Israel – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Thu, 17 May 2018 01:10:59 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Israel – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Mutually Assured Manipulation | Unfilter 280 https://original.jupiterbroadcasting.net/124941/mutually-assured-manipulation-unfilter-280/ Wed, 16 May 2018 17:10:59 +0000 https://original.jupiterbroadcasting.net/?p=124941 Show Notes: unfilter.show/280

The post Mutually Assured Manipulation | Unfilter 280 first appeared on Jupiter Broadcasting.

]]>

Show Notes: unfilter.show/280

The post Mutually Assured Manipulation | Unfilter 280 first appeared on Jupiter Broadcasting.

]]>
Spy Tapes | TechSNAP 340 https://original.jupiterbroadcasting.net/119041/spy-tapes-techsnap-340/ Thu, 12 Oct 2017 16:33:13 +0000 https://original.jupiterbroadcasting.net/?p=119041 RSS Feeds: HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: The Ethics of Running a Data Breach Search Service HIBP – have i been pwned? Is the NSA Doing More Harm Than Good in Not Disclosing Exploits? Post a boarding pass on Facebook, […]

The post Spy Tapes | TechSNAP 340 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

The Ethics of Running a Data Breach Search Service

Is the NSA Doing More Harm Than Good in Not Disclosing Exploits?

Post a boarding pass on Facebook, get your account stolen

How Israel Caught Russian Hackers Scouring the World for U.S. Secrets


Feedback


Round Up:

The post Spy Tapes | TechSNAP 340 first appeared on Jupiter Broadcasting.

]]>
Trumping the Iran Deal | Unfilter 154 https://original.jupiterbroadcasting.net/86447/trumping-the-iran-deal-unfilter-154/ Wed, 12 Aug 2015 20:35:49 +0000 https://original.jupiterbroadcasting.net/?p=86447 The Iran deal is getting the hard sell this week from both sides, and we’ll cut through all the hype and discuss the real issues with the nuke deal & what our best alternatives are. Another Cyber attack, this time on the pentagon is behind pinned on Russia & we cover a few moments of […]

The post Trumping the Iran Deal | Unfilter 154 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The Iran deal is getting the hard sell this week from both sides, and we’ll cut through all the hype and discuss the real issues with the nuke deal & what our best alternatives are. Another Cyber attack, this time on the pentagon is behind pinned on Russia & we cover a few moments of the first 2016 debate.

Plus an update on all those rebels the US has trained in Syria, Hillary turns in her email server, a very high-class high-note & much more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

— Episode Links —

The post Trumping the Iran Deal | Unfilter 154 first appeared on Jupiter Broadcasting.

]]>
Obama’s Iran Plan | Unfilter 151 https://original.jupiterbroadcasting.net/85287/obamas-iran-plan-unfilter-151/ Wed, 15 Jul 2015 22:27:28 +0000 https://original.jupiterbroadcasting.net/?p=85287 It’s another historic week documented by the Unfilter show. The Obama administration signs an “executive agreement” with Iran, but we ask what the limitations of an “executive agreement” are, and what the downsides to the deal might be. Plus the head of the FBI pushes to crack encryption, and track ISIS via twitter, the OPM […]

The post Obama's Iran Plan | Unfilter 151 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

It’s another historic week documented by the Unfilter show. The Obama administration signs an “executive agreement” with Iran, but we ask what the limitations of an “executive agreement” are, and what the downsides to the deal might be.

Plus the head of the FBI pushes to crack encryption, and track ISIS via twitter, the OPM hack is even worse than previously reported, and an updates on the NSA.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

— Episode Links —

The post Obama's Iran Plan | Unfilter 151 first appeared on Jupiter Broadcasting.

]]>
Who’s Following ISIS | Unfilter 138 https://original.jupiterbroadcasting.net/79472/whos-following-isis-unfilter-138/ Wed, 25 Mar 2015 21:05:38 +0000 https://original.jupiterbroadcasting.net/?p=79472 Is the ISIS Cyber Division responsible for a spree of hack attacks across America? We’ll review the smattering of defacements throughout the week linked to ISIS. An Obama administration official leaks Israel’s spying, Iran talks heats up & Ted Cruz lies through his teeth on air. Direct Download: Video | MP3 Audio | OGG Audio […]

The post Who's Following ISIS | Unfilter 138 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Is the ISIS Cyber Division responsible for a spree of hack attacks across America? We’ll review the smattering of defacements throughout the week linked to ISIS. An Obama administration official leaks Israel’s spying, Iran talks heats up & Ted Cruz lies through his teeth on air.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

CISA Security Bill: An F for Security But an A+ for Spying | WIRED

When the Senate Intelligence Committee passed the Cybersecurity Information Sharing Act by a vote of 14 to 1, committee chairman Senator Richard Burr argued that it successfully balanced security and privacy. Fifteen new amendments to the bill, he said, were designed to protect internet users’ personal information while enabling new ways for companies and federal agencies to coordinate responses to cyberattacks. But critics within the security and privacy communities still have two fundamental problems with the legislation: First, they say, the proposed cybersecurity act won’t actually boost security. And second, the “information sharing” it describes sounds more than ever like a backchannel for surveillance.

