Welcome to friends of Liberty!
.: Home | Your Account | Submit News | Search | Topics | Top 10 :.
  Wisdoms Maw

Now "live" via Kindle


  The Video

  Main Menu
· Home
· Advertising
· Calendar
· Feedback
· IP_Tracking
· Recommend Us
· Search
· Statistics
· Stories Archive
· Submit News
· Surveys

Friends of Liberty: Privacy

Search on This Topic:   
[ Go to Home | Select a New Topic ]

 Throwing Rocks At The Google Bus: by Douglas Rushkoff

How Growth Became the Enemy of Prosperity

Workers lose to automation, investors lose to algorithms, and even tech developers lose their visions to the demands of the startup economy.

According to Douglas Rushkoff’s new book, Throwing Rocks at the Google Bus: How Growth Became the Enemy of Prosperity, the digital economy has gone wrong, and no one quiet knows how to fix it. The problems lie not with digital technology itself, but in the ways we are deploying it: instead of building a distributed digital economy that new networks could foster, we’re doubling down on the industrial age mandate for growth above all.

But it doesn’t have to be this way. In the era of big data, robots, and the gig economy, Rushkoff calls for a bridge to the human-technology divide in a way that optimizes the economy for the people it’s supposed to serve.

Join New America for a conversation with Douglas Rushkoff on how to reboot out obsolete economic operating system from the inside out – and prosper along the way.

Posted by editor on Monday, February 22 @ 05:43:12 UTC (2611 reads)
(Read More... | 3489 bytes more | Score: 5)


by Howard Nema
November 9, 2015

I have learned through friends that Barbara Hartwell has been maliciously attacking and spreading lies about me. She claims I have not deleted her work, when I have, long ago. Aside from this post there is not one article, link or video on TRUTH TALK NEWS or HowardNema.com that I have not deleted. Yet she continuously attacks me, tries to discredit me and even was so lame as to publish my real name, as if it is a secret. 

Oh, heavens to Betsy. I have mentioned my REAL name, Howard Nemaizer on air many times and use Howard Nema simply because it has been my stage name as a musician and it is easy to remember. There is no great “deception” or alias. I don’t know if I can say that about BH, but I don’t attack others and normally ignore inaccurate rantings. BH ‘s obsession with trying to discredit me should be very revealing to those who know me and my work; and now the absence of any of the material BH claims I refuse to remove should set the record straight.

But BH keeps stalking me and posting disinformation. Like the fact I was asked to do a local radio show on UNITED FM RADIO by owner Keith Mutch, who saw my appearance on WAPJ and invited me to do a weekly 3 hr show. It had been a year since I did any live radio and I agreed. We did several shows before I quit due to owner Keith Mutch’s shock jock style attacking residents, many I know in town, which caused great conflict and guilt by association with some of my friends here in Torrington, who informed me that Keith was convicted of felony arson. I don’t need people like Keith Mutch in my life any more than I need Barbara Hartwell in my life. In any case, BH benefited far more from our association than I did, despite her lies, cries of outrage and crocodile tears. 

You see, I QUIT long before BH posted that I was a radio host on UNITED FM. Get your facts straight, Barbara if you are going to accuse people, unless facts and truth no longer matter to you. I remember when I thought they did. Your actions make me question everything you have ever confided in me with and everything we discussed on radio shows. You revealed your true self by attacking me. And I am sorry we ever met, Barbara. Honestly, much as I thought I knew Barbara Hartwell, I clearly did not know her at all. 

But I know her now and I know her game: By their fruits shall we know them. This is the only and final response to BH. There has been much omitted from her attacks like the money I gave her and took her in when she faced homelessness. Barbara Hartwell lived at my home rent free in “squalor” for six weeks eating fried shrimp and filet mignon provided by yours truly. There are lots of questions Bab’s refuses to answer publicly.


Why isn’t Barbara with her own family on Thanksgiving?

Why won’t her OWN family help her?   She has a son who refused to help her until I left her on his doorstep in  Hyde Park, NY, as a last resort.  He was FORCED to take her in.

And why did she turn on me,  after claiming to be so desperate and on the verge homelessness  then complain how I displaced her when she was going to be thrown out on the street?

I think she thought she had found another sucker to pay her bills.  Her vindictive attacks are as relentless as her pursuit of  “donations”.

My wife didn’t like the idea at all, but she went along with it and we took Barbara in.

In those 6 weeks she didn’t lift a finger to help around the house and even disobeyed wishes to make her presence living in Our home a secret from my in-laws and neighbors, who ultimately informed my landlord, by which time my wife was already quite sick of Barbara and her non-conformity of house rules:  smoking in the house, spilling coffee and wine and leaving tobacco and cigarette butts all around Our property.  It was as if we were the help and she was paying us to be her housekeepers instead of giving her free room and board.

Did I mention that I moved her stuff from Maine to Connecticut for free, in a van I rented and paid for.  The expenses of the move came close to $400...


Complete article here: http://www.howardnema.com/2015/11/09/addressing-barbara-hartwells-compulsive-attacks/

Posted by editor on Tuesday, November 10 @ 15:15:15 UTC (4417 reads)
(Read More... | 7647 bytes more | Score: 5)

 CISA Systemic Domestic Spying

Technology in cyber space is designed to be the instrument of a totality surveillance society. Secretive methods, back doors, observation and collection of data have been in place for decades. CISA is the latest legislation authorization agreement that provides liability exemption for law enforcement and spooks to conduct their systematic assimilation with the codes and functions of technological development for the intended purpose of efficient monitoring of electronic communication.  

Coercion for compliance from any resisting tech giant will provide the government with the brute force to muscle their way past any remnants of Fourth Amendment Bill of Right protections.

The fact that there is so much enthusiasm in Congress to further gut civil liberties comes as no surprise but is frightening that the push back is so weak. 

Senate overwhelmingly passes historic cybersecurity bill is reported by CNN accordingly, “It took several tries, but on Tuesday the U.S. Senate approved a measure to help American companies work more closely with law enforcement to fight off hackers. The Cybersecurity Information Sharing Act (CISA) overwhelmingly passed with a vote of 74 to 21.”

The S.754 - Cybersecurity Information Sharing Act of 2015 summary is provided online.

(Sec. 3) Requires the Director of National Intelligence (DNI), the Department of Homeland Security (DHS), the Department of Defense (DOD), and the Department of Justice (DOJ) to develop and promulgate procedures to promote: (1) the timely sharing of classified and declassified cyber threat indicators in possession of the federal government with private entities, non-federal government agencies, or state, tribal, or local governments; (2) the sharing of unclassified indicators with the public; and (3) the sharing of cybersecurity threats with entities to prevent or mitigate adverse effects.

