Patriot Act – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Thu, 02 Jul 2015 06:38:34 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Patriot Act – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Terror for the 4th | Unfilter 149 https://original.jupiterbroadcasting.net/84557/terror-for-the-4th-unfilter-149/ Wed, 01 Jul 2015 22:38:34 +0000 https://original.jupiterbroadcasting.net/?p=84557 Dire warnings of a holiday attack this weekend, your Unfilter show gets to the bottom of this week’s latest scare! The NSA’s vacuums are back to full, we’ll explain why, Russia turns off the gas, the Supreme court makes their big decision & we’re tracking the latest claimed threats from ISIS. Plus IRS emails recovered, […]

The post Terror for the 4th | Unfilter 149 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Dire warnings of a holiday attack this weekend, your Unfilter show gets to the bottom of this week’s latest scare! The NSA’s vacuums are back to full, we’ll explain why, Russia turns off the gas, the Supreme court makes their big decision & we’re tracking the latest claimed threats from ISIS.

Plus IRS emails recovered, the situation in Greece, some Red Book follow up & more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

— Episode Links —

The post Terror for the 4th | Unfilter 149 first appeared on Jupiter Broadcasting.

]]>
Reigning In Blood | Unfilter 145 https://original.jupiterbroadcasting.net/82922/reigning-in-blood-unfilter-145/ Wed, 27 May 2015 22:40:29 +0000 https://original.jupiterbroadcasting.net/?p=82922 The media is sure the “strategy” against ISIS has failed & the time has come for boots on the ground in Iraq again, but the real game is a much longer player & the intention is to sell the American public on arming more militants. We’ll break it down. The Senate fails to reform NSA […]

The post Reigning In Blood | Unfilter 145 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The media is sure the “strategy” against ISIS has failed & the time has come for boots on the ground in Iraq again, but the real game is a much longer player & the intention is to sell the American public on arming more militants. We’ll break it down.

The Senate fails to reform NSA spying & the Patriot Act is set to expire this Sunday. We’ll explain where things are at & why regardless of anything, the larger transgressions by the NSA are being left untouched.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

The Senate Fails to Reform NSA Spying, Votes Against USA Freedom Act

A last-minute bid to reform NSA spying before lawmakers break for a week-long recess failed early Saturday morning after hours of debate and filibuster overnight when Senate lawmakers voted 57-42 against the USA Freedom Act.

Senator Mitch McConnell then tried to lead an effort to extend the key provision in the Patriot Act that has been used to justify NSA spying, which is set to expire on June 1. But that vote also failed. Temporarily, that means the government’s bulk collection of phone records from U.S. telecoms is on hold.

USA Freedom Act aimed to put an end to that program, first uncovered by USA Today in 2006 and re-exposed in 2013 by NSA whistleblower Edward Snowden.

The bill called for records to be retained by telecoms and would have forced the NSA to obtain court orders from the Foreign Intelligence Surveillance Court to gain access to them. It also would have required the agency to use specific search terms to narrow its access to only relevant records.

A companion bill passed in the House earlier this month by a landslide vote of 338 to 88 but encountered trouble in the Senate where opponents said it would handicap the fight against terrorism and harm national security.

Proponents of the bill were pushing to get it passed before lawmakers could vote on whether or not to re-authorize sections of the US Patriot Act. Section 215, which the government has long said legally justifies its collection of phone records, is set to expire at midnight June 1.

Unlike many privacy and civil liberties groups, the ACLU has refrained from endorsing the USA Freedom Act and instead is advocating for allowing the Patriot Act provisions to sunset — i.e., to die a long overdue death rather than being “reformed.” Meanwhile, almost all of the 86 “no” votes in the House were based on the argument that the USA Freedom Act either does not go far enough in limiting the NSA or that it actually makes things worse.

The USA Freedom Act was rejected by the U.S. Senate on May 22, 2015. By a vote of 57-42, the Senate did not pass the bill that would have required 60 votes to move forward, which means that the NSA must start winding down its domestic mass surveillance program this week. The Senate also rejected, by 54-45, also short of the necessary 60 votes, a two-month extension for the key provision in the Patriot Act that has been used to justify NSA spying, which is set to expire on June 1, 2015.