On Tuesday the bill’s authors released the full, updated text of the CISA legislation passed last week, and critics say the changes have done little to assuage their fears about wanton sharing of Americans’ private data. In fact, legal analysts say the changes actually widen the backdoor leading from private firms to intelligence agencies. “It’s a complete failure to strengthen the privacy protections of the bill,” says Robyn Greene, a policy lawyer for the Open Technology Institute, which joined a coalition of dozens of non-profits and cybersecurity experts criticizing the bill in an open letter earlier this month. “None of the [privacy-related] points we raised in our coalition letter to the committee was effectively addressed.”


“CISA goes far beyond [cybersecurity], and permits law enforcement to use information it receives for investigations and prosecutions of a wide range of crimes involving any level of physical force,” reads the letter from the coalition opposing CISA. “The lack of use limitations creates yet another loophole for law enforcement to conduct backdoor searches on Americans—including searches of digital communications that would otherwise require law enforcement to obtain a warrant based on probable cause. This undermines Fourth Amendment protections and constitutional principles.”

Israel Denies Spying on Iran Nuclear Talks – NYTimes.com

Three top Israeli ministers on Tuesday denied a report that their intelligence services had spied on the closed-door negotiations over Iran‘s nuclear program, as tensions continued to mount between Washington and Jerusalem.

“There is no such thing as Israel spying on the Americans,” the defense minister, Moshe Yaalon, said at a pre-Passover toast, according to a transcript provided by his office. Mr. Yaalon said he had checked and found no complaint from the United States to Israeli intelligence services about such spying. “There is a strict prohibition on that,” he said.

NSA shared Americans’ private communications with Israel: Snowden

Former U.S. intelligence analyst Edward Snowden has accused the U.S. National Security Agency of routinely passing private, unedited communications of Americans to Israel, an expert on the intelligence agency said Wednesday.

James Bamford, writing in the New York Times, said Snowden told him the intercepts included communications of Arab- and Palestinian-Americans whose relatives in Israel and the Palestinian territories could become targets based on the information.

“It’s one of the biggest abuses we’ve seen,” Bamford quoted Snowden as saying.

Snowden said the material was routinely transferred to Unit 8200, a secretive Israeli intelligence organization.

Bamford cited a memorandum of understanding between the NSA and its Israeli counterpart outlining transfers that have occurred since 2009.

Leaked by Snowden and first reported by the British newspaper the Guardian, it said the material included “unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content.”

The Wall Street Journal‘s Adam Entous dropped a huge story Tuesday morning: Israel acquired classified US information while spying on the Iranian nuclear negotiations, and leaked the stolen information about the emerging deal to American lawmakers in an attempt to sabotage the Obama administration’s outreach to Tehran.

US House Votes 348-48 To Arm Ukraine, Russia Warns Lethal Aid Will “Explode The Whole Situation” | Zero Hedge

Yesterday, in a vote that largely slid under the radar, the House of Representatives passed a resolution urging Obama to send lethal aid to Ukraine, providing offensive, not just “defensive” weapons to the Ukraine army – the same insolvent, hyperinflating Ukraine which, with a Caa3/CC credit rating, last week started preparations to issue sovereign debt with a US guarantee, in essence making it a part of the United States (something the US previously did as a favor to Egypt before the Muslim Brotherhood puppet regime was swept from power by the local army).

The resolution passed with broad bipartisan support by a count of 348 to 48.

According to DW, the measure urges Obama to provide Ukraine with “lethal defensive weapon systems” that would better enable Ukraine to defend its territory from “the unprovoked and continuing aggression of the Russian Federation.”

“Policy like this should not be partisan,” said House Democrat Eliot Engel, the lead sponsor of the resolution. “That is why we are rising today as Democrats and Republicans, really as Americans, to say enough is enough in Ukraine.”

Engel, a New York Democrat, has decided that he knows better than Europe what is the best option for Ukraine’s people – a Europe, and especially Germany, which has repeatedly said it rejects a push to give western arms to the Ukraine army, and warned that Russia under President Vladimir Putin has become “a clear threat to half century of American commitment to an investment in a Europe that is whole, free and at peace. A Europe where borders are not changed by force.

