Drone – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Wed, 10 Mar 2021 01:18:23 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Drone – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 How Linux Got to Mars | LINUX Unplugged 396 https://original.jupiterbroadcasting.net/144432/how-linux-got-to-mars-linux-unplugged-396/ Tue, 09 Mar 2021 17:00:00 +0000 https://original.jupiterbroadcasting.net/?p=144432 Show Notes: linuxunplugged.com/396

The post How Linux Got to Mars | LINUX Unplugged 396 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxunplugged.com/396

The post How Linux Got to Mars | LINUX Unplugged 396 first appeared on Jupiter Broadcasting.

]]>
Shrimps have SSHells | LINUX Unplugged 342 https://original.jupiterbroadcasting.net/139757/shrimps-have-sshells-linux-unplugged/ Tue, 25 Feb 2020 19:00:00 +0000 https://original.jupiterbroadcasting.net/?p=139757 Show Notes: linuxunplugged.com/342

The post Shrimps have SSHells | LINUX Unplugged 342 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxunplugged.com/342

The post Shrimps have SSHells | LINUX Unplugged 342 first appeared on Jupiter Broadcasting.

]]>
Toll Free Exploitation | TTT 226 https://original.jupiterbroadcasting.net/91411/toll-free-exploitation-ttt-226/ Fri, 11 Dec 2015 12:21:22 +0000 https://original.jupiterbroadcasting.net/?p=91411 The open web is being locked down by the very companies that try to slice it up and sell it to you byte by byte. We discuss the major moves big telcos are taking to intrench the incumbents online. Microsoft drops some more open source code & Tokyo’s rolling out the “drone squad”. Plus a […]

The post Toll Free Exploitation | TTT 226 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The open web is being locked down by the very companies that try to slice it up and sell it to you byte by byte. We discuss the major moves big telcos are taking to intrench the incumbents online.

Microsoft drops some more open source code & Tokyo’s rolling out the “drone squad”. Plus a very risqué Kickstarter of the week!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Patreon

Show Notes:

— Episode Links —

Kickstarter of the week: Penis candles for the world by Amanda Murphy —Kickstarter

End of Show Clip:

The post Toll Free Exploitation | TTT 226 first appeared on Jupiter Broadcasting.

]]>
Rooting Noah’s House | LAS 384 https://original.jupiterbroadcasting.net/88201/rooting-noahs-house-las-384/ Sun, 27 Sep 2015 09:31:02 +0000 https://original.jupiterbroadcasting.net/?p=88201 Home automation can make you feel like you’re living in the future. This week we dig into the technology, advantages & disadvantages to fully automating all aspects of your home or office. We share our hard learned lessons! Plus Valve’s huge milestone, what’s great about Gnome 3.18, Ubuntu powered Drones, the creepy Windows 10 feature […]

The post Rooting Noah's House | LAS 384 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Home automation can make you feel like you’re living in the future. This week we dig into the technology, advantages & disadvantages to fully automating all aspects of your home or office. We share our hard learned lessons!

Plus Valve’s huge milestone, what’s great about Gnome 3.18, Ubuntu powered Drones, the creepy Windows 10 feature that’s pushing people to adopt Linux & more!

Thanks to:


DigitalOcean


Ting

Direct Download:

HD Video | Mobile Video | WebM Torrent | MP3 Audio | OGG Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —


System76

Brought to you by: System76

Noah’s House tour

Automation starts by designing around something

  • Automation Controller ie: Crestron
  • Peer to Peer Automation ie: Insteon
  • Science Project based automation ie: X10
  • Security System based automation ie: HAI

Consider the the following

  • How can I interface to other systems?
  • What I/O does the system offer? ie: prop protocol? CC/OC?
  • How does the system communicate? ie: wifi, network

Light Solutions Considered

Instead
X10
Crestron
Lutron

Advantages of Lutron

Able to interface to multiple devices

— PICKS —

Runs Linux

Z-Wave Plus home automation hub runs Linux on Raspberry Pi

View post on imgur.com

Z-Wave Europe and Popp & Co. have launched a “Popp Hub” home automation gateway that runs Linux on a Raspberry Pi, and supports Z-Wave and IP smart devices.

Desktop App Pick

Avidemux

Avidemux is a free video editor designed for simple cutting, filtering and encoding tasks.

It supports many file types, including AVI, DVD compatible MPEG files, MP4 and ASF, using a variety of codecs. Tasks can be automated using projects, job queue and powerful scripting capabilities.

Weekly Spotlight

App Grid – your alternative to the Ubuntu Software Center

App Grid is an alternative to the Software Center.


— NEWS —

GNOME 3.18 Release Notes

GNOME 3.18 is the latest version of GNOME 3, and is the result of 6 months’ hard work by the GNOME community. It contains major new features, as well as many smaller improvements and bug fixes. In total, the release incorporates 25112 changes, made by approximately 772 contributors.

Qualcomm Goes Ubuntu for Drone Reference Platform | Linux.com

Ubuntu got a big boost as a competitive operating system for drones with an Unmanned Aerial Vehicle (UAV) reference platform announced by Qualcomm last week called Snapdragon Flight. The Snapdragon 801 based development platform supports Linaro’s version of Ubuntu, as well as OpenCV, according to an email to Linux.com from a Qualcomm representative. The rep went on the call it “an open platform for companies to port their own existing drone software.”

Valve hits a Linux landmark—1,500 games available on Steam

But this weekend there’s an even bigger numeric milestone to celebrate according to the Linux site Phoronix—1,500 Linux titles are currently available through Steam.

Steam Crosses 1,500 Games Natively Available For Linux – Phoronix

Today marks a huge milestone for Steam on Linux: 1,500 games are natively available! This is quite significant while Windows is at 6,464 and OS X is at 2,323.

Windows ‘outs’ you to your parents

Feedback:

Road Trip Playlist

Watch the adventures, productions, road trips, trails, mistakes, and fun of the Jupiter Broadcasting mobile studio.

https://www.amazon.com/RioRand-Interface-Adapter-Lighting-Controller/dp/B00V7MQ99G/ref=sr_1_3?ie=UTF8&qid=1443225027&sr=8-3&keywords=usb+dmx+light

  • https://slexy.org/view/s2w0wU9vqE

  • https://www.remax.com/realestatehomesforsale/3890-mulberry-dr-grand-forks-nd-58201-gid600024156879.html

Chris’s Twitter account has changed, you’ll need to follow!

Chris Fisher (@ChrisLAS) | Twitter

— CHRIS’ STASH —

Hang in our chat room:

irc.geekshed.net #jupiterbroadcasting

— NOAH’S STASH —

Noah’s Day Job

Altispeed Technologies

Contact Noah

noah [at] jupiterbroadcasting.com

Find us on Google+

Find us on Twitter

Follow us on Facebook

Catch the show LIVE Friday:

The post Rooting Noah's House | LAS 384 first appeared on Jupiter Broadcasting.

]]>
50 First Jihads | Unfilter 156 https://original.jupiterbroadcasting.net/86966/50-first-jihads-unfilter-156/ Wed, 26 Aug 2015 20:50:04 +0000 https://original.jupiterbroadcasting.net/?p=86966 The NSA is being sued by a former mayor for blanket surveillance & the case could spark a public debate. New information on how the Clinton’s stored their mail server, our takedown of ISIS claimed attempts to recruit American women & why you better buy that Patriot Drone soon! Plus an update on the 2016 […]

The post 50 First Jihads | Unfilter 156 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The NSA is being sued by a former mayor for blanket surveillance & the case could spark a public debate. New information on how the Clinton’s stored their mail server, our takedown of ISIS claimed attempts to recruit American women & why you better buy that Patriot Drone soon!

Plus an update on the 2016 election, the recent market turmoil & more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

— Episode Links —

ISIS Is Recruiting Women

The post 50 First Jihads | Unfilter 156 first appeared on Jupiter Broadcasting.

]]>
Traveling in the Future | FauxShow 222 https://original.jupiterbroadcasting.net/86207/traveling-in-the-future-fauxshow-222/ Thu, 06 Aug 2015 13:07:20 +0000 https://original.jupiterbroadcasting.net/?p=86207 Angela and Chris discuss a couple major projects that being worked on for the future of our airways. Everything from making our Back To The Future dreams come true to drone delivery from Amazon & getting internet to areas that can’t support a full infrastructure. Direct Download: HD Video | Mobile Video | MP3 Audio […]

The post Traveling in the Future | FauxShow 222 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Angela and Chris discuss a couple major projects that being worked on for the future of our airways. Everything from making our Back To The Future dreams come true to drone delivery from Amazon & getting internet to areas that can’t support a full infrastructure.

Direct Download:

HD Video | Mobile Video | MP3 Audio | YouTube

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Torrent Feed | iTunes Feed

Show Notes

Main Topic:
+ The Lexus Hoverboard: It’s here – YouTube
+ The Lexus Slide
+ ROLLER CYCLE ON GRASS – YouTube
+ Amazon proposes drones-only airspace to facilitate high-speed delivery | Technology | The Guardian
+ Facebook made a solar-powered plane to deliver internet
+ Facebook’s UAV Flies, Builds On Developments In Solar Power | Technology content from Aviation Week

Email angela@jupiterbroadcasting.com your computer based PORN SKIT! Yes, write your own potentially horribly geeky porn skit and email it in. Send in a pic and/or link and IRC nick.

