GCHQ – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Thu, 26 Jul 2018 03:14:06 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png GCHQ – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Trump Tape Troubles | Unfilter 288 https://original.jupiterbroadcasting.net/126321/126321/ Wed, 25 Jul 2018 19:13:57 +0000 https://original.jupiterbroadcasting.net/?p=126321 Show Notes: unfilter.show/288

The post Trump Tape Troubles | Unfilter 288 first appeared on Jupiter Broadcasting.

]]>

Show Notes: unfilter.show/288

The post Trump Tape Troubles | Unfilter 288 first appeared on Jupiter Broadcasting.

]]>
Conspiracy Trackpad | TTT 208 https://original.jupiterbroadcasting.net/87026/conspiracy-trackpad-ttt-208/ Thu, 27 Aug 2015 09:57:39 +0000 https://original.jupiterbroadcasting.net/?p=87026 AT&T gets caught injecting ads into wifi, YouTube Gaming launches & the way the GCHQ obliterated the Guardian’s laptops may have revealed more than it intended. Plus the real dirty secret behind Ashley Madison & more! Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube RSS Feeds: MP3 […]

The post Conspiracy Trackpad | TTT 208 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

AT&T gets caught injecting ads into wifi, YouTube Gaming launches & the way the GCHQ obliterated the Guardian’s laptops may have revealed more than it intended.

Plus the real dirty secret behind Ashley Madison & more!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

The post Conspiracy Trackpad | TTT 208 first appeared on Jupiter Broadcasting.

]]>
Unidentified Flying Selfies | Tech Talk Today 85 https://original.jupiterbroadcasting.net/70607/unidentified-flying-selfies-tech-talk-today-85/ Tue, 04 Nov 2014 12:14:02 +0000 https://original.jupiterbroadcasting.net/?p=70607 A drone that attaches to your wrist & takes to the air with a quick gesture, Amazon brings unlimited storage of photos to Prime members, the head of the GCHQ goes on record hating social media & more! Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube RSS […]

The post Unidentified Flying Selfies | Tech Talk Today 85 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A drone that attaches to your wrist & takes to the air with a quick gesture, Amazon brings unlimited storage of photos to Prime members, the head of the GCHQ goes on record hating social media & more!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

Amazon Prime Members’ Newest Benefit Is Free, Unlimited Photo Storage

Amazon Prime members are getting another benefit today, the company announced this morning: free, unlimited photo storage. In a new service called Prime Photos, paying subscribers of Amazon’s membership program will now be about to store photos in their original resolutions to Amazon Cloud Drive from any device, including iOS, Android, and Fire phones and tablets, as well as Mac and Windows PCs.

These photos can then be viewed on those devices, as well as on the big screen via Amazon Fire TV, the new Fire TV Stick, game consoles like the PlayStation 3 and PlayStation 4, and some models of LG and Samsung smart TVs.

To get started with Prime Photos, Amazon Prime subscribers can now visit the homepage for the new service (at www.amazon.com/primephotos) in order to download the Cloud Drive Photos iOS or Android application

Nixie wearable camera drone wins $500k in Intel tech contest

Beating nine other entries in the final, the US-based team behind the awesome wrist-based flying camera took to the stage at a special ceremony in San Francisco on Monday to collect the $500,000 prize money.

Nixie only requires a flick of the arm, at which point it unfolds from your wrist, flies off, takes your picture, and returns. Open up your smartphone and staring back at you will be your just-snapped image.

Google’s Nexus Player: More prototype than finished product | Ars Technica

The Nexus Player has 3 components. For $99, you get the set-top box and remote control, while another $40 gets you the optional Nexus Player Gamepad. The total package is a $105 premium over the $35 Google Chromecast, but the Chromecast is just a streaming stick. While the Nexus Player supports Google Cast (the retconned name for the Chromecast protocol), it also brings a dedicated TV interface along with local apps and games. In other words, it’s a smartphone for your television.


Inside the box puck is a 1.8GHz Intel Atom (Silvermont) processor, a PowerVR Series6 GPU, 1GB of RAM, and 8GB of storage. Dual-band 2×2 802.11ac Wi-Fi provides connectivity, along with Bluetooth LE 4.0. While Android TV supports Ethernet, the Nexus Player doesn’t.


The worst part of the remote is that it likes to randomly stop working. You’ll be clicking along the interface and everything will just stop, which means it’s time to get up, flip the box over, hit the Bluetooth pairing button, and then hold home+back to set the remote to pairing mode. We had to do this three times in about two hours.


Given the emphasis on apps, that 8GB of storage is a disaster, though. After the OS and pre-installed apps, you’ve got about 5GB of storage free out of the box. Let’s install some games!


All the videos we tested from several sources (YouTube, Google Play, Netflix) would drop frames. The frame drops are seemingly random, too, as if the Nexus Player is just fast enough to run 1080p content at a smooth framerate but then the OS decides to do something in the background and things start to slow down.

U.K. Spy Agency Chief Goes Public With Anti-Encryption Appeal To U.S. Tech Companies | TechCrunch

Writing in the Financial Times newspaper, GCHQ’s Robert Hannigan claims that “privacy has never been an absolute right” and warns that the terrorist group ISIS has “embraced the Internet as a noisy channel in which to promote itself, intimidate people, and radicalise new recruits”.


Hannigan’s initial argument focuses on how ISIS is using social media tools such as Twitter and Facebook as propaganda platforms

“I understand why they have an uneasy relationship with governments,” he writes of U.S. tech firms. “They aspire to be neutral conduits of data and to sit outside or above politics. But increasingly their services not only host the material of violent extremism or child exploitation, but are the routes for the facilitation of crime and terrorism.

“However much they may dislike it, they have become the command-and-control networks of choice for terrorists and criminals, who find their services as transformational as the rest of us.

The Internet Archive Created a Free Online Arcade With Over 900 Games

If you were planning a productive morning of work, you may want to reschedule: the Internet Archive has created an online arcade which lets you run over 900 classic games right there, in your browser.

GO VOTE: Tech Talk Today

There are two kickstarter of the week submissions, the top voted one will make it on the show tomorrow for our jury to judge. You still have a chance to submit a winner too if your organized!

The post Unidentified Flying Selfies | Tech Talk Today 85 first appeared on Jupiter Broadcasting.

]]>
Microsoft Gets Its Band Together | Tech Talk Today 83 https://original.jupiterbroadcasting.net/70267/microsoft-gets-its-band-together-tech-talk-today-83/ Thu, 30 Oct 2014 09:44:12 +0000 https://original.jupiterbroadcasting.net/?p=70267 CurrentC has its email list hacked, but the press is having a heyday. Microsoft reveals their fitness band & we are impressed. Plus the GCHQ loophole & the Humble Bundle win for Linux users. Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube RSS Feeds: MP3 Feed | […]

The post Microsoft Gets Its Band Together | Tech Talk Today 83 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

CurrentC has its email list hacked, but the press is having a heyday. Microsoft reveals their fitness band & we are impressed.

Plus the GCHQ loophole & the Humble Bundle win for Linux users.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

CurrentC Hacked

Here’s a bad sign for CurrentC, the fledgling mobile payment system in development by a consortium of retailers.

CurrentC is sending emails to people who signed up for the beta version of the app warning them “that unauthorized third parties obtained the e-mail addresses of some of you.”

It doesn’t sound as if it’s the worst breach in the world, but it’s definitely not good for CurrentC, which is just getting started.

CurrentC is in the news this week because of Apple Pay, Apple’s mobile payment system for the iPhone 6.

CurrentC is backed by MCX, the Merchants Consumer Exchange, which is a group of retailers trying to create a mobile payment system. It is being spearheaded by Wal-Mart.

Davidson also detailed a hack of its email system that was revealed this morning, saying its email provider was hacked, though he wouldn’t disclose the name of the provider. He says the hack exposed dummy zip codes and “some tester email addresses.”