This war has left thousands of dead, tens of thousands wounded, a million displaced, and has begun to threaten the post-Cold War stability of Europe,” Engel said.

Odd, perhaps the US state department should have thought of that in a little over a year ago when Victoria Nuland was plotting how to most effectively put her puppet government in charge of Kiev and how to overthrow the lawfully elected president in a US-sponsored coup.

Then again, one glance at the Rep. Engel’s career donors provides some explanation for his tenacity to start another armed conflict and to escalate what he himself defines as a cold war into a warm one.

Cruz’s Wife Heidi to Take Unpaid Leave From Goldman – Bloomberg Business

Heidi Cruz, a managing director at Goldman
Sachs Group Inc. in Houston, has taken an unpaid leave from her
private wealth-management job to help with her husband’s
campaign for the U.S. presidency, a person familiar with the
matter said.

Ted Cruz, 44, a Republican senator from Texas, said on
Twitter early Monday morning that he plans to run for president
in the 2016 election. Heidi Cruz’s leave will last the duration
of the campaign, said the person, who asked not to be identified
speaking about Cruz’s employment.

Heidi Cruz, 42, a Harvard Business School graduate who
worked in President George W. Bush’s administration, joined
Goldman Sachs in 2005 and was promoted to managing director, the
firm’s second-highest rank, in 2012. She serves as regional head
of the Houston office in the private wealth-management unit,
which serves individuals and families who have on average more
than $40 million with the firm.

The post Who's Following ISIS | Unfilter 138 first appeared on Jupiter Broadcasting.

]]>
The 47-Year-War | Unfilter 108 https://original.jupiterbroadcasting.net/63422/the-47-year-war-unfilter-108/ Wed, 30 Jul 2014 20:31:18 +0000 https://original.jupiterbroadcasting.net/?p=63422 We look at the Israel and Gaza conflict, and how this current event fits in a historical context. The new NSA reforms that could truly make a difference, and the recent developments at the crash site of MH17. Plus the New York Times endorses Cannabis legalization, Washington is still blowing, and more! Direct Download: Video […]

The post The 47-Year-War | Unfilter 108 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We look at the Israel and Gaza conflict, and how this current event fits in a historical context. The new NSA reforms that could truly make a difference, and the recent developments at the crash site of MH17.

Plus the New York Times endorses Cannabis legalization, Washington is still blowing, and more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

— Show Notes —

— The Slow Death of Privacy —

U.S. Senate bill proposes sweeping curbs on NSA surveillance – Yahoo News

Senator Patrick Leahy introduced legislation on Tuesday to ban the U.S. government’s bulk collection of Americans’ telephone records and Internet data and narrow how much information it can seek in any particular search.

The bill, which has White House backing, goes further than a version passed in May by the U.S. House of Representatives in reducing bulk collection and immediately drew warmer response from privacy advocates and technology companies.

Judiciary Committee Chair Patrick Leahy (D-VT) introduces a bill that would end the NSA’s bulk data collection and storage of metadata, require court orders to search private phone company databases and put limitations on broad searches by the NSA.

Tech Companies Reel as NSA’s Spying Tarnishes Reputations – Bloomberg

Citing concerns from top executives of Microsoft Corp. (MSFT), Cisco Systems Inc. (CSCO) and other companies, the report made a case that NSA spying could damage the $150 billion industry for cloud computing services. Those services are expanding rapidly as businesses move software and data to remote servers.

“The immediate pain point is lost sales and business challenges,” said Chris Hopfensperger, policy director for BSA/The Software Alliance, a Washington-based trade association that represents companies including Apple Inc. and Oracle Corp.

U.S. technology companies may lose as much as $35 billion in the next three years from foreign customers choosing not to buy their products over concern they cooperate with spy programs, according to an earlier study by the Washington-based Information Technology and Innovation Foundation.

Lawfare › Senator Leahy’s NSA Reform Bill: A Quick and Dirty Summary

But the administration also makes significant gains here. Most importantly, it codifies an authority that is now highly contested, and it pushes back a scheduled sunset of that authority that is approaching rather quickly.

In short, the trade throughout this bill seems to be institutionalization of governmental authority in exchange for regulation the government will regard as burdensome and a great deal of transparency. Whether this works ultimately in favor of the government or the civil libertarians probably depends on whether industry ends up maintaining call records—in which case the institutionalization of governmental access to them will probably prove more important than the added hurdles attached to that access. If, on the other hand, industry stops maintaining these records, government will have won the authority to access records that no longer exist.