WTR

Follow Jupiter Broadcasting

  • See more pics: https://instagram.com/jupiterbroadcasting#
  • Sign up for Jupiter Signal: www.bit.ly/jupitersignal
  • Unfilter is on Patreon! https://www.patreon.com/unfilter
  • Tech Talk Today is on Patreon! https://www.patreon.com/jupitersignal

JB SWAG

Find the FauxShow!

  • Facebook: https://www.facebook.com/thefauxshow
  • Twitter: https://www.twitter.com/angerz
  • G+: https://www.gplus.to/fauxshow
  • Subscribe to Jupiter Signal: https://www.bit.ly/jupitersignal
  • Jupiter Radio: https://jblive.info
  • Affiliates Firefox Extension: https://addons.mozilla.org/en-US/firefox/addon/jupiterbroadcasting/
  • Affiliates Chrome Extension: https://chrome.google.com/webstore/detail/bjekemhblnilimncanbehhjijdpjgimj
  • Donations: https://original.jupiterbroadcasting.net/donate
  • Shows & Shownotes: https://original.jupiterbroadcasting.net/show/fauxshow/

The post Traveling in the Future | FauxShow 222 first appeared on Jupiter Broadcasting.

]]>
Any Cert Will Do | TechSNAP 208 https://original.jupiterbroadcasting.net/79867/any-cert-will-do-techsnap-208/ Thu, 02 Apr 2015 16:51:51 +0000 https://original.jupiterbroadcasting.net/?p=79867 Why boring technology might be the better choice, Google revokes & China chokes, why you want to create an account at irs.gov before crooks do it for you. Plus your great IT questions, a rocking round up & much, much more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video | Mobile […]

The post Any Cert Will Do | TechSNAP 208 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Why boring technology might be the better choice, Google revokes & China chokes, why you want to create an account at irs.gov before crooks do it for you.

Plus your great IT questions, a rocking round up & much, much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

Why you should choose boring technology

  • The basic premise is that in building technology, specifically web sites and web services, there is often a bias towards using the latest and greatest technology, rather than the same old boring stuff
  • This often turns out to bite you in the end. Look at people who based their site or product on FoundationDB, which was recently bought and shutdown by Apple
  • Look at one of the most popular sites on the internet, Facebook, originally written in PHP and MySQL, and still largely remains based on those same old technologies
  • “The nice thing about boringness (so constrained) is that the capabilities of these things are well understood. But more importantly, their failure modes are well understood.”
  • “Anyone who knows me well will understand that it’s only with a overwhelming sense of malaise that I now invoke the spectre of Don Rumsfeld, but I must.“
  • “When choosing technology, you have both known unknowns and unknown unknowns”
  • The Socratic paradox
  • A known unknown is something like: we don’t know what happens when this database hits 100% CPU.
  • An unknown unknown is something like: geez it didn’t even occur to us that writing stats would cause GC pauses.
  • “Both sets are typically non-empty, even for tech that’s existed for decades. But for shiny new technology the magnitude of unknown unknowns is significantly larger, and this is important.”
  • The advantage to using boring technology is that more people understand how it works, more people understand how it fails, more people have come before you, tried to do something similar to what you are doing
  • You won’t find the answer on Stack Overflow if you are the first person to try it
  • “One of the most worthwhile exercises I recommend here is to consider how you would solve your immediate problem without adding anything new. First, posing this question should detect the situation where the “problem” is that someone really wants to use the technology. If that is the case, you should immediately abort.”
  • People like new toys and new challenges
  • Businesses should try to avoid new costs, and new risks
  • Adding a new technology is not a bad thing, but first consider if the goal can be accomplished with what you already have

Google revokes CNNIC root certificate trust

  • On March 20th Google security engineers noticed a number of unauthorized certificates being used for gmail and other google domains
  • The certificates were issued by a subordinate CA, MCS Holdings
  • “Established in 2005, MCS (Mideast Communication Systems) offers Value Added Distribution focusing on Networking and Automation businesses.”
  • MCS Holdings makes Firewalls and other network appliances
  • MCS got its subordinate CA certificate from CNNIC (Chinese Internet Network Information Center)
  • “CNNIC is included in all major root stores and so the misissued certificates would be trusted by almost all browsers and operating systems. Chrome on Windows, OS X, and Linux, ChromeOS, and Firefox 33 and greater would have rejected these certificates because of public-key pinning, although misissued certificates for other sites likely exist.”
  • Google added the MCS certificate to its revocation list so it would no longer be trusted
  • “CNNIC responded on the 22nd to explain that they had contracted with MCS Holdings on the basis that MCS would only issue certificates for domains that they had registered. However, rather than keep the private key in a suitable HSM, MCS installed it in a man-in-the-middle proxy. These devices intercept secure connections by masquerading as the intended destination and are sometimes used by companies to intercept their employees’ secure traffic for monitoring or legal reasons. The employees’ computers normally have to be configured to trust a proxy for it to be able to do this. However, in this case, the presumed proxy was given the full authority of a public CA, which is a serious breach of the CA system”
  • Google accepted the explanation as the truth, but is unsatisfied with the situation
  • “This explanation is congruent with the facts. However, CNNIC still delegated their substantial authority to an organization that was not fit to hold it.”
  • CNNIC has specific obligations it must fulfill in order to be a trusted CA
  • The CA/Browser Forum sets the policies agreed upon for signing new trusted certificates
  • Mozilla has an existing policy that enumerates the possible problems and their immediate and potential consequences
  • “Update – April 1: As a result of a joint investigation of the events surrounding this incident by Google and CNNIC, we have decided that the CNNIC Root and EV CAs will no longer be recognized in Google products. This will take effect in a future Chrome update. To assist customers affected by this decision, for a limited time we will allow CNNIC’s existing certificates to continue to be marked as trusted in Chrome, through the use of a publicly disclosed whitelist. While neither we nor CNNIC believe any further unauthorized digital certificates have been issued, nor do we believe the misissued certificates were used outside the limited scope of MCS Holdings’ test network, CNNIC will be working to prevent any future incidents. CNNIC will implement Certificate Transparency for all of their certificates prior to any request for reinclusion. We applaud CNNIC on their proactive steps, and welcome them to reapply once suitable technical and procedural controls are in place.”
  • CNNIC has released an official statement calling Google’s actions “unacceptable”
  • Mozilla is considering similar actions:
  • Reject certificates chaining to CNNIC with a notBefore date after a threshold date
  • Request that CNNIC provide a list of currently valid certificates and publish that list so that the community can recognize any back-dated certs
  • Allow CNNIC to re-apply for full inclusion, with some additional requirements (to be discussed on this list)
  • If CNNIC’s re-application is unsuccessful, then their root certificates will be removed
  • The Mozilla community feels that CNNIC needs more than a slap on the wrist, to ensure other CAs (and Governments) get the message that this type of behaviour is unacceptable
  • Google reiterates the need for the Certificate Transparency project
  • “Certificate Transparency makes it possible to detect SSL certificates that have been mistakenly issued by a certificate authority or maliciously acquired from an otherwise unimpeachable certificate authority. It also makes it possible to identify certificate authorities that have gone rogue and are maliciously issuing certificates.”
  • Additional Coverage – Ars Technica

Signup for an account at irs.gov before crooks do it for you

  • “If you’re an American and haven’t yet created an account at irs.gov, you may want to take care of that before tax fraudsters create an account in your name and steal your personal and tax data in the process.”
  • “Recently, KrebsOnSecurity heard from Michael Kasper, a 35-year-old reader who tried to obtain a copy of his most recent tax transcript with the Internal Revenue Service (IRS). Kasper said he sought the transcript after trying to file his taxes through the desktop version of TurboTax, and being informed by TurboTax that the IRS had rejected the request because his return had already been filed.”
  • “Kasper said he phoned the IRS’s identity theft hotline (800-908-4490) and was told a direct deposit was being made that very same day for his tax refund — a request made with his Social Security number and address but to be deposited into a bank account that he didn’t recognize.”
  • The fraudster filed the new return using nearly identical data to the correct information that the victim had filed the previous year
  • The victim suspects that the fraudster was able to use the irs.gov portal to view his previous returns and extract information from them to file the fraudulent return
  • The fraudster files a corrected W-2 to adjust the withholding amount, to get a bigger refund
  • The story goes on into details about the case, including the college student that was used as a money mule
  • “The IRS’s process for verifying people requesting transcripts is vulnerable to exploitation by fraudsters because it relies on static identifiers and so-called “knowledge-based authentication” (KBA) — i.e., challenge questions that can be easily defeated with information widely available for sale in the cybercrime underground and/or with a small amount of searching online.”
  • In addition, Americans who have not already created an account at the Social Security Administration under their Social Security number are vulnerable to crooks hijacking SSA benefits now or in the future. For more on how crooks are siphoning Social Security benefits via government sites, check out this story.
  • In Canada, to get access to your CRA Account, a passcode is mailed to you, at the current address the government already has on file for you
  • In order to gain access to your account, you also must answer more specific questions than just KBAs, usually including things like “the number from line 350 of your 2013 tax return”

Feedback:


Round Up:


The post Any Cert Will Do | TechSNAP 208 first appeared on Jupiter Broadcasting.