“The CurrentC app itself was not affected. We own this and are taking it seriously,” he said. The investigation is ongoing, and involves security experts and partners organizations. Stolen email addresses were not stored in the cloud.

Microsoft’s health revolution is here, starting with a $199 fitness tracker | The Verge

Microsoft Band, a black $199 wearable that tracks your steps, heart rate, and stride length, all while showing you text, email, and Twitter alerts. It will be available from Microsoft Stores in the US tomorrow.

Simply by virtue of being available to Android, iOS, and Windows Phone users all at once, Microsoft believes it can make inroads in an otherwise terribly siloed marketplace. Health will work with Android Wear watches, Android phones, and the iPhone 6’s motion processor, automatically collecting data from all three. Microsoft’s also been working with Jawbone, MapMyFitness, My Fitness Pal, and Runkeeper to import their data, and plans to incorporate many more.

The Band is sort of Microsoft’s take on the Google Nexus strategy, which Microsoft hopes will show others how to build great trackers. Microsoft is even licensing the ten sensor modules it has developed, so others can build new and different ways to measure your heart rate and step count.

Secret Policy Allows GCHQ Bulk Access To NSA Data

Though legal proceedings following the Snowden revelations, Liberty UK have succeeded in forcing GCHQ to reveal secret internal policies allowing Britain’s intelligence services to receive unlimited bulk intelligence from the NSA and other foreign agencies and to keep this data on a massive searchable databases, all without a warrant. Apparently, British intelligence agencies can “trawl through foreign intelligence material without meaningful restrictions”, and can keep copies of both content and metadata for up to two years. There is also mention of data obtained “through US corporate partnerships”. According to Liberty, this raises serious doubts about oversight of the UK Intelligence and Security Committee and their reassurances that in every case where GCHQ sought information from the US, a warrant for interception signed by a minister was in place.


Eric King, Deputy Director of Privacy international, said: “We now know that data from any call, internet search, or website you visited over the past two years could be stored in GCHQ’s database and analyzed at will, all without a warrant to collect it in the first place. It is outrageous that the Government thinks mass surveillance, justified by secret ‘arrangements’ that allow for vast and unrestrained receipt and analysis of foreign intelligence material is lawful. This is completely unacceptable, and makes clear how little transparency and accountability exists within the British intelligence community.”

Humble Indie Bundle 13

It’s baaaaacccckkkk! In the distance, a dog barks. A crow caws. A spider drops from the ceiling. Why the commotion? It’s the return of the Humble Indie Bundle! Pay what you want for OlliOlli, Insanely Twisted Shadow Planet, and Tower of Guns. Beat the average price, and you’ll also receive four copies of Risk of Rain (one for you and three shareable copies to give away*), Jazzpunk, and Amnesia: A Machine for Pigs. Pay more than $12, and you get all of that plus Shadowrun Returns.

But that’s not all! If your purchase is over $65, you also get a Fangamer merch box decked out in custom Humble Indie Bundle 13 art, 11 custom Humble Indie Bundle 13 collectible cards, a hoodie with custom Humble Indie Bundle 13 art, a cassette with tracks from the games in the bundle, and a Humble Indie Bundle 13 and Humble Bundle patch.

The post Microsoft Gets Its Band Together | Tech Talk Today 83 first appeared on Jupiter Broadcasting.

]]>
GCHQ, Spying on YOU! | Unfilter 106 https://original.jupiterbroadcasting.net/62447/gchq-spying-on-you-unfilter-106/ Wed, 16 Jul 2014 20:37:21 +0000 https://original.jupiterbroadcasting.net/?p=62447 New Snowden revelations show the extent of the GCHQ’s disruption of online services and communities, the Obama administration lets the CIA slide again, and the BRICS nations launch a major attack against the US Dollar. Plus a good use of Drones, some post-legalization issues in Washington, your feedback, our follow up, and much much more! […]

The post GCHQ, Spying on YOU! | Unfilter 106 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

New Snowden revelations show the extent of the GCHQ’s disruption of online services and communities, the Obama administration lets the CIA slide again, and the BRICS nations launch a major attack against the US Dollar.

Plus a good use of Drones, some post-legalization issues in Washington, your feedback, our follow up, and much much more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

— Show Notes —

The Slow Death of Privacy

CIA vs Senate | Unfilter 89

uf-0089

After five years the Senate’s investigation into the Central Intelligence Agencies torture programs has bursted into the light when a massive fight between top Senate officials and the CIA went public in a big way.

Taking to the floor, traditionally an intelligence agency apologist, blasted the CIA we’ll break it all down.

Obama adm refuses to pursue criminal investigation of CIA spying on Senate staffers

On Thursday this week, a DOJ spokesperson confirmed to McClatchy
that the Justice Dept. won’t pursue any further its investigation
into whether Senate Intelligence Committee staffers took
classified documents from a secure facility, nor a related probe
concerning allegations that the CIA spied on those same
congressional workers.

“The department carefully reviewed the matters referred to us
and did not find sufficient evidence to warrant a criminal
investigation,”
spokesman Peter Carr said in a statement
sent to the news agency.

Earlier this year in March, the CIA alleged that Senate staffers
working on a controversial, yet-to-be-published report concerning
the agency’s use of torture tactics after the September 11, 2001
terrorist attacks had improperly removed classified documents
from a protected site and brought them illegally to their Capitol
Hill offices. Sen. Dianne Feinstein (D-California), the chair of
the Senate Intelligence Committee working on that report, in turn
fired back and said that the CIA has been secretly monitoring the
computer use of lawmakers and staff members involved.

During an unannounced speech on the floor of Congress that month,
Feinstein said she had “grave concerns that the CIA’s search
may well have violated the separation of powers principles
embodied in the US Constitution.”

There is_”no legitimate reason to allege to the Justice
Department that Senate staff may have committed a
crime,”Feinstein said, adding that she viewed the CIA’s
request for an investigation as a
“potential effort to
intimidate this staff.”_

GCHQ’s “Chinese menu” of tools spreads disinformation across Internet

GCHQ Wiki Page of Menu of Tricks

What appears to be an internal Wiki page detailing the cyber-weaponry used by the British spy agency GCHQ was published today by Glenn Greenwald of The Intercept. The page, taken from the documents obtained by former NSA contractor Edward Snowden, lists dozens of tools used by GCHQ to target individuals and their computing devices, spread disinformation posing as others, and “shape” opinion and information available online.

The page had been maintained by GCHQ’s Joint Threat Research Intelligence Group (JTRIG) Covert Internet Technical Development team, but it fell out of use by the time Snowden copied it. Greenwald and NBC previously reported on JTRIG’s “dirty tricks” tactics for psychological operations and information warfare, and the new documents provide a hint at how those tactics were executed.

The effects tools fall into a few broad categories, including:

Denial of service and access:

  • JTRIG CITD has developed its own equivalent of CryptoLocker—Swamp Donkey, a tool “that will silently locate all predefined types of file [sic] and encrypt them on a target’s machine.”
  • Sunblock blocks a target from sending or receiving e-mail and viewing websites.
  • Stealth Moose will “disrupt [the] target’s Windows machine.” And for the ultimate in harassment, there’s ANGRY PIRATE, “a tool that will permanently disable a target’s account on their computer.”

**Information harassment tools: **

  • A tool appropriately called Badger allows GCHQ to overwhelm targets with spam e-mails “to support an Information Operations campaign.”
  • Concrete Donkey “is the ability to scatter an audio message to a large number of telephones, or repeatedly bomb a target number with the same message.”
  • Cannonball is a similar “bombing” tool for SMS messages, and Pitbull targets instant messaging accounts.
  • For those who prefer old-school communications, Serpent’s Tongue is a fax-bomb, designed for fax broadcasting to multiple phone numbers.
  • Imperial Barge can connect two target phones together in a call arbitrarily, for those times when GCHQ wants to force people to talk to each other.