Former NSA chief to profit from patented hacker detection tech, charging clients $1M a month – Boing Boing

  • Keith Alexander, the former director of the National Security Administration, is filing for tech security patents related to his work running the NSA.

  • He’s hawking a hacker/intrusion-detection service to banks and big corporations for a reported fee of one million dollars a month.


Shane Harris for Foreign Policy, on what could possibly justify that $1 million/month fee:

The answer, Alexander said in an interview Monday, is a new technology, based on a patented and “unique” approach to detecting malicious hackers and cyber-intruders that the retired Army general said he has invented, along with his business partners at IronNet Cybersecurity Inc., the company he co-founded after leaving the government and retiring from military service in March. But the technology is also directly informed by the years of experience Alexander has had tracking hackers, and the insights he gained from classified operations as the director of the NSA, which give him a rare competitive advantage over the many firms competing for a share of the cybersecurity market.

The fact that Alexander is building what he believes is a new kind of technology for countering hackers hasn’t been previously reported. And it helps to explain why he feels confident in charging banks, trade associations, and large corporations millions of dollars a year to keep their networks safe. Alexander said he’ll file at least nine patents, and possibly more, for a system to detect so-called advanced persistent threats.

— Thanks for Supporting Unfilter —

Become an Unfilter supporter on Patreon

Foo

  • Thanks to our 303 patrons

  • 3 Slots at the SWAG pledge level have opened.

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


— The 47-Year-War —

Six-Day War

The Six-Day War was fought between June 5 and 10, 1967, by Israel and the neighboring states of Egypt (known at the time as the United Arab Republic), Jordan, and Syria. The war began on June 5 with Israel launching surprise strikes against Egyptian air-fields after the mobilisation of Egyptian forces on the Israeli border.

A period of high tension had preceded the war. In response to PLO sabotage acts against Israeli targets,[16][17][18] Israel raided into the Jordanian-controlled West Bank[19][20] and initiated flights over Syria, which ended with aerial clashes over Syrian territory.[21] Syrian artillery attacks against Israeli civilian settlements in the vicinity of the border followed by Israeli responses against Syrian positions in the Golan Heights and encroachments of increasing intensity and frequency into the demilitarized zones along the Syrian border,[22] and culminating in Egypt blocking the Straits of Tiran,[23] deploying its troops near Israel’s border, and ordering the evacuation of the U.N. buffer force from the Sinai Peninsula.[24][25] Within six days, Israel had won a decisive land war. Israeli forces had taken control of the Gaza Strip and the Sinai Peninsula from Egypt, the West Bank and East Jerusalem, from Jordan, and the Golan Heights from Syria.

By June 10, Israel had completed its final offensive in the Golan Heights, and a ceasefire was signed the day after. Israel had seized the Gaza Strip, the Sinai Peninsula, the West Bank of the Jordan River (including East Jerusalem), and the Golan Heights. Overall, Israel’s territory grew by a factor of three, including about one million Arabs placed under Israel’s direct control in the newly captured territories. Israel’s strategic depth grew to at least 300 kilometers in the south, 60 kilometers in the east, and 20 kilometers of extremely rugged terrain in the north, a security asset that would prove useful in the Yom Kippur War six years later.

Gaza Strip

Gaza has an annual population growth rate of 2.91% (2014 est.), the 13th highest in the world, and is overcrowded.

There is a limited capability to construct new homes and facilities for this growth. The territory is 25 miles long, and from 3.7 to 7.5 miles wide.

With a total area of 141 sq miles.

As of 2014, Palestinians of the Gaza Strip numbered around 1.82 million people. The large Palestinian refugee population makes it among the most densely populated parts of the world

Following the victory of Hamas in the 2006 Palestinian legislative election, Hamas and Fatah formed the Palestinian authority national unity government headed by Ismail Haniya. Shortly after, Hamas took control of the Gaza Strip in the course of the Battle of Gaza,[43] seizing government institutions and replacing Fatah and other government officials with its own.[44] By 14 June, Hamas fully controlled the Gaza Strip. Palestinian President Mahmoud Abbas responded by declaring a state of emergency, dissolving the unity government and forming a new government without Hamas participation

Israeli Shells Said to Hit School in Gaza, Killing at Least 20 – NYTimes.com

The strikes came in rapid succession. At around 5 a.m. Wednesday at a United Nations school at the Jabaliya refugee camp, where 3,300 Palestinians had taken refuge from the fierce fighting in their Gaza neighborhoods, what appeared to be four Israeli artillery shells hit the compound.