As with so much of the language used by government to sanitize the real functions of providing legal cover for unlawful practices by passing additional unconstitutional laws, CISA is a true Trojan horse. Regretfully, your virus protection will not protect your computer content or privacy. 

This is how the mainstream media is framing the “so called” intent and purpose of the legislation. U.S. Senate approves measure to help companies work with law enforcement to fight hackers.

“The bill calls for "real-time" sharing. Companies in a hurry might not wipe the data enough before law enforcement gets it, expanding how much they know about Americans.

Those jumbles of code known as "cyber threat indicators" could still be revealing about Americans' daily lives.

DHS isn't allowed to wipe personal data if another agency, like NSA, objects.

And even though law enforcement is only allowed to collect "cyber threat indicators," cops can use them to investigate "an imminent threat of death," bodily harm, economic harm and "terrorist" acts.

"It creates the wrong impression about what this bill does," said Jeff Greene, a top policy attorney at Symantec who wants that language cut out of the bill.

Perhaps most importantly, companies that share too much -- and accidentally harm their customers -- are protected from lawsuits. A key provision in CISA is the complete elimination of liability for companies that share data. Last week, U.S. Senator Rand Paul warned, "It makes your privacy agreement not worth the paper it's written on."

The Presidential campaign for Rand Paul falters not because he is wrong about defending personal liberty, but because so many Americans are oblivious or reconciled to the treason of the District of Criminal political class. Disconnect is obvious and grows worse with each passing year and little ever improves. Actually, it is hard to remember when the last time a true victory came out of the Federal government.

CISA is a prime example of public apathy in an environment of voluntary Facebook disclosure using the countenance of “PC” algorithm censorship.

Objection to additional violations of privacy measures that confuse the masses, while empowering the authoritarians further is expressed in the reasoned position by the Electronic Frontier Foundation. Their assessment is spot on in, EFF Disappointed as CISA Passes Senate.

“The conference committee between the House of Representatives and the Senate will determine the bill's final language. But no amount of changes in conference could fix the fact that CISA doesn't address the real cybersecurity problems that caused computer data breaches like Target and the U.S. Office of Personnel Management (OPM).

The passage of CISA reflects the misunderstanding many lawmakers have about technology and security. Computer security engineers were against it.  Academics were against it. Technology companies, including some of Silicon Valley’s biggest like Twitter and Salesforce, were against it. Civil society organizations were against it. And constituents sent over 1 million faxes opposing CISA to Senators.”

If so many tech companies and factions express their opposition to this draconian legislation and can be ignored so easily, how can average Americans protect their most personal information? Well, the most basic common sense safeguard is to be extremely guarded with any aspect of your life that is freely placed online. 

In an age of computerization germinating into an artificial intelligence matrix of human replacement, the cause of maintaining the essence of individual identity may well require carving out a wilderness reclusive retreat. However, how many people will drive their range rover with GPS tracker and an iPhone to their secret hideaway?  

Most people are acclimated to the socialization of popular culture. Addicted to smart phone trivia is a prime exemplar of technology gone awry. Nevertheless, the notion that devices are neutral and are not often designed to embody intrinsic dehumanization is a foreign concept to the trendy crowd. 

However, that is exactly where high-tech corporatists are herding the sheeple into the pit of self-induced conformity and submission. Here is where the security hysteria of government imposition tyranny becomes routine in a society that has lost all self-respect. 

When Edward Snowden warns that “The NSA has built an infrastructure that allows it to intercept almost everything”, CISA encodes an unconstitutional legality for a domestic spying integration with tech companies and ISP providers that expedites the collection and storage of electronic digital data on ANYONE. 

This is the operational purpose of despotic agencies that once were charged with legitimate foreign intelligence gathering that has redirected their capabilities on their new enemy “Patriots”, now called domestic terrorists. The hidden translation in their ciphers is that citizen dissenters are the targets of their echelon antennas and dishes. 

The use of StingRay, an IMSI-catcher (International Mobile Subscriber Identity), is a controversial cellular phone surveillance device that fits nicely under the CISA umbrella. Now that it is disclosed, IRS possessed Stingray cellphone surveillance gear, documents reveal; isn’t it convenient that CISA will indeed facilitate sharing for the benefit of added government control. No doubt DHS can be trusted? RIGHT . . . just like the IRS did not target conservative groups.

People need to get serious about the number one threat from the terror coming out of their own government. Congressional arrogance and Senate hubris in passing CISA has become the new normal. Close behind are the likes of Facebook, who may be the secret force behind the surveillance bill “CISA”. 

  • All privacy policies effectively null and void. Companies can share any private user data with the government, without a warrant, as long as the government says it is being used for a “cybersecurity” purpose.
  • In exchange, companies are given blanket immunity from civil and criminal laws, like fraud, money laundering, or illegal wiretapping (if a violation was committed or exposed in the process of sharing data).
  • Data is shared with a wide array of government agencies, from the FBI and NSA, to the IRS and local law enforcement. Many of these agencies have been breached within the last year and have outdated security systems, opening up the doors to even more cyber attacks.
  • Companies that play along can get otherwise classified intelligence data from the government, including private information about their competitors. 

This is the future of the total surveillance state. Those corporatist companies that actively seek to extract the substance of personal identity for use as a marketing asset need to be exposed and punished for their betrayal of trust. When Mark Zuckerberg once called Facebook users “dumb f*cks” for trusting him with their data, he exposed himself for the scumbag that he is. 

Technology of personal privacy destruction is a curse. Marry that engineering with the insatiable appetite of the NSA Spying on Americans, and you have a formula for a system of individual identity obliteration. 

Establishing and instituting legitimate cybersecurity is a function of inventing and fostering the actual solutions to protect the nation, its businesses and the public. Rewarding a corporate accord for disclosing real time information to the DHS with blanket liability immunity is one additional step towards a complete Fascist union. 

Even if the Fourth Amendment is not a top priority for government worshipers, the dehumanization of one’s own dignity should give pause for anyone who still has the ability to look in the mirror. CISA only protects the power establishment as it exposes and exploits your inner most secrets.

SARTRE – November 3, 2015  

- See more at: http://batr.org/autonomy/110315.html#sthash.RZyEI0Bw.dpuf

Posted by editor on Monday, November 02 @ 17:54:48 UTC (4542 reads)
(Read More... | 13322 bytes more | Score: 0)

 Urban Military Martial Law

by James Hall
May 2, 2015

Are you ready for a “Long Hot Summer”? The prospects for urban riots are hyped as a breach of domestic security. The mass propaganda media does not waste a moment to ratchet up the tension and fear that torching neighborhoods will come to a community in your area. If people were able to apply critical thinking, they would realize that local incidents are being managed to increase and spread discontent nationwide. That asphalt jungle is paved with assault vehicles moving into place before your own eyes. The purpose is to manage disorder with the imposition of military tactics. As urban fires burn, advocates of an authoritarian police state implement their master plan for the final destruction of America...

