surveillance – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Thu, 17 May 2018 22:58:01 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png surveillance – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Tech Talk Today 279 https://original.jupiterbroadcasting.net/124966/tech-talk-today-279/ Thu, 17 May 2018 14:58:01 +0000 https://original.jupiterbroadcasting.net/?p=124966 Show Notes: techtalk.today/279

The post Tech Talk Today 279 first appeared on Jupiter Broadcasting.

]]>

Show Notes:

techtalk.today/279

The post Tech Talk Today 279 first appeared on Jupiter Broadcasting.

]]>
Some Fishy Chips | TechSNAP 317 https://original.jupiterbroadcasting.net/114371/some-fishy-chips-techsnap-317/ Wed, 03 May 2017 01:51:09 +0000 https://original.jupiterbroadcasting.net/?p=114371 RSS Feeds: HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Red alert! Intel patches remote execution hole that’s been hidden in biz, server chips since 2008 Bug is in Intel’s Active Management Technology (AMT), Standard Manageability (ISM) and Small Business Technology (SBT) firmware […]

The post Some Fishy Chips | TechSNAP 317 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | MP3 Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Red alert! Intel patches remote execution hole that’s been hidden in biz, server chips since 2008

  • Bug is in Intel’s Active Management Technology (AMT), Standard Manageability (ISM) and Small Business Technology (SBT) firmware versions 6 to 11.6.

  • Every Intel platform with either Intel Standard Manageability, Active Management Technology, or Small Business Technology, from Nehalem in 2008 to Kaby Lake in 2017 has a remotely exploitable security hole in the IME (Intel Management Engine)

  • Are you affected? Read this!

Tarsnap


Feedback


Round Up:


The post Some Fishy Chips | TechSNAP 317 first appeared on Jupiter Broadcasting.

]]>
Shaken Brussels | Unfilter 181 https://original.jupiterbroadcasting.net/97966/shaken-brussels-unfilter-181/ Wed, 23 Mar 2016 23:14:01 +0000 https://original.jupiterbroadcasting.net/?p=97966 Terror attacks in Brussels, major developments in Apple vs the DOJ, Western Tuesday’s elections & of course news from around the world. It’s a packed edition of Unfilter this week. We cover the latest developments in the iPhone unlocking case, “Cyber Threats” & privacy threats. Some a few historical moments & our new Overtime segment. […]

The post Shaken Brussels | Unfilter 181 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Terror attacks in Brussels, major developments in Apple vs the DOJ, Western Tuesday’s elections & of course news from around the world. It’s a packed edition of Unfilter this week.

We cover the latest developments in the iPhone unlocking case, “Cyber Threats” & privacy threats. Some a few historical moments & our new Overtime segment.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Episode Links

The post Shaken Brussels | Unfilter 181 first appeared on Jupiter Broadcasting.

]]>
Slaving for Red Star OS | LINUX Unplugged 125 https://original.jupiterbroadcasting.net/92101/slaving-for-red-star-os-lup-125/ Tue, 29 Dec 2015 18:43:48 +0000 https://original.jupiterbroadcasting.net/?p=92101 A distribution of Linux built to survey and track speech, we go into the surveillance marvel that is Red Star OS. Solus hits 1.0 & we bring on some of the team to tell us all about it. Plus Mozilla has a new… Distraction? We debate their merits of rumored new Firefox OS powered hardware. […]

The post Slaving for Red Star OS | LINUX Unplugged 125 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A distribution of Linux built to survey and track speech, we go into the surveillance marvel that is Red Star OS. Solus hits 1.0 & we bring on some of the team to tell us all about it.

Plus Mozilla has a new… Distraction? We debate their merits of rumored new Firefox OS powered hardware.

Thanks to:

Ting


DigitalOcean


Linux Academy

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed | WebM Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Pre-Show:

The ‘Kopimashin’, seen in the video below makes 100 copies of the Gnarls Barkley song ‘Crazy’ and sends them all to /dev/null — a technical term meaning the files are deleted as soon as they are saved.

Follow Up / Catch Up

Solus 1.0 Released

The Solus Project is proud to announce the release of the first version of its operating system, Solus, on 27th of December, 2015. Solus 1.0 is codenamed Shannon after the longest river in Ireland.

Solus 1.0 is the result of over eight months of work, coalesced from over a dozen contributors, over 2000 package builds, a rewrite of the premier desktop environment Budgie, and more.

20151224-gnupg-in-november-and-december

Unfortunately, although Facebook initially announced that they would provide USD50,000 of support per year, they have since rescinded.

DigitalOcean

How Red Star OS Spies on Users

Two German researchers — Florian Grunow and Niklaus Schiess — pulled apart the North Korean operating system, which closely resembles Apple’s Mac OS X, during a presentation at Chaos Communication in Hamburg.

A pair of German researchers have just given the code a once over — and as you’d expect, it’s locked down and oppressive, and worse than just a weaker version of other Linux distros. It’s geared toward enabling and maintaining a total surveillance state, all while giving the illusion of technological progress to its citizens.

Linux Academy

Exclusive: Mozilla working on a tablet a stickTV, an intelligent keyboard and a router

We mentioned earlier that Mozilla’s Firefox os isn’t dead. Mozilla has some great plans for firefox os. These internal documents obtained by Hypertext shows the future of Mozilla Firefox preparing detailed OS beyond smartphones and include Panasonic TVs & these documents detail the new plans of Mozilla.

TING

Looking into 2016

Support Jupiter Broadcasting on Patreon

The post Slaving for Red Star OS | LINUX Unplugged 125 first appeared on Jupiter Broadcasting.

]]>
Double ROT-13 | TechSNAP 241 https://original.jupiterbroadcasting.net/90526/double-rot-13-techsnap-241/ Thu, 19 Nov 2015 16:45:11 +0000 https://original.jupiterbroadcasting.net/?p=90526 Encryption & privacy took quite a beating this week in the wake of the Paris attacks. We come to its defense. Your ISP heard you like backdoors, so they put a backdoor in your backdoor, the story of the social RAT & more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video […]

The post Double ROT-13 | TechSNAP 241 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Encryption & privacy took quite a beating this week in the wake of the Paris attacks. We come to its defense. Your ISP heard you like backdoors, so they put a backdoor in your backdoor, the story of the social RAT & more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

The Paris Attacks Were An Intelligence Community Failure, Not An ‘Encryption’ Problem

  • Less than two months ago that Techdirt noted that, having lost the immediate battle for US legislation to backdoor encryption, those in the intelligence community knew they just needed to bide their time until the next big terrorist attack.
  • Here was the quote from Robert Litt — the top lawyer for the Office of the Director of National Intelligence from September:

“the legislative environment is very hostile today,” the intelligence community’s top lawyer, Robert S. Litt, said to colleagues in an August e-mail, which was obtained by The Post, “it could turn in the event of a terrorist attack or criminal event where strong encryption can be shown to have hindered law enforcement.”


Backdoor in cable modem, contains backdoor

  • Security researcher Bernardo Rodrigues was invited to give a talk at a security conference, and he decided to research the topic of Cable Modem security
  • Unlike talks from years ago, this wasn’t about how to get free cable internet, but instead about “the security of the cable modems, the technology used to manage them, how the data is protected and how the ISPs upgrade the firmwares. Spoiler Alert: everything’s really really bad.”
  • “While researching on the subject, I found a previously undisclosed backdoor on ARRIS cable modems, affecting many of their devices including TG862A, TG862G, DG860A. As of this writing, Shodan searches indicate that the backdoor affects over 600.000 externally accessible hosts and the vendor did not state whether it’s going to fix it yet.”
  • “ARRIS SOHO-grade cable modems contain an undocumented library (libarris_password.so) that acts as a backdoor, allowing privileged logins using a custom password”
  • ARRIS password of the day is a remote backdoor known since 2009. It uses a DES encoded seed (set by the ISP using the arrisCmDoc30AccessClientSeed MIB) to generate a daily backdoor password. The default seed is MPSJKMDHAI and guess what – many ISPs won’t bother changing it at all.”
  • “The backdoor account can be used to enable Telnet and SSH remotely via the hidden HTTP Administrative interface “https://192.168.100.1/cgi-bin/tech_support_cgi” or via custom SNMP MIBs”
  • “The default password for the SSH user ‘root’ is ‘arris’. When you access the telnet session or authenticate over SSH, the system spawns the ‘mini_cli’ shell asking for the backdoor password”
  • “Yes, they put a backdoor in the backdoor (Joel from Dlink is sure to be envy). The undocumented backdoor password is based on the last five digits from the modem’s serial number. You get a full busybox shell when you log on the Telnet/SSH session using these passwords.”
  • The researchers marketing solution for the vulnerability? A old fashion keygen complete with chiptunes and ascii art
  • The vulnerability was disclosed to CERT on 2015-09-13, and CERT has a 45 disclosure policy. The vendor has yet to correct the issue
  • Ohh, and it seems there are more backdoors