Information disruption tools:

  • BUMPERCAR is a system that uses complaints to YouTube and other sites about “offensive content” to “disrupt and deny Internet-based terror videos and other material.”
  • Another tool, Silverlord, is used for “disruption of video-based websites hosting extremist content through concerted target discovery and content removal.”
  • Silverblade is used specifically to report terrorist content on the video site Dailymotion.

Misinformation and spoofing tools.

  • Underpass is used to “change outcome of online polls.”
  • Slipstream and Gateway can be used to manipulate traffic to a website, inflating its page views and raising its search rank to alter perception of its popularity.
  • Gestator can be used for “amplification of a given message, normally video, on popular multimedia websites (Youtube).”
  • Clean Sweep allows GCHQ to “masquerade Facebook Wall Posts for individuals or entire countries.”
  • Burlesque, an SMS robot, can send SMS messages spoofed from a particular user.
  • Scrapheap Challenge does “perfect spoofing of e-mails from Blackberry targets.”
  • Another tool, called Clumsy Beekeeper, may have been used in GCHQ’s targeting of Anonymous. It is an “IRC effects” tool that was still under development the last time the page was updated.
  • Chinese Firecracker is intended to crack passwords to forums and other sites so that analysts can post under someone else’s name.

Emergency surveillance bill to be fast-tracked despite 49 MPs’ opposition | The Guardian

The bill requires internet and phone companies to store the communications data generated by phone calls, email, texts and internet use for 12 months and make it accessible to police and security services.

  • Prime Minister insists police and spy agencies must retain snooping powers
  • Telecoms firms must keep records of calls, texts and emails for 12 months
  • The laws are intended to protect powers for GCHQ, MI5 and MI6
  • Government insists it is not an extension of the Snoopers’ Charter
  • Extraordinary cross-party deal between Cameron, Clegg and Miliband
  • Critics condemn the ‘stitch-up’ which will see laws ‘railroaded through’

Wall Street Joins U.S. Intelligence Cronies To Form Fascist “Cyber War Council”

The man behind the push appears to be ex-NSA chief Keith Alexander, who as I reported on last month, is now: Pimping Advice to Wall Street Banks for $1 Million a Month. As I mentioned in that post, one of Mr. Alexander’s most high profile clients is Wall Street’s largest lobbying group the Securities Industry and Financial Markets Association (SIFMA). Unsurprisingly, SIFMA is behind the latest push to formally merge Wall Street with the government intelligence apparatus. Mr. Alexander isn’t wasting any time.

Rep. Alan Grayson (D-Fla.) Concerned Banks Becoming Part of a War Council

AlanGrayson

Rep. Alan Grayson (D-Fla.), who has publicly questioned how Alexander could serve as a consultant without revealing any classified information, said Tuesday that Congress “needs to keep an eye on” the industry’s proposed working group.

“Because of the murky nature of cybersecurity, I am concerned that a council like this might propose either physical attacks or cyberattacks by the US military on the perceived source of the threats,” Grayson said in a statement. “This could in effect make the banks part of what would begin to look like a war council.”

Bloomberg reports that:

Wall Street’s biggest trade group has proposed a government-industry cyber war council to stave off terrorist attacks that could trigger financial panic by temporarily wiping out account balances, according to an internal document.

The proposal by the Securities Industry and Financial Markets Association, known as Sifma, calls for a committee of executives and deputy-level representatives from at least eight U.S. agencies including the Treasury Department, the National Security Agency and the Department of Homeland Security, all led by a senior White House official.

More centralization. This is the exact opposite of what we want or need. The establishment is very worried about the trend toward decentralization, and making its move on many fronts.

The trade association also reveals in the document that Sifma has retained former NSA director Keith Alexander to “facilitate” the joint effort with the government. Alexander, in turn, has brought in Michael Chertoff, the former U.S. Secretary of Homeland Security, and his firm, Chertoff Group.

Why All the Snowden Docs Should Be Public: An Interview with Cryptome

Before Snowden and Wikileaks grabbed the headlines, there was Cryptome. Launched in 1996, the website, or “digital library,” as its owners John Young and Deborah Natsios describe it, is a tome of classified documents. Including everything from lists of MI6 agents to details on nuclear technology, the archive currently stands at over 71,600 files, spanning nearly two decades of disclosures.

Among those is all the available information on the Snowden files, and the duo behind the venture are adamant that the entirety of the leaked NSA documents should be dumped online, rather than strategically trickled out by journalists. Cryptome has even made vague hints that the Snowden documents may be released in full this month.

Brics countries create $100bn bank to ease western grip on global finances | Global development | theguardian.com


Brics leaders, from left: Russia’s president Vladimir Putin, India’s prime minister Narendra Modi, Brazil’s president Dilma Rousseff, Chinese president Xi Jinping and South Africa’s president Jacob Zuma. Photograph: Mikhail Klimentyev / Ria Novosti / Kremlin Pool/EPA

The Brics group comprises Brazil, Russia, India, China and South Africa. The bank, aimed at funding infrastructure projects in developing nations, will be based in Shanghai, and India will preside over its operations for the first five years, followed by Brazil and then Russia

The bank will begin with a subscribed capital of $50bn divided equally between its five founders, with an initial total of $10bn in cash put in over seven years and $40bn in guarantees. It is scheduled to start lending in 2016 and be open to membership by other countries, but the capital share of the Brics cannot drop below 55%.

— Thanks for Supporting Unfilter —

Become an Unfilter supporter on Patreon

Foo

  • Thanks to our 298 patrons

  • 4 Slots at the SWAG pledge level have opened.

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


Drone Update:

Washington to use drone to monitor wildfires

Washington state says the Federal Aviation Administration has given it authorization to use an unmanned drone to monitor wildfires that pose an urgent threat.

Public Lands Commissioner Peter Goldmark said Tuesday that the additional “real-time information” will make things safer for firefighters.

Weed Wackers:

Cannabis really can trigger paranoia | theguardian.com

We recruited 121 volunteers, all of whom had taken cannabis at least once before, and all of whom reported having experienced paranoid thoughts in the previous month (which is typical of half the population). None had been diagnosed with a mental illness. The volunteers were randomly chosen to receive an intravenous 1.5mg dose of either THC (the equivalent of a strong joint) or a placebo (saline). To track the effects of these substances, we used the most extensive form of assessment yet deployed to test paranoia, including a virtual-reality scenario, a real-life social situation, self-administered questionnaires, and expert interviewer assessments.

The results were clear: THC caused paranoid thoughts. Half of those given THC experienced paranoia, compared with 30% of the placebo group: that is, one in five had an increase in paranoia that was directly attributable to the THC. (Interestingly, the placebo produced extraordinary effects in certain individuals. They were convinced they were stoned, and acted accordingly. Because at the time we didn’t know who had been given the drug, we assumed they were high too.)

Pot unwelcome on federal land in Washington

FedLandWA

Larry Chambers, a US Forest Service spokesperson says the agency is legally required to enforce federal laws on public lands they manage, even though Washington voters legalized recreational marijuana in November 2012.

This map of Washington shows what’s federal or tribal land. The highlighted green areas represent National Parks and National Forests, where the Forest Service stresses pot is illegal. You can’t possess it or smoke it or else face a fine.

Seattle City Attorney Apologizes for Taking Pot to Work – NBC News.com

Holmes, who helped sponsor Initiative 502, which made Washington the second state to legalize sales of small amounts of recreational marijuana, showed up at Seattle’s only legal pot store Tuesday to be one of the first Seattleites to make a purchase. But while the marijuana law has changed, “the workplace rule has not changed,” Holmes said in a statement Friday. After discussions with the city’s personnel department, he said, “I have volunteered to donate $3,000 to the Downtown Emergency Service Center. I apologize to my employees, all city employees and to the public.”