- See more at: http://batr.org/#sthash.LU89VEtn.dpuf


Posted by editor on Thursday, May 07 @ 10:38:09 UTC (7717 reads)
(Read More... | 1122 bytes more | Score: 0)


May 5, 2015


MIAMI (AP) -- Investigators do not need a search warrant to obtain cellphone tower location records in criminal prosecutions, a federal appeals court ruled Tuesday in a closely-watched case involving the rules for changing technology.

The Atlanta-based 11th U.S. Circuit Court of Appeals, overturning a three-judge panel of the same court, concluded that authorities properly got 67 days' worth of records from MetroPCS for Miami robbery suspect Quartavious Davis using a court order with a lower burden of proof.

In its 9-2 decision, the 11th Circuit decided Davis had no expectation of privacy regarding historical records establishing his location near certain cellphone towers. The records were key evidence used to convict Davis of a string of armed robberies, leading to a 162-year prison sentence...

Posted by editor on Thursday, May 07 @ 10:28:36 UTC (7726 reads)
(Read More... | 1843 bytes more | Score: 0)

 Edward Snowden Explains Why You Should Use Passphrases, Not Passwords

by Eric Ravenscraft

We’ve talked a lot about password security, and how you should be using longer, complex passphrases, rather than short passwords. In this video, Edward Snowden explains why you should use passphrases in a way all your friends and family can understand.

Posted by editor on Saturday, April 11 @ 17:21:14 UTC (7836 reads)
(Read More... | 705 bytes more | Score: 0)

 Snowden: Apple iPhone with Secret iFeature Allows Government to Spy on You

By Aaron Mamiit, Tech Times
January 24, 2015

Edward Snowden, the infamous former contractor for the National Security Agency who leaked thousands of pages of previously classified NSA intelligence documents, reportedly thinks that Apple's iPhone has "special software" that authorities can activate remotely to be able to gather information about the user.

"Edward never uses an iPhone; he's got a simple phone," said the lawyer of Snowden, Anatoly Kucherena, in an interview with the Russian media company RIA Novosti.

"The iPhone has special software that can activate itself without the owner having to press a button and gather information about him; that's why on security grounds he refused to have this phone," Kucherena added.

It is not clear if the "special software" being referred to in the interview is made up of standard diagnostic tools, or if the NSA whistleblower thinks intelligence agencies from the United States have found a way to compromise the mobile operating system developed by Apple.

Apple was among the first companies accused of participating in the PRISM data mining project of the NSA, following the release by Snowden of the agency's classified documents. The project reportedly involved extracting video, audio, pictures, documents, emails and connection logs from devices, allowing analysts to track the movement of the device's user and the communications that they are receiving or sending out.

At the time, the accusations were immediately denied by Apple, stating that the company is not involved in the supposed PRISM project and that it does not grant government agencies direct access to the company's servers...

Posted by editor on Sunday, January 25 @ 01:20:01 UTC (11312 reads)
(Read More... | 2189 bytes more | Score: 0)

 Ron Paul group to defy IRS

BY: Joel Gehrke April 15, 2014 | 2:15 pm
Washington Examiner

Ron Paul's nonprofit Campaign for Liberty will fight the Internal Revenue Service's demand that it reveal its donor list to the agency, despite having already been fined for refusing to do so.

"There is no legitimate reason for the IRS to know who donates to Campaign for Liberty," Megan Stiles, the communications director at Campaign for Liberty, told the Washington Examiner in an email on Tuesday. "We believe the First Amendment is on our side as evidenced by cases such as NAACP v. Alabama and International Union UAW v. National Right to Work. Many 501(c)(4) organizations protect the privacy of their donors in the very same way as Campaign for Liberty. For some reason the IRS has now chosen to single out Campaign for Liberty for special attention. We plan to fight this all the way."

Ron Paul suggested that the group will refuse to pay the IRS fine in an fundraising email to supporters about the agency's request for information.

"Paying this outrageous extortionist fine — just to exercise our rights as American citizens to petition our government — may even be cheaper in the short run," he wrote. "But it’ll just embolden an alphabet soup of other federal agencies to come after us." Paul's email said that the rule requiring that 501(c)(4)s list their donors is "rarely enforced."

Stiles accused the IRS of trying to silence her organization. "The IRS technically requires donor information from 501(c)(4) organizations and is forbidden by law from releasing it to the public, yet despite this they have 'mistakenly' released the information repeatedly over the years," she wrote. "Often these leaks have been made to political opponents of the conservative groups whose information was leaked. Leaking the donor information is intended to harass and to intimidate those donors from donating to political causes. Campaign for Liberty has refused to provide donor information to the IRS to protect the privacy of our members. Now the IRS has demanded the information and fined Campaign for Liberty for protecting its members’ privacy."

Posted by editor on Friday, April 25 @ 20:53:33 UTC (5691 reads)
(Read More... | 2675 bytes more | Score: 0)

 Sen. Paul announces 'historic' class-action suit over NSA spying

Sen. Rand Paul on Wednesday announced what he described as one of the largest class-action lawsuits in history, taking President Obama and top intelligence officials to court over National Security Agency surveillance. 

"This, we believe, will be a historic lawsuit," the Kentucky Republican said. The suit, joined by conservative advocacy group FreedomWorks, was filed in U.S. District Court in the District of Columbia. 

It alleges that the NSA program that sweeps up and stores massive amounts of telephone "metadata" -- which includes where and when calls are made, but not the contents of the calls -- violates the Fourth Amendment. The suit asks the court to rule the program unconstitutional and forbid the government from continuing it. 

"There's a huge and growing swell of protest in this country of people who are outraged that their records would be taken without suspicion, without a judge's warrant and without individualization," Paul said, at a press conference in Washington. 

He said hundreds of thousands of people have joined, and predicted the suit could "conceivably represent hundreds of millions of people who have phone lines in this country."...

Posted by editor on Wednesday, February 12 @ 10:01:22 UTC (4774 reads)
(Read More... | 1631 bytes more | Score: 0)

 Judge deals blow to NSA phone data program

Published December 16, 2013

A federal judge ruled Monday that the National Security Agency's bulk collection of phone records likely violates the Constitution, in a major setback for the controversial spy agency. 

U.S. District Court Judge Richard Leon granted a preliminary injunction sought by plaintiffs Larry Klayman and Charles Strange. However, he also stayed his decision "pending appeal," giving the U.S. government time to fight the decision over the next several months. 

The judge wrote that he expects the government to "prepare itself to comply with this order when, and if, it is upheld."...

