are being manipulated and have no privacy.

    Being continuously tracked/surveilled, makes one feel unsafe/fearful-- like living in a police/totalitarian state where you'r always being watched.



    the collection,storage,and algorhythmic analysis/processing of private data(personal information) should be restricted if not banned



    Data bases wch store private information are vulnerable to being breached

    if not adequately safeguarded..

    A recent cyberattack compromised the personal and health records of most Canadians!

    https://torontosun.com/news/national/extremely-troubling-private-health-data-of-15m-canadians-compromised-in-lifelabs-cyberattack



    Before downloading an app, please notice thst the app provider requires you to grant access to all kinds of personal information as a condition for using the app!



    ReplyDelete
    Replies
    1. Douglas Rudshkoff:

      "Every time you swipe your smartphone, your smartphone is getting smarter about you, and you're getting dumber about it," he remarked, adding that the phone's technology remains hidden as a "proprietary" secret.

      The algorithms in phones and social media platforms are "demonic" in the sense that as they learn more about us, they exploit our human nature, he cited. Slot machine algorithms are ported to Snapchat and our newsfeeds to make them more addictive, he added. Rushkoff revealed that the TikTok app (popular among youth culture for uploading short-form video) is actually owned in part by the Chinese military. Why would they want kids' faces in their database? "That's because China" he noted, "even worse than Facebook or Google...is looking for total information supremacy.

      Delete
  47. New California privacy law lets people find out exactly what companies know about them

    https://www.cbc.ca/radio/asithappens/as-it-happens-wednesday-edition-1.5412371/new-california-privacy-law-lets-people-find-out-exactly-what-companies-know-about-them-1.5412442?__vfz=medium%3Dsharebar

    ReplyDelete

  48. ClearView AI has got your number!
    facial recognition software can find you out

    Clearview AI’s facial recognition technology

    Clearview AI’s facial recognition technology lets you upload a picture of someone’s face, and find other images of them online, leading to their name or home address. New York Times reporter Kashmir Hill says it could be “the end of public anonymity.”

    Download Clearview AI’s facial recognition technology
    [mp3 file: runs 00:24:01]



    http://21393.mc.tritondigital.com/CBC_CURRENT_P/media-session/fb7947c1-9630-409d-b217-b9576046030a/current-hd8tZWzq-20200121.mp3

    ReplyDelete
  49. Pegasus is a surveillance malware developed by the Israeli surveillance NSO Group that could infect both iPhones and Android devices, it is sold exclusively to the governments and law enforcement agencies. Earlier August, Citizen Lab shared evidence of attacks against 175 targets worldwide carried on with the NSO spyware.
    NSO mobile Pegasus Spyware used in operations in 45 ...


    http//securityaffairs.co/wordpress/76333/malware/nso-pegasus-spyware-report.html

    ReplyDelete
  50. social engineering

    We are being manipulated by Big Data (Google,Facebook,Amazon,etc)

    ReplyDelete
  51. the intelligence coup of the century --Washington Post exposee:

    The CIA secretly bought a company that sold encryption devices across the world. Then its spies sat back and listened. From the Washington Post

    https://www.washingtonpost.com/graphics/2020/world/national-security/cia-crypto-encryption-machines-espionage/

    How US government intelligence agency exploited a private Swiss company(CryptoAG) to spy on 120 countries

    For 50 years the CIA was listening to the most secret/encrypted communications in the world through the KryptoAG program

    120 countries were under surveillance by CIA


    https://www.meta-religion.com/Secret_societies/Conspiracies/CIA/crypto_ag.htm

    https://en.m.wikipedia.org/wiki/Crypto_

    ReplyDelete
  52. Bellingcat.com is building an online community of investigators using open source information available on the internet to expose injustice and bring crimes to justice. In the era of deception. and misinformation , this group fights the forces of disinformation and exposes the truth.

    https://www.bellingcat.com/about/

    ReplyDelete
    Replies
    1. Information highway is a two way street!
      Information flows in both directions!

      Delete
    2. could use a few more guys in white hats

      Delete

  53. A great leap forward for the abuse of power /massey lecture on CBC/ ideas

    https://www.cbc.ca/listen/live-radio/1-23-ideas/clip/15808371-cbc-massey-lecture-4-a-great-leap

    The initial vision of the internet was that it would empower individuals and expose the wrongdoings of state and corporate interests. But now the same technologies that had been used for public uprisings against oppressive governments are now being used by those governments against political demonstrators, whistleblowers and dissidents. *This episode originally aired on November 12, 2020.

    ReplyDelete
  54. https://www.cbc.ca/news/world/spyware-journalists-activists-1.6108070

    Pegasus is a spyware developed by the Israeli cyberarms firm NSO Group that can be covertly installed on mobile phones (and other devices) running most versions of iOS and Android. The 2021 Project Pegasus revelations suggest that current Pegasus software is able to exploit all recent iOS versions up to iOS 14.6.

    Pegasus spyware /Israeli-developed spyware software for monitoring your phone
    180 journalists have been compromised by this spyware!
    150,000 phone numbers targeted and hacked

    ReplyDelete