Feedback:


Secure Ways to Contact the Show:


Follow the Us:

Call us: 1.425.312.1756


If you’re a Supporter check Patreon for this epsiodes supporter exclusives!

The post GCHQ, Spying on YOU! | Unfilter 106 first appeared on Jupiter Broadcasting.

]]>
DMCA Whack-a-Mole | Tech Talk Today 26 https://original.jupiterbroadcasting.net/62287/dmca-whack-a-mole-tech-talk-today-26/ Tue, 15 Jul 2014 10:16:04 +0000 https://original.jupiterbroadcasting.net/?p=62287 Github is served with another DMCA takedown, this time for Popcorn Time. Is this the start of a bad trend, and does the open source community need to develop a Github replacement? We’ll debate. Plus the latest Snowden leaks reveal the GCHQ’s troll like skills, Microsoft launches an assault on Chromebooks, the US says it […]

The post DMCA Whack-a-Mole | Tech Talk Today 26 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Github is served with another DMCA takedown, this time for Popcorn Time. Is this the start of a bad trend, and does the open source community need to develop a Github replacement? We’ll debate.

Plus the latest Snowden leaks reveal the GCHQ’s troll like skills, Microsoft launches an assault on Chromebooks, the US says it can have your cloud data & more!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

Latest Snowden Revelations Suggest GCHQ Is Just Like 4Chan Trolls, But With More Firepower

As Greenwald details (and the embedded document below reveals), among GCHQ’s capabilities in its Joint Threat Research Intelligence Group (JTRIG) are a bunch of things that sound quite a bit like traditional internet trolling efforts. These include juicing internet polls to vote for GCHQ’s favorite candidate as well as flooding email inboxes or websites and even connecting two people on the phone and listening to the conversation.

Here are the programs Greenwald highlights:

  • “Change outcome of online polls” (UNDERPASS)
  • “Mass delivery of email messaging to support an Information Operations campaign” (BADGER) and “mass delivery of SMS messages to support an Information Operations campaign” (WARPARTH)
  • “Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.” (SILVERLORD)
  • “Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.” (MINIATURE HERO)
  • “Find private photographs of targets on Facebook” (SPRING BISHOP)
  • “A tool that will permanently disable a target’s account on their computer” (ANGRY PIRATE)
  • “Ability to artificially increase traffic to a website” (GATEWAY) and “ability to inflate page views on websites” (SLIPSTREAM)
  • “Amplification of a given message, normally video, on popular multimedia websites (Youtube)” (GESTATOR)
  • “Targeted Denial Of Service against Web Servers” (PREDATORS FACE) and “Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG” (ROLLING THUNDER)
  • “A suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk)” (ELATE)
  • “Ability to spoof any email address and send email under that identity” (CHANGELING)
  • “For connecting two target phone together in a call” (IMPERIAL BARGE)

Of course, this is not the first time that JTRIG has been called out by Glenn Greenwald for its sneaky online practices. Last time, Greenwald highlighted its practice of putting a bunch of false info online about someone to destroy their reputation.

US government says online storage isn’t protected by the Fourth Amendment

A couple months ago, a New York judge ruled that US search warrants applied to digital information even if they were stored overseas. The decision came about as part of an effort to dig up a Microsoft user’s account information stored on a server in Dublin, Ireland. Microsoft responded to the ruling and challenged it, stating that the government’s longstanding views of digital content on foreign servers are wrong, and that the protections applied to physical materials should be extended to digital content. In briefs filed last week, however, the US government countered. It states that according to the Stored Communications Act (SCA), content stored online simply do not have the same Fourth Amendment protections as physical data.

From the Justice Department’s point of view, this law is necessary in an age where “fraudsters” and “hackers” use electronic communications in not just the U.S. but abroad as well. Indeed, the Microsoft account in this case is in relation to a drug-trafficking investigation. However, Microsoft believes there are wide-ranging implications for such a statement, and it’s not the only company that thinks so. Verizon also responded, stating that this would create “dramatic conflict with foreign data protection laws” and Apple and Cisco joined in by saying this could potentially damage international relations. In the meantime, a senior counsel for the Irish Supreme Court offered that a “Mutual Legal Assistance Treaty” be pursued so that the US government can get at the email account in question.

Microsoft launches a price assault on Chromebooks | The Verge

At the company’s partner conference today, Microsoft COO Kevin Turner revealed that HP is planning to release a $199 laptop running Windows for the holidays. Turner didn’t provide specifications for HP’s “Stream” device, but he did detail $249 laptop options from Acer and Toshiba. Acer’s low-cost laptop will ship with a 15.6-inch screen and a 2.16GHz Intel Celeron processor, and Toshiba’s includes a 11.6-inch display

Turner also revealed that HP is planning to release 7- and 8-inch versions of its new “Stream” PCs for $99 this holiday season, both running versions of Windows. “We are going to participate at the low-end,” says Turner.

Microsoft to Announce Job Cuts as Soon as This Week – Bloomberg

The reductions — which may be unveiled as soon as this week — will probably be in areas such as Nokia and divisions of Microsoft that overlap with that business, as well as marketing and engineering, said the people, who asked not to be identified because the plans aren’t public. The restructuring may end up being the biggest in Microsoft history, topping the 5,800 jobs cut in 2009, two of the people said. Some details are still being worked out, two of the people said.

Home Depot begins selling MakerBot 3D printers

Home Depot became the latest retailer to offer 3D printers today when it began selling MakerBots online and in 12 stores nationwide. The store is selling three printer models, plus MakerBot’s 3D scanner and filament. The 12 stores are located in California, Illinois and New York. “Imagine a world where you can 3D print replacement parts and use 3D printing as an integral part of design and building work,” MakerBot CEO Bre Pettis said in a release.

Announcing CrossOver 13.2.0

CrossOver 13.2.0 provides much greater ease of installation for Linux
users. With CrossOver 13.2.0, more Windows applications
will run out-of-the box on a fresh installation of CrossOver.

In the Linux version of CrossOver 13.2.0 we have changed our philosophy
about what to install automatically alongside CrossOver. In the past,
CrossOver sought to have the smallest possible footprint by depending
only on packages which were absolutely necessary for CrossOver to run.
Many times, this meant that our Linux users were forced to install
additional packages to get Windows applications running. With
CrossOver 13.2.0, we have made the CrossOver Linux packages depend on
many of the most common packages which Windows applications need.
Linux users can install CrossOver 13.2.0 and Windows applications more
easily than ever before.

For both Mac and Linux, CrossOver 13.2.0 includes stability
improvements for games running with Performance Enhanced Graphics.
Problems installing Adobe Acrobat have been resolved, as has a bug
registering CrossOver for users with non-Latin characters in their
usernames.

Yet another DMCA takedown on Github: MPAA PULLS “POPCORN TIME” REPOSITORIES OFF GITHUB : linux

Aside from the fact that this is a controversial piece of software (let’s not get into it), it looks like that Github is no longer a safe place to work with.

First Qualcomm[1] , now MPAA[2] , I wonder how many projects were taken down which are not big enough thing for media to cover.

The post DMCA Whack-a-Mole | Tech Talk Today 26 first appeared on Jupiter Broadcasting.

]]>
The Ukraine Invasion | Unfilter 88 https://original.jupiterbroadcasting.net/52832/the-ukraine-invasion-unfilter-88/ Wed, 05 Mar 2014 21:14:13 +0000 https://original.jupiterbroadcasting.net/?p=52832 All sides are engaged in media fueled war of propaganda to hide the real reasons for the conflict, we’ll follow the money, and break it down.

The post The Ukraine Invasion | Unfilter 88 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Russia and United States are meeting face to face for the first time, since the situation in the Ukraine that they’ve helped create, exploded. The confirmation bias is strong, and all sides are engaged in media fueled war of propaganda to hide the real reasons for the conflict, we’ll follow the money, and break it down.