Inside the battle for Ramadi: Iraqi soldier speaks

He believes that the order to withdraw was a betrayal. The Iraqi government has said it launched an investigation to find out what went wrong and how the order was issued, but so far, no one has given a viable explanation.

“I want to quit the army, I would, if I thought I wouldn’t get into trouble,” Al-Yassiri says. “I want to join the militias and go back to the fight.”

Ramadi Fell to ISIS Fighters Even Though They Were ‘Vastly Outnumbered’ by Iraqi

The city of Ramadi is controlled by “hundreds” of ISIS fighters who were able to seize the city after Iraqi military commanders ordered the withdrawal of several thousand Iraqi troops from the city.

That’s according to a U.S. official who also confirmed that the withdrawal of Iraqi troops from Ramadi may have been prompted by the unexplained pullout of the elite Iraqi counterterrorism force based in the city.

The pullout of the Iraqi counterterrorism unit from Ramadi first appeared in the Kurdish news agency Rudaw.

Ramadi occupies a highly strategic location on the Euphrates and the road west into Syria and Jordan. This has made it a hub for trade and traffic, from which the city gained significant prosperity. Its position has meant that it has been fought over several times, during the two World Wars and again during the Iraq War and Iraqi insurgency. It was heavily damaged during the Iraq War, when it was a major focus for the insurgency against occupying United States forces. Following the withdrawal of US forces from Iraq in 2011, the city was contested by the Iraqi government and the extremist group Islamic State of Iraq and the Levant (ISIL) and fell to ISIL in May 2015.

The King of Tech Talk Showed Everyone a (His?) Naked Dick

This particular incident occurred on May 24th, during an explanatory segment on Apple’s new Photos app. Most of the clip is the same sort of David Pogue explainer-mush that’s been Laporte’s bread and butter for years. While clicking through his photo library, Laporte brings up a grid of imported images: family, friends, food, and an erect penis.

The Tech Guy Leo Laporte Accidentally Shows A Penis Photo During His Live Tech Program! See The Awkward Moment HERE!

Wikileaks reveal massive haul of 1978 Documents

PlusD

Today WikiLeaks has released more than half a million US State Department cables from 1978. The cables cover US interactions with, and observations of, every country.

1978 was an unusually important year in geopolitics. The year saw the start of a great many political conflicts and alliances which continue to define the present world order, as well as the rise of still-important personalities and political dynasties.


The cables document the start of the Iranian Revolution, leading to the stand-off between Iran and the West (1979 — present); the Second Oil Crisis; the Afghan conflict (1978 — present); the Lebanon–Israel conflict (1978 — present); the Camp David Accords; the Sandinista Revolution in Nicaragua and the subsequent conflict with US proxies (1978 — 1990); the 1978 Vietnamese invasion of Cambodia; the Ethopian invasion of Eritrea; Carter’s critical decision on the neutron bomb; the break-up of the USSR’s nuclear-powered satellite over Canada, which changed space policy; the US “playing the China card” against Russia; Brzezinski’s visit to China, which led to the subsequent normalisation of relations and a proxy war in Cambodia; with the US, UK, China and Cambodia on one side and Vietnam and the USSR on the other.


Through 1978, Zbigniew “Zbig” Brzezinski was US National Security Advisor. He would become the architect of the destabilisation of Soviet backed Afghanistan through the use of Islamic militants, elements of which would later become known as al-Qaeda. Brzezinski continues to affect US policy as an advisor to Obama. He has been especially visible in the recent conflict between Russia and the Ukraine.


WikiLeaks’ Carter Cables II comprise 500,577 US diplomatic cables and other diplomatic communications from and to US embassies and missions in nearly every country. It follows on from the Carter Cables (368,174 documents from 1977), which WikiLeaks published in April 2014.

The Carter Cables II bring WikiLeaks total published US diplomatic cable collection to 2.7 million documents.

The post Reigning In Blood | Unfilter 145 first appeared on Jupiter Broadcasting.