Posted by editor on Monday, December 16 @ 18:14:12 UTC (5062 reads)
(Read More... | 806 bytes more | Score: 0)

 Government Spies Forcing Privacy Email Services To Shut Down

Steve Watson
December 12, 2013

GCHQ, the British counterpart and facilitator to the NSA, has forced a privacy focused email service to shut down because it could not effectively spy on the encrypted emails people were sending.

As the blog IT Security Guru reports, a beta version of the PrivateSky service from London-based web security firm CertiVox was shut down early in 2013 following a government order.

The secure email encryption service, which worked with both web based email and Outlook, had “tens of thousands of heavily active users” before it was targeted by government spooks, according to the developers.

Brian Spector, CEO of CertiVox, tells reporters “Towards the end of 2012, we heard from the National Technical Assistance Centre (NTAC), a division of GCHQ and a liaison with the Home Office, [that] they wanted the keys to decrypt the customer data.”

“So they had persons of interest they wanted to track and came with a RIPA warrant signed by the home secretary. You have to comply with a RIPA warrant or you go to jail.” Spector adds.

Because the PrivateSky system works by splitting the root key between the company and the user, CertiVox was simply unable to wholly fulfil the government demand to hand over the data.

“So as far as I know we are the first to do that so if the NSA or GCHQ says ‘hand it over’… they cannot do anything with it until they have the other half, where the customer has control of it.” Spector notes.

The CEO also says that his company could only have continued to offer the secure email system by allowing government spies to have backdoor access to it – completely defeating the point of PrivateSky...

Posted by editor on Thursday, December 12 @ 13:40:08 UTC (4669 reads)
(Read More... | 2154 bytes more | Score: 1)

 Spies worry over 'doomsday' cache stashed by ex-NSA contractor Snowden

(Reuters) - British and U.S. intelligence officials say they are worried about a "doomsday" cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud.

The cache contains documents generated by the NSA and other agencies and includes names of U.S. and allied intelligence personnel, seven current and former U.S. officials and other sources briefed on the matter said.

The data is protected with sophisticated encryption, and multiple passwords are needed to open it, said two of the sources, who like the others spoke on condition of anonymity to discuss intelligence matters...


Posted by editor on Tuesday, November 26 @ 16:07:09 UTC (3335 reads)
(Read More... | 1065 bytes more | Score: 0)

 America's Plan to Kill Online Privacy Rights Everywhere

By Colum Lynch
Foreign Policy
Wednesday, November 20, 2013

The United States and its key intelligence allies are quietly working behind the scenes to kneecap a mounting movement in the United Nations to promote a universal human right to online privacy, according to diplomatic sources and an internal American government document obtained by The Cable.

The diplomatic battle is playing out in an obscure U.N. General Assembly committee that is considering a proposal by Brazil and Germany to place constraints on unchecked internet surveillance by the National Security Agency and other foreign intelligence services. American representatives have made it clear that they won't tolerate such checks on their global surveillance network. The stakes are high, particularly in Washington -- which is seeking to contain an international backlash against NSA spying -- and in Brasilia, where Brazilian President Dilma Roussef is personally involved in monitoring the U.N. negotiations.

The Brazilian and German initiative seeks to apply the right to privacy, which is enshrined in the International Covenant on Civil and Political Rights (ICCPR), to online communications. Their proposal, first revealed by The Cable, affirms a "right to privacy that is not to be subjected to arbitrary or unlawful interference with their privacy, family, home, or correspondence." It notes that while public safety may "justify the gathering and protection of certain sensitive information," nations "must ensure full compliance" with international human rights laws. A final version the text is scheduled to be presented to U.N. members on Wednesday evening and the resolution is expected to be adopted next week.

A draft of the resolution, which was obtained by The Cable, calls on states to "to respect and protect the right to privacy," asserting that the "same rights that people have offline must also be protected online, including the right to privacy." It also requests the U.N. high commissioner for human rights, Navi Pillay, present the U.N. General Assembly next year with a report on the protection and promotion of the right to privacy, a provision that will ensure the issue remains on the front burner.

Publicly, U.S. representatives say they're open to an affirmation of privacy rights. "The United States takes very seriously our international legal obligations, including those under the International Covenant on Civil and Political Rights," Kurtis Cooper, a spokesman for the U.S. mission to the United Nations, said in an email. "We have been actively and constructively negotiating to ensure that the resolution promotes human rights and is consistent with those obligations."

But privately, American diplomats are pushing hard to kill a provision of the Brazilian and German draft which states that "extraterritorial surveillance" and mass interception of communications, personal information, and metadata may constitute a violation of human rights. The United States and its allies, according to diplomats, outside observers, and documents, contend that the Covenant on Civil and Political Rights does not apply to foreign espionage.

In recent days, the United States circulated to its allies a confidential paper highlighting American objectives in the negotiations, "Right to Privacy in the Digital Age -- U.S. Redlines." It calls for changing the Brazilian and German text so "that references to privacy rights are referring explicitly to States' obligations under ICCPR and remove suggestion that such obligations apply extraterritorially." In other words: America wants to make sure it preserves the right to spy overseas...

Posted by editor on Sunday, November 24 @ 02:11:46 UTC (3665 reads)
(Read More... | 5093 bytes more | Score: 0)

 CIA Collects Money Transfer Data from Western Union and Others

November 15th, 2013, 08:32 GMT
By Lucian Parfeni

For the past few months, since the Edward Snowden revelations went public, the NSA has been the focus of most reports, along with its British counterpart, the GCHQ. That makes sense, since Snowden worked for the NSA when he decided to gather information to leak and most of the documents he collected were from the GGHQ.

But these aren't the only two spy agencies messing with people's privacy and going beyond what the laws that govern them allow or should allow.

The CIA is collecting all financial transactions processed by the likes of Western Union, including those to and from the US. What this means is that the CIA has on hand a list of all transfers processed by Western Union including those of Americans.

The idea is to track the funding of various terrorist organizations and individuals associated with them or, at least, that's what anonymous officials say the program is for.

The agency would not confirm the program. But it is claimed that the program is legal under the Section 215 of the Patriot Act and is overseen by the Foreign Intelligence Surveillance Court. These are the same conditions that make most of NSA's surveillance "legal."

Allegedly, the data on Americans can't be searched by CIA agents, even if it's stored, unless they can be tied to terrorist organizations. The data is also supposed to be deleted after a few years.

Both the New York Times and the Wall Street Journal have reported on the matter, citing sources inside the government.

What's encouraging in all of this is that, for once in the past few months, these revelations don't come from the Edward Snowden documents. Of course, it's bad news that there are many of these types of programs that need to be revealed, but it's a good thing that they are finally unveiled, one way or another.