Carnage at U.N. school as Israel pounds Gaza Strip

Israeli shelling killed at least 15 Palestinians sheltering in a U.N.-run school and another 17 near a street market on Wednesday, Gaza’s Health Ministry said, with no ceasefire in sight after more than three weeks of fighting.


According to the Gaza Health Ministry, 1,323 Palestinians, mostly civilians, have been killed since Israel began its offensive on July 8 with the declared aim of halting cross-border rocket fire. Ninety-six Palestinians were killed on Wednesday alone.

On the Israeli side, 56 soldiers and three civilians have been killed. Public support remains strong for continuing the military operation

Tomorrow there’s no school in Gaza, they don’t have any children left.'”

This video shows an Israeli mob actually singing in celebration of children’s deaths in the style of a soccer fans’ song: “In Gaza there’s no studying, No children are left there, Olé, olé, olé-olé-olé.”


Israel is finding it harder to deny targeting Gaza infrastructure | World news | The Guardian

With blackouts, food shortages and sewage in the streets, observers say the IDF either targets civilians or has terrible aim

List of countries by Global Militarization Index

The Global Militarization Index (GMI) depicts the relative weight and importance of the military apparatus of one state in relation to its society as a whole. For this, the GMI home a number of indicators to represent the degree of militarization of a country:[1]

  • comparison of military expenditure with its gross domestic product (GDP);
  • comparison of military expenditure with its health expenditure;
  • contrast between the total number of (para)military forces with the number of physicians, and the overall population;
  • ratio of the number of heavy weapons available and the overall population.

imgurlArea 30-07-14  10_18_29.png

In 2012, Israel spent $15.2 billion on its armed forces, one of the highest ratios of defense spending to GDP among developed countries ($1,900 per person). However, Israel’s spending per capita is below that of the USA

— MH17 Update —

Ukrainian forces take over Debaltseve, Shakhtarsk, Torez, Lutuhyne, fighting for Pervomaisk and Snizhne underway

imgurlArea 30-07-14  13_57_51.png

The anti-terrorist operation (ATO) forces have taken control of the town of Debaltseve in Donetsk region and the Savur-Mohyla heights, from which illegal armed groups constantly shelled the positions of Ukrainian law enforcers, the ATO press center reported on Monday, July 28.

U.S. Releases Satellite Images To Back Up Claims Russia Fired Rockets Into Ukraine

Stepping up pressure on Moscow, the U.S. on Sunday released satellite images it says show that rockets have been fired from Russia into neighboring eastern Ukraine and that heavy artillery for separatists has crossed the border.

The images, which came from the U.S. Director of National Intelligence and could not be independently verified by The Associated Press, show blast marks where rockets were launched and craters where they landed. Officials said the images show heavy weapons fired between July 21 and July 26 — after the July 17 downing of Malaysia Airlines Flight 17.

US says satellite images show Russia has fired rockets into Ukraine | Fox News

The U.S. images claim to show multiple rocket launchers fired at Ukrainian forces from within Ukraine and from Russian soil. One image shows dozens of craters around a Ukrainian military unit and rockets that can travel more than seven miles.

U.S. Says Russia Tested Cruise Missile, Violating Treaty – NYTimes.com

Russia first began testing the cruise missiles as early as 2008, according to American officials, and the Obama administration concluded by the end of 2011 that they were a compliance concern. In May 2013, Rose Gottemoeller, the State Department’s senior arms control official, first raised the possibility of a violation with Russian officials.

At the heart of the issue is the 1987 treaty that bans American and Russian ground-launched ballistic or cruise missiles capable of flying 300 to 3,400 miles. That accord, which was signed by President Ronald Reagan and Mikhail S. Gorbachev, the Soviet leader, helped seal the end of the Cold War and has been regarded as a cornerstone of American-Russian arms control efforts.


— Weed Wackers —

imgurlArea 30-07-14  14_22_24.png

The federal government should repeal the ban on marijuana.

Marijuana farm photos show inner-workings of massive Texas pot plantation – Houston Chronicle

A deer hunter in Polk County, Texas stumbled across a massive marijuana growing operation Saturday, July 26, 2014. Investigators found more than 44,000 plants spread across more than 12 fields


— Feedback —


Secure Ways to Contact the Show:


Follow the Us:

Call us: 1.425.312.1756


If you’re a Supporter check Patreon for this episodes supporter exclusives!

The post The 47-Year-War | Unfilter 108 first appeared on Jupiter Broadcasting.

]]>
Russia to the Rescue | Unfilter 66 https://original.jupiterbroadcasting.net/42977/russia-to-the-rescue-unfilter-66/ Wed, 11 Sep 2013 21:50:34 +0000 https://original.jupiterbroadcasting.net/?p=42977 Russia’s president Vladimir Putin has silenced America’s war drums, at least for now. While special interests continue to push for war.