Actions speak louder than words, and we’ll examine the fast paced maneuvering of the US, Russia, and the EU, and why all of this could be heading towards a new kind of status quo, we’ll explain.

Plus our followup, your feedback, and much much more.

On this week’s episode of, Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is Crazy

GCHQ files dating between 2008 and 2010 reveal that a surveillance program codenamed Optic Nerve collected images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not.

In one six-month period in 2008 alone, the agency collected webcam images, including substantial quantities of sexually explicit material, from more than 1.8 million Yahoo user accounts globally.

Optic Nerve was based on collecting information from GCHQ’s huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA’s XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo’s webcam traffic.

Bulk surveillance on Yahoo users was begun, the documents said, because “Yahoo webcam is known to be used by GCHQ targets”.

NSA ragout 3
NSA ragout 3

The documents also show that GCHQ trialled automatic searches based on facial recognition technology, for people resembling existing GCHQ targets

The document estimates that between 3% and 11% of the Yahoo webcam imagery harvested by GCHQ contains “undesirable nudity”. Discussing efforts to make the interface “safer to use”, it noted that current “naïve” pornography detectors assessed the amount of flesh in any given shot, and so attracted lots of false positives by incorrectly tagging shots of people’s faces as pornography. NSA ragout 1

McClatchy News is reporting that the CIA may have monitored computers that the agency provided to the Senate Intelligence Committee. The computers were used by Senate aides to prepare the Committee’s (still unreleased) report on the CIA’s secret detention and interrogation programs.

The agency’s inspector general began the inquiry partly as a response to complaints from members of Congress that C.I.A. employees were improperly monitoring the work of staff members of the Senate Intelligence Committee, according to government officials with knowledge of the investigation.

The committee has spent several years working on a voluminous report about the detention and interrogation program, and according to one official interviewed in recent days, C.I.A. officers went as far as gaining access to computer networks used by the committee to carry out its investigation.

A leading US senator has said that President Obama knew of an “unprecedented action” taken by the CIA against the Senate intelligence committee, which has apparently prompted an inspector general’s inquiry at Langley.

The subtle reference in a Tuesday letter from Senator Mark Udall to Obama, seeking to enlist the president’s help in declassifying a 6,300-page inquiry by the committee into torture carried out by CIA interrogators after 9/11, threatens to plunge the White House into a battle between the agency and its Senate overseers.


:– Amazon Review Police
:– Sean B
:– Jonathan C
:– Robert C
:– Edward
:– David T
:– John W

– Thanks for Supporting Unfilter –

  • Thanks to our 356 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


Ukraine mayhem

Confirmation bias (also called confirmatory bias or myside bias) is the tendency of people to favor information that confirms their beliefs or hypotheses.

People display this bias when they gather or remember information selectively, or when they interpret it in a biased way. The effect is stronger for emotionally charged issues and for deeply entrenched beliefs.

Russia’s Sergei Lavrov refused to meet his Ukrainian counterpart, whose government Moscow does not recognise.

The visit — and a promise of a $1 billion loan — was intended to build a relationship with Ukraine’s new leaders while demonstrating to an increasingly aggressive Russia that the United States is firmly behind Ukraine’s citizens, including the ragtag volunteer defense forces who continue to stand guard around the parliament building in Kiev.

The European Union offered a larger than expected package of aid to Ukraine on Wednesday, saying it was willing to provide $15 billion in loans and grants over the next several years to help get the shattered economy back on its feet.

Ukraine’s acting finance minister Oleksander Shlapak reported that the country needs to repay $10 billion by year end and that the country may ask for a debt restructuring. Naturally, absent outside help, no repayment is possible and the country will certainly default, which means someone has to step up and bail out the Ukraine. The only question is where this aid comes from: EU/IMF or Russia.

The United States is sending six more F–15 fighter jets and one KC–135 refueling aircraft to Poland, according to a defense official Wednesday.

“The only thing we had to do, and we did it, was to enhance the defense of our military facilities because they were constantly receiving threats and we were aware of the armed nationalists moving in,” Mr. Putin said, referring to Russia’s longstanding bases affiliated with the Black Sea Fleet, which has its headquarters in the port of Sevastopol in the Crimea region of Ukraine.

CIA director John Brennan told a senior lawmaker Monday that a 1997 treaty between Russia and Ukraine allows up to 25,000 Russia troops in the vital Crimea region, so Russia may not consider its recent troop movements to be an invasion, U.S. officials said.

Wars in Iraq, Afghanistan, Libya were distortions of intl law and UNSC resolution, says Vladimir Putin during is conversation with journalists

There’s a new strong man in Russia but his rise to power is based on a dark secret hidden decades in the past. The solution to that mystery lies with a most unexpected source, President Jack Ryan.

Really written by Mark Greaney, part of the Clancy franchise.

Feedback:

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post The Ukraine Invasion | Unfilter 88 first appeared on Jupiter Broadcasting.

]]>
Go Directly to Fail | TechSNAP 151 https://original.jupiterbroadcasting.net/52407/go-directly-to-fail-techsnap-151/ Thu, 27 Feb 2014 17:23:58 +0000 https://original.jupiterbroadcasting.net/?p=52407 We’ll break down Apple’s major SSL flaw, and what it says about Apple’s general security posture, then the Zeus trojan evolves…

The post Go Directly to Fail | TechSNAP 151 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We’ll break down Apple’s major SSL flaw, and what it says about Apple’s general security posture, then the Zeus trojan evolves…

Plus an awesome batch of your questions, our answers.

On this week’s episode of, TechSNAP.

Thanks to:


\"GoDaddy\"


\"Ting\"


\"iXsystems\"

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

— Show Notes: —

Apple fixes certificate validation flaw in iOS and OS X

  • The flaw in the certificate verification step allowed an attacker to sign a certificate with any private key, or no key at all, and the certificate would still be accepted by the device
  • This means an attacker could trivially perform a man-in-the-middle (MitM) attack, and intercept all traffic between you and a secure destination
  • This would allow an attack to get your email passwords, logins for services like facebook and twitter, and compromise your online banking account
  • A MitM attack is what TLS/SSL are designed to prevent
  • A MitM is trivial to perform if you can trick a user into connecting to a WiFi access point you control, say at a coffee shop or other public space
  • The flaw is also present in Mac OS X and fixed in 10.9.2 (Released Feb 25th, 4 days after the iOS update)
  • The issue is caused by a duplicate ‘goto’ statement. The first is inside the if structure (with implied curly braces), but the 2nd is unconditional, causing the goto fail to happen in every case
  • It is unclear how long Apple has known about the flaw, but the CVE for the bug was reserved on January 8th
  • diff between Mac OS X 10.8.5 and 10.9 showing the addition of the errant goto
  • OS X 10.9.2 also fixes an issue with cURL, where the TLS/SSL verification code did not check the hostname again the certificate if the URL was an IP address
  • Hacker News thread
  • More analysis
  • Why were there gotos in apple software in the first place?
  • Apple Announcement

University of Maryland ID card system breached

  • 309,079 of the students, faculty, and staff of the University of Maryland College Park and Shady Grove campuses have had their personal information exposed in an attack against the ID card system
  • The breach occurred about 04:00 February 18th
  • An attacker was able to get access to the ID card database that holds information on all card holders dating back to 1998
  • The data includes full name, SSN, birth date and University ID number
  • Brian Voss, CIO of U Md., said “what most concerns him is the sophistication of the attack: The hacker or hackers must have had a “very significant understanding” of how the school’s data are designed and protected”
  • Voss claims that this was not a case of a ‘door left open’, that the attackers had to ‘pick through multiple locks’
  • It will be interesting to see if details of the attack are published
  • Related: The total cost of unmasked data