]]>
The ISIS Swindle | Unfilter 134 https://original.jupiterbroadcasting.net/77612/the-isis-swindle-unfilter-134/ Wed, 18 Feb 2015 23:16:24 +0000 https://original.jupiterbroadcasting.net/?p=77612 We challenge the premise behind the ISIS beheading videos & look at the possible reasons western governments are using these videos are a pretext for war. Why Egyptian jets are bombing in Libya & the US puts weaponized drones up for sale. Plus the major “cyber heist” that’s making news & a lot more! Direct […]

The post The ISIS Swindle | Unfilter 134 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We challenge the premise behind the ISIS beheading videos & look at the possible reasons western governments are using these videos are a pretext for war. Why Egyptian jets are bombing in Libya & the US puts weaponized drones up for sale.

Plus the major “cyber heist” that’s making news & a lot more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

NEWS

New agency to sniff out threats in cyberspace – The Washington Post

The Obama administration is establishing a new agency to combat the deepening threat from cyberattacks, and its mission will be to fuse intelligence from around the government when a crisis occurs.

The agency is modeled after the National Counterterrorism Center, which was launched in the wake of the Sept. 11, 2001, attacks amid criticism that the government failed to share intelligence that could have unraveled the al-Qaeda plot.

Over the past several years, a series of significant cyber-incidents has affected U.S. companies and government networks, increasing the profile of the threat for policymakers and industries. Disruptions, linked to Iran, of major bank Web sites, a Russian intrusion into the White House’s unclassified computer networkand the North Korean hack of Sony Pictures have raised the specter of devastating consequences if critical infrastructure were destroyed.

ISIS

Moderate Syrian rebels ‘to be given power to call in US air strikes’ – Telegraph

Totes Rebles

US and Turkey close to agreeing deal on training opposition forces while
details emerge of plan to arm rebel units with pick-up trucks equipped with
machine guns

Egyptian jets bomb Libya after jihadists behead 21 Copts | The Times of Israel

Cairo targets Islamic State weapons caches and training camps ‘to avenge bloodshed’ of slain Christians; Libyan planes hit city taken over by Islamists

High-Note

Federal Study: Marijuana Use Doesn’t Increase Auto Crash Rates

After the legalization of marijuana in multiple states around the U.S., many are worried about a corresponding uptick in car crashes as people drive while under the influence of pot. But according to a new federal study (PDF) commissioned by the National Highway Traffic Safety Administration, those fears seem unfounded. They report that after adjusting for other factors (people who tend to drive after using marijuana also tend to be more crash-prone in general), there was no statistically significant increase in crash rates by drivers who tested positive for the drug. It’s still a bad idea to drive high, but driving drunk is far, far worse: “One substance was shown to have a major influence on crashes: alcohol. The study confirmed the enormous danger of drinking and driving, even after age and sex adjustment: drivers with a 0.05% blood-alcohol level were found to be twice as likely to be in a crash. For a person weighing 180 to 190 pounds, that could be a single can of beer, glass of wine, or shot of liquor. At 0.08% (two drinks), the likelihood is quadrupled, and at .20% (four drinks or more), the risk is higher by 23 times.”

Looking for more links? Support our show on Patreon

The post The ISIS Swindle | Unfilter 134 first appeared on Jupiter Broadcasting.

]]>
ARMed with Arch | LINUX Unplugged 80 https://original.jupiterbroadcasting.net/77477/armed-with-arch-lup-80/ Tue, 17 Feb 2015 18:17:04 +0000 https://original.jupiterbroadcasting.net/?p=77477 One of the core developers of Arch Linux ARM joins us to chat about this rapidly developing platform, how Arch is used in ARM deployments & their relationship with the main Arch project. Plus an update on Ubuntu Phone & the first fully sandboxed portable Linux desktop app is demoed this week. How is it […]

The post ARMed with Arch | LINUX Unplugged 80 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

One of the core developers of Arch Linux ARM joins us to chat about this rapidly developing platform, how Arch is used in ARM deployments & their relationship with the main Arch project.

Plus an update on Ubuntu Phone & the first fully sandboxed portable Linux desktop app is demoed this week. How is it different than what we’ve seen before? And how far away might it be? We debate.

Thanks to:

Ting


DigitalOcean


Linux Academy

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed | WebM Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

Pre-Show:

FU:

Linux Academy

SCALE 13x Logo

LinuxFest Northwest 2015

Bellingham, WA • April 25th & 26th

lanoxx/tilda · GitHub


DigitalOcean

Arch Linux ARM

Jason Plum (WarheadsSE) – OxNAS specialist, Perlmonger, and once again, another one of the smartest guys we know. Available as a hired gun for ARM projects.

ODROID-C1 | Arch Linux ARM

TING

First fully sandboxed Linux desktop app | Alexander Larsson

This is going to require a lot of changes to the Linux stack. For instance, we have to use Wayland instead of X11, because X11 is impossible to secure. We also need to use kdbus to allow desktop integration that is properly filtered at the kernel level.

Recently Wayland has made some pretty big strides though, and we now have working Wayland sessions in Fedora 21. This means we can start testing real sandboxing for simple applications. To get something running I chose to focus on a game, because they require very little interaction with the system. Here is a video I made of Neverball, running in a minimal sandbox.

  • Is independent of the host distribution
  • Has no access to any system or user files other than the ones from the runtime and application itself
  • Has no access to any hardware devices, other than DRI (for GL rendering)
  • Has no network access
  • Can’t see any other processes in the system
  • Can only get input via Wayland
  • Can only show graphics via Wayland
  • Can only output audio via PulseAudio
  • … plus more sandboxing details

How “omnipotent” hackers tied to NSA hid for 14 years—and were found at last | Ars Technica

In 2009, one or more prestigious researchers received a CD by mail that contained pictures and other materials from a recent scientific conference they attended in Houston. The scientists didn’t know it then, but the disc also delivered a malicious payload developed by a highly advanced hacking operation that had been active since at least 2001. The CD, it seems, was tampered with on its way through the mail.

It wasn’t the first time the operators—dubbed the “Equation Group” by researchers from Moscow-based Kaspersky Lab—had secretly intercepted a package in transit, booby-trapped its contents, and sent it to its intended destination. In 2002 or 2003, Equation Group members did something similar with an Oracle database installation CD in order to infect a different target with malware from the group’s extensive library. (Kaspersky settled on the name Equation Group because of members’ strong affinity for encryption algorithms, advanced obfuscation methods, and sophisticated techniques.)

Kaspersky researchers have documented 500 infections by Equation Group in at least 42 countries, with Iran, Russia, Pakistan, Afghanistan, India, Syria, and Mali topping the list. Because of a self-destruct mechanism built into the malware, the researchers suspect that this is just a tiny percentage of the total; the actual number of victims likely reaches into the tens of thousands.

Next week: Retro edition of LUP. Your favorite moments, now available with the self gratifying feature known has hindsight.

Runs Linux from the people:

  • Send in a pic/video of your runs Linux.
  • Please upload videos to YouTube and submit a link via email or the subreddit.

New Shows : Tech Talk Today (Mon – Thur)

Support Jupiter Broadcasting on Patreon

The post ARMed with Arch | LINUX Unplugged 80 first appeared on Jupiter Broadcasting.

]]>
Canadian On Tap | Tech Talk Today 124 https://original.jupiterbroadcasting.net/76477/canadian-on-tap-tech-talk-today-124/ Thu, 29 Jan 2015 11:01:52 +0000 https://original.jupiterbroadcasting.net/?p=76477 Microsoft goes all in on Android & we breakdown the big questions behind the apps. Intel announces wireless docking at the chipset level & Canada’s covert operation of tracking downloads and uploads all over the world is revealed. Plus a few tangents & the biggest “disruption” of the year! Direct Download: MP3 Audio | OGG […]

The post Canadian On Tap | Tech Talk Today 124 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Microsoft goes all in on Android & we breakdown the big questions behind the apps. Intel announces wireless docking at the chipset level & Canada’s covert operation of tracking downloads and uploads all over the world is revealed.

Plus a few tangents & the biggest “disruption” of the year!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

Microsoft Launches Outlook For iOS And Android Based On Its Acompli Acquisition

Microsoft today launched Outlook for Android and iOS phones and tablets, based on the application it acquired when it bought Acomplilast December. These new applications will go live in their respective app stores over the course of the next few hours.

Microsoft says its mobile Office apps should run on devices with Android 4.4 or later, 1GB of RAM or more, and ARM-based processors. Support for Intel chips is in the works and Microsoft says it plans to add support for Intel-based tablets within the next few months.