The Story of the Social RAT-in-the-Browser

  • A Remote Access Trojan (RAT) is a malicious malware that runs on your computer giving unlimited access to a cybercriminal who can then steal information or install other malicious software.
  • They are able to operate under the radar of traditional security measures because a RAT’s installation mechanism is usually attached to a legitimate program, allowing an intruder to do just about anything on the targeted computer including, access confidential information, such as credit card and social security numbers, activate a system’s video or webcam, distribute malware, or alter files.
  • RATs have been used by countries and hacktivists for many years, however recently, we’ve seen this remote access attack vector migrate to online banking fraud.
  • These specific RATs, termed RAT-in-the-Browser (RitB), give cybercriminals access to banking credentials and account information.
  • One of the reasons these Trojans have spread so rapidly is because banks often use traditional security measures such as device fingerprinting to validate a device’s reputation, assigning ‘risk’ to new or untrustworthy devices and assigning ‘trust’ to known user devices.
  • RitB sessions are, therefore, often successful since these detection tools won’t find anything unusual.
  • A Social RitB, adding another layer of complexity, as fraudsters are beginning to use social engineering to carry out remote access attacks. All a fraudster needs to do is convince a user to install a standard remote support tool on their computer — for example, Ammyy, UltraVNC, AeroAdmin, or RemotePC — and use it to perpetrate online banking fraud.
  • This type of banking fraud is simple for cybercriminals to carry out since it doesn’t require the technical knowhow needed to develop malware and is easy to infect users through various exploitation mechanisms.
  • Here’s how it works: a fraudster calls a user and convinces him or her that he or she is an employee of a reputable organization (i.e. an Internet service provider or bank), explains to the user that there is a security issue on his computer and then fools the user into downloading and installing a remote support tool (or gives the fraudster access to an existing tool already installed). The fraudster then convinces the user to login to his or her bank account for a quick ‘security check.’ And voilà, the attacker is in and can submit a fraudulent transaction. This is a relatively easy process for the criminal that requires far less technical know-how and monetary expenditure than a regular RitB attack.

Feedback:


Round-Up:


The post Double ROT-13 | TechSNAP 241 first appeared on Jupiter Broadcasting.

]]>
5 Blind Eyes | Unfilter 166 https://original.jupiterbroadcasting.net/90476/5-blind-eyes-unfilter-166/ Wed, 18 Nov 2015 22:01:46 +0000 https://original.jupiterbroadcasting.net/?p=90476 Brutal attacks in Paris are all the west need to pass new laws and launch new campaigns against their self created monster. Despite communicating in the clear text, the debate to break encryption is being pushed back into the public conversation with Telegram as the primary target. We explain why this was inevitable. We cover […]

The post 5 Blind Eyes | Unfilter 166 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Brutal attacks in Paris are all the west need to pass new laws and launch new campaigns against their self created monster. Despite communicating in the clear text, the debate to break encryption is being pushed back into the public conversation with Telegram as the primary target. We explain why this was inevitable.

We cover the complete timeline of events in the Paris attacks, with the absolutely latest information. Discuss the major cyber attack pinned on Iran, and wrap the whole thing up with a high note.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

— Links and Notes —

The above video, reportedly recorded outside of Aleppo, Syria and posted online Tuesday, features rebels from the U.S.-backed Free Syrian Army firing a U.S.-supplied anti-tank guided missile at what it is clearly a U.S.-made Humvee.

Bloomberg News has reported that on the same day as the Paris attacks, local emergency responders had gone through an exercise that simulated a mass shooting event. (Drills such as the one carried out Friday became regular occurrences after the Charlie Hebdo shootings in January, according to the report.)

Yet news emerging from Paris — as well as evidence from a Belgian ISIS raid in January — suggests that the ISIS terror networks involved were communicating in the clear, and that the data on their smartphones was not encrypted.

The post 5 Blind Eyes | Unfilter 166 first appeared on Jupiter Broadcasting.

]]>
50 First Jihads | Unfilter 156 https://original.jupiterbroadcasting.net/86966/50-first-jihads-unfilter-156/ Wed, 26 Aug 2015 20:50:04 +0000 https://original.jupiterbroadcasting.net/?p=86966 The NSA is being sued by a former mayor for blanket surveillance & the case could spark a public debate. New information on how the Clinton’s stored their mail server, our takedown of ISIS claimed attempts to recruit American women & why you better buy that Patriot Drone soon! Plus an update on the 2016 […]

The post 50 First Jihads | Unfilter 156 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The NSA is being sued by a former mayor for blanket surveillance & the case could spark a public debate. New information on how the Clinton’s stored their mail server, our takedown of ISIS claimed attempts to recruit American women & why you better buy that Patriot Drone soon!

Plus an update on the 2016 election, the recent market turmoil & more!

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

— Episode Links —

ISIS Is Recruiting Women

The post 50 First Jihads | Unfilter 156 first appeared on Jupiter Broadcasting.

]]>
Organic Chinese Wifi | TTT 191 https://original.jupiterbroadcasting.net/84532/organic-chinese-wifi-ttt-191/ Wed, 01 Jul 2015 10:51:45 +0000 https://original.jupiterbroadcasting.net/?p=84532 Pregnant Woman Mode is coming to a wifi router near you & we discuss the launch of Apple’s first 24/7 radio station. Plus we explain why NSA phone records surveillance are turned back on early, the 11 attacks on San Francisco-area Internet lines & more! Direct Download: MP3 Audio | OGG Audio | Video | […]

The post Organic Chinese Wifi | TTT 191 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Pregnant Woman Mode is coming to a wifi router near you & we discuss the launch of Apple’s first 24/7 radio station.

Plus we explain why NSA phone records surveillance are turned back on early, the 11 attacks on San Francisco-area Internet lines & more!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

— Episode Links —

The post Organic Chinese Wifi | TTT 191 first appeared on Jupiter Broadcasting.

]]>
Propaganda of Patriotism | Unfilter 143 https://original.jupiterbroadcasting.net/82172/propaganda-of-patriotism-unfilter-143/ Sat, 16 May 2015 00:53:46 +0000 https://original.jupiterbroadcasting.net/?p=82172 Seymour M. Hersh is out with his version of how Osama bin Laden was killed, which refutes many aspects of the official story. We’ll poke at the aspects of his reports that might be true & those that might be false. Plus a look at the NSA’s loudest defenders, a new Cyber threat & the […]

The post Propaganda of Patriotism | Unfilter 143 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Seymour M. Hersh is out with his version of how Osama bin Laden was killed, which refutes many aspects of the official story. We’ll poke at the aspects of his reports that might be true & those that might be false.

Plus a look at the NSA’s loudest defenders, a new Cyber threat & the real problem ABC has with covering the Clintons.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

News:

Many of the NSA’s Loudest Defenders Have Financial Ties to NSA Contractors – The Intercept

NSA Fake Logo

The debate over the NSA’s bulk collection of phone records has reached a critical point after a federal appeals court last week ruled the practice illegal, dramatically raising the stakes for pending Congressional legislation that would fully or partially reinstate the program. An army of pundits promptly took to television screens, with many of them brushing off concerns about the surveillance.

The talking heads have been backstopping the NSA’s mass surveillance more or less continuously since it was revealed. They spoke out to support the agency when NSA contractor Edward Snowden released details of its programs in 2013, and they’ve kept up their advocacy ever since — on television news shows, newspaper op-ed pages, online and at Congressional hearings. But it’s often unclear just how financially cozy these pundits are with the surveillance state they defend, since they’re typically identified with titles that give no clues about their conflicts of interest. Such conflicts have become particularly important, and worth pointing out, now that the debate about NSA surveillance has shifted from simple outrage to politically prominent legislative debates.

As one example of the opaque link between NSA money and punditry, take the words of Stewart Baker, who was general counsel to the NSA from 1992 through 1994. During a Senate committee hearing last summer on one of the reform bills now before Congress, the USA FREEDOM Act, which would partially limit mass surveillance of telephone metadata, Baker essentially said the bill would aid terrorists.

Previously, in December 2013, Baker wrote in The New York Times that “Snowden has already lost the broader debate he claims to want, and the leaks are slowly losing their international impact as well.” He made similar comments in multiple news outlets, and testified before Congress to defend virtually every program revealed by the Snowden documents. Baker at one point told intelligence committee lawmakers that The Intercept’s Glenn Greenwald was simply on a campaign to “cause the greatest possible diplomatic damage to the United States and its intelligence capabilities.”