Posted by editor on Saturday, November 16 @ 13:46:36 UTC (3759 reads)
(Read More... | 2496 bytes more | Score: 0)

 To Stop Junk Mail, Stop Receiving Mail

by Bill Rounds

I hated having to check the mail. When I did receive mail in my mailbox, it was mostly ads, bulk mail and mass mailers that were a complete waste of my time and a waste of trees. Before I had figured out how to stop junk mail, I still had to go through that pile of junk in order to not miss the occasional important piece of mail that I got. I found a way to stop receiving mail and don’t receive regular mail anymore. You don’t have to either.  I will show you one way to stop receiving mail.

Problems Sending Mail From Home

All of these options will prevent someone from snooping through your mail, possibly taking important items or even stealing your identity.

Sending mail from the curbside mailbox in front of your own home can be dangerous, especially if you are paying bills through the mail. You should never leave a piece of mail with a personal check in your curbside mailbox. These problems sending mail are related to the problems receiving mail at home.  By receiving mail at your home, you disclose the identity of the people who live there to anyone who might be curious. Not only might your mail contain your name on the outside, there may be sensitive information on the inside. You may receive checks, credit card offers or other pieces of mail that sit unattended near the street. This kind of information can be gold to private investigators and identity thieves. Receiving mail at an address that is not your permanent home might also expose you to income tax in a state that is not the state with which you have the strongest connection.

To Stop Junk Mail, Start Online

There are ways to stop receiving mail that you don’t want by contacting many of the mass mailing marketing agencies that keep track of you and send junk mail to you.  I may cover that in another post, but my purpose here is to show you how to stop receiving mail altogether to stop junk mail.  It is actually possible to stop receiving mail at your curb side mailbox, even if you have received mail at that address before. First, it is helpful to eliminate all important mail, like bank statements, credit card bills, etc. Check those kinds of important accounts online if possible. Online security protocol should be followed of course.

To Stop Junk Mail, Use A New Address

You still may have items or accounts that do not allow for electronic monitoring, or you may not want to risk the potential insecurity of online activity. For these items you can use a PO box or private mail receiving agency, like Earth Class Mail, to receive your mail. Another option is to receive mail at an office or location that has more security than a curb side mail box. All of these options will prevent someone from snooping through your mail, possibly taking important items or even stealing your identity. Earth Class Mail is also a good way to easily dispose of unwanted junk mail easily.

Once you no longer depend on the mail for service, you can take steps to stop mail delivery to your home. The post office allows requests from customers to hold delivery of their mail for up to 30 days. I am unaware if there are any limits to how often you can do this, or if you can extend this request for longer than 30 days.

Stop Receiving Mail By Not Checking Mail

You can rely on another postal regulation to cease mail delivery to your house completely. I don’t think the USPS likes people doing this, but it is within the regulations of the post office. If your mail accumulates in your mailbox and more mail cannot be reasonably delivered, the mailman will take all of your mail and hold it at the post office. Oreo will double stuff their cookies, the post office will not.  He will not deliver more mail to your house until you pick your mail up at the post office. You will be notified with a short note left in your mailbox where your pile of useless junk mail once sat. Once you have read the note, you should leave it in the mailbox for good so that the mailman is not aware that you have ever seen the note. They will only hold your mail for a few weeks, so anything older than a few weeks will be returned to sender.

This is easier to do if you can avoid the mailman. It might make for uncomfortable conversation if you regularly do yoga on your front lawn whenever your mailman comes by or if you see him at parties. If your house appears to be a vacation home, this technique will also be more effective.


I do not think the post office intends for people to stop checking their mail so they can stop receiving their mail.  That is the unintended result of their policy.  This is just one of many of the strategies discussed in the book How To Vanish that are legal but that the authorities don’t really want you to know about.  Do not let your private information sit unattended at the curb every day.  If possible use a reputable CMRA such as Earth Class Mail as this will both protect your privacy, increase peace of mind and save you time. It will also help you when you are traveling outside of tax free states so that you don’t expose yourself to unjust tax liability.  Fight the urge to check your mail just for a while and you will never have to check it again.

Posted by editor on Friday, November 08 @ 17:59:46 UTC (3190 reads)
(Read More... | 6850 bytes more | Score: 0)

 Being an Existential Prepper

October 28, 2013

It may seem that an analysis of the prepper cultural phenomena is a trite endeavor, but if you delve into the philosophical underpinnings of human instincts for survival, a worthy lesson can be the result. Since life is a gift, the conditions upon which it ends or voluntarily forfeited, are not necessarily dependent upon the will of the individual. A calculated act of placing your life at risk is not equivalent with a deliberate suicide. The functions and purpose of the prepper community is in direct conflict with those individuals that languish in hopeless despair and desperation. The response of the prepper to social turmoil is to prepare for contingencies. Yet that defensive posture avoids the essential question, what is the point of surviving if the communal environment is a hopeless wasteland.

A novel plot for a pilot reality show entitled Preppers vs. Self-Sufficientists gives a comparison.

"Picture a quiet street in a small suburban town, Somewhere, U.S.A. On the left side of the street live the Self-Sufficientists, community-minded folks who believe that being self-reliant in the event of whatever disaster or hardship may come is good for everyone. The right side of the street is reserved for the Preppers, people who mind their own business, look after themselves, and are armed and ready to defend the freedoms they hold dear."

What accounts for this different approach towards survival, largely depends upon the peril level and perceived type of social dislocation and political unrest that might follow. The populace dismisses both viewpoints, discounted by the vast majority of urban inhabitants that are entirely dependent upon the interdependent public services and just in time distribution systems that sustain their lifestyle.

Whether a natural disaster, a social unrest upheaval, a financial bubble or a breakdown of infrastructure or services; the expectation is that the government will respond. Meeting the needs of the dispossessed is now seen as a civil right, no matter what the circumstance.

Proverbs 27:12 -

"A prudent person foresees the danger ahead and takes precautions. The simpleton goes blindly on and suffers the consequences."

For the dependent dwellers, they never assume the personal responsibility to take even the most modest precautions. The remediation of dire consequences falls upon first responders, FEMA facilities and government subsidies. Prepping for an unknown catastrophic disaster would interfere with texting and surfing.

Reliance upon a fragile technological communication cloud, when a storm is on the horizon, is foolish to the prudent person. However, common sense and practical skills are distinctly on the decline, even when found in the postmodern artificial intelligence matrix.


Therefore, when the prepper enthusiast emerges as a counter weight to urban apathy, the slackers lash out against the rural refuge mindset that promotes independence and self-reliance...

Posted by editor on Tuesday, October 29 @ 05:09:00 UTC (3041 reads)
(Read More... | 4338 bytes more | Score: 0)

 US admits: French surveillance revelations raise 'legitimate questions'

Paul Lewis in Washington and Angelique Chrisafis in Paris
theguardian.com, Monday 21 October 2013 23.24 BST

The White House conceded on Monday that revelations about how its intelligence agencies have intercepted enormous amounts of French phone traffic raised "legitimate questions for our friends and allies".