Peeing My Way Around New York City With Airpnp, The App For Bathroom Emergencies – BuzzFeed News

Airpnp is the worst-designed app I’ve ever used. It’s also the most profound.

AnandTech | Intel Announces Broadwell vPro Processors: Wireless Docking and More

ntel Wireless Docking could be the most exciting new feature. Using four channels of 802.11ad at 60 GHz radio frequency, Intel claims a total bandwidth of 7 Gbps. All data passed between the dock and device is protected with 128-bit AES hardware encryption, and two monitors plus USB 3.0 are supported. Intel has not yet provided information yet about supported resolutions, however they do provide an impressive video demonstrating a video file streaming from a USB stick to a laptop from the wireless dock, then back to the wireless dock for display.

This docking implementation is particularly interesting as it is implemented at the chipset level instead of the OS level. Intel’s low level control of peripherals allows them to enable no-brainer functionality such as closing the laptop lid and not entering sleep mode after establishing the dock connection.

Canada Casts Global Surveillance Dragnet Over File Downloads – The Intercept

The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files.

Drone Maker Enforces No-Fly Zone Over DC, Hijacking Malware Demonstrated – Slashdot

A recent incident at the White House showed that small aerial vehicles (drones) present a specific security problem. Rahul Sasi, a security engineer at Citrix R&D, created MalDrone, the first backdoor malware for the AR drone ARM Linux system to target Parrot AR Drones, but says it can be modified to target others as well. The malware can be silently installed on a drone, and be used to control the drone remotely and to conduct remote surveillance. Meanwhile, the Chinese company that created the drone that crashed on the White House grounds has announced a software update for its “Phantom” series that will prohibit flight within 25 kilometers of the capital.

The post Canadian On Tap | Tech Talk Today 124 first appeared on Jupiter Broadcasting.

]]>
Profiting From Paris | Unfilter 129 https://original.jupiterbroadcasting.net/75557/profiting-from-paris-unfilter-129/ Wed, 14 Jan 2015 22:07:13 +0000 https://original.jupiterbroadcasting.net/?p=75557 A week after the attacks in Paris we look at the connections to terrorists in Yemen, the different groups trying to claim credit & how this tragic event is greatly benefiting politicians pushing for more surveillance. Plus Wall Street throws big money at Cannabis startups & a look at Colorado one year after recreational legalization. […]

The post Profiting From Paris | Unfilter 129 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A week after the attacks in Paris we look at the connections to terrorists in Yemen, the different groups trying to claim credit & how this tragic event is greatly benefiting politicians pushing for more surveillance.

Plus Wall Street throws big money at Cannabis startups & a look at Colorado one year after recreational legalization.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

News

Breaking News

An Ohio man who allegedly wanted to set up an ISIS cell in the U.S. was arrested Wednesday and accused of planning to attack the U.S. Capitol. But U.S. officials told NBC News the man was dealing with a government informer working undercover the entire time and was never in a position to carry out his plan.

Christopher Lee Cornell, 20, of Green Township, near Cincinnati, was arrested after he bought two M-15 semi-automatic rifles and about 600 rounds of ammunition as the undercover operative watched, according to an FBI affidavit.

Officials said Cornell never bought any components for pipe bombs. “There was never a danger to the public,” an official told NBC News.

A preliminary hearing was scheduled for Jan. 22 in U.S. District Court in Cincinnati on charges of the attempted killing of a U.S. government officer and possession of a firearm in furtherance of an attempted crime of violence.

High Note

Cannbis

Geoff Lewis’s firm, Founders Fund, a $2 billion company, made its name investing early in new companies like Facebook, Spotify and SpaceX. But now it’s betting on pot.

Feedback

The post Profiting From Paris | Unfilter 129 first appeared on Jupiter Broadcasting.

]]>
Alert Fatigue | Tech Talk Today 115 https://original.jupiterbroadcasting.net/75432/alert-fatigue-tech-talk-today-115/ Tue, 13 Jan 2015 11:25:11 +0000 https://original.jupiterbroadcasting.net/?p=75432 Amber alerts in your feed, UK encryption crackdown, MacBooks selling like crazy, AI warnings & Drone journalism takes flight. Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube RSS Feeds: MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed Become […]

The post Alert Fatigue | Tech Talk Today 115 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Amber alerts in your feed, UK encryption crackdown, MacBooks selling like crazy, AI warnings & Drone journalism takes flight.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

Introducing AMBER Alerts on Facebook

With more than 725 children recovered as a direct result of AMBER Alerts since the program launched in 1996, we know the system works. We hope our new delivery mechanism will help increase that number and reunite even more families.

British Prime Minister Suggests Banning Some Online Messaging Apps

That was the message delivered on Monday by Prime Minister David Cameron, who said he would pursue banning encrypted messaging services if Britain’s intelligence services were not given access to the communications.

Apple Maintains Mac Sales Momentum in Holiday Quarter

With its 11.7 percent share of the market, Apple is the third largest PC vendor in the United States, behind HP and Dell, which captured 29.2 and 22.6 percent of the market, respectively. Lenovo and ASUS came in behind Apple, with 10.2 and 6.8 percent of the market, respectively.

Artificial intelligence experts sign open letter to protect mankind from machines

Famed physicist Stephen Hawking and Tesla Motors CEO Elon Musk have also voiced their concerns about allowing artificial intelligence to run amok. “One can imagine such technology outsmarting financial markets, out-inventing human researchers, out-manipulating human leaders, and developing weapons we cannot even understand,” Hawking said in an article he co-wrote in May for The Independent. “Whereas the short-term impact of AI depends on who controls it, the long-term impact depends on whether it can be controlled at all.”

Google launches Chrome Remote Desktop for iOS | VentureBeat

Google today launched its Chrome Remote Desktop app for iOS, some nine months after releasing the tool on its own mobile platform. Like its Android counterpart, the iOS version lets you remotely control your computer using your smartphone or tablet. You can download the new app from Apple’s App Store

CNN’s Drone Journalism Is Just the Beginning – NationalJournal.com

“Our aim is to get beyond hobby-grade equipment and to establish what options are available and workable to produce high-quality video journalism using various types of UAVs and camera setups,” CNN Senior Vice President David Vigilante, said in a press release.

The development is significant because currently the FAA does not allow Unmanned Aerial Vehicles for commercial use, save for a few exceptions for the entertainment industry and agriculture. This loosening of the rules could pave the way not just for aerial news-gathering but also for Amazon’s proposed air delivery service.

The post Alert Fatigue | Tech Talk Today 115 first appeared on Jupiter Broadcasting.

]]>
3D Printing Wood | Tech Talk Today 114 https://original.jupiterbroadcasting.net/75122/3d-printing-wood-tech-talk-today-114/ Thu, 08 Jan 2015 10:22:11 +0000 https://original.jupiterbroadcasting.net/?p=75122 The hottest Smartwatch at CES 2015 is running Open WebOS, we share the details. Tablets in cars & 3D printing with wood and other materials. Plus some follow up & the Drone Rodeo! Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube RSS Feeds: MP3 Feed | OGG […]

The post 3D Printing Wood | Tech Talk Today 114 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The hottest Smartwatch at CES 2015 is running Open WebOS, we share the details. Tablets in cars & 3D printing with wood and other materials.

Plus some follow up & the Drone Rodeo!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

Exclusive: The hottest smartwatch of CES isn’t running Android Wear — it’s Open webOS | Android Central

We tracked down the Audi/LG watch — still officially nameless, by the way — in Las Vegas today, and we can exclusively reveal that it’s not running Android Wear as originally believed. In fact, it’s packing completely different software based on LG’s Open webOS.

The most beautiful tablet you’ll ever own comes with an Audi Q7

While the primary purpose of the tablet is entertainment for your rear passengers, the Audi Tablet also controls most of the car’s electronic functions. Passengers in the Q7 can have a look at the current route via a map app and can even set a new waypoint and pass it to the main stack in the front via WiFi. Music choices, media access, speed and even data showing if your driver has been keeping up with the maintenance are all on tap. Charging and a serial port that interfaces with the car’s CANBus — for communication with the auto’s systems — are on the back of the device and a standard micro-USB port and headphone jack are, too

10.1-inch tablet being driven by a Tegra 4

This is the most insane wireless router in the history of mankind | The Verge

The router in question is the D-Link AC3200 Ultra Wi-Fi Router, and make no mistake: as these things go it’s more than solid. Six antennas, support for the latest 802.11 protocols, and speeds up to 3.2Gbps. And this is just one of D-Link’s new Ultra series (it’ll be available on Newegg tomorrow for $309.99).

But mostly it just looks bonkers.

MakerBot makes 3D printing more realistic with metal, wood and stone – CNET

MakerBot announced Tuesday here at the 2015 International CES that it’s using new PLA Composite Filaments made with composites of real metal, stone and wood. Basically, these materials, in powder form, are mixed with regular PLA filament to create a new special type of filament. As the result, the printed objects will provide more of the look and certain characteristics of the materials being used.