Isil leader Abu Bakr al-Baghdadi issues call to arms in ‘audio message’ – Telegraph

Abu Bakr al-Baghdadi

Abu Bakr al-Baghdadi, the leader of Islamic State of Iraq and the Levant (Isil), appeared to issue a defiant call to arms on Thursday in what would be the jihadist leader’s first audio recording in six months.

Seymour M. Hersh · The Killing of Osama bin Laden

Seymour Hersh

It’s been four years since a group of US Navy Seals assassinated Osama bin Laden in a night raid on a high-walled compound in Abbottabad, Pakistan. The killing was the high point of Obama’s first term, and a major factor in his re-election. The White House still maintains that the mission was an all-American affair, and that the senior generals of Pakistan’s army and Inter-Services Intelligence agency (ISI) were not told of the raid in advance. This is false, as are many other elements of the Obama administration’s account. The White House’s story might have been written by Lewis Carroll: would bin Laden, target of a massive international manhunt, really decide that a resort town forty miles from Islamabad would be the safest place to live and command al-Qaida’s operations? He was hiding in the open. So America said.

Hersh Claims vs Obama Adminstration Claims

Seymour Myron “Sy” Hersh (born April 8, 1937) is an American investigative journalist and author based in Washington, D.C. He is a regular contributor to The New Yorker magazine on military and security matters. He has also won two National Magazine Awards and is a five-time Polk winner and recipient of the 2004 George Orwell Award.[5]

He first gained worldwide recognition in 1969 for exposing the My Lai Massacre and its cover-up during the Vietnam War, for which he received the 1970 Pulitzer Prize for International Reporting. His 2004 reports on the US military‘s mistreatment of detainees at Abu Ghraib prison gained much attention.

Gareth Porter (born June 18, 1942) is an American historian, investigative journalist, author and policy analyst specializing in U.S. national security policy. He was active as a Vietnam specialist and anti-war activist during the Vietnam War, serving as Saigon Bureau Chief for Dispatch News Service International from 1970-1971, and later, as co-director of the Indochina Resource Center. He has written several books about the potential for peaceful conflict resolution in Southeast Asia and the Middle East,[1] including his 2005 book Perils of Dominance: Imbalance of Power and the Road to War in Vietnam, an analysis of how and why the United States went to war in Vietnam.[2] Porter’s analysis and reporting has appeared in academic journals, news publications and periodicals for four decades, and in 2012 he was the winner of the Martha Gellhorn Prize for Journalism, which is awarded annually by the Frontline Club in London to acknowledge reporting that exposes propaganda.

Seymour Hersh Succumbs To Disinformation — Paul Craig Roberts – PaulCraigRoberts.org

I do not believe Hersh’s story for three reasons. One reason is that bin Laden was suffering from disease that no one can survive for a decade. His death was widely reported in 2001. One reason is that even Hersh’s “true” account of “what really happened” is contradicted by eye witnesses and the initial Pakistani TV interviews of eye witnesses. One reason is that Hersh’s story is too convoluted for an assassination raid, a routine event. He exposes lies within lies, indecision within decision, payoffs within payoffs, and reports such a huge number of people with advance knowledge of the raid that it cannot possibly have been kept a secret.

Sy Hersh’s bin Laden Story First Reported in 2011 — With Seemingly Different Sources – The Intercept

R.J. Hillhouse

R.J. Hillhouse, a former professor, Fulbright fellow and novelist whose writing on intelligence and military outsourcing has appeared in the Washington Post and New York Times, made the same main assertions in 2011 about the death of Osama bin Laden as Seymour Hersh’s new story in the London Review of Books — apparently based on different sources than those used by Hersh.

George Stephanopoulos Apologizes On-Air: I Made a ‘Mistake’

The former Bill Clinton operative spun the donations, saying, “Even though I made them strictly to support work done to stop the spread of AIDS, help children and protect the environment in poor countries, I should have gone the extra mile to avoid even the appearance of a conflict.” He added, “**I apologize to all of you for failing to do that.” **

Politico Gives CIA’s Worst WMD Liar a Platform to Slam Seymour Hersh – The Intercept

Hersh

What’s neither appropriate nor useful is to give former government officials the chance to attack Hersh’s story without giving readers the context of their track record of veracity. But that’s exactly what Politico did in this piece, “U.S. officials fuming over Hersh account of Osama bin Laden raid”:

“If you were to believe Sy, you would have to believe this massive conspiracy that President Obama, Robert Gates, Leon Panetta and Mike Morell were all lying to you,” said Bill Harlow, the [CIA]’s former top spokesman, referring to two recent secretaries of defense and a former acting CIA director. “It makes absolutely no sense.”

  • The next paragraph would have been the right place for Politico to say this:

*In 2003, Harlow himself participated in a massive conspiracy to lie to you about Iraq’s purported WMD. Indeed, he personally engaged in some of most egregious government dishonesty on the issue when he blatantly lied about a _Newsweek_ story published just before the war that strongly suggested Iraq had no remaining banned weapons. Since leaving the CIA, Harlow has co-written three books with former top CIA officials, all of which defend the agency’s use of torture, and Sen. Dianne Feinstein recently accused Harlow of making “false charges” about the Senate’s torture investigation.
*
That would have provided a real service: readers would have heard what Harlow had to say about a specific news article, but also learned that Harlow has a history of dishonesty when he wants to discredit accurate reporting.

The post Propaganda of Patriotism | Unfilter 143 first appeared on Jupiter Broadcasting.

]]>
The French Disconnection | TechSNAP 211 https://original.jupiterbroadcasting.net/81082/the-french-disconnection-techsnap-211/ Fri, 24 Apr 2015 01:11:19 +0000 https://original.jupiterbroadcasting.net/?p=81082 What’s really the key to detecting a breach before its become much too late? We’ll share some key insights, plus a technical breakdown of China’s great cannon & the new New French Surveillance Law that should be a warning to us all. Plus a great round up, fantastic questions, our answers & much, much more! […]

The post The French Disconnection | TechSNAP 211 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

What’s really the key to detecting a breach before its become much too late? We’ll share some key insights, plus a technical breakdown of China’s great cannon & the new New French Surveillance Law that should be a warning to us all.

Plus a great round up, fantastic questions, our answers & much, much more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

Security analytics: The key for breach detection

  • “Although security spending is at an all-time high, security breaches at major organizations are also at an all-time high, according to Gartner, Inc. The impact of advanced attacks has reached boardroom-level attention, and this heightened attention to security has freed up funds for many organizations to better their odds against such attacks.”
  • “Breach detection is top of mind for security buyers and the field of security technologies claiming to find breaches or detect advanced attacks is at an all-time noise level,” said Eric Ahlm, research director at Gartner. “Security analytics platforms endeavor to bring situational awareness to security events by gathering and analyzing a broader set of data, such that the events that pose the greatest harm to an organization are found and prioritized with greater accuracy.”
  • The approach that seems to be in favour at the moment is: security information and event management (SIEM)
  • “While most SIEM products have the ability to collect, store and analyze security data, the meaning that can be pulled from a data store (such as the security data found in a SIEM) depends on how the data is reviewed. How well a SIEM product can perform automated analytics — compared with user queries and rules — has become an area of differentiation among SIEM providers.”
  • “User behavior analytics (UBA) is another example of security analytics that is already gaining buyer attention. UBA allows user activity to be analyzed, much in the same way a fraud detection system would monitor a user’s credit cards for theft. UBA systems are effective at detecting meaningful security events, such as a compromised user account and rogue insiders. Although many UBA systems can analyze more data than just user profiles, such as devices and geo-locations, there is still an opportunity to enhance the analytics to include even more data points that can increase the accuracy of detecting a breach.”
  • “As security analytics platforms grow in maturity and accuracy, a driving factor for their innovation is how much data can be brought into the analysis. Today, information about hosts, networks, users and external actors is the most common data brought into an analysis. However, the amount of context that can be brought into an analysis is truly boundless and presents an opportunity for owners of interesting data and the security providers looking to increase their effectiveness.”
  • “Analytics systems, on average, tend to do better analyzing lean, or metadata-like, data stores that allow them to quickly, in almost real-time speed, produce interesting findings. The challenge to this approach is that major security events, such as breaches, don’t happen all at once. There may be an early indicator, followed hours later by a minor event, which in turn is followed days or months later by a data leakage event. When these three things are looked at as a single incident that just happens to span, say, three months, the overall priority of this incident made up of lesser events is now much higher, which is why “look backs” are a key concept for analytics systems.”
  • “Ultimately, how actual human users interface with the outputs of large data analytics will greatly determine if the technology is adopted or deemed to produce useful information in a reasonable amount of time,” said Mr. Ahlm. “Like other disciplines that have leveraged large data analytics to discover new things or produce new outputs, visualization of that data will greatly affect adoption of the technology.”
  • It will be interesting to see where the industry goes with these new concepts