New Zeus trojan variant targets SalesForce.com

  • “The Adallom Labs team recently discovered an unusual variant of the Zeus trojan that targets Salesforce users. We’ve been internally referring to this type of attack as “landmining”, since the attackers laid “landmines” on unmanaged devices used by employees to access company resources. The attackers, now bypassing traditional security measures, wait for the user to connect to *.my.salesforce.com in order to exfiltrate company data from the user’s Salesforce instance.”
  • We have covered the Zeus trojan before, it is a sophisticated malware used to steal online banking credentials and perform transactions, even in the face of two-factor authentication schemes by performing ‘man-in-the-browser’ attacks
  • This attack does not exploit a vulnerability of SalesForce, it is just taking over the user’s device used to access the site, in order to steal data from the site once logged in
  • This attack seems to be a totally new kind of attack, not described by any existing Common Attack Pattern Enumeration and Classification (CAPEC) pattern.
  • When the Adallom security system detected an employee accessing a large number of records in a short period of time, it triggered an ‘insider thread’ alert. This alert is fairly common and is usually related to a sales agent downloading their entire rolodex, sometimes in preparation for leaving the company
  • When corporate security integrated the employee in question, they claimed no knowledge of the bulk download
  • The employees laptop was scanned and found to be clean
  • Further investigation lead to the employees home PC, which was running outdated windows XP, an unpatched version of Internet Explorer, and an expired virus scanner
  • The machine was infected with various bits of malware, but specifically, a modified version of the Zeus Trojan (win32/ZBot)
  • The interesting part is that the Trojan targets *.my.salesforce.com instead of banking sites
  • The attack also leveraged devices not controlled by corporate security
  • This highlights the risks involved with BYOD and allowing employees to use their home computers to access corporate applications, especially SaaS applications

Feedback:


Round Up:


The post Go Directly to Fail | TechSNAP 151 first appeared on Jupiter Broadcasting.

]]>
Olympic Fear Games | Unfilter 84 https://original.jupiterbroadcasting.net/51037/olympic-fear-games-unfilter-84/ Wed, 05 Feb 2014 21:47:22 +0000 https://original.jupiterbroadcasting.net/?p=51037 The Winter Propaganda Games are in full force, ramping up before the actual games begin and the media would have you believe the Olympics are taking place in the middle of a war zone.

The post Olympic Fear Games | Unfilter 84 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The Winter Propaganda Games are in full force, ramping up before the actual games begin and the media working in hand with egomaniac politicians would have you believe the Olympics are taking place in the middle of a war zone.

Then the GCHQ, the NSA, and the Canadian spy agencies spend some more time in the light, as new revelations have come out. We’ll bring you up to date.

Plus an update from across the pond, our follow up, and much much more.

On this week’s episode of, Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is Crazy

Rogers, who today runs the Navy’s Fleet Cyber Command, oversees a total force of approximately 15,000 sailors and civilians – plus contractors- of which about 5,000 are specifically charged with giving the Navy the same kind of reach and flexibility in cyberspace that it has at sea.

“The network must be treated as a weapons system as we continue the fight to maintain our advantage in cyberspace, and thus across the other four war fighting domains: sea, air, land and space,” he said in a Q&A on the Feb. 2013 issue of Military Information Technology magazine, which dubbed him the “Cyberspace Warrior.”

“He was the best there was, and he was going to lead us into the cyberfuture,” said retired Adm. Gary Roughead, who in 2011 picked Rogers to head Fleet Cyber Command, the Navy’s cyber organization, which was seen as a steppingstone.

A top secret document retrieved by U.S. whistleblower Edward Snowden and obtained by CBC News shows that Canada’s electronic spy agency used information from the free internet service at a major Canadian airport to track the wireless devices of thousands of ordinary airline passengers for days after they left the terminal.

After reviewing the document, one of Canada’s foremost authorities on cyber-security says the clandestine operation by the Communications Security Establishment Canada (CSEC) was almost certainly illegal.


Joint Committee on National Security Strategy has a chat with PM David Cameron

“I think the public reaction as I judge it has not been one of
‘shock horror!’ but one of ‘intelligence agencies carry out
intelligence work: good’,” Cameron said. Apparently Mr Cameron
hasn’t seen this
YouGov poll
from June 2013, which showed that 56 percent of
people think that Edward Snowden did the right thing (compared to
27 percent of people who think he did the wrong thing) and 52
percent think he shouldn’t be prosecuted.

Mr Cameron highlighted how crimes in television dramas are solved by tracking
the use of mobile phones. He warned that investigators will lose this
ability as criminals and terrorists resort to using the internet instead.

Earlier this week Mr Cameron told BBC Radio 2 that he likes to relax by
watching Elementary, a modern-day version of Sherlock Homes set in the US,
and Homeland, a thriller about a CIA agent on the trail of a soldier she
believes is an Al-Qaida operative.

– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Dalton R

  • Harry

  • Patrik N

  • Nick A

  • Thanks to our 345 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


Winter Propaganda Games

The U.S. State Department has told Americans coming to Sochi that they should have “no expectation of privacy,” even in their hotel rooms.

A July 2013 article in the Washington Times reveals that there was a significant cybersecurity threat during the 2012 London Olympic Games. “There was a credible [threat of] attack on the electricity infrastructure supporting the Games,” said Oliver Hoare, head of Olympic cybersecurity.

“There are a number of specific threats of varying degrees of credibility that we’re tracking,” he said. “And we’re working very closely with the Russians and with other partners to monitor any threats we see and to disrupt those.”

“The primary threat, from a terrorism perspective, comes from Imarat Kavkaz, probably the most prominent terrorist group in Russia. It’s made its intent clear to seek to carry out attacks in the run-up to the Games,” said Olsen. “We think the greater danger from a terrorist perspective is in potential for attacks to occur outside of the actual venues for the Games themselves in the area surrounding Sochi or outside of Sochi in the region.”


Top Story in the unfilter Subreddit


Feedback:

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Olympic Fear Games | Unfilter 84 first appeared on Jupiter Broadcasting.

]]>
Unfiltering the State of the Union | Unfilter 83 https://original.jupiterbroadcasting.net/50557/unfiltering-the-state-of-the-union-unfilter-83/ Tue, 28 Jan 2014 23:01:41 +0000 https://original.jupiterbroadcasting.net/?p=50557 Unfilter is bringing you play-by-play coverage of Obama’s 2014 Station of the Union. Plus we’ll fact checking the talking points, and take your live calls.

The post Unfiltering the State of the Union | Unfilter 83 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Grab the popcorn it’s special occasion and were throwing out the playbook and doing it live. Unfilter is bringing you play-by-play coverage of Obama’s 2014 Station of the Union.

Plus we’ll fact checking the talking points, take your live calls, our follow up, and much much more.

On this week’s episode of, Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —



State of the Union


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Matt R

  • Jason T

  • James E

  • Chresten C

  • Mike G

  • Kenneth L

  • Mike

  • Jason G

  • Jordan E

  • Thanks to our 341 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


NSA is Crazy:

Exploiting phone information and location is a high-priority effort for the intelligence agencies, as terrorists and other intelligence targets make substantial use of phones in planning and carrying out their activities, for example by using phones as triggering devices in conflict zones. The NSA has cumulatively spent more than $1bn in its phone targeting efforts.

The disclosures also reveal how much the shift towards smartphone browsing could benefit spy agencies’ collection efforts.
golden nugget
A May 2010 NSA slide on the agency’s ‘perfect scenario’ for obtaining data from mobile apps. Photograph: Guardian

One slide from a May 2010 NSA presentation on getting data from smartphones – breathlessly titled “Golden Nugget!” – sets out the agency’s “perfect scenario”: “Target uploading photo to a social media site taken with a mobile device. What can we get?”

The question is answered in the notes to the slide: from that event alone, the agency said it could obtain a “possible image”, email selector, phone, buddy lists, and “a host of other social working data as well as location”.

Whistleblower Edward Snowden leaked the documents about US mass surveillance. He spoke about his disclosures and his life to NDR journalist Seipel in Moscow.