]]>
Naked Line In The Sand | Unfilter 140 https://original.jupiterbroadcasting.net/80182/naked-line-in-the-sand-unfilter-140/ Wed, 08 Apr 2015 20:18:19 +0000 https://original.jupiterbroadcasting.net/?p=80182 We review and discuss the most important bits from Edward Snowden’s Interview on John Oliver’s Last Week Tonight program. Plus an update on the situation in Yemen & the US’s increasing involvement. Russia hacks the White House but the White House won’t confirm & a high note worth millions. Direct Download: Video | MP3 Audio […]

The post Naked Line In The Sand | Unfilter 140 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We review and discuss the most important bits from Edward Snowden’s Interview on John Oliver’s Last Week Tonight program. Plus an update on the situation in Yemen & the US’s increasing involvement.

Russia hacks the White House but the White House won’t confirm & a high note worth millions.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

News:

Oh, Google.

Tsarnaev

Dzokhar Tsarnaev is found guilty, and could face death penalty

Russia

How Russians hacked the White House – CNN.com

Russian hackers behind the damaging cyber intrusion of the State Department in recent months used that perch to penetrate sensitive parts of the White House computer system, according to U.S. officials briefed on the investigation.

While the White House has said the breach only affected an unclassified system, that description belies the seriousness of the intrusion. The hackers had access to sensitive information such as real-time non-public details of the president’s schedule. While such information is not classified, it is still highly sensitive and prized by foreign intelligence agencies, U.S. officials say.

Snowden:

An Edward Snowden Statue Was Replaced By A Hovering Snowden Image Last Night

Last Week Tonight with John Oliver: Government Surveillance (HBO) – YouTube

There are very few government checks on what America’s sweeping surveillance programs are capable of doing. John Oliver sits down with Edward Snowden to discuss the NSA, the balance between privacy and security, and dick-pics.

High Note:

Bob Marley-branded weed is helping pot startups break funding records

GOP medical marijuana bill delayed until next year

The post Naked Line In The Sand | Unfilter 140 first appeared on Jupiter Broadcasting.

]]>
The Zimmerman Distraction | Unfilter 59 https://original.jupiterbroadcasting.net/40472/the-zimmerman-distraction-unfilter-59/ Wed, 17 Jul 2013 22:42:23 +0000 https://original.jupiterbroadcasting.net/?p=40472 We call out the corporate media for sensationalized coverage of the George Zimmerman trial while ignoring important stories like the latest NSA revelations.

The post The Zimmerman Distraction | Unfilter 59 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We’ll push past the distractions and focus on the important events. During an interview this week NSA Whistleblower Russ Tice claims to have held the orders in his hands to wiretap top government officials, today the NSA Admits It Analyzes more people’s data than previously revealed, in what continues to be a series of story changes. We’ll bring you up to date.

Then: Edward Snowden seeks asylum in Russia, while the media runs wild with claims of a secret NSA blueprint.

Plus a follow up on the death of Michael Hastings, your feedback, and much much more.

On this week’s Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


Zimmerman Trial a Distraction?

For the record, that’s where I’m coming from regarding the George Zimmerman-Trayvon Martin murder trial in Florida — a lamentable tragedy of errors marketed as a multimedia morality play on the combustible theme of race. It makes me crazy to see what I call the Mighty MSNBC Art Players and other media figures fictionalize, dissemble and play fast and loose with facts. The case is troubling enough without turning the participants into political symbols.

– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Tony D
  • Michael
  • Chris B
  • Joseph S
  • Todd E
  • Jonathan H
  • Travis D
  • Conrad
  • Jason H
  • Jacob B
  • Thanks to our 138 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience.

Latest Leaks

Abby Martin talks to Russell Tice, former intelligence analyst and original NSA whistleblower, about how the recent NSA scandal is only scratches the surface of a massive surveillance apparatus, citing specific targets the he saw spying orders for including former senators Hilary Clinton and Barack Obama.

But Inglis’ statement was new. Analysts look “two or three hops” from terror suspects when evaluating terror activity, Inglis revealed. Previously, the limit of how surveillance was extended had been described as two hops. This meant that if the NSA were following a phone metadata or web trail from a terror suspect, it could also look at the calls from the people that suspect has spoken with—one hop. And then, the calls that second person had also spoken with—two hops. Terror suspect to person two to person three. Two hops. And now: A third hop.

For a sense of scale, researchers at the University of Milan found in 2011 that everyone on the Internet was, on average, 4.74 steps away from anyone else. The NSA explores relationships up to three of those steps. (See our conversation with the ACLU’s Alex Abdo on this.)