China’s Great Cannon

  • “This post describes our analysis of China’s “Great Cannon,” our term for an attack tool that we identify as separate from, but co-located with, the Great Firewall of China. The first known usage of the Great Cannon is in the recent large-scale novel DDoS attack on both GitHub and servers used by GreatFire.org.”
  • “On March 16, GreatFire.org observed that servers they had rented to make blocked websites accessible in China were being targeted by a Distributed Denial of Service (DDoS) attack. On March 26, two GitHub pages run by GreatFire.org also came under the same type of attack. Both attacks appear targeted at services designed to circumvent Chinese censorship. A report released by GreatFire.org fingered malicious Javascript returned by Baidu servers as the source of the attack. Baidu denied that their servers were compromised.”
  • “Several previous technical reports have suggested that the Great Firewall of China orchestrated these attacks by injecting malicious Javascript into Baidu connections. This post describes our analysis of the attack, which we were able to observe until April 8, 2015.”
  • “We show that, while the attack infrastructure is co-located with the Great Firewall, the attack was carried out by a separate offensive system, with different capabilities and design, that we term the “Great Cannon.” The Great Cannon is not simply an extension of the Great Firewall, but a distinct attack tool that hijacks traffic to (or presumably from) individual IP addresses, and can arbitrarily replace unencrypted content as a man-in-the-middle.”
  • The report is broken down into a number of sections
  • Section 2 locates and characterizes the Great Cannon as a separate system;
  • Section 3 analyzes DDoS logs and characterizes the distribution of affected systems;
  • Section 4 presents our attribution of the Great Cannon to the Government of China;
  • Section 5 addresses the policy context and implications;
  • Section 6 addresses the possibility of using the Great Cannon for targeted exploitation of individual users.
  • I wonder what the next target of the Great Cannon of China will be

New French Surveillance Law

  • “The new French Intelligence Bill has provoked concern among many of the country’s lawmakers, as well as international NGOs.”
  • “According to French Human Rights Defender Jacques Toubon, the legislation contravenes the rulings of the European Court of Human Rights”
  • “Despite boasting the support of France’s two major political parties, the Union for a Popular Movement (UMP) and the Socialist Party (PS), the Intelligence Bill has come in for some strong criticism in France, and it is now also beginning to raise eyebrows abroad.”
  • “Many international NGOs, have condemned the vague and general nature of the bill. Designed to legalise certain surveillance practices, the bill would also broaden the powers of the security services, giving them the authority to ask private operators to follow and report on the activity of internet users. The debate over using terrorism as an excuse for internet surveillance is already raging in France, since Paris decided to “block” access to certain sites in the wake of the 7 January attacks.”
  • “But the new bill goes even further. If adopted, it will allow investigators and government agents to intercept private emails and telephone conversations in the name of security, if they are directly linked to an investigation. Agents would be allowed to use new technologies wherever they deem necessary, including microphones, trackers and spy cameras. They would also be able to intercept conversations typed on a keyboard in real time. All these interceptions would be authorised by the Prime Minister, without the prior approval of a judge, and would be authorised after the fact by a new administrative authority, the National Commission for the Control of Intelligence Techniques (CNCTR).”
  • “Seven companies, including web hosting and technology companies OVH, IDS, and Gandi have said in a letter to the French prime minister Manuel Valls that they will be pushed into de facto “exile” if the French government goes ahead with the “real-time capture of data” by its intelligence agencies.”
  • Letter to French Prime Minister (in French)
  • This has caused a very large backlash from the IT community
  • Especially some of the large Internet and Server providers like Gandi, OVH, IDS, Ikoula and Lomaco who have threatened to leave France if the law passes
  • OVH and Gandi threaten to move their operations, customers, tax revenue, and most importantly, 1000s of high tech jobs
  • Hopefully this sends a clear warning to the US and other countries who are considering or proposing similar legislation, or who’s intelligence agencies have run amok
  • “The companies argued that being required by the law to install “black boxes” on their networks will “destroy a major segment of the economy,” and if passed it will force them to “move our infrastructure, investments, and employees where our customers will want to work with us.” Citing a figure of 30-40 percent of foreign users, the companies say their customers come to them “because there is no Patriot Act in France,” France’s surveillance bill (“projet de loi relatif au renseignement”) allows the government’s law enforcement and intelligence agencies to immediately access live phone and cellular data for anyone suspected of being linked to terrorism. These phone records can be held for five years.”
  • Tech firms threaten mass exodus from franch of new mass suveillance law
  • Additional Coverage
  • Hacker News

Feedback:

Some twitter comics:

Second Set:


Round Up:


The post The French Disconnection | TechSNAP 211 first appeared on Jupiter Broadcasting.

]]>
Bitcoin Recession | Tech Talk Today 154 https://original.jupiterbroadcasting.net/80077/bitcoin-recession-tech-talk-today-154/ Tue, 07 Apr 2015 10:03:04 +0000 https://original.jupiterbroadcasting.net/?p=80077 Is the Bitcoin Foundation about to collapse or is the situation a bit overblown? We’ll discuss. OnLive finally gets a shutdown date & John Oliver helps refocus the surveillance debate. Plus what we suspect is behind the elementary OS countdown clock! Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent […]

The post Bitcoin Recession | Tech Talk Today 154 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Is the Bitcoin Foundation about to collapse or is the situation a bit overblown? We’ll discuss. OnLive finally gets a shutdown date & John Oliver helps refocus the surveillance debate.

Plus what we suspect is behind the elementary OS countdown clock!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Video Feed | Torrent Feed

Become a supporter on Patreon

Foo

Show Notes:

Guys… My #1 Rig Died. What’s some of the first stuff you install/set on your new

John Oliver Just Changed The Surveillance Reform Debate | TechCrunch

It’s been almost two years since the world was captivated by Snowden’s leaks to The Guardian and The Washington Post about American surveillance programs. For weeks it seemed there was a new headline everyday about another previously classified surveillance program or another government official calling for action on this issue. Presidential review groups were called. President Obama called for major changes to the programs.

Oliver’s interview is timely as we approach an important deadline for surveillance reform on June 1. In response to the public outcry that followed the Snowden revelations, President Obama stipulated that congress must renew or reform the Patriot Act provision authorizing the bulk collection of Americans’ phone records by that date, or else the program will expire.

Last Week Tonight with John Oliver: Government Surveillance (John Oliver sits down with Edward Snowden to discuss the NSA, the balance between privacy and security @14 min. mark) : LinuxActionShow

OnLive, The First Big Streaming Games Service, Is Dead

OnLive, the first video game streaming service to really make waves (or at least headlines), is going to the great capital-C Cloud in the sky on April 30th. Ars Technica reports that all of the company’s patents have been sold off to Sony Computer Entertainment America, presumably for their PlayStation Now service, which is similarly focused on streaming games directly to players sans pesky intermediaries like the space-time continuum.

Has the Bitcoin Foundation Run Out of Cash?

The Bitcoin Foundation, an organization that promotes development of bitcoin, is ‘effectively bankrupt’ and has shed most of its staff, according to Olivier Janssens, a member of the foundation’s board of directors. Janssens attributed the foundation’s financial straits to two years of ‘ridiculous spending and poorly thought out decisions,’ adding that the board has tried to remedy the situation by finding a new executive director. Two other board members, however, said the foundation was not bankrupt, though in need of some kind of restructuring.

The Facts About the Bitcoin Foundation

BTCF Strategic Proposal

elementary Countdown

The post Bitcoin Recession | Tech Talk Today 154 first appeared on Jupiter Broadcasting.

]]>
Who’s Following ISIS | Unfilter 138 https://original.jupiterbroadcasting.net/79472/whos-following-isis-unfilter-138/ Wed, 25 Mar 2015 21:05:38 +0000 https://original.jupiterbroadcasting.net/?p=79472 Is the ISIS Cyber Division responsible for a spree of hack attacks across America? We’ll review the smattering of defacements throughout the week linked to ISIS. An Obama administration official leaks Israel’s spying, Iran talks heats up & Ted Cruz lies through his teeth on air. Direct Download: Video | MP3 Audio | OGG Audio […]

The post Who's Following ISIS | Unfilter 138 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Is the ISIS Cyber Division responsible for a spree of hack attacks across America? We’ll review the smattering of defacements throughout the week linked to ISIS. An Obama administration official leaks Israel’s spying, Iran talks heats up & Ted Cruz lies through his teeth on air.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Foo

Show Notes:

CISA Security Bill: An F for Security But an A+ for Spying | WIRED

When the Senate Intelligence Committee passed the Cybersecurity Information Sharing Act by a vote of 14 to 1, committee chairman Senator Richard Burr argued that it successfully balanced security and privacy. Fifteen new amendments to the bill, he said, were designed to protect internet users’ personal information while enabling new ways for companies and federal agencies to coordinate responses to cyberattacks. But critics within the security and privacy communities still have two fundamental problems with the legislation: First, they say, the proposed cybersecurity act won’t actually boost security. And second, the “information sharing” it describes sounds more than ever like a backchannel for surveillance.