For example, an object printed using metal PLA filament can be magnetized and is heavier than the same object printed using regular pure-plastic PLA filaments.

In order to print the new materials, however, a new extruder is needed for each material type. The good news is all MakerBot’s fifth-generation 3D printers support a Smart Extruder, which can be easily swapped out.

FBI Director: Sony’s ‘Sloppy’ North Korean Hackers Revealed Their IP Addresses | WIRED

Speaking at a Fordham Law School cybersecurity conference Wednesday, Comey said that he has “very high confidence” in the FBI’s attribution of the attack to North Korea. And he named several of the sources of his evidence, including a “behavioral analysis unit” of FBI experts trained to psychologically analyze foes based on their writings and actions. He also said that the FBI compared the Sony attack with their own “red team” simulations to determine how the attack could have occurred. And perhaps most importantly, Comey now says that the hackers in the attack failed on multiple occasions to use the proxy servers that bounce their Internet connection through an obfuscating computer somewhere else in the world, revealing IP addresses that tied them to North Koreans.

In his statement Wednesday, Comey acknowledged the skepticism about the FBI’s attributions claims. But he responded that “they don’t have the facts that I have. They don’t see what I see.”

Racing in a Las Vegas Drone Rodeo — CES 2015 – YouTube

The post 3D Printing Wood | Tech Talk Today 114 first appeared on Jupiter Broadcasting.

]]>
Unidentified Flying Selfies | Tech Talk Today 85 https://original.jupiterbroadcasting.net/70607/unidentified-flying-selfies-tech-talk-today-85/ Tue, 04 Nov 2014 12:14:02 +0000 https://original.jupiterbroadcasting.net/?p=70607 A drone that attaches to your wrist & takes to the air with a quick gesture, Amazon brings unlimited storage of photos to Prime members, the head of the GCHQ goes on record hating social media & more! Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube RSS […]

The post Unidentified Flying Selfies | Tech Talk Today 85 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A drone that attaches to your wrist & takes to the air with a quick gesture, Amazon brings unlimited storage of photos to Prime members, the head of the GCHQ goes on record hating social media & more!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

Amazon Prime Members’ Newest Benefit Is Free, Unlimited Photo Storage

Amazon Prime members are getting another benefit today, the company announced this morning: free, unlimited photo storage. In a new service called Prime Photos, paying subscribers of Amazon’s membership program will now be about to store photos in their original resolutions to Amazon Cloud Drive from any device, including iOS, Android, and Fire phones and tablets, as well as Mac and Windows PCs.

These photos can then be viewed on those devices, as well as on the big screen via Amazon Fire TV, the new Fire TV Stick, game consoles like the PlayStation 3 and PlayStation 4, and some models of LG and Samsung smart TVs.

To get started with Prime Photos, Amazon Prime subscribers can now visit the homepage for the new service (at www.amazon.com/primephotos) in order to download the Cloud Drive Photos iOS or Android application

Nixie wearable camera drone wins $500k in Intel tech contest

Beating nine other entries in the final, the US-based team behind the awesome wrist-based flying camera took to the stage at a special ceremony in San Francisco on Monday to collect the $500,000 prize money.

Nixie only requires a flick of the arm, at which point it unfolds from your wrist, flies off, takes your picture, and returns. Open up your smartphone and staring back at you will be your just-snapped image.

Google’s Nexus Player: More prototype than finished product | Ars Technica

The Nexus Player has 3 components. For $99, you get the set-top box and remote control, while another $40 gets you the optional Nexus Player Gamepad. The total package is a $105 premium over the $35 Google Chromecast, but the Chromecast is just a streaming stick. While the Nexus Player supports Google Cast (the retconned name for the Chromecast protocol), it also brings a dedicated TV interface along with local apps and games. In other words, it’s a smartphone for your television.


Inside the box puck is a 1.8GHz Intel Atom (Silvermont) processor, a PowerVR Series6 GPU, 1GB of RAM, and 8GB of storage. Dual-band 2×2 802.11ac Wi-Fi provides connectivity, along with Bluetooth LE 4.0. While Android TV supports Ethernet, the Nexus Player doesn’t.


The worst part of the remote is that it likes to randomly stop working. You’ll be clicking along the interface and everything will just stop, which means it’s time to get up, flip the box over, hit the Bluetooth pairing button, and then hold home+back to set the remote to pairing mode. We had to do this three times in about two hours.


Given the emphasis on apps, that 8GB of storage is a disaster, though. After the OS and pre-installed apps, you’ve got about 5GB of storage free out of the box. Let’s install some games!


All the videos we tested from several sources (YouTube, Google Play, Netflix) would drop frames. The frame drops are seemingly random, too, as if the Nexus Player is just fast enough to run 1080p content at a smooth framerate but then the OS decides to do something in the background and things start to slow down.

U.K. Spy Agency Chief Goes Public With Anti-Encryption Appeal To U.S. Tech Companies | TechCrunch

Writing in the Financial Times newspaper, GCHQ’s Robert Hannigan claims that “privacy has never been an absolute right” and warns that the terrorist group ISIS has “embraced the Internet as a noisy channel in which to promote itself, intimidate people, and radicalise new recruits”.


Hannigan’s initial argument focuses on how ISIS is using social media tools such as Twitter and Facebook as propaganda platforms

“I understand why they have an uneasy relationship with governments,” he writes of U.S. tech firms. “They aspire to be neutral conduits of data and to sit outside or above politics. But increasingly their services not only host the material of violent extremism or child exploitation, but are the routes for the facilitation of crime and terrorism.

“However much they may dislike it, they have become the command-and-control networks of choice for terrorists and criminals, who find their services as transformational as the rest of us.

The Internet Archive Created a Free Online Arcade With Over 900 Games

If you were planning a productive morning of work, you may want to reschedule: the Internet Archive has created an online arcade which lets you run over 900 classic games right there, in your browser.

GO VOTE: Tech Talk Today

There are two kickstarter of the week submissions, the top voted one will make it on the show tomorrow for our jury to judge. You still have a chance to submit a winner too if your organized!

The post Unidentified Flying Selfies | Tech Talk Today 85 first appeared on Jupiter Broadcasting.

]]>
Rebooting Iraq | Unfilter 114 https://original.jupiterbroadcasting.net/66947/rebooting-iraq-unfilter-114/ Wed, 17 Sep 2014 20:53:40 +0000 https://original.jupiterbroadcasting.net/?p=66947 The war machine is in overdrive as the push into Iraq and Syria reaches a fever pitch. With a designed to fail coalition in place we’ll examine the state of the US’ fight against ISIS. Plus we look at the military response to the Ebola outbreak, the situation in Scotland, and everyones favorite celebrity who […]

The post Rebooting Iraq | Unfilter 114 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The war machine is in overdrive as the push into Iraq and Syria reaches a fever pitch. With a designed to fail coalition in place we’ll examine the state of the US’ fight against ISIS.

Plus we look at the military response to the Ebola outbreak, the situation in Scotland, and everyones favorite celebrity who announced he is a cannabis user.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

— Show Notes —

NSA Update

Israel’s N.S.A. Scandal – NYTimes.com

IN Moscow this summer, while reporting a story for Wired magazine, I had the rare opportunity to hang out for three days with Edward J. Snowden. It gave me a chance to get a deeper understanding of who he is and why, as a National Security Agency contractor, he took the momentous step of leaking hundreds of thousands of classified documents.


Among his most shocking discoveries, he told me, was the fact that the N.S.A. was routinely passing along the private communications of Americans to a large and very secretive Israeli military organization known as Unit 8200. This transfer of intercepts, he said, included the contents of the communications as well as metadata such as who was calling whom.

Mr. Snowden stressed that the transfer of intercepts to Israel contained the communications — email as well as phone calls — of countless Arab- and Palestinian-Americans whose relatives in Israel and the Palestinian territories could become targets based on the communications. “I think that’s amazing,” he told me. “It’s one of the biggest abuses we’ve seen.”

Snowden Leaks Didn’t Make Al Qaeda Change Tactics, Says Report – NBC News.com

There is no evidence that Edward Snowden‘s revelations about NSA spying inspired Islamic terror groups to hide their electronic communications behind more sophisticated encryption software, according to a new analysis that challenges other recent research and assertions by U.S. officials about the impact of the leaks.

WWIII

U.S. House votes to arm Syrian rebels, but questions remain

The House voted 273-to-156 to authorize the plan, a test of support for Obama’s stepped-up campaign to “degrade and destroy” Islamic State fighters who have seized a third of both Iraq and Syria, declared war on the West and seek to establish a caliphate in the heart of the Middle East.

Written as an amendment to a stopgap spending bill, the measure does not include any money to pay for the arms and training.

House, in Unusual Alignments, Moves Toward Vote on ISIS Fight – NYTimes.com

A House divided along unusual and unpredictable lines moved toward a vote Wednesday to authorize the training and arming of Syrian rebels to confront the militant group Islamic State, with President Obama leading efforts to secure a solid majority.