Plaintiffs include: GreenPeace, Human Rights Watch and the National Organization for the Reform of Marijuana Laws. CalGuns, which lobbies against more restrictive gun laws, and one California gun manufacturer, Franklin Armory, have also joined the case, as have religious groups including the Council on American-Islamic Relations.

The suit was brought by the Electronic Frontier Foundation, a digital rights advocacy group and law firm. It asserts that the NSA’s “dragnet surveillance” – which extends to millions of Americans – is illegal and unconstitutional.

Other organizations, including the American Civil Liberties Union, have also recently sued the NSA in response to leaked information on its surveillance programs. This most recent case is especially notable in that it represents a broad coalition of groups that often don’t have much use for each other.

Approximately 160 billion envelopes, packages and postcards were photographed by the United States Postal Service last year, reports The New York Times.

The American Civil Liberties Union has released documents confirming that police license plate readers capture vast amounts of data on innocent people, and in many instances this intelligence is kept forever.

According to documents obtained through a number of Freedom of
Information Act requests filed by ACLU offices across the United
States, law enforcement agencies are tracking the whereabouts of
innocent persons en masse by utilizing a still up-and-coming
technology.

In some jurisdictions, that information is then held forever.
FOIA requests obtained by the ACLU estimated that authorities in
Jersey City, New Jersey have accumulated 10 million license plate
records as of last year — in a town of only 250,000 — because
retention policies allow officials to keep that data for five
years. In Milpitas, California — a town with roughly four times
the population — has no retention policy and has picked up around
4.7 million plates.

Some authorities such as Minnesota State Patrol delete all their scanned records after 48 hours. Others are much looser in their regulations, such as the town of Milpitas in California, population 67,000, which stores almost 5m plate reads with no time limits at all.

Soon, I will introduce legislation that would repeal the laws that brought us our current “surveillance state”: the Patriot Act and the FISA Amendments Act. My bill would restore the probable cause-based warrant requirement for any surveillance against an American citizen being proposed on the basis of an alleged threat to the nation.


Where in the World is Snowden

WikiLeaks, which has been advising Snowden, announced his application in a tweet: “Edward Snowden today has filed for a temporary protection visa with Russia’s ministry of immigration.”

National Security Agency leaker Edward Snowden on Tuesday submitted a request for temporary asylum in Russia, his lawyer said.

Anatoly Kucherena, a lawyer who is a member of the Public Chamber, a Kremlin advisory body, said that Snowden submitted the asylum request to Russia’s Federal Migration Service. The service had no immediate comment.

Kucherena told The Associated Press that he met Snowden in the transit zone of Moscow’s Sheremetyevo airport and Snowden made the request after the meeting.

“In order to take documents with him that proved that what he was saying was true he had to take ones that included very sensitive, detailed blueprints of how the NSA does what they do,” Greenwald said in Brazil, adding that the interview was taking place about four hours after his last interaction with Snowden.

Former two-term GOP Senator Gordon Humphrey of New Hampshire emailed Edward Snowden


Michael Hastings Cremated Without Family Consent:

Hastings’ friend and confidant SSgt. Joe Biggs disclosed a macabre twist in the award-winning journalist’s death in a suspicious single-car accident. According to SSgt. Biggs, “Michael Hastings’ body was returned to Vermont in an urn.”


Feedback:

Bitmessage Address: BM-GuQ4gqmBeW8CYpSo3Htg2pBrBdHbvpe7

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post The Zimmerman Distraction | Unfilter 59 first appeared on Jupiter Broadcasting.

]]>
Exaggerated Cybercrime | TechSNAP 54 https://original.jupiterbroadcasting.net/18867/exaggerated-cybercrime-techsnap-54/ Thu, 19 Apr 2012 16:47:21 +0000 https://original.jupiterbroadcasting.net/?p=18867 We bust some Cybercrime propaganda, give you the scoop on a fresh openSSL vulnerability, and answer a common audience question.

The post Exaggerated Cybercrime | TechSNAP 54 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We bust some Cybercrime propaganda, give you the scoop on a fresh openSSL vulnerability, and answer a common audience question.

All that and much more, on this week’s TechhSNAP!

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Limited time offer: $5.99 .coms, up to 5 domains! just use our code 599com7

Want to save money on your entire order? Use our code spring7 and save 15%!