The post Russia to the Rescue | Unfilter 66 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Russia’s president Vladimir Putin has silenced America’s war drums, at least for now. While special interests continue to push for war, American’s have awoken from their industrial media induced commas and taken to the streets. We’ll cover the mounting pressure against a new war.

Then the NSA is caught again, this time subverting industry standards and covertly influencing major tech companies. We’ll bring you up to date.

Plus it’s your feedback, our follow up, and much much more.

On this week’s Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is CRAZY

The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments.

The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – “the use of ubiquitous encryption across the internet”.

Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with “brute force”, and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves.

Through these covert partnerships, the agencies have inserted secret vulnerabilities – known as backdoors or trapdoors – into commercial encryption software.

The National Security Agency made a select amount of information on American citizens available to the Central Intelligence Agency and two other agencies even though prohibited by court order, according to documents released Tuesday by National Intelligence Director James Clapper.

The unauthorized dissemination of Americans’ data, including telephone numbers and email addresses and culled from the full phone records database on all domestic and one-end-foreign calls, is one of a number of ways in which the NSA misused the database between 2006 and 2009. Though there are authorized reasons the NSA can share information with outside agencies, the dissemination activity revealed in the documents did not fit those criteria.

However, it remains a mystery why the NSA granted the CIA, Federal Bureau of Investigation and National Counterterrorism Center (NCTC) access to the data, because that information was blacked out when the intelligence community released documentation of this violation on Tuesday.


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Anonymous Via Bitcoin and Bitmessage

  • Vital T

  • Craig T

  • Craig C

  • Colin H

  • User

  • Jakup L

  • Thanks to our 177 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience.


Syria

“I want to make sure that norm against use of chemical weapons is maintained,” Mr Obama told ABC News.

“That’s in our national security interest. If we can do that without a military strike, that is overwhelmingly my preference.”

The Syrian government has accepted a Russian proposal to put its chemical weapons under international control to avoid a possible U.S. military strike, Interfax news agency quoted Syria’s foreign minister as saying on Tuesday.

Russian President Vladimir Putin appears especially delighted by the tentative acceptance of the plan. It allows him to show that Moscow remains a major player in the Middle East and a world power broker.

“He’s been eager to show that he can fill the partial diplomatic vacuum the U.S. has left in the Middle East, and this lets him make that point,” said Andrew Weiss, a White House advisor on Russia during the Clinton administration and now vice president for studies at the Carnegie Endowment for International Peace.

The chairman of the Senate Armed Services Committee said Wednesday that he is working on a new congressional resolution for Syria that would link the use of force with the failure to achieve a political solution eliminating Bashar Assad’s chemical weapons stockpiles.

Sen. Carl Levin, D-Mich., made the remarks a day after President Obama said he would postpone seeking authorization for a military strike to give a diplomatic solution a chance to work.


Feedback:

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Russia to the Rescue | Unfilter 66 first appeared on Jupiter Broadcasting.

]]>
Why so Syria | Unfilter 65 https://original.jupiterbroadcasting.net/42462/why-so-syria-unfilter-65/ Wed, 04 Sep 2013 21:36:18 +0000 https://original.jupiterbroadcasting.net/?p=42462 We’ll blow past the patriotic platitudes and superficial reasons for the conflict and call out the real interest behind this aggression.

The post Why so Syria | Unfilter 65 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

After an abrupt change of course President Obama’s plan to bomb Syria has won key congressional support, as lawmakers prepare to authorize America’s new war, we’ll blow past the patriotic platitudes and superficial reasons for the conflict and call out the real interest behind this aggression, and the dangerous blowback even a limited strike could bring.

Plus: Revelation of the NSA’s rampant spying continue to leak, this week we learned the NSA captured the emails of Brazil and Mexico presidents, and they’re not very happy about it.

Then the good news for Cannabis legalization, your feedback, and much much more.

On this week’s Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is CRAZY

Brazil and Mexico have called on the U.S. to explain recent reports — sourced to documents obtained by Edward Snowden — alleging that the NSA spied on Brazilian president Dilma Rousseff and Mexican President Enrique Pena Nieto. Rousseff, who called in U.S. ambassador Thomas Shannon over the allegations, might cancel an October trip to the White House.

The United States intelligence agency was so interested, in fact, that it hacked into Al Jazeera’s internal communications system, according to documents from former NSA contractor and whistleblower Edward Snowden that have been seen by SPIEGEL.