Russia: ‘Free Syrian Army No Longer Exists’; Rebels Are Coordinating With Terrorists

— Russia on Tuesday accused the West of ignoring its warnings about the growing terrorist threat in Syria, and claimed that the moderate rebel front — the one the Obama administration wants to arm as part of its anti-ISIS strategy — “no longer exists.”

Who Pays the Pro-War Pundits? Conflicts of Interest Exposed for TV Guests Backing Military Action | Democracy Now!

A new report finds many talking heads who have been fanning the flames of war in the news media have ties to Pentagon contractors.

Russians urged ‘don’t panic’ as rouble hits new low

The rouble fell about 1% to 38.71 per dollar, the weakest it has been since the currency was restructured in 1998.

Last week, the US and Europe introduced further sanctions against Russia for its actions in Ukraine.

“Don’t panic,” said deputy finance minister Alexei Moiseyev.

Meet The Millionaires And Billionaires Suddenly Buying Tons Of Land In Africa – Business Insider

Oakland Institute just completed the most thorough investigative report on who’s buying land in Africa we’ve seen yet: “Hedge Funds Grabbing Land in Africa,” as BBC called it.

As commodities prices rise and inflation picks up, the OI made the report public, they say, because the number of investors buying up land in Africa concerns them.

Scotland

Specifically, if Scotland becomes independent, it gets to keep 90% of the revenues from its huge oil reserves.

The New York Times reports:

Scottish nationalists have long argued that being governed from London has deprived their country of its fair share of the wealth from Britain’s oil and natural gas fields, which mostly lie in North Sea waters off their shores.

“It’s Scotland’s oil” was the rallying cry in the 1970s that helped raise the profile of the Scottish Nationalist Party, which now leads the country and is pushing for a vote to secede in the referendum on Thursday. Alex Salmond, the politician leading the separatist movement, has pointed to North Sea energy as the treasure that would help finance an independent Scotland — ensuring that the country could continue the generous public spending, including free university tuition, that he is promising voters.

High Note

50 Companies Look To Fill 500 Openings At Cannabis Job Fair In Denver « CBS Denver

There were about 50 companies looking for workers to fill about 500 jobs. The positions ranged from bud-tenders in the stores to upper level management. The type of companies was also quite varied.

The post Rebooting Iraq | Unfilter 114 first appeared on Jupiter Broadcasting.

]]>
Big Brother Google | Tech Talk Today 37 https://original.jupiterbroadcasting.net/63757/big-brother-google-tech-talk-today-37/ Mon, 04 Aug 2014 09:30:27 +0000 https://original.jupiterbroadcasting.net/?p=63757 Google says “think of the children” but does that justify fully analyzing the contents of everyones Gmail? A drone crashes carrying phones and drugs into a prison & “The Scourge Of Zero Rating”. Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube RSS Feeds: MP3 Feed | OGG […]

The post Big Brother Google | Tech Talk Today 37 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Google says “think of the children” but does that justify fully analyzing the contents of everyones Gmail? A drone crashes carrying phones and drugs into a prison & “The Scourge Of Zero Rating”.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

Crashed drone carried contraband aimed at South Carolina prison | Reuters

A drone being flown in a novel attempt to smuggle phones, marijuana and tobacco into a South Carolina maximum security prison crashed outside its walls, authorities said on Wednesday.

Officials believe it was the first time an unmanned aircraft had been used in an effort to breach prison walls in the state, Givens said. Most cellphones are thrown over walls.

Authorities have arrested one man in the drone incident and are seeking another suspect. Brenton Lee Doyle, 28, appeared in court on Wednesday for a hearing. He faces charges of attempting to introduce contraband into a prison and possession of the drug flunitrazopam, a muscle relaxant known as “roofies.”

Doyle has said he has never seen a drone and that police said nothing about a drone at the time of his arrest, his attorney Wayne Floyd said.

Police Say A Google Tip About Child Abuse Led To Arrest – Business Insider

A Houston man has been arrested after Google sent a tip to the National Center for Missing and Exploited Children saying the man had explicit images of a child in his email, according to Houston police.

The man was a registered sex offender, convicted of sexually assaulting a child in 1994, reports Tim Wetzel at KHOU Channel 11 News in Houston.

“He was keeping it inside of his email. I can’t see that information, I can’t see that photo, but Google can,” Detective David Nettles of the Houston Metro Internet Crimes Against Children Taskforce told Channel 11.

After Google reportedly tipped off the National Center for Missing and Exploited Children, the center alerted police, who used the information to get a warrant.

On one hand, most people would certainly applaud the use of technology to scan email in a case like this.

On the other, debate rages about how much privacy users can expect when using Google’s services like email. In a word: none.

A year ago, in a court brief, Google said as much. Then, in April, after a class-action case against Google for email scanning fell apart, Google updated its terms of service to warn people that it was automatically analyzing emails.

Google Said to Plan Separating Photo Service From Google+ – Bloomberg

The move would enable the photo service to stand more
independently and be accessible for consumers who aren’t part of
Google+, potentially spurring more growth, said the people, who
asked not to be identified because the plans aren’t public. The
service, called Google+ Photos, would still work with the social
network’s users and may be rebranded as part of the move, one of
the people said.

Mailpile: Mailpile Alpha II – The Dogfood Edition

We present Mailpile Alpha II – The Dogfood Edition!

Yummy! This savoury mass of source code has been tagged in Github
(release 0.2.0)
and we have updated our live demos.

The Scourge Of Zero Rating – AVC

Fred Wilson is a New York City-based venture capitalist since 1986, and a blogger. Wilson is the co-founder of Union Square Ventures, with investments in companies such as Twitter, Tumblr, Foursquare, Zynga, Kickstarter, and others.

It seems like every week I read another article about a mobile carrier offering some incredible deal to eat the mobile data costs you rack up using certain apps.

The most recent was the news that Sprint will sell at data plan that “only connects to Facebook and Twitter”.

The pernicious thing about zero rating is that it is marketed as a consumer friendly offering by the mobile carrier — “we are not charging you for data when you are on Spotify”.


But what all of this zero rating activity is setting up is a mobile internet that looks a lot more like cable TV than our wide open Internet. Soon a startup will have to negotiate a zero rating plan before launching because mobile app customers will be trained to only use apps that are zero rated on their network.

I strongly encourage policy makers, policy wonks, internet activists, and anyone who cares about protecting an open internet for all to take a hard look at zero rating. Like all the best scourges, it’s a wolf in sheep’s clothing.

The post Big Brother Google | Tech Talk Today 37 first appeared on Jupiter Broadcasting.

]]>
Unraveling Ukraine | Unfilter 94 https://original.jupiterbroadcasting.net/55862/unraveling-ukraine-unfilter-94/ Wed, 23 Apr 2014 16:33:10 +0000 https://original.jupiterbroadcasting.net/?p=55862 Unrest in Ukraine likely backed by Moscow is boiling up to critical levels this week. We’ll discuss how we are one drunken gun fight away from US and Russian troops in a full confrontation. Plus Snowden confronts Putin about spying, a weed propaganda update, and much more! Direct Download: Video | MP3 Audio | OGG […]

The post Unraveling Ukraine | Unfilter 94 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Unrest in Ukraine likely backed by Moscow is boiling up to critical levels this week. We’ll discuss how we are one drunken gun fight away from US and Russian troops in a full confrontation.

Plus Snowden confronts Putin about spying, a weed propaganda update, and much more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is Crazy

Edward Snowden defends decision to question Vladimir Putin on surveillance

In the phone-in, Snowden asked Putin: “Does Russia intercept, store or analyse, in any way, the communications of millions of individuals?”

Putin replied: “Our intelligence efforts are strictly regulated by our law… We don’t have a mass system of such interception and – according with our law –it cannot exist.”

The wording was deliberately modelled, Snowden says, on the query of US senator Ron Wyden to the director of national intelligence, James Clapper, in March last year – almost three months before the NSA disclosures began – to which Clapper blatantly and inaccurately denied that the US government collected data on millions on Americans.

“The question was intended to mirror the now infamous exchange between Senator Ron Wyden and DNI James Clapper… and to invite either an important concession or a clear evasion” from Putin, Snowden writes.

Lavabit held in contempt of court for printing crypto key in tiny font [Updated] | Ars Technica

A federal appeals court on Wednesday upheld a contempt of court ruling against Ladar Levison and his now-defunct encrypted e-mail service provider, Lavabit LLC, for hindering the government’s investigation into the National Security Agency leaks surrounding Edward Snowden.

In the summer of 2013, Lavabit was ordered to provide real-time e-mail monitoring of one particular user of the service, believed to be Snowden, the former NSA contractor turned whistleblower. Instead of adequately complying with the order to turn over the private SSL keys that protected his company’s tens of thousands of users from the government’s prying eyes, Levison chose instead to shut down Lavabit last year after weeks of stonewalling the government.

– Thanks for Supporting Unfilter –

– NO NEW SUPPORTERS –

  • Thanks to our 378 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


Ukraine

Volodymyr Rybak

Rybak had tried to remove the flag of the separatist Donetsk Republic, the website said. “Over my dead body will you take down that flag,” one man in plain clothes yells at Rybak as the politician tries to gain entry to the town hall.