In a statement released after a phone call between Barack Obama and his counterpart, François Hollande, the White House made one of its strongest admissions yet about the diplomatic impact of the disclosures by the former NSA contractor Edward Snowden.

The French government had earlier summoned the US ambassador in Paris on Monday to demand an urgent explanation over claims that the National Security Agency had engaged in widespread phone and internet surveillance of French citizens.

The French daily Le Monde published details from the NSA whistleblower Edward Snowden, suggesting the NSA had been intercepting French phone traffic on what it termed "a massive scale".

"The president and President Hollande discussed recent disclosures in the press – some of which have distorted our activities, and some of which raise legitimate questions for our friends and allies about how these capabilities are employed," the White House said in a statement. 

"The president made clear that the United States has begun to review the way that we gather intelligence, so that we properly balance the legitimate security concerns of our citizens and allies with the privacy concerns that all people share. The two presidents agreed that we should continue to discuss these issues in diplomatic channels."

Le Monde said more than 70m French phone calls had been recorded in one 30-day period late last year. Techniques included the automatic recording of conversations from certain numbers, and sweeping up text messages based on keywords. Le Monde warned that the interceptions were likely to have targeted not just those with suspected terrorist links but also people in business and politics...

Posted by editor on Monday, October 21 @ 21:07:32 UTC (4883 reads)
(Read More... | 2640 bytes more | Score: 0)

 How the NSA Thinks About Secrecy and Risk

At this point, the agency has to assume that all of its operations will become public, probably sooner than it would like.

Bruce Schneier
The Atlantic.com
Oct 4 2013, 11:06 AM ET

The former monitoring base of the NSA in Bad Aibling, Germany (Reuters)

As I report in The Guardian today, the NSA has secret servers on the Internet that hack into other computers, codename FOXACID. These servers provide an excellent demonstration of how the NSA approaches risk management, and exposes flaws in how the agency thinks about the secrecy of its own programs.

Here are the FOXACID basics: By the time the NSA tricks a target into visiting one of those servers, it already knows exactly who that target is, who wants him eavesdropped on, and the expected value of the data it hopes to receive. Based on that information, the server can automatically decide what exploit to serve the target, taking into account the risks associated with attacking the target, as well as the benefits of a successful attack. According to a top-secret operational procedures manual provided by Edward Snowden, an exploit named Validator might be the default, but the NSA has a variety of options. The documentation mentions United Rake, Peddle Cheap, Packet Wrench, and Beach Head—all delivered from a FOXACID subsystem called Ferret Cannon. Oh how I love some of these code names. (On the other hand, EGOTISTICALGIRAFFE has to be the dumbest code name ever.)

Snowden explained this to Guardian reporter Glenn Greenwald in Hong Kong. If the target is a high-value one, FOXACID might run a rare zero-day exploit that it developed or purchased. If the target is technically sophisticated, FOXACID might decide that there's too much chance for discovery, and keeping the zero-day exploit a secret is more important. If the target is a low-value one, FOXACID might run an exploit that's less valuable. If the target is low-value and technically sophisticated, FOXACID might even run an already-known vulnerability.

We know that the NSA receives advance warning from Microsoft of vulnerabilities that will soon be patched; there's not much of a loss if an exploit based on that vulnerability is discovered. FOXACID has tiers of exploits it can run, and uses a complicated trade-off system to determine which one to run against any particular target...

Posted by editor on Saturday, October 05 @ 20:47:49 UTC (6221 reads)
(Read More... | 3102 bytes more | Score: 0)

 NSA disguised itself as Google to spy, say reports

by Edward Moyer
September 12, 2013 2:19 PM PDT

If a recently leaked document is any indication, the US National Security Agency -- or its UK counterpart -- appears to have put on a Google suit to gather intelligence.

Here's one of the latest tidbits on the NSA surveillance scandal (which seems to be generating nearly as many blog items as there are phone numbers in the spy agency's data banks).

Earlier this week, Techdirt picked up on a passing mention in a Brazilian news story and a Slate article to point out that the US National Security Agency had apparently impersonated Google on at least one occasion to gather data on people. (Mother Jones subsequently pointed out Techdirt's point-out.)

Brazilian site Fantastico obtained and published a document leaked by Edward Snowden, which diagrams how a "man in the middle attack" involving Google was apparently carried out.

A technique commonly used by hackers, a MITM attack involves using a fake security certificate to pose as a legitimate Web service, bypass browser security settings, and then intercept data that an unsuspecting person is sending to that service. Hackers could, for example, pose as a banking Web site and steal passwords.

The technique is particularly sly because the hackers then use the password to log in to the real banking site and then serve as a "man in the middle," receiving requests from the banking customer, passing them on to the bank site, and then returning requested info to the customer -- all the while collecting data for themselves, with neither the customer nor the bank realizing what's happening. Such attacks can be used against e-mail providers too.

It's not clear if the supposed attack in the Fantastico document was handled by the NSA or by its UK counterpart, the Government Communications Headquarters (GCHQ). The article by the Brazilian news agency says, "In this case, data is rerouted to the NSA central, and then relayed to its destination, without either end noticing."

"There have been rumors of the NSA and others using those kinds of MITM attacks," Mike Masnick writes on Techdirt, "but to have it confirmed that they're doing them against the likes of Google... is a big deal -- and something I would imagine does not make [Google] particularly happy."

Google provided a short statement to Mother Jones reporter Josh Harkinson in response to his questions on the matter: "As for recent reports that the US government has found ways to circumvent our security systems, we have no evidence of any such thing ever occurring. We provide our user data to governments only in accordance with the law." (The company is also trying to win the right to provide more transparency regarding government requests for data on Google users.)

CNET got a "no comment" from the NSA in response to our request for more information...


Posted by editor on Friday, September 13 @ 03:32:48 UTC (3745 reads)
(Read More... | 3783 bytes more | Score: 0)

 Tahoe and Tor: Building Privacy on Strong Foundations

September 6, 2013 | By Danny O'Brien

Many people want to build secure Internet services that protect their users against surveillance, or the illegal seizure of their data. When EFF is asked how to build these tools, our advice is: don't start from scratch. Find a public, respected, project which provides the privacy-protecting quality you want in your own work, and find a way to implement your dream atop these existing contributions.

So, for instance, the New Yorker's Strongbox, a dropbox for anonymous sources, uses Tor as its basis to provide anonymity to its users. If you want anonymity in your app, building your tool on top of Tor's backbone means you can take advantage of its experience and future improvements, as well as letting you contribute back to the wider community.

Anonymity is only one part of what will make the Net secure and privacy-friendly, though. The recent NSA revelations as well as glitches and attacks on single services like GitHub, Amazon, Twitter and the New York Times, have prompted demand for online data storage that doesn't depend on companies who might hand over such data or compromise security to comply with government demands, nor depend on one centralised service that could taken down through external pressure.