“If there’s information at Siemens that’s beneficial to US national interests – even if it doesn’t have anything to do with national security – then they’ll take that information nevertheless,” Snowden said in the interview conducted in Russia, where Snowden has claimed asylum.

Snowden also told the German public broadcasting network he no longer had possession of any documents or information on NSA activities and had turned everything over to select journalists. He said he did not have any control over the publication of the information.


Top Story in the unfilter Subreddit


If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Unfiltering the State of the Union | Unfilter 83 first appeared on Jupiter Broadcasting.

]]>
Obama’s NSA Reform Ruse | Unfilter 82 https://original.jupiterbroadcasting.net/50167/obamas-nsa-reform-ruse-unfilter-82/ Wed, 22 Jan 2014 21:45:37 +0000 https://original.jupiterbroadcasting.net/?p=50167 President Obama has outlined his so called reforms of America's controversial surveillance tactics. But as expected the reforms are light on real change.

The post Obama’s NSA Reform Ruse | Unfilter 82 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

President Obama has outlined his so called reforms of America’s controversial surveillance tactics. But as expected the reforms are light on real change, and leave many of the worst policies in place and unabated. We’ll dig into the most egregious.

Plus: It’s new round of character assassination for Edward Snowden, and this time the claims are even more ridiculous. Is Snowden a double agent for the FSB? We’ll debunk.

Then it’s your feedback, our followup, and much much more.

On this week’s Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is CRAZY

Michael Morell, who retired as deputy director of the CIA last summer, has joined CBS News as an intelligence, national security and counterterrorism contributor, the network announced this week.

The Washington Post has already identified the five big takeaways from Obama’s speech:

  1. US intelligence agencies will no longer hold Americans’ phone call records.

  2. There will, nevertheless, be some system for those records to be accessible when required.

  3. The US will no longer monitor the communications of the heads of state or government of “close friends and allies”.

  4. A new panel will be created to provide additional input into the secret court that oversees the Foreign Intelligence Surveillance Act (FISA), including privacy specialists and other non-government folks.

  5. There will be new rules to extend some of the privacy provisions applying to US citizens to foreigners, unless there’s a “compelling national security purpose”.

  6. ’The USA knows that for us spying is a crime’

“The German justice system will not stand idly by if the efforts of the NSA blithely continue here,” he told Bild newspaper on Monday.

Hours after President Barack Obama finished his speech last Friday on proposed intelligence and surveillance reforms, the Office of the Director of National Intelligence (ODNI) declassified a number of documents from the nation’s most secretive court.

The new documents are heavily redacted orders from FISC to the FBI. These items request that the court order an entity (likely a business) to provide “tangible things” under Section 215 of the PATRIOT Act. The documents do not refer to who the target is, nor which company or organization they apply to.

“The Court understands that NSA expects that it will continue to provide on average approximately three telephone identifiers per day to the FBI,” reads a footnote in a 2007 court order (PDF) authored by FISC Judge Frederick Scullin, Jr.

We’ve put together a scorecard showing how Obama’s announcements stack up against 12 common sense fixes that should be a minimum for reforming NSA surveillance. Each necessary reform was worth 1 point, and we were willing to award partial credit for steps in the right direction. On that scale, President Obama racked up 3.5 points out of a possible 12.


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Kai

  • AmazonReviewPolice

  • Jonathan M.

  • Niklas V.

  • Michael O. ← 333rd Subscriber!

  • Thanks to our 333 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


Snow Job:

Mr. Rogers said on the NBC News program “Meet the Press” on Sunday that Mr. Snowden should be seen not as a whistle-blower but as “a thief, who we believe had some help.”

Officials at both the N.S.A. and the F.B.I. have said their investigations have turned up no evidence that Mr. Snowden was aided by others.

Speaking from Moscow, where he is a fugitive from American justice, Snowden told The New Yorker, “This ‘Russian spy’ push is absurd.”

“It’s not the smears that mystify me,” Snowden told me. “It’s that outlets report statements that the speakers themselves admit are sheer speculation.” Snowden went on to poke fun at the range of allegations that have been made against him in the media without intelligence officials providing some kind of factual basis: “ ‘We don’t know if he had help from aliens.’ ‘You know, I have serious questions about whether he really exists.’ ”

Snowden went on, “It’s just amazing that these massive media institutions don’t have any sort of editorial position on this. I mean these are pretty serious allegations, you know?” He continued, “The media has a major role to play in American society, and they’re really abdicating their responsibility to hold power to account.”

Ellsberg is commonly looked at as the quintessential whistleblower today, but shortly after he leaked the top secret Vietnam War study, the Nixon administration made a concerted effort to paint him as a Soviet spy in the press, using anonymous quotes and non-existent ‘secret’ evidence.

  • Live Q&A with Edward Snowden: Thursday 23rd January, 8pm GMT, 3pm EST | Free Snowden](https://freesnowden.is/_2476.html)

Top Story in the unfilter Subreddit

The National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including location, contact networks and credit card details, according to top-secret documents.

The untargeted collection and storage of SMS messages – including their contacts – is revealed in a joint investigation between the Guardian and the UK’s Channel 4 News based on material provided by NSA whistleblower Edward Snowden.

The documents also reveal the UK spy agency GCHQ has made use of the NSA database to search the metadata of “untargeted and unwarranted” communications belonging to people in the UK.

The NSA program, codenamed Dishfire, collects “pretty much everything it can”, according to GCHQ documents, rather than merely storing the communications of existing surveillance targets.

The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more – including of individuals under no suspicion of illegal activity.


If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Obama’s NSA Reform Ruse | Unfilter 82 first appeared on Jupiter Broadcasting.

]]>
Down with TPP | Unfilter 75 https://original.jupiterbroadcasting.net/46317/down-with-tpp-unfilter-75/ Wed, 13 Nov 2013 22:04:22 +0000 https://original.jupiterbroadcasting.net/?p=46317 A Pivotal section of the Trans-Pacific Partnership has been revealed by Wikileaks. Some say the TPP would threaten access to the Internet, and cultural works.

The post Down with TPP | Unfilter 75 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A Pivotal section of the Trans-Pacific Partnership has been revealed by Wikileaks, today. Shrouded in secrecy from the beginning some say the TPP would threaten access to information, the Internet, and cultural works. One thing is for sure, the world needs to challenge this controversial agreement, that’s on the fast track for the end of the year.

New leaks reveal the NSA and GCHQ Infiltrated OPEC’s Computer Network to perform economic espionage, and you won’t believe how they got in.

Plus your feedback, or follow up, and much much more. On this week’s episode of… Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is CRAZY

In January 2008, the NSA department in charge of energy issues reported it had accomplished its mission. Intelligence information about individual petroleum-exporting countries had existed before then, but now the NSA had managed, for the first time, to infiltrate OPEC in its entirety.

A secret GCHQ document dating from 2010 states that the agency had traditionally had “poor access” to OPEC. But that year, after a long period of meticulous work, it had managed to infiltrate the computers of nine OPEC employees by using the “Quantum Insert” method, which then creates a gateway to gain access into OPEC’s computer system. GCHQ analysts were even able to acquire administrator privileges for the OPEC network and gain access to two secret servers containing “many documents of interest.”

The cooperation is conducted under a voluntary contract, not under subpoenas or court orders compelling the company to participate, according to the officials. The C.I.A. supplies phone numbers of overseas terrorism suspects, and AT&T searches its database and provides records of calls that may help identify foreign associates, the officials said.


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Casey K

  • Chris B

  • B J

  • Maxime R

  • Spencer S

  • Daniel A

  • Rellon L

  • Thanks to our 253 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • NEW Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • NEW Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


TPP Property Rights Chapter Leaked

Today, 13 November 2013, WikiLeaks released the secret negotiated draft text for the entire TPP (Trans-Pacific Partnership) Intellectual Property Rights Chapter. The TPP is the largest-ever economic treaty, encompassing nations representing more than 40 per cent of the world’s GDP. The WikiLeaks release of the text comes ahead of the decisive TPP Chief Negotiators summit in Salt Lake City, Utah, on 19–24 November 2013.