Two uniformed policemen appear in the video, though only one appears to intervene – ineffectually. After several minutes, Rybak appears able to walk away. Ukraine’s Interior Ministry said he was seen being bundled into a car by masked men in camouflage later that day. His body was found on Saturday near Slaviansk.


Drone Update:

The newspaper The Australian first reported the deaths. The newspaper said Wednesday the men were killed Nov. 19 during a Predator drone strike on rebels traveling in a convoy of cars in Yemen’s eastern region of Hadramout. It said the men were part of Yemen’s Al-Qaeda branch, also called Al-Qaeda in the Arabian Peninsula.

The newspaper identified the Australian as Christopher Harvard of Townsville.

Court: U.S. must release memo on targeted killings

A federal appeals court ordered the U.S. Department of Justice Monday to turn over key portions of a memorandum justifying the government’s targeted killing of people, including Americans, who are linked to terrorism.


If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Unraveling Ukraine | Unfilter 94 first appeared on Jupiter Broadcasting.

]]>
Death by Metadata | Unfilter 85 https://original.jupiterbroadcasting.net/51527/death-by-metadata-unfilter-85/ Wed, 12 Feb 2014 21:52:00 +0000 https://original.jupiterbroadcasting.net/?p=51527 Drone assassinations and the NSA surveillance programs have intersected this week. We’ve got the details on how the NSA Metadata is used to kill people.

The post Death by Metadata | Unfilter 85 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Two topics we’ve been closing following on the Unfilter show, Drone assassinations, and the NSA surveillance programs have intersected this week. We’ll give you the details on how Obama uses the NSA Metadata collection to kill people with drones.

Now as we record this episode thanks to new leaks we’ve learned the Administration is preparing their case to kill another American citizen based on the cellphone, in his pocket.

Plus the GCHQ gets caught playing with hackers, and we’ll take a look at Glenn Greenwald’s new publication, and much much more.

On this week’s episode of, Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is Crazy

More than 5,300 web-based companies and other organizations, including Reddit, Imgur, Tumblr, Mozilla the Electronic Frontier Foundation and the American Civil Liberties Union, have joined forces to protest National Security Agency surveillance on Feb. 11.

The Day We Fight Back, though, is an attempt to dismantle a system that’s been in place for years. Inside the US, participants are urged to put a banner on their website and call or email their legislators in support of Representative Jim Sensenbrenner (R-WI) and Senator Patrick Leahy’s (D-VT) USA Freedom Act, which would reform the NSA’s metadata database. But they’re also urged to oppose Dianne Feinstein’s (D-CA) FISA Improvements Act, a bill that sounds just as pleasant but has been sharply criticized for enshrining the database program in law. And even these are just baby steps in the long run.

“This, we believe, will be a historic lawsuit,” the Kentucky Republican said. The suit, joined by conservative advocacy group FreedomWorks, was filed in U.S. District Court in the District of Columbia.

So far, damages and injury from NSA data-gathering have been hard to establish even on an individual basis. Several groups have brought lawsuits against the administration by saying a particular individual organization or person has suffered because of surveillance. But even for Verizon customers, who have a leaked court order to back them up, there’s no definitive way to tell whether the NSA actually collected metadata from them, and the claim is too hypothetical for many judges. If Paul wants to go forward with the suit, he’ll need to calculate and prove similar damages for _every single member _of his class.


Drones

According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using.

The drone operator, who agreed to discuss the top-secret programs on the condition of anonymity, was a member of JSOC’s High Value Targeting task force, which is charged with identifying, capturing or killing terrorist suspects in Yemen, Somalia, Afghanistan and elsewhere.

The JSOC operator’s account is supported by another insider who was directly involved in the drone program. Brandon Bryant spent six years as a “stick monkey” – a drone sensor operator who controls the “eyes” of the U.S. military’s unmanned aerial vehicles. By the time he left the Air Force in 2011, Bryant’s squadron, which included a small crew of veteran drone operators, had been credited with killing 1,626 “enemies” in action.

Bryant says he has come forward because he is tormented by the loss of civilian life he believes that he and his squadron may have caused. Today he is committed to informing the public about lethal flaws in the U.S. drone program.

Leaks from two unnamed officials in the Obama administration to the Associated Press describe him as “an al-Qaida facilitator who has been directly responsible for deadly attacks against U.S. citizens overseas and who continues to plan attacks against them that would use improvised explosive devices.”

The person, who was not identified, has been the subject of debate among military commanders and intelligence officials for several weeks as they decide what to recommend. President Barack Obama would make a final decision.

CNN has also learned key members of Congress have been aware of the internal debate.

The officials spoke to CNN’s Barbara Starr on condition of anonymity because of the sensitivity of the situation.

Exhaustive independent studies by the British Bureau of Investigative Journalism, the New America Foundation and the Long War Journal have documented that civilian casualties are endemic – the latest count is at least 440 since the drone campaigns began, according to the BIJ.

Obama himself is hardly unaware of the dreadful downside of errant drone strikes. As Daniel Klaidman reported in his book, “Kill or Capture,” Obama authorized his very first drone strike on the third full day of his presidency, after having been assured by then-CIA director Michael Hayden that the targets were high-level al Qaeda and Taliban commanders. The Hellfire missile he sent into a compound in Pakistan instead killed a prominent pro-government tribal elder and four members of his family, including two children.

“The online news venture backed by eBay founder Pierre Omidyar debuted Monday, featuring fresh revelations about US intelligence from investigative reporter Glenn Greenwald. The news site dubbed ”The Intercept“ launched with two articles, including one co-authored by Greenwald stating that the US National Security Agency is relying on electronic surveillance, such as cell phone location, rather than human intelligence, to locate targets for lethal drone strikes. The report said the NSA ”geolocates“ the SIM card or handset of a suspected terrorist’s mobile phone for raids and drone strikes to capture or kill suspected terrorists…”.* How does this match up with what President Obama has said? The Young Turks host Cenk Uygur breaks it down.

– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Donald M.

  • Phil*

  • Keith G

I have just signed up as a JB supporter. The $10(USD) a month was intended for the Unfilter show.

The reason I am contributing $10, is because of your unmentioned and non-existent Valentines Day offer. Both my girlfriend and I listen to Unfilter. I hope I am not breaking any rules by having two names on one payment account. If you like you may read the following on-air:

“I would like to express my love for Judith using the cyber tubes of the internet in the freedom dimension.”

  • Thanks to our 347 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


Top Story in the unfilter Subreddit


If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Death by Metadata | Unfilter 85 first appeared on Jupiter Broadcasting.

]]>
The NSA Justification | Unfilter 77 https://original.jupiterbroadcasting.net/47477/the-nsa-justification-unfilter-77/ Wed, 04 Dec 2013 22:19:11 +0000 https://original.jupiterbroadcasting.net/?p=47477 Dianne Feinstein and Mike Rogers held a joint interview over the weekend that gives us new insights into the rampant paranoia and circular logic.

The post The NSA Justification | Unfilter 77 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Dianne Feinstein and Mike Rogers the supposed chief overseers of the the US intelligence war machine held a joint interview over the weekend that gives us new insights into the rampant paranoia and circular logic that dominates their thinking and enables them to justify the spying of the world’s connected population. We’ll bust their talking points and focus on their real motivations.

But first: The editor of The Guardian was grilled by politicians and his patriotism called into question. Meanwhile Greenwald takes to the air to defend their reporting on the Snowden leaks.

Then it’s Amazon’s drones, your feedback, our follow up, and much much more.

On this week’s episode of, Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —



Amazon’s Cyber Monday Ad

60 Minutes associate producer Nathalie Sommer says even Bezos built up the surprise during breaks in filming the 60 Minutes segment. During a tape change, Bezos told the producers, “If you can guess what it is, then…I will give you half my fortune and send you to Vegas with it.”

The 10-mile delivery radius for the drones shown in the Amazon video seems quite literally a stretch, according to Colin Guinn CEO of DJI Innovations, a Texas based company that makes unmanned aerial cinematography systems for commercial and recreational use.

“The [Amazon] video is by far the most fleshed out proof of concept yet,” Guinn said. “But with the system they showed, a 20-mile round trip on a single charge isn’t possible with today’s technology.”

He said that the system Amazon presented would carry a five-pound payload for a maximum flight time of about 15 to 20 minutes. “That would amount to maybe about a five-mile delivery radius,” he said, adding that a 10-mile radius might be possible in about a year from now.

As you can see, tweets for “Amazon” increased by 180% between Saturday (11/30) and Sunday (12/1). Their 60 minutes appearance was a great tool for getting people to talk about Jeff Bezos, Amazon and their drones. Of course, Amazon hopes that this increase in conversations will influence people to visit Amazon.com.


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Matt B

  • Dylan L

  • Jason F

  • Aaron G

  • ProfessorKaos

  • Andrew T

  • Matt D

  • Edward R

  • Jared R

  • Thanks to our 273 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.