On Tuesday the bill’s authors released the full, updated text of the CISA legislation passed last week, and critics say the changes have done little to assuage their fears about wanton sharing of Americans’ private data. In fact, legal analysts say the changes actually widen the backdoor leading from private firms to intelligence agencies. “It’s a complete failure to strengthen the privacy protections of the bill,” says Robyn Greene, a policy lawyer for the Open Technology Institute, which joined a coalition of dozens of non-profits and cybersecurity experts criticizing the bill in an open letter earlier this month. “None of the [privacy-related] points we raised in our coalition letter to the committee was effectively addressed.”


“CISA goes far beyond [cybersecurity], and permits law enforcement to use information it receives for investigations and prosecutions of a wide range of crimes involving any level of physical force,” reads the letter from the coalition opposing CISA. “The lack of use limitations creates yet another loophole for law enforcement to conduct backdoor searches on Americans—including searches of digital communications that would otherwise require law enforcement to obtain a warrant based on probable cause. This undermines Fourth Amendment protections and constitutional principles.”

Israel Denies Spying on Iran Nuclear Talks – NYTimes.com

Three top Israeli ministers on Tuesday denied a report that their intelligence services had spied on the closed-door negotiations over Iran‘s nuclear program, as tensions continued to mount between Washington and Jerusalem.

“There is no such thing as Israel spying on the Americans,” the defense minister, Moshe Yaalon, said at a pre-Passover toast, according to a transcript provided by his office. Mr. Yaalon said he had checked and found no complaint from the United States to Israeli intelligence services about such spying. “There is a strict prohibition on that,” he said.

NSA shared Americans’ private communications with Israel: Snowden

Former U.S. intelligence analyst Edward Snowden has accused the U.S. National Security Agency of routinely passing private, unedited communications of Americans to Israel, an expert on the intelligence agency said Wednesday.

James Bamford, writing in the New York Times, said Snowden told him the intercepts included communications of Arab- and Palestinian-Americans whose relatives in Israel and the Palestinian territories could become targets based on the information.

“It’s one of the biggest abuses we’ve seen,” Bamford quoted Snowden as saying.

Snowden said the material was routinely transferred to Unit 8200, a secretive Israeli intelligence organization.

Bamford cited a memorandum of understanding between the NSA and its Israeli counterpart outlining transfers that have occurred since 2009.

Leaked by Snowden and first reported by the British newspaper the Guardian, it said the material included “unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content.”

The Wall Street Journal‘s Adam Entous dropped a huge story Tuesday morning: Israel acquired classified US information while spying on the Iranian nuclear negotiations, and leaked the stolen information about the emerging deal to American lawmakers in an attempt to sabotage the Obama administration’s outreach to Tehran.

US House Votes 348-48 To Arm Ukraine, Russia Warns Lethal Aid Will “Explode The Whole Situation” | Zero Hedge

Yesterday, in a vote that largely slid under the radar, the House of Representatives passed a resolution urging Obama to send lethal aid to Ukraine, providing offensive, not just “defensive” weapons to the Ukraine army – the same insolvent, hyperinflating Ukraine which, with a Caa3/CC credit rating, last week started preparations to issue sovereign debt with a US guarantee, in essence making it a part of the United States (something the US previously did as a favor to Egypt before the Muslim Brotherhood puppet regime was swept from power by the local army).

The resolution passed with broad bipartisan support by a count of 348 to 48.

According to DW, the measure urges Obama to provide Ukraine with “lethal defensive weapon systems” that would better enable Ukraine to defend its territory from “the unprovoked and continuing aggression of the Russian Federation.”

“Policy like this should not be partisan,” said House Democrat Eliot Engel, the lead sponsor of the resolution. “That is why we are rising today as Democrats and Republicans, really as Americans, to say enough is enough in Ukraine.”

Engel, a New York Democrat, has decided that he knows better than Europe what is the best option for Ukraine’s people – a Europe, and especially Germany, which has repeatedly said it rejects a push to give western arms to the Ukraine army, and warned that Russia under President Vladimir Putin has become “a clear threat to half century of American commitment to an investment in a Europe that is whole, free and at peace. A Europe where borders are not changed by force.

This war has left thousands of dead, tens of thousands wounded, a million displaced, and has begun to threaten the post-Cold War stability of Europe,” Engel said.

Odd, perhaps the US state department should have thought of that in a little over a year ago when Victoria Nuland was plotting how to most effectively put her puppet government in charge of Kiev and how to overthrow the lawfully elected president in a US-sponsored coup.

Then again, one glance at the Rep. Engel’s career donors provides some explanation for his tenacity to start another armed conflict and to escalate what he himself defines as a cold war into a warm one.

Cruz’s Wife Heidi to Take Unpaid Leave From Goldman – Bloomberg Business

Heidi Cruz, a managing director at Goldman
Sachs Group Inc. in Houston, has taken an unpaid leave from her
private wealth-management job to help with her husband’s
campaign for the U.S. presidency, a person familiar with the
matter said.

Ted Cruz, 44, a Republican senator from Texas, said on
Twitter early Monday morning that he plans to run for president
in the 2016 election. Heidi Cruz’s leave will last the duration
of the campaign, said the person, who asked not to be identified
speaking about Cruz’s employment.

Heidi Cruz, 42, a Harvard Business School graduate who
worked in President George W. Bush’s administration, joined
Goldman Sachs in 2005 and was promoted to managing director, the
firm’s second-highest rank, in 2012. She serves as regional head
of the Houston office in the private wealth-management unit,
which serves individuals and families who have on average more
than $40 million with the firm.

The post Who's Following ISIS | Unfilter 138 first appeared on Jupiter Broadcasting.

]]>
ChromeDroid Convergence | Tech Talk Today 84 https://original.jupiterbroadcasting.net/70507/chromedroid-convergence-tech-talk-today-84/ Mon, 03 Nov 2014 10:42:47 +0000 https://original.jupiterbroadcasting.net/?p=70507 Pre-crime becomes a reality in London, powered by technology. Andy Rubin, Creator Of Android, leaves Google & we speculate if we’ll see a merging of Chrome & Android. Plus the first browser dedicated to developers is coming & more! Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube […]

The post ChromeDroid Convergence | Tech Talk Today 84 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Pre-crime becomes a reality in London, powered by technology. Andy Rubin, Creator Of Android, leaves Google & we speculate if we’ll see a merging of Chrome & Android.

Plus the first browser dedicated to developers is coming & more!

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

BBC News – London police trial gang violence ‘predicting’ software

Police in London have tested software designed to identify which gang members are most likely to commit violent crimes.

The 20-week pilot study is thought to have been the first of its kind in the UK, although similar experiments have been carried out elsewhere.

It used five years worth of historic data, but the idea would be to analyse up-to-date details if it is deployed.


Civil liberty campaigners have voiced concerns.

But Accenture – the firm that developed the software – highlighted the potential benefit it offered.

“You’ve got limited police resources and you need to target them efficiently,” said Muz Janoowalla, head of public safety analytics at the company.


“What this does is tell you who are the highest risk individuals that you should target your limited resources against.”
Flagging threats


The software works by merging together data from existing systems already used by the Metropolitan Police and carrying out predictive calculations.

Types of information ranged from previous crimes to social media activity.

Australian Courts Will Be Able To See Your Browsing History

A series of slips by the nation’s top cop followed by communications minister Malcolm Turnbull has made Australia’s data retention bill even more of a potential horror than it seemed when it was introduced last week.” Writes Richard Chirgwin in an article about Australia’s new legislation.. “lawyers are already gathering, telling the ABC’s PM program that metadata could be demanded in family law cases and insurance cases” it continues, with the inevitable result that your internet browsing history will be used against people trying to resist demands during divorce. “What’s depressing is that Australians probably won’t take to the streets about this issue.

Andy Rubin, Creator Of Android, Leaves Google

According to the WSJ, Andy Rubin left Google after almost a decade of working for the company. He has been working at Google since 2005, when his company at the time, Android Inc., was acquired by the search giant. Rubin was in charge of Android until last year, when he was replaced as Android chief by Sundar Pichai, then the SVP of Chrome.