The TPP is being referred to as “NAFTA on steroids,” and concerned citizens all over the nation are organizing to stop this from being fast-tracked. Organizations such as Backbone Campaign, Public Citizen’s Global Trade Watch, Fair Trade Coalition in Oregon and Washington, Popular Resistance and many others have joined together to form FlushTheTPP.org, an action campaign aimed at stopping the Trans-Pacific Partnership. These organizations are also launching a coordinated day of action Tuesday, November 12 with light projections planned in Dallas, Spokane, Detroit, Olympia, Baltimore, DC, Seattle and other cities.

  • The draft contains US and Japanese proposals designed to enhance the ability of pharmaceutical manufacturers to extend and widen their patents on drugs and medicines.

  • US and AU seek to criminalise modifications of technology devices to circumvent region restrictions.

  • US and Australia oppose a clause stating that ISPs “cannot be held legally responsible for copyright infringement on their networks”

  • US pushes a clause to patent surgical methods.

Source | Source | Source

Public Citizen has some analysis here on the chapter, noting lengthening and extension of copyright and access to medicine.

In the US, this is likely to further entrench controversial aspects of US copyright law (such as the Digital Millennium Copyright Act [DMCA]) and restrict the ability of Congress to engage in domestic law reform to meet the evolving IP needs of American citizens and the innovative technology sector. The recently leaked US-proposed IP chapter also includes provisions that appear to go beyond current US law.

The TPP would force the adoption of the US DMCA Internet intermediaries copyright safe harbor regime in its entirety. For example, this would require Chile to rewrite its forward-looking 2010 copyright law that currently establishes a judicial notice-and-takedown regime, which provides greater protection to Internet users’ expression and privacy than the DMCA.

– Tracking the Spokesholes –

Blunt last year became chief spokesman
and a lobbyist in Washington for Detroit’s Big Three automakers
just as the American automotive industry was enjoying a
resurgence.

David Lee Carden is an American lawyer and diplomat who is the United States Representative to the Association of Southeast Asian Nations (“ASEAN”) with the rank of Ambassador Extraordinary and Plenipotentiary. He was nominated by President Barack Obama in November 2010 and confirmed by the U.S. Senate in March, 2011.


MexiCoke Watch 2013!

America’s small but vocal Cult of Mexicoke freaked out. It was enough to prompt a reversal of sorts from Arca, which subsequently vowed to continue using only cane sugar in the Coke it exports to the U.S. Call it a New Coke moment in reverse for the maker of Mexican Coke. The uproar also revealed that much of the Coke sold south of the border already contains high-fructose corn syrup. Arca’s corn-to-sugar mix for the soda it sells at home is around 50/50.

Feedback:

  • Voice Mail.

  • Bitmessage Address: BM-GuQ4gqmBeW8CYpSo3Htg2pBrBdHbvpe7

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Down with TPP | Unfilter 75 first appeared on Jupiter Broadcasting.

]]>
From Russia with Love | Unfilter 56 https://original.jupiterbroadcasting.net/39512/from-russia-with-love-unfilter-56/ Wed, 26 Jun 2013 22:03:41 +0000 https://original.jupiterbroadcasting.net/?p=39512 After escaping from Hong Kong the media went into overdrive. We’ll reflect on the continued character assassination and the new revelations from his leaks.

The post From Russia with Love | Unfilter 56 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Edward Snowden dominates the mainstream headlines, as he makes his escape from Hong Kong. We’ll reflect on their continued character assassination and arm you with the critical thinking you’ll need to form your own opinions on his motivations.

Warrantless dragnet surveillance of the Internet expands beyond the borders of the US. This week it was revealed Britain’s spy agency the GCHQ has secretly gained access to the network cables that carry the world’s phone calls and internet traffic, which it has admitted to sharing with the NSA. Effectively creating a world-wide police state.

Plus the troubling death of Michael Hastings, your feedback, and much much more.

On this week’s Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


Michael Hastings Death Twists

Hastings was researching a story about a privacy lawsuit brought by Florida socialite Jill Kelley against the Department of Defense and the FBI.

He was scheduled to meet with a Kelley representative next week in L.A. to discuss the case, according to a person close to Kelley. Hastings wrote for Rolling Stone and the website BuzzFeed.

He was best known for a 2010 Rolling Stone profile that led to the resignation of Gen. Stanley McChrystal.

On Wednesday night, the anti-secrecy website WikiLeaks published a message on Twitter that Hastings had contacted a lawyer for the organization hours before his car smashed into a tree on North Highland Avenue in Los Angeles.

The message read: “Michael Hastings contacted WikiLeaks lawyer Jennifer Robinson just a few hours before he died, saying that the FBI was investigating him.”

The Federal Bureau of Investigation said Hastings was never under investigation by the agency.

The bureau responded in a statement: “At no time was journalist Michael Hastings ever under investigation by the FBI.”

“Hey [redacted copy], the Feds are interviewing my ‘close friends and associates.’ Perhaps if authorities arrive ‘BuzzFeed GQ’, er HQ, may be wise to immediately request legal counsel before any conversations or interviews about our news-gathering practices or related journalism issues,” Hastings wrote in the email.

“Also: I’m onto a big story, and need to go off the radar for a bit,” he added. “All the best, and hope to see you all soon.” He signed the letter, “Michael.”

Roughly 15 hours later, 33-year-old Hastings was dead.

I’m here to state that I’ve seen dozens of cars hit walls and stuff at high speeds and the number of them that I have observed to eject their powertrains and immediately catch massive fire is, um, ah, zero. Modern cars are very good at not catching fire in accidents. The Mercedes-Benz C-Class, which is an evolutionary design from a company known for sweating the safety details over and above the Euro NCAP requirements, should be leading the pack in the not-catching-on-fire category.


The Media Misdirection in Full Force

Instead of devoting coverage to surveillance information revealed by Edward Snowden, the mainstream US media has slandered him.


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Blake J
  • Buc Z
  • Brendan B
  • Sean
  • Thomas E
  • Sheldon G
  • Khashayar K
  • Alex K
  • Jon L
  • George H
  • Paul S
  • Harm
  • Thanks to our 110 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience.


GCHQ taps Fibre-optic Cables for Secret Access to World’s Communications

Britain’s spy agency GCHQ has secretly gained access to the network of cables which carry the world’s phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).

The sheer scale of the agency’s ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.

The British spy agency GCHQ has access to the global network of communications, storing calls, Facebook posts and internet histories – and shares this data with the NSA, Edward Snowden has revealed to the Guardian in a new leak


Where in the World is Snowden

“My position with Booz Allen Hamilton granted me access to lists of machines all over the world the NSA hacked. That is why I accepted that position about three months ago,” he told Hong Kong’s South China Morning Post during an interview on June 12 that was published on Tuesday.

Edward Snowden signed on to work with intelligence contractor Booz Allen Hamilton only to obtain information about the United States’ surveillance programs, the NSA leaker told the South China Morning Post.

Edward Snowden, who is wanted by the United States for leaking state secrets, is not collaborating with Russia’s Federal Security Service, the FSB, anti-secrecy group WikiLeaks said on its Twitter feed Wednesday.


Second NSA whistleblower being ignored

But again I find it fascinating that so much attention is being put on Snowden at the exact same time as another NSA whistleblower Russell Tice just stepped forward with some incredible revelations including the fact that in 2004 the NSA was wire tapping soon-to-be president Barack Obama, then an Illinois State Senator, presumably for the purpose of blackmailing the information that they found out about him. As well as General David Petraeus, White House General Secretary Scott McClelland – a whole range of names that Russell Tice has just revealed.


Spying on US is Nothing New for the NSA