  • Unfilter lands on Dec 25th and Jan 1st. No main show those weeks, but supporters only shows will air. A limited time opportunity to have the entire lineup in the sync folder for easy listening.

  • BitTorrent Sync JFK Archive

BSQROSUAQASU7BEKURP73ULWOGABSQOZ6

“The goal for the next six months, is that we need more shows and less newscasts.”

He wants the network to attract “viewers who are watching places like Discovery and History and Nat Geo and A&E.”


NSA is CRAZY

The NSA does not target Americans’ location data by design, but the agency acquires a substantial amount of information on the whereabouts of domestic cellphones “incidentally,” a legal term that connotes a foreseeable but not deliberate result.

One senior collection manager, speaking on condition of anonymity but with permission from the NSA, said “we are getting vast volumes” of location data from around the world by tapping into the cables that connect mobile networks globally and that serve U.S. cellphones as well as foreign ones. Additionally, data are often collected from the tens of millions of Americans who travel abroad with their cellphones every year.

In one curious exchange, the committee chair, Keith Vaz, asked Rusbridger if he loved his country.

“I’m slightly surprised to be asked the question,” replied Rusbridger. "But, yes, we are patriots and one of the things we are patriotic about is the nature of democracy, the nature of a free press and the fact that one can in this country discuss and report these things.

Senator Dianne Feinstein and Representative Mike Rogers appeared together on CNN’s State of the Union, on the day that al-Qaida’s US spokesperson called for attacks on US interests around the world. Rogers said al-Qaida groups had changed their means of communication as a result of leaks about US surveillance programs, making it harder to detect potential plots in the early planning stages.

“We’re fighting amongst ourselves here in this country about the role of our intelligence community that it is having an impact on our ability to stop what is a growing number of threats,” he said. “And so we’ve got to shake ourselves out of this pretty soon and understand that our intelligence services are not the bad guys.”

Feinstein, a California Democrat, said there were more terrorist groups than ever, with more sophisticated and hard-to-detect bombs. She said: “There is huge malevolence out there.”

I asked him about the NSA disclosure that bothered him most. He described how, in the name of defending the country, the hackers of the NSA are committing a cardinal digital sin: weakening the Internet by targeting cryptography and other security measures that make the Internet secure for the bad guys and for everyone else too.


The Season of Weed

OVER-POLICING

Between 2001 and 2010, there were over 8 million pot arrests in the U.S. That’s one bust every 37 seconds and hundreds of thousands ensnared in the criminal justice system.

WASTED TIME AND MONEY

Enforcing marijuana laws costs us about $3.6 billion a year, yet the War on Marijuana has failed to diminish the use or availability of marijuana.

STAGGERING RACIAL BIAS

Marijuana use is roughly equal among Blacks and whites, yet Blacks are 3.73 times as likely to be arrested for marijuana possession.

Mom Recounts Using Medical Marijuana To Treat Her Son’s Epilepsy: He went 48 hours without a seizure immediately. Within three days he was pumping his legs on the swings, which is something I had tried to teach him for seven years…tomorrow he’ll be 14 months seizure-free."

Feedback:

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post The NSA Justification | Unfilter 77 first appeared on Jupiter Broadcasting.

]]>
Convenient Emergency | Unfilter 62 https://original.jupiterbroadcasting.net/41302/convenient-emergency-unfilter-62/ Thu, 08 Aug 2013 05:14:38 +0000 https://original.jupiterbroadcasting.net/?p=41302 The Obama Administration claims to have intercepted significant chatter warning them to an impending attack from terrorist. We have questions.

The post Convenient Emergency | Unfilter 62 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Terror ALERT! The Obama Administration claims to have intercepted significant chatter warning them to an impending attack from terrorist. Forcing the US to shutter nearly two dozen diplomatic posts and evacuate personnel around the world.

The convenient emergency arises during major new revelations of domestic spying abuse.

The Drug Enforcement Administration is using intelligence gathered by the NSA to investigate US citizens for domestic crimes, a and then covers it up. We’ve got the details.

Plus: Snowden leaves the airport , your feedback, our follow up, and much much more…

On this week’s Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


Where in the World is Edward Snowden?

“We have reached the conclusion that there is not enough recent progress in our bilateral agenda with Russia to hold a US-Russia Summit,” the White House said in a statement.

In addition to Russia’s “disappointing decision” to grant Mr Snowden temporary asylum, the White House cited a lack of progress on issues ranging from missile defence to human rights.

“We believe it would be more constructive to postpone the summit until we have more results from our shared agenda,” the White House said.

Charles Schumer, the U.S. Senate’s third ranking Democrat and a close Obama ally, accused Russian President Vladimir Putin of trying to antagonize the United States by granting American fugitive Edward Snowden asylum for one year.

“President Putin is behaving like a schoolyard bully,” Schumer said on the CBS television talk show “Face the Nation.” “In my experience, I’ve learned unless you stand up to that bully, they ask for more and more and more.”


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Chris
  • Michael B
  • Allen P
  • James F
  • Nick W @13.33 – Welcome to the investors club Nick!
  • Kyle J
  • Dusko P
  • Brian
  • Thanks to our 151 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience.


World Wide Terror Alert

Officials shuttered 22 U.S. embassies and consulates for the day on Sunday amid fears of an al Qaeda attack. On Sunday afternoon, the State Department said it had extended embassy and consulate closures in 15 of the locations until Friday and added four other posts to the list.

The House Intelligence Committee members weigh in the latest terror threat and the NSA.

Al-Qa’ida in the Arabian Peninsula (AQAP) is a Sunni extremist group based in Yemen that has orchestrated numerous high-profile terrorist attacks. One of the most notable of these operations occurred when AQAP dispatched Nigerian-born Umar Farouk Abdulmutallab, who attempted to detonate an explosive device aboard a Northwest Airlines flight on 25 December 2009

Egyptian newspaper, al-Masry al-Yom reported this week on what it is foreseeing will become Yemen – Saudi Arabia new Oil conflict.

Until 2012, Yemeni officials’ rhetoric revolve around the accepted belief that the poorest country of the Arabian Peninsula was running out of oil and gas.

It is important to note that experts’ discovery of large resources of petrol, most of which is said to be in basement (trap deep with earth pockets) were only made public in 2012, upon the departure from power of Yemen’s former President.

“There were attempts to control key cities in Yemen like Mukala and Bawzeer,” Badi told the British broadcaster. “This would be coordinated with attacks by al Qaeda members on the gas facilities in Shebwa city and the blowing up of the gas pipe in Belhaf city.”

the NY Times has already revealed details of the email intercepts by the US:

_The Obama administration’s decision last week to close nearly two dozen diplomatic missions and issue a worldwide travel alert resulted from intercepted electronic communications in which the head of Al Qaeda in Pakistan ordered the leader of its affiliate in Yemen, the terrorist organization’s most lethal branch, to carry out an attack as early as this past Sunday, according to American officials.

The intercepted conversations last week between Ayman al-Zawahri, who succeeded Osama bin Laden as the head of the global terrorist group, and Nasser al-Wuhayshi, the head of the Yemen-based Al Qaeda in the Arabian Peninsula, revealed one of the most serious plots against American and other Western interests since the attacks on Sept. 11, 2001, American intelligence officials and lawmakers have said.
_

So… revealing that we collect data on everyone somehow turns Snowden into a traitor, while having officials in the government tell the NY Times that we directly intercepted emails between Al Qaeda’s top leaders is somehow perfectly fine? How does that work?


SOD, The DEA’s Information Sharing Program

Reuters published a Monday report revealing that a shadowy
DEA unit known as the Special Operative Division (SOD) – made up
of officials from the FBI, CIA, NSA, IRS, and Department of
Homeland Security – funnels information gathered by the DEA to
those and other police agencies. Information from DEA wiretaps,
informants, and the database of telephone records is passed on,
often to investigations bearing no relevance to national
security.

According to documents viewed by Reuters, SOD federal agents are then trained to “recreate” the source of the investigation to cover up how they discovered a particular bit of information. That method, law experts say, violates an individual’s constitutional right to a fair trial because their defense attorney would be unable to examine details that could turn up evidence of biased witnesses or police malpractice.

A former federal agent who worked with the SOD said that police would find an excuse to stop a vehicle which they had prior information on and then have drug dogs search the car. Upon making the arrest, officers would fabricate a traffic violation that permitted the initial stop in order to hide that they were acting on an SOD tip.


NSA is Crazy

German High Court Justice Hans-Jürgen Papier defended the German government’s relationship with the American spy services. He said that a country has a “basic responsibility to protect its citizens from the attacks of foreign powers” but noted that a state “can only be responsible for doing things that it has the legal power, and is able, to do.”


TOP VOTED: The TSA Expands

With little fanfare, the agency best known for airport screenings has vastly expanded its reach to sporting events, music festivals, rodeos, highway weigh stations and train terminals.


Feedback:

Bitmessage Address: BM-GuQ4gqmBeW8CYpSo3Htg2pBrBdHbvpe7

Supporters Show Email:

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Convenient Emergency | Unfilter 62 first appeared on Jupiter Broadcasting.

]]>