The First Browser Dedicated to Developers is Coming

We’ve redesigned the browser by looking at it through a completely new filter to put developers’ interests first. It’s built by developers for developers so you can debug the whole Web, allowing you to more easily build awesome Web experiences. It also integrates some powerful new tools like WebIDE and the Firefox Tools Adapter.

Soon, we’re going to bring you more, a lot more, in a package that you deserve as a builder for an independent Web.

Get ready to spread the word (#Fx10 #ChooseIndependent) or sign up for our Hacks newsletter here to be emailed as soon as the browser is available.

We can’t wait to share it with you on November 10th.

The post ChromeDroid Convergence | Tech Talk Today 84 first appeared on Jupiter Broadcasting.

]]>
Obama’s NSA Pivot | Unfilter 91 https://original.jupiterbroadcasting.net/54102/obamas-nsa-pivot-unfilter-91/ Wed, 26 Mar 2014 20:49:51 +0000 https://original.jupiterbroadcasting.net/?p=54102 Obama is now promising reforms to how the NSA collects phone records, but are the changes as comprehensive as we are being led to believe?

The post Obama's NSA Pivot | Unfilter 91 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Obama is now promising reforms to how the NSA collects phone records, but are the changes as comprehensive as we are being led to believe? We’ll cover some of the big gaps still being left open for the NSA to exploit.

Without missing a beat western powers work together to encircle Russia, and its clear the focus of world security has changed, we’ll bring you up to date on the latest in Ukraine.

Plus our thoughts on the media’s heyday with Flight 370, your feedback, and much much more.

On this week’s episode of, Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —



NSA is Crazy

Obama’s New NSA Proposal and Democratic Partisan Hackery

As for the substantive reform, the fact that the President is now compelled to pose as an advocate for abolishing this program – the one he and his supporters have spent 10 months hailing – is a potent vindication of Edward Snowden’s acts and the reporting he enabled.

And now the President himself depicts himself as trying to end it. Whatever test exists for determining whether “unauthorized” disclosures of classified information are justified, Snowden’s revelations pass the test with ease.

That President Obama now proclaims the need to end a domestic spying program that would still be a secret in the absence of Snowden’s whistleblowing proves that quite compellingly.

The House’s NSA Bill Could Allow More Spying Than Ever. You Call This Reform?

While the full draft of the bill isn’t yet public, the Guardian has seen a copy, and its description does not inspire confidence. Under the Rogers and Ruppersberger proposal, slyly named the “End Bulk Collection Act”, the telephone companies would hold on to phone data. But the government could search data from those companies based on “reasonable articulable suspicion” that someone is an agent of a foreign power, associated with an agent of a foreign power, or “in contact with, or known to, a suspected agent of a foreign power”. The NSA’s current phone records program is restricted to a reasonable articulable suspicion of terrorism.

A judge would reportedly not have to approve the collection beforehand, and the language suggests the government could obtain the phone records on citizens at least two “hops” away from the suspect, meaning if you talked to someone who talked to a suspect, your records could be searched by the NSA. Coupled with the expanded “foreign power” language, this kind of law coming out of Congress could, arguably, allow the NSA to analyze more data of innocent Americans than it could before.

President Obama’s reported proposal sounds more promising, though we have even fewer details than the Intelligence Committee proposal. The administration’s plan would supposedly end the collection of phone records by the NSA, without requiring a dangerous new data retention mandate for the phone companies, while restricting analysis to the current rules around terrorism and, importantly, still requiring a judge to sign off on each phone-record search made to the phone companies – under what the New York Times described as “a new kind of court order”.

If, for some reason, your phone number happens to be within three hops of an NSA target, all of your calling records may be in the corporate store, and thus available for any NSA analyst to search at will.

Obama’s NSA reform leaves out email, text and social media

But, what seems to be lost amidst today’s victory is that the NSA, right at this very moment, is collecting data via email, text, social media, and mobile apps. This should be a big concern.

US Moral High Ground Completely Gone As China Demands US Stop Spying On Its

Some people forget this, but the day before the very first of the Ed Snowden revelations, there were plenty of headlines about how President Obama was about to meet with China’s President Xi Jinping, with a major focus of the talk being about how Obama wanted to the Chinese to stop their “cyberattacks” on US companies. An anonymous “senior White House official” was quoted at the time saying:

_“We expect this to become a standing issue in the US/China relationship. We believe that all nations need to abide by international norms and follow the rules of the road and that means dealing with actions emanating from your territory.”
_

The NSA Has a Media Kit

The media kit came with a short letter from an NSA spokesperson, which explained that the kit is about the NSA’s “mission and contributions to national defense.”

The kit “may inform your national security beat reporter or team” and “enhance awareness of NSA’s role in defending the nation,” the letter reads. The kit “may inform your national security beat reporter or team” and “enhance awareness of NSA’s role in defending the nation,” the letter reads.

The kit actually consists of two pamphlets. The large one defines the agency as “a unique national asset,” but warns that “most of the details about how NSA contributes to national security can’t be publicly discussed without tipping off America’s adversaries.”


Did Flight 370 Coverage Create new breed cable news beast?

Too much coverage of plane mystery?

So, a new formula: When you find a story you think will sell, pound it, over and over again, to the exception of pretty much everything else. And that’s what CNN did with the missing plane.

Media judgment vanished in Flight MH370 coverage

So we remain glued to the saga of Flight MH370, filling the gaps in our understanding the same way the television networks fill their airtime, by spreading crazy theories, speculating about tiny blobs on satellite images and just generally pretending we know what we’re talking about when we obviously have no clue. We can’t get enough. Precisely because there isn’t enough.

CNN’s Don Lemon: ‘Is It Preposterous’ to Think a Black Hole Caused Flight 370 to Go Missing?

CNN’s Don Lemon has been entertaining all sorts of theories about the missing Malaysian Airlines Flight 370, including the chance something “supernatural” happened, but on Wednesday night, he actually asked panelists about the possibility a black hole was involved.

Lemon brought this up along with other “conspiracy theories” people have been floating on Twitter, including people noting the eerie parallels to Lost and The Twilight Zone, and wondered, “is it preposterous” to consider a black hole as a possibility?

– Thanks for Supporting Unfilter –

:-] christopher
:-] Lodwin C
:-] Adam O
:-] Carlos S
:-] Michael
:-] Tracy Q
:-] Sean

  • Thanks to our 370 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


The West Works Together to stop Russia

Barack Obama: Russia is a regional power showing weakness over Ukraine

President Barack Obama has described Russia as no more than a “regional power” whose actions in Ukraine are an expression of weakness rather than strength, as he restated the threat from the G7 western allies and Japan that they would inflict much broader sanctions if Vladimir Putin went beyond annexation of Crimea and moved troops into eastern Ukraine.

Ukraine crisis: Gunfire and explosions as Crimean base is stormed by Russian troops

Machine guns and stun grenades were used in the assault by Russian soldiers as they ended the siege of Belbek military airport in a brutal show of power. The commander of the base, Colonel Yuli Manchur, who had led his men in defying repeated demands for surrender, was arrested and taken away.

Russia Ominously Building Up Troops on Border with Ukraine

Martin reports Defense Secretary Chuck Hagel called the Russian Defense Minister to ask about the troop movements and was told they are only “exercises.” But no timetable was given for when the “exercises” will end.

BRICS rejects sanctions against Russia over Ukraine

The White House said earlier on Monday that US President Barack Obama and the leaders of Britain, Canada, France, Germany, Italy and Japan decided to end Russia’s role in the G8 over the crisis in Ukraine and the status of Crimea.

Meanwhile, the G7 group of top economic powers has snubbed a planned meeting that Russian President Vladimir Putin was due to host in the Black Sea resort city of Sochi in June.


If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Obama's NSA Pivot | Unfilter 91 first appeared on Jupiter Broadcasting.

]]>
Cold War 2.0 | Unfilter 90 https://original.jupiterbroadcasting.net/53652/cold-war-2-0-unfilter-90/ Wed, 19 Mar 2014 21:09:17 +0000 https://original.jupiterbroadcasting.net/?p=53652 Putin’s next move is revealed. What is his end-game, how far will the US go, and are we witnessing the launch of the next cold war?

The post Cold War 2.0 | Unfilter 90 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Putin’s next move is revealed, showing once again he’s two steps ahead of Obama and the world. But what is his end-game, how far will the US go, and are we witnessing the launch of the next cold war? As Russia digs in, the US doubles down on their toothless bite. We’ll discuss.

While the corporate media capitalizes on a lost flight, Edward Snowden makes another public appearance, this time with a much more polished message. We’ll look at Snowden’s changing role in the NSA debate, and discuss the outrageous new leaks that came out this week.