Tahoe-LAFS draws from a combination of computer security philosophies, backed up with cryptography implement in open-source code.

The Principle of Least Authority In computer science, the principle of least authority means granting the minimum set of permissions necessary to accomplish a task. For example, someone who is a contributing blogger on a website doesn't need full administrator access to a site. Tahoe attempts to apply this principle to online file storage by ensuring through encryption that the organization storing your data can't see all your data, and that users can be given fine-grained access through cryptographic capabilities.

Cryptographic capabilities In Tahoe-LAFS, you can read or write a file in the system only if you know a (rather long) set of characters, or key. The capability keys are different for each file, which means you can share a picture by sending a friend one capability key without giving them access to everything. You can also give people power to create or even edit files by sending them different keys. Using capability-based security means there's no central authority that manages access control for you, as with Dropbox or Google Docs. You're in charge of spreading (or withholding) your capability keys.

Erasure coding A method of redundantly storing data over a number of servers that allows data to be reconstructed, even if a certain number of those servers get shut down or corrupted. In the default Tahoe network, data is spread over ten drives, and can be read even if seven of those servers are lost. That means you don't have to rely on one provider, and makes Tahoe storage harder to disrupt.

The Tahoe Least Authority File System (Tahoe-LAFS) has been actively developed since 2007. Just as Tor concentrates on anonymity, Tahoe-LAFS's developers have worked hard to create a resilient, decentralized, infrastructure that lets you store online both data you'd want to keep private, as well as data you want to share with selected groups of friends. It's also able to protect against a single source of failure or censorship, like a commercial service being attacked or responding to a takedown.

Tahoe-LAFS is open source, but this month, some of the Tahoe project's founders launched S4, a commercial "PRISM-proof" secure, off-site backup service which uses Tahoe as a backend, and Amazon as a storage site.

Tahoe's protections against third-party snooping and deletion have the kind of strong mathematical guarantees that reassure security experts that Tahoe-LAFS is well-defended against certain kinds of attack. That also means its privacy and resilience are not dependent on the good behaviour or policies of its operators (see the box for more info).

Secure online backups like S4 are  one possible use for Tahoe's time-tested code and approach. You and your friends can run your own Tahoe network, sharing storage space across a number of servers, confident that your friends can only see and change what they have the caps to see, and that even if a sizeable number of those servers disappear, your data will still be retrievable. Services like git-annex-assistant, a decentralised Dropbox-like folder synchroniser, already optionally offer it as backend. Some privacy activists have run private Tahoe networks over Tor, creating an anonymous, distributed, and largely censorship-proof, storage system.

It's great to see commercial services like S4 emerging in the face of our new knowledge about pervasive online surveillance. Even better is the possibility that others, including entrepreneurs, designers and usability experts, will stand on the shoulders of the secure possibilities that protocols like Tor and Tahoe provide, and give us all innovative Internet tools that can truly keep users and their data safe and sound.

Posted by editor on Monday, September 09 @ 23:29:42 UTC (5255 reads)
(Read More... | 6786 bytes more | Score: 0)

 Crucial Unanswered Questions about the NSA's BULLRUN Program

September 9, 2013 | By Dan Auerbach and Kurt Opsahl

As we work hard to promote encryption on the web through tools like our browser extension HTTPS Everywhere, we also pay close attention to attacks that undermine the security of that encryption. That's why we were dismayed by last Thursday's revelations about the National Security Agency's aggressive efforts to undermine the ability of citizens to communicate securely. It's not surprising that the NSA would try to break cryptographic systems in whatever way they can, but the deeply pernicious nature of this campaign—undermining national standards and sabotaging hardware and software—as well as the amount of overt private sector cooperation are both shocking.

These leaks should not lead us to privacy nihilism – while we cannot be certain about the NSA's capabilities, we have good reason to believe that the mathematical underpinnings of crypto systems in widespread use remain strong. We are safer when communicating with encryption and anonymity tools. This is especially true for open source tools that are developed in public view and provide a higher level of auditability than closed tools. Even if the NSA and other major spying powers like the United Kingdom, China, and Russia have advanced attacks and backdoors, strong encryption can make their spying more difficult while protecting against less sophisticated adversaries.

And while it is important not to despair, a thorough examination of the available information from the NSA is in order, both so that we can bolster our defenses against these attacks on our communications infrastructure, and so that we can have an open democratic debate about what tactics are appropriate for the NSA to use. Unfortunately, while last Thursday's articles and documents about the BULLRUN program paint a picture of spy agencies working hard on a variety of fronts in order to undermine our ability to communicate securely, these broad brush strokes leave many key questions unanswered.

Does the NSA hold the private SSL encryption keys of major communication service providers like Facebook, Google, and Microsoft?

We've recently been worried about the privacy of keys that are supposed to be in the hands of service providers and no one else. A very large fraction of the world's online communications flow through a handful of service providers, and in turn a handful of private keys used by those providers serve as a gateway to the communications of billions of people. It is therefore critical to know whether or not the NSA has these private keys, since that would mean the agency has unfettered access to a huge swath of the world's online communications.1

Posted by editor on Monday, September 09 @ 23:19:43 UTC (3632 reads)
(Read More... | 4431 bytes more | Score: 0)

 Edward Snowden Reveals Secret Decryption Programs: 10 Things You Need To Know

By Ryan W. Neal
International Business Times
on September 06 2013 12:38 PM

Former NSA contractor Edward Snowden has leaked new documents to The Guardian and The New York Times that reveal expensive secret programs in the NSA and GCHQ aimed at defeating online privacy by decrypting email, online banking and medical records. Security experts have said that the programs “undermine the fabric of the Internet,” but can they really be any worse than the surveillance programs Snowden outted, like PRISM and XKeyscore? Here are 10 things you need to know about the latest Snowden leak.

1.       Codenamed Bullrun and “Edgehill”

The NSA’s decryption program was named "Bullrun" after the major battle in the American Civil War, while the British program was named "Edgehill" after a battle in the English Civil War. According to the documents leaked by Snowden, Bullrun aims to “defeat the encryption used in specific network communication technologies.” Similarly, Edgehill aimed to decrypt the four major Internet communication companies: Hotmail, Google, Yahoo and Facebook.

2.      Bullrun Began 10 Years Ago

Snowden showed how the NSA had been working for a decade to break Internet encryption technologies. A major breakthrough for the NSA came in 2010, when it was able to exploit Internet cable taps to collect “vast amounts” of data.

3.       NSA and GCHQ View Encryption as a Threat

One document leaked by Snowden showed that the NSA described its program as “the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.” Both the NSA and GCHQ described encryption, used to ensure privacy and establish confidence in Internet commerce, as a threat to their mission against terrorism.