 

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Support the Show:

Show Notes:

OpenSSL Vulnerability

  • Two developers from the Google Security Team found a flaw in OpenSSL and contributed the fix
  • The flaw affects all versions of OpenSSL before 1.0.1a, 1.0.0i or 0.9.8v
  • Official Announcement
  • Full Disclosure
  • The vulnerability is in the way OpenSSL handles DER encoded data, which can cause a heap overflow and memory corruption
  • CVE Entry

US Unhappy With Australians Storing Data On Australian Shores

  • The US trade representatives specifically took issue with statements by the Australian Department of Defence, which has been making negative comments about various cloud providers based outside of Australia, implying that “hosting data overseas, including in the United States, by definition entails greater risk and unduly exposes consumers to their data being scrutinized by foreign governments.”
  • The issues first arose when the AU government started considering storing data in the cloud
  • The privacy commissioner raised many concerns about the security of the data in foriegn hands, and also the governments inability to legislate against foreign service providers
  • More coverage
    *

    Cybercrime massively over reported, statistics totally unrealistic

  • Some reports claim that losses due to cybercrime could be as much as $1 Trillion US Dollars
  • Most cybercrime estimates are based on surveys of consumers and companies, and are very unreliable
  • Normal statistical polling for opinion questions, such as seen with political polling works well, however the same method does not work for questions related to a value, because there are no negative values to cancel out the statistical outliers when then get extrapolated resulting in a large upward bias
  • In a 2006 survey of identity theft by the Federal Trade Commission, two respondents gave answers that, when extrapolated to the entire population, would have added $37 billion to the estimate, dwarfing that of all other respondents combined
  • Numbers are also exaggerated by the same pool of gullible and unprotected users being repeatedly targeted, which leads to diminishing returns, however the unreliable statistical models do not take this into consideration

Feedback:

Q: Simon asks about running multiple servers behind a single IP address

A:

  • NAT may be the best answer, especially if you need NAT anyway for the 3 servers to connect out to the internet in the first place
  • You can forward the traffic using something like ‘balance’ or ‘HAProxy’, however the disadvantage to this over NAT is that the internal machines will see the source IP as the LAN IP of the internet facing machine, whereas with NAT they will see the original source IP address
  • For web traffic HTTP (80) and HTTPS (443), you can use nginx, and apache mod_rpaf to pass the original source IP to the internal apache server(s)
  • FreeBSD’s IPFW firewall has the ‘forward’ command, however this does not rewrite the headers of the packet, so the server that receives the forwarded packet needs to know what to do with it

War Story:

Mike sends in his own IBM war story:

After hearing so many war stories from the Other Other Alan, I decided to add one of my own IBM war stories.
I’ve been a contract employee from IBM since 1997. Early in 2000 I and 4 other guys were assigned to a new Network Operations Outsourcing Center. The basic idea was that we four would perform network operations for customers, small/medium businesses external to IBM. Our first customer was a textile company with facilities scattered across the continental US from Georgia to California. IBM sales sold the company a package of software, hardware and services which included IBM Tivoli and Netview monitoring that we were to use to do our monitoring and maintenance of their network.

So, as was always the case back then IBM had specialists who would go out in the field and perform installs and configuration for the customer (in this case us) and then we would be responsible for maintaining it. The initial install took nearly a week with a couple of days of training. Now imagine all the oohs and ahs as all this was running on three HUGE IBM Netfinity 5500 Quad PIII Beasts running Windows NT server and the technicians were explaining all the bells and whistles including event correlation and intelligent discovery. Two days after they left, the database crashed. Well we couldn’t be down with no method of monitoring the customer’s systems. So we took an old copy of “What’s up Gold” and installed it on the only spare hardware we had, a Thinkpad 765. So, as IBM repeatedly sent out technicians to fix one thing or another with the Tivoli environment, or the Oracle database from Hell, we chugged on for an entire year monitoring 40 odd NT servers and an equal amount of network hardware…from a little old pentium 166 laptop, while untold thousands of dollars worth of software and hardware sat almost unused until it was disassembled at the end of the contract.


Round-UP:

The post Exaggerated Cybercrime | TechSNAP 54 first appeared on Jupiter Broadcasting.

]]>