Plus your feedback, our follow up, and much much more.

On this week’s episode of, Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


NSA is Crazy

Edward Snowden: The Biggest Revelations Are Yet to Come

In a surprise appearance via satellite robot at the 2014 TED conference in Vancouver, Snowden said there is still a lot of reporting to be done, including diving deeper into the accusation that the NSA tricks companies into building backdoors into their systems that make data vulnerable to hackers across the world.

“Rights matter because you never know when you’re going to need them,” Snowden said, adding that people should be able to pick up the phone and call their family, send a text to their loved ones and travel by train without worrying about how these events will look to a government years in the future.

Edward Snowden: Here’s how we take back the Internet

Appearing by telepresence robot, Edward Snowden speaks at TED2014 about surveillance and Internet freedom. The right to data privacy, he suggests, is not a partisan issue, but requires a fundamental rethink of the role of the internet in our lives — and the laws that protect it. “Your rights matter,” he say, “because you never know when you’re going to need them.” Chris Anderson interviews, with special guest Tim Berners-Lee.

NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls – The Washington Post

The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.

The voice interception program, called MYSTIC, began in 2009. Its RETRO tool, short for “retrospective retrieval,” and related projects reached full capacity against the first target nation in 2011. Planning documents two years later anticipated similar operations elsewhere.

In the initial deployment, collection systems are recording “every single” conversation nationwide, storing billions of them in a 30-day rolling buffer that clears the oldest calls as new ones arrive, according to a classified summary.

The call buffer opens a door “into the past,” the summary says, enabling users to “retrieve audio of interest that was not tasked at the time of the original call.” Analysts listen to only a fraction of 1 percent of the calls, but the absolute numbers are high. Each month, they send millions of voice clippings, or “cuts,” for processing and long-term storage.

At the request of U.S. officials, The Washington Post is withholding details that could be used to identify the country where the system is being employed or other countries where its use was envisioned.

Ubiquitous voice surveillance, even overseas, pulls in a great deal of content from Americans who telephone, visit and work in the target country. It may also be seen as inconsistent with Obama’s Jan. 17 pledge “that the United States is not spying on ordinary people who don’t threaten our national security,” regardless of nationality, “and that we take their privacy concerns into account.”

US tech giants knew of NSA data collection, agency’s top lawyer insists | World news | theguardian.com

The senior lawyer for the National Security Agency stated unequivocally on Wednesday that US technology companies were fully aware of the surveillance agency’s widespread collection of data, contradicting months of angry denials from the firms.

Rajesh De, the NSA general counsel, said all communications content and associated metadata harvested by the NSA under a 2008 surveillance law occurred with the knowledge of the companies – both for the internet collection program known as Prism and for the so-called “upstream” collection of communications moving across the internet.

Asked during a Wednesday hearing of the US government’s institutional privacy watchdog if collection under the law, known as Section 702 or the Fisa Amendments Act, occurred with the “full knowledge and assistance of any company from which information is obtained,” De replied: “Yes.”

Nancy Pelosi Admits That Congress Is Scared Of The CIA

In response to Senator Dianne Feinstein’s speech last week calling out the CIA for spying on her staffers, Rep. Nancy Pelosi was asked to comment and gave what might be the most revealing comments to date as to why Congress is so scared of the CIA:

_“I salute Sen. Feinstein,” Pelosi said at her weekly news conference of the chairwoman of the Senate Intelligence Committee. “I’ll tell you, you take on the intelligence community, you’re a person of courage, and she does not do that lightly. Not without evidence, and when I say evidence, documentation of what it is that she is putting forth.”

Pelosi added that she has always fought for checks and balances on CIA activity and its interactions with Congress: "You don’t fight it without a price because they come after you and they don’t always tell the truth._


:– Jason H
:– David H

– Thanks for Supporting Unfilter –

  • Thanks to our 363 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.


Putin Wins this Round

Putin signs Russia-Crimea treaty

Mr Putin told parliament that Crimea, which was taken over by pro-Russian forces in February, had “always been part of Russia”.

Legacy of Iraq Putin in Western criticism: “They tell us that we are violating the norms of international law. First of all, it’s good that they at least remember that international law exists”

“They tell us that we are violating the norms of international law. First of all, it’s good that they at least remember that international law exists,” Putin said, pointing at what he called the U.S. trampling of international norms in wars in Serbia, Iraq, Afghanistan and Libya.

Unknown Snipers Once Again Stir Up Violence

However, there were indications that it was the separatist Crimean government’s recently created “Self Defence Forces” who had actually carried out the fatal attack. Local officials, meanwhile, claimed that “fascist snipers” had fired the first shot from a residential building and one of the injured was one of the defence force members.

Why Russia No Longer Fears the West – Ben Judah – POLITICO

The focus is on Crimea, but next is the fight for Ukraine

Only the criminally naive or the hardened fellow-traveller could maintain that the pro-Russian groups now working to produce chaos, disorientation and violence in cities such as Donetsk and Kharkiv are not actively supported by Moscow.


Feedback:

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post Cold War 2.0 | Unfilter 90 first appeared on Jupiter Broadcasting.

]]>
NSA Wargames | Unfilter 78 https://original.jupiterbroadcasting.net/47892/nsa-wargames-unfilter-78/ Thu, 12 Dec 2013 00:13:02 +0000 https://original.jupiterbroadcasting.net/?p=47892 The NSA Spying Scandal is Costing U.S. Tech Giants Billions, and until this week they’ve remained nearly silent, and politely complicent.

The post NSA Wargames | Unfilter 78 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The NSA Spying Scandal is Costing U.S. Tech Giants Billions, and until this week they’ve remained nearly silent, and politely complicent.

Now eight of the largest tech companies joined forces to push back against the Government spying policies.

Meanwhile new leaks continue to be published, the latest detail the infiltration of online gaming communities to conduct massive surveillance of gamers.

Don’t worry everything’s just fine, the mainstream media is reporting the economy is on the fast track to recovery now, and unemployment is down. We’ll discuss the reality of the situation, plus your feedback, and much more.

On this week’s episode of, Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


Edward Snowden’s Rough Week

Eric Michael O’Neill (born March 3, 1973) is a former American FBI counter-terrorism and counterintelligence operative. He worked and was entitled as an Investigative Specialist with the Special Surveillance Group (SSG) and played a major role in the arrest, conviction, and life imprisonment of FBI agent Robert Hanssen for spying on behalf of the Soviet Union and the Russian Federation.

The ABC News doyenne pushed hard to have NSA leaker*Edward Snowden *at the top of her list of 10 most fascinating people of the year — but in the end was overruled by network brass, a source told Confidenti@l.

In addition to Snowden, the others chosen for the much-anticipated special includeJennifer Lawrence, Miley Cyrus, Kim Kardashian and Kanye West (starring jointly as KimYe), baby Prince George, the cast of “Duck Dynasty,” swimmer Diana Nyad, “Good Morning America” hostRobin Roberts andPope Francis.

The European parliament is lining up Edward Snowden to give evidence by video link this month, in spite of resistance by British Conservatives, a Green MEP has announced.


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Caleb J

  • Chris S

  • Robert R

  • Sigmund V

  • David P

  • Brady L

  • Paul B

  • Thomas D

  • Alex

  • John I

  • Shayne

  • Robert B

  • Alexander R

  • Eric B

  • Faran J

  • Daniel P

  • Michael P

  • Sean W

  • Thanks to our 290 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience. ‘

  • Supporter perk: Exclusive BitTorrent Sync share of our production and non-production clips, notes, and more since the NSA scandal broke in episode 54. The ultimate Unfiltered experience, just got more ultimate.

  • Supporter Perk: Past 5 supporters shows, in a dedicated bittorrent sync folder.

  • Unfilter lands on Dec 25th and Jan 1st. No main show those weeks, but supporters only shows will air. A limited time opportunity to have the entire lineup in the sync folder for easy listening.


World of Spycraft

Online games might seem innocuous, a top-secret 2008 NSA document warned, but they had the potential to be a “target-rich communication network” allowing intelligence suspects “a way to hide in plain sight.” Virtual games “are an opportunity!,” another 2008 NSA document declared.

But for all their enthusiasm — so many CIA, FBI and Pentagon spies were hunting around in Second Life, the document noted, that a “deconfliction” group was needed to avoid collisions — the intelligence agencies may have inflated the threat.

The documents do not cite any counterterrorism successes from the effort, and former American intelligence officials, current and former gaming company employees and outside experts said in interviews that they knew of little evidence that terrorist groups viewed the games as havens to communicate and plot operations.