One such document, dated March 23, 2006, reveals that the NSA’s Network Analysis Center managed to access and read communication by “interesting targets” that was specially protected by the news organization. The information also shows that the NSA officials were not satisfied with Al Jazeera’s language analysis.

"Much of the material is encrypted. However, among the unencrypted documents
… was a piece of paper that included the password for decrypting one of
the encypted files on the external hard drive recovered from the claimant.

“The fact that … the claimant was carrying on his person a handwritten piece
of paper containing the password for one of the encrypted files … is a
sign of very poor information security practice.”

According to the latest Snowden leaks in The Washington Post, an intelligence community report entitled “Threats to Unmanned Aerial Vehicles” details Al-Qaeda’s attempts to counter US drone strikes dating back to 2006. Al-Qaeda attempted to down US drones in various ways, including jamming GPS signals and hobby airplanes. The terrorist organization is trying to recruit more engineers and technicians to focus on counter-drone operations.


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Jesper M

  • Robert M

  • James T

  • Alexander l

  • Benjamin K

  • Samuel W

  • Patrik N

  • Adam P

  • Stefan S

  • Kevin H

  • Thanks to our 172 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience.


Syria

The Prime Minister said that the UK “can’t be part and won’t be part” of any
military strikes against Bashar al-Assad’s regime.

“President Obama is not asking America to go to war,” Mr Kerry told the Senate Foreign Relations Committee.

“He is asking for authorization to degrade and deter (Syrian president) Bashar al-Assad’s capacity to use chemical weapons.”

The vote came after Sen. John McCain, R-Ariz., raised objections to an earlier draft. The objections forced lawmakers to renegotiate the measure; McCain ultimately won tougher language clarifying that U.S. policy would be aimed at changing the momentum on the ground. He was among the 10 who voted for the final resolution, after getting two amendments added.

“These amendments are vital to ensuring that any U.S. military operations in Syria are part of a broader strategy to change the momentum on the battlefield in Syria,” McCain said in a statement afterward. “That strategy must degrade the military capabilities of the Assad regime while upgrading the military capabilities of moderate Syrian opposition forces. These amendments would put the Congress on the record that this is the policy of the United States, as President Obama has assured me it is.”

U.S. Defense Secretary Chuck Hagel told lawmakers on Wednesday that a limited military strike against Syria was expected to cost “tens of millions” of dollars.


Weed

The Obama administration said Thursday that it would not challenge laws legalizing marijuana in Colorado and Washington state as long as those states maintain strict rules involving the sale and distribution of the drug.

In a memo to U.S. attorneys in all 50 states, Deputy Attorney General James M. Cole said the Justice Department is “committed to using its limited investigative and prosecutorial resources to address the most significant threats in the most effective, consistent and rational way.” He stressed that marijuana remains illegal under federal law.

Feedback:

Bitmessage Address: BM-GuQ4gqmBeW8CYpSo3Htg2pBrBdHbvpe7

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Why so Syria | Unfilter 65 first appeared on Jupiter Broadcasting.

]]>
Peek Inside | TechSNAP 63 https://original.jupiterbroadcasting.net/20817/peek-inside-techsnap-63/ Thu, 21 Jun 2012 16:00:02 +0000 https://original.jupiterbroadcasting.net/?p=20817 We take a peek inside a few never before seen data centers, and find out what makes the unique, then a major flaw affecting Intel chips, and some big answers to the Flame malware mystery! Plus some great Q&A and a few follow up stories you won’t want to miss! All that and more, on […]

The post Peek Inside | TechSNAP 63 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We take a peek inside a few never before seen data centers, and find out what makes the unique, then a major flaw affecting Intel chips, and some big answers to the Flame malware mystery!

Plus some great Q&A and a few follow up stories you won’t want to miss!

All that and more, on this week’s TechSNAP!

Thanks to:

Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Limited time offers:

$1.99/mo economy hosting for 3 months – special offer!
Code:  199tech
Expires:  June 30, 2012

$3.99 .US domain!
Code:  399us4

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

Show Notes:

Washington Post and New York Times suggest Flame malware created by US and Israel