4.       Bullrun Is the Most Expensive Program Leaked by Snowden

The funding allocated for Bullrun in top-secret budgets dwarfs the money set aside for programs like PRISM and XKeyscore. PRISM operates on about $20 million a year, according to Snowden, while Bullrun cost $254.9 million in 2013 alone. Since 2011, Bullrun has cost more than $800 million.

5.       Bullrun Influences Product Design

A majority of the funding for Bullrun goes toward actively engaging tech companies in their product design. The NSA covertly influenced tech companies to insert vulnerabilities into commercial products that would allow the NSA access without consumers’ knowledge. Snowden did not name specific tech companies that were involved.

6.       GCHQ Has Lofty Goals For Edgehill

Edgehill started with the initial goal of decrypting the programs used by three major Internet companies, which were unnamed in Snowden’s leak, and 30 Virtual Private Networks. GCHQ hopes that by 2015 Edgehill will have decrypted 15 major Internet companies and 300 VPNs...

Posted by editor on Monday, September 09 @ 22:55:21 UTC (3105 reads)
(Read More... | 3494 bytes more | Score: 0)

 Facebook to compensate users for sharing details on ads

By Joe Miller
BBC News
August 27, 2013

Approximately 614,000 Facebook users whose personal details appeared in ads on the site without their permission will each receive a $15 (£9.65) payout.

The names and pictures of an estimated 150 million Facebook members were used in Sponsored Stories, but only those who responded to an email from the site earlier this year will be compensated.

Privacy organisations will also receive some of the $20m (£12.9m) settlement.

Facebook said it was "pleased" the settlement had been approved.

The payout was approved by a US court on Monday following a class action filed against Facebook in 2011 by five of its users.

The group said their details had been used to promote products and services through the site's Sponsored Stories programme, without paying them or giving them the choice to opt-out.

A Sponsored Story is a tailored advertisement that appears on members' Facebook pages, highlighting products a user's friends have endorsed or "liked" on the site.

No 'meaningful' harm

US District Judge Richard Seeborg acknowledged that the $15 payments were relatively small, but said it had not been established that Facebook had "undisputedly violated the law".

He added that the claimants could not prove they were "harmed in any meaningful way".

The court estimated that Facebook had made about $73m (£47m) in profit from the Sponsored Stories featuring details of the 150 million members.

The settlement also requires Facebook to make changes to its "Statement of Rights" and to give users more information and control over how their details are used in the future...

Posted by editor on Wednesday, August 28 @ 06:48:45 UTC (2973 reads)
(Read More... | 1864 bytes more | Score: 0)

 DoD Training Manual: 'Extremist' Founding Fathers 'Not Welcome In Military'

Adan Salazar
August 24, 2013

Conservative watchdog group Judicial Watch recently obtained a Department of Defense training manual which lists people who embrace “individual liberties” and honor “states’ rights,” among other characteristics, as potential “extremists” who are likely to be members of “hate groups.”


Marked “for training purposes only,” the documents, obtained Thursday through a Freedom of Information Act request submitted in April, include PowerPoint slides and lesson plans, among which is a January 2013 Air Force “student guide” distributed by the Defense Equal Opportunity Management Institute simply entitled “Extremism.”

Judicial Watch’s FOIA request asked for “Any and all records concerning, regarding, or related to the preparation and presentation of training materials on hate groups or hate crimes distributed or used by the Air Force.”

As the group notes, “The document defines extremists as ‘a person who advocates the use of force or violence; advocates supremacist causes based on race, ethnicity, religion, gender, or national origin; or otherwise engages to illegally deprive individuals or groups of their civil rights.’”

The manual goes on to bar military personnel from “active participation” in such extremist organization activities as “publicly demonstrating,” “rallying,” “fundraising” and “organizing,” basically denying active-duty military from exercising the rights they so ardently fight to defend.

It begins its introduction of a section titled, “Extremist ideologies,” by describing the American colonists who sought independence from British rule as a historical example of extremism.

“In U.S. history, there are many examples of extremist ideologies and movements. The colonists who sought to free themselves from British rule and the Confederate states who sought to secede from the Northern states are just two examples,” according to the training guide.

In a section drawing inspiration from a 1992 book titled “Nazis, Communists, Klansmen, and Others on the Fringe: Political Extremism in America,” the manual also lists “Doomsday thinking” under “traits or behaviors that tend to represent the extremist style.”

Extremists often predict dire or catastrophic consequences from a situation or from a failure to follow a specific course, and they tend to exhibit a kind of crisis-mindedness. It can be a Communist takeover, a Nazi revival, nuclear war, earthquakes, floods, or the wrath of God. Whatever it is, it is just around the corner unless we follow their program and listen to their special insight and wisdom, to which only the truly enlightened have access. For extremists, any setback or defeat is the beginning of the end.

“Nowadays,” the manual explains, “instead of dressing in sheets or publicly espousing hate messages, many extremists will talk of individual liberties, states’ rights, and how to make the world a better place.”...

Posted by editor on Saturday, August 24 @ 21:46:24 UTC (3339 reads)
(Read More... | 4136 bytes more | Score: 0)

 NSA reportedly broke privacy rules thousands of times

Published August 16, 2013

The National Security Agency has overstepped its authority and broken privacy rules thousands of times every year since being given new surveillance powers by Congress in 2008, The Washington Post reported, citing an internal audit and other secret documents.

The documents, which the Post claims it received earlier this summer from NSA leaker Edward Snowden, detail how the controversial agency has crossed the line many times over in its collection of massive amounts of data from around the world.

Despite repeated claims by officials that the NSA does not spy on Americans, the Post reports that the bulk of the infractions involved improper surveillance of Americans or foreign targets in the U.S. Some of the infractions were inadvertent, caused by typographical errors resulting in U.S. calls or emails being intercepted. Others were more serious.

The Post reported that the most significant violations included the unauthorized use of information on more than 3,000 Americans and green-card holders. In another incident, the Post reported that a “large number” of calls from Washington were intercepted in 2008 after the Washington area code 202 was confused with the code 20, which is the code for dialing to Egypt.

In total, an NSA audit from May 2012 reportedly found 2,776 incidents in the prior 12 months of improper collection and handling of communications.

In another case, the special court that oversees the NSA did not learn about a new collection method until it had been underway for months. The court ruled the method unconstitutional, according to the Post.

Posted by editor on Friday, August 16 @ 05:01:14 UTC (3065 reads)
(Read More... | 2146 bytes more | Score: 0)

  News Tips



  Far Gone Travels


  Dogshit Park



  Currency Converter

Convert yr currency



  Internet Traffic Report

Traffic speed on the net


  Like Minds



Copyright Friends of Liberty 2002-2015