During Smith’s 6 years on Eve, he used the game to communicate covert messages with the US State Department. Being the perfect cover, online games like Eve provide a pathway of communication between the US government and overseas operatives on nearly secured channels because of the cryptic messages being passed back and forth.

The friend recalls that Smith was on Eve the night of the attack and conveyed that sirens could be heard in the distance, and suddenly would go offline, then pop back up. In the last communication, Smith said “GUNFIRE”, logged off – and never returned. – See more at: https://www.occupycorporatism.com/state-department-covers-up-ambassador-stevens-death-at-rented-villa-in-benghazi/#sthash.DWzBGG2S.dpuf

Beck accuse Sean Smith and his colleagues of either working with the CIA or of being CIA agents, and that some of Smith’s final messages to the outside world – which were sent to members of the EVE Online community – were actually coded, and intended for the CIA.

NSA is CRAZY

The agency’s internal presentation slides, provided by former NSA contractor Edward Snowden, show that when companies follow consumers on the Internet to better serve them advertising, the technique opens the door for similar tracking by the government. The slides also suggest that the agency is using these tracking techniques to help identify targets for offensive hacking operations.

According to the documents, the NSA and its British counterpart, GCHQ, are using the small tracking files or “cookies” that advertising networks place on computers to identify people browsing the Internet. The intelligence agencies have found particular use for a part of a Google-specific tracking mechanism known as the “PREF” cookie. These cookies typically don’t contain personal information, such as someone’s name or e-mail address, but they do contain numeric codes that enable Web sites to uniquely identify a person’s browser.

“In our Q1 earnings call of November 13th, we stated that product orders in China declined 18% in Q1 FY14, whereas in Q4 FY13, we referenced that our business in China had declined 6%,” a Cisco spokesperson told Ars. “By comparison, China bookings were up 8% in Q3 FY13. So, yes, there is a short-term trend of declining business in China, which we have acknowledged.”

“We shouldn’t have gathered economic intelligence under the guise of security – not with an ally,” Clinton told O Globo, a newspaper in Rio de Janeiro.

On Monday the companies, led by Google and Microsoft, presented a plan to regulate online spying and urged the United States to lead a worldwide effort to restrict it. They accompanied it with an open letter, in the form of full-page ads in national newspapers, including The New York Times, and a website detailing their concerns.

Apple, Yahoo, Facebook, Twitter, AOL and LinkedIn joined Google and Microsoft in saying that they believed in governments’ right to protect their citizens. But, they said, the spying revelations that began last summer with leaks of National Security Agency materials by Edward J. Snowden showed that “the balance in many countries has tipped too far in favor of the state and away from the rights of the individual.”


War on Unemployment Benefits Heats Up

One reason the unemployment insurance extension wasn’t included in the budget deal: cost. The budget deal includes about $22 billion in deficit reduction over two years. (It cuts $85 billion but allows spending caps to rise by $63 billion.)

Extending unemployment will cost about $25 billion for one year. It would undo the bill’s savings. That doesn’t mean Congress won’t do it. But they couldn’t credibly pair it with their modest budget bill.

Sen. Rand Paul says “black unemployment in America is double white unemployment” and “hasn’t budged” under President Obama. Actually, the black unemployment rate is lower now than when Obama took office, and the gap between the races is below the historical average.

CEO vs. Worker inequality

  • The Average CEO makes 354 times what the average worker makes[3]
    [year: ratio between worker/CEO earnings]

1982: 42:1
1992: 201:1
2002: 281:1
2012: 354:1

Feedback:

If you’re a Supporter check your inbox!

Call us: 1.425.312.1756

Follow the Us:

The post NSA Wargames | Unfilter 78 first appeared on Jupiter Broadcasting.

]]>
From Russia with Love | Unfilter 56 https://original.jupiterbroadcasting.net/39512/from-russia-with-love-unfilter-56/ Wed, 26 Jun 2013 22:03:41 +0000 https://original.jupiterbroadcasting.net/?p=39512 After escaping from Hong Kong the media went into overdrive. We’ll reflect on the continued character assassination and the new revelations from his leaks.

The post From Russia with Love | Unfilter 56 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Edward Snowden dominates the mainstream headlines, as he makes his escape from Hong Kong. We’ll reflect on their continued character assassination and arm you with the critical thinking you’ll need to form your own opinions on his motivations.

Warrantless dragnet surveillance of the Internet expands beyond the borders of the US. This week it was revealed Britain’s spy agency the GCHQ has secretly gained access to the network cables that carry the world’s phone calls and internet traffic, which it has admitted to sharing with the NSA. Effectively creating a world-wide police state.

Plus the troubling death of Michael Hastings, your feedback, and much much more.

On this week’s Unfilter.

Direct Download:

Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter Supporter:

— Show Notes —


Michael Hastings Death Twists

Hastings was researching a story about a privacy lawsuit brought by Florida socialite Jill Kelley against the Department of Defense and the FBI.

He was scheduled to meet with a Kelley representative next week in L.A. to discuss the case, according to a person close to Kelley. Hastings wrote for Rolling Stone and the website BuzzFeed.

He was best known for a 2010 Rolling Stone profile that led to the resignation of Gen. Stanley McChrystal.

On Wednesday night, the anti-secrecy website WikiLeaks published a message on Twitter that Hastings had contacted a lawyer for the organization hours before his car smashed into a tree on North Highland Avenue in Los Angeles.

The message read: “Michael Hastings contacted WikiLeaks lawyer Jennifer Robinson just a few hours before he died, saying that the FBI was investigating him.”

The Federal Bureau of Investigation said Hastings was never under investigation by the agency.

The bureau responded in a statement: “At no time was journalist Michael Hastings ever under investigation by the FBI.”

“Hey [redacted copy], the Feds are interviewing my ‘close friends and associates.’ Perhaps if authorities arrive ‘BuzzFeed GQ’, er HQ, may be wise to immediately request legal counsel before any conversations or interviews about our news-gathering practices or related journalism issues,” Hastings wrote in the email.

“Also: I’m onto a big story, and need to go off the radar for a bit,” he added. “All the best, and hope to see you all soon.” He signed the letter, “Michael.”

Roughly 15 hours later, 33-year-old Hastings was dead.

I’m here to state that I’ve seen dozens of cars hit walls and stuff at high speeds and the number of them that I have observed to eject their powertrains and immediately catch massive fire is, um, ah, zero. Modern cars are very good at not catching fire in accidents. The Mercedes-Benz C-Class, which is an evolutionary design from a company known for sweating the safety details over and above the Euro NCAP requirements, should be leading the pack in the not-catching-on-fire category.


The Media Misdirection in Full Force

Instead of devoting coverage to surveillance information revealed by Edward Snowden, the mainstream US media has slandered him.


– Thanks for Supporting Unfilter –

This Week’s New Supporters:

  • Blake J
  • Buc Z
  • Brendan B
  • Sean
  • Thomas E
  • Sheldon G
  • Khashayar K
  • Alex K
  • Jon L
  • George H
  • Paul S
  • Harm
  • Thanks to our 110 Unfilter supporters!

  • Supporter perk: Downloadable Pre and Post show. Extra clips, music, hijinks, and off the cuff comments. The ultimate Unfiltered experience.


GCHQ taps Fibre-optic Cables for Secret Access to World’s Communications

Britain’s spy agency GCHQ has secretly gained access to the network of cables which carry the world’s phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).

The sheer scale of the agency’s ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.

The British spy agency GCHQ has access to the global network of communications, storing calls, Facebook posts and internet histories – and shares this data with the NSA, Edward Snowden has revealed to the Guardian in a new leak


Where in the World is Snowden

“My position with Booz Allen Hamilton granted me access to lists of machines all over the world the NSA hacked. That is why I accepted that position about three months ago,” he told Hong Kong’s South China Morning Post during an interview on June 12 that was published on Tuesday.

Edward Snowden signed on to work with intelligence contractor Booz Allen Hamilton only to obtain information about the United States’ surveillance programs, the NSA leaker told the South China Morning Post.

Edward Snowden, who is wanted by the United States for leaking state secrets, is not collaborating with Russia’s Federal Security Service, the FSB, anti-secrecy group WikiLeaks said on its Twitter feed Wednesday.


Second NSA whistleblower being ignored

But again I find it fascinating that so much attention is being put on Snowden at the exact same time as another NSA whistleblower Russell Tice just stepped forward with some incredible revelations including the fact that in 2004 the NSA was wire tapping soon-to-be president Barack Obama, then an Illinois State Senator, presumably for the purpose of blackmailing the information that they found out about him. As well as General David Petraeus, White House General Secretary Scott McClelland – a whole range of names that Russell Tice has just revealed.


Spying on US is Nothing New for the NSA