  • American officials say that Flame was not part of Operation Olympic Games (which was begun under President G.W. Bush)
  • Officials have declined to say whether the United States was responsible for the Flame attack
  • Obama repeatedly expressed concerns that any American acknowledgment that it was using cyber weapons could enable other countries, terrorists or hackers to justify their own attacks
  • New York Times Coverage
  • Noted Security Expert Bruce Schneier calls cyber warfare destabilizing and dangerous
  • Compared the 2007 Israeli attack on the Syrian nuclear facility, Stuxnet did not result in any loss of life, or risk to friendly personnel
  • However, Stuxnet has damaged the U.S.’s credibility as a fair arbiter and force for peace in cyberspace. Its effects will be felt as other countries ramp up their offensive cyberspace capabilities in response
  • The offensive use of cyber weapons opens a pandora’s box and weakens the U.S.’s long term position, in exchange for a short term gain
  • Have Stuxnet and Flame already destroyed the U.S.’s credibility as a leader for a free and open Internet?
  • Richard Clarke (Former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism, and Author of ‘Cyber War’), contends that there is a firm distinction between cyber-espionage and offensive cyber-attacks
  • Clarke argues that while cyber-espionage should be considered a routine, acceptable practice of any country as part of government intelligence operations, cyber-attacks are much more grave, and should be considered on par with physical attacks
  • Clarke and others argue for international cyber weapon arms control treaties
  • Richard Clark: How China Steals Our Secrets

US-CERT discloses security flaw in 64 bit Intel chips

  • The issue surrounds the AMD64 processor instruction SYSRET
  • The instruction is implemented differently by AMD (who developed the AMD64 instruction set) than by Intel
  • Some implementations, notably: Microsoft, FreeBSD/NetBSD and Xen, used the AMD specifications
  • This resulted in a mismatch in the expected behavior, that could result in a privilege escalation
  • Microsoft’s Statement: An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights
  • FreeBSD’s Statement: Successful exploitation of the problem can lead to local kernel privilege escalation, kernel data corruption and/or crash. To exploit this vulnerability, an attacker must be able to run code with user privileges on the target system
  • Xen’s Statement: 64-bit PV guest to host privilege escalation vulnerability. This issue only impacts servers running on Intel processors and could permit a 64-bit PV guest to compromise the XenServer host
  • Intel’s Statement: This is a software implementation issue. Intel processors are functioning as per specifications and this behavior is correctly documented in the IntelR64 Software Developers Manual, Volume 2B Pages 4–598–599
  • AMD’s Statement: AMD processors’ SYSRET behavior is such that a non-canonical address in RCX does not generate a #GP while in CPL0. We have verified this with our architecture team, with our design team, and have performed tests that verified this on silicon. Therefore, this privilege escalation exposure is not applicable to any AMD processor
  • Additional Source

Team at Fujitsu cracks proposed new pairing-based cryptography standard

  • The team at Fujitsu, working in partnership with the Japanese National Institute of Information and Communications Technology (NICT) and Kyushu University, have successfully cracked 923-bit pairing based cryptography, in 148.2 days
  • Based on previous results it was estimated to take several hundred thousand years to break a 923-bit key
  • This does not mean that the security of pairing-based cryptography is entirely broken, just that a larger key size is required to maintain security
  • This type of research is why only open cryptography standards should be trusted, and why it takes so long to select new standards
  • The competition for the SHA–3 algorithm opened in 2007 and is not expected to be completed until later this year. More than 50 algorithms were entered into the competition, only 5 remain
  • Among the rejected algorithms is MD6, which proported to scale to very large numbers of CPU cores for long messages, due to speed problems and unsufficient proof if its resistance to differential cryptanalysis. MD6 is still a work in progress and may still be used sometime in the future
  • Additional Source
  • NICT paper on cracking 676 bit pairing cryptography

A tour of GoDaddy’s Data Center

  • Photo Tour
  • Go Daddy is the registrar for over 52 million domain names
  • DNS infrastructure responds to 10 billion DNS queries per day
  • SSL infrastructure handles more than 1 billion OCSP responses every day
  • Currently hosts more than 5 million web sites on 35,000 servers
  • Blocks 2.5 million brute force attacks every hour.
  • More than 23 petabytes of data housed on its storage systems
  • Processes more than 350 million emails every day

OVH deploys world’s largest data center in Canada

  • The new data center makes use of OVH’s ‘Cube Data Center’ design, where servers are servers are kept in the outer corridors of the cube, and the center of the cube is open
  • Cold air is inlet from the outside of the cube, and the hot exhaust air is vented outside in the center of the cube
  • OVH also makes extensive use of water cooling for their servers, which they found can save as much as 30% on their energy bills
  • OVH Beauharnois, Quebec Data Center Video
  • The Quebec data center is located adjacent to the electrical sub station for the 1900 megawatt Beauharnois Hydroelectric Power Station, which will provide renewable energy for the data center
  • The data center also takes feeds from two additional power grids
  • Additional Coverage

Feedback:

Round-Up:

The post Peek Inside | TechSNAP 63 first appeared on Jupiter Broadcasting.

]]>