The battle for control of cyberspace is turning nasty, with young hackers, pirates and activists facing long prison sentences. We report from the frontline
#AaronSwartz - @Cryptomeorg’s open access guerilla warfare has released a library of #ebooks and papers relating to #cyberwar, #surveillance state, #propaganda, #crypto and #cybersecurity
For those that are hungry for knowledge, these are feasting times. Caches of knowledge are being released all over the place. Cryptome has been releasing a collection of ebooks that are very interesting for /r/evolutionReddit.
Thank you Cryptome!
- Aaron Swartz: Oxford Dictionary of Slang
- Aaron Swartz: Postcolonialism Introduction
- Aaron Swartz: End of the World Guide
- Aaron Swartz: Power Sex Suicide
- Aaron Swartz: March of Unreason
- Aaron Swartz: Global Catastrophes Introduction
- Aaron Swartz: Surviving Armageddon
- Aaron Swartz: Emerald Planet
- Aaron Swartz: Magic Universe
- Aaron Swartz: Information Society Theories
- Aaron Swartz: Democracy Inc: Totalitarianism
- Aaron Swartz: Governing Global E-Networks
- Aaron Swartz: Information Arts, Science, Tech
- Aaron Swartz: Wireless Internet Security
- Aaron Swartz: Internet Jurisdiction-Regulation
- Aaron Swartz: InfoTech Moral Philosophy
- Aaron Swartz: Thinking in Action On the Internet
- Aaron Swartz: Who Controls the Internet?
- Aaron Swartz: US-UK Spy Cooperation Post-911
- Aaron Swartz: Government Secrecy in Net Age
- Aaron Swartz: US Telecom Policy in Net Age
- Aaron Swartz: Cybercrime Principles
- Aaron Swartz: Cybersecurity Law and Economics
- Aaron Swartz: Global Transparency Perils-Promise
- Aaron Swartz: Cryptography and Complexity
- Aaron Swartz: Guerilla Open Access Manifesto
- Aaron Swartz: Marketing Rebellion (ie WikiLeaks)
- Aaron Swartz: Munitions of the Mind: Propaganda
- Aaron Swartz: Citizen Spy: TV Spying Propaganda
- Aaron Swartz: Spy Wars, Moles, Deadly Games
- Aaron Swartz: Spying Blind: CIA, FBI, 9/11
- Aaron Swartz: The Culture of Conspiracy
- Aaron Swartz: Norms in a Wired World
- Aaron Swartz: Prison State: Mass Incarceration
- Aaron Swartz: Media, Politics, Network Society
- Aaron Swartz: Internet Scientific Collaboration
- Documents Allegedly Downloaded by Aaron Swartz
- Aaron Swartz: Disposable Women of Global Capital
- Aaron Swartz: Achieving Human Rights
- Aaron Swartz: Constructing Knowledge in Networks
- USA v. Aaron Swartz Terminated
- Aaron Swartz: Managing InfoSys Emotional Intel
- Aaron Swartz: MIT Compile of Cognitive Sciences
- Aaron Swartz: Philosphy and Computing
- Aaron Swartz: Acts of Rebellion
- Aaron Swartz: Media Psychology
- Aaron Swartz: Interrogation-Confession Handbook
- Aaron Swartz: Psychology Law Truth and Lies
- Aaron Swartz: Psychology of Spying Analysis
- Aaron Swartz: Psychiatric Slavery
- O’Reilly donating ebook “Open Government” as a tribute to Aaron Swartz
- 18,592 scientific publications totaling 33GiB, all from Philosophical Transactions of the Royal Society and which should be available to everyone at no cost, but most have previously only been made available at high prices through paywall gatekeepers like JSTOR.
- Links scraped from Twitter hashtag #pdftribute
- Github for research. Searchable paper repository. Easy upload, perhaps with a tweet. Brought to you by a collaboration of the people behind pdftribute.net
- The Papester Collective. Need to get behind a paywall? Send a tweet.
- Open Access in Memoriam. Collecting email addresses for those interested in being a part of open access efforts going forward – based on the #pdftribute hashtag
- Operation Angel: Phase Two
- Also, if anyone is interested in helping build a P2P darknet library on retroshare, i2p and Tor – send me a PM. Basically, the aim is to build an unbreakable body of books and scientific papers accessible to all. But staying with the general eR theme of pushing darknet P2P as the final solution to a free information society.
- I also a very wildcard idea; but looking for someone who is familiar with using bots to submit to reddit.
White House Petitions:
- Remove United States District Attorney Carmen Ortiz from office for overreach in the case of Aaron Swartz.
- Fire Assistant U.S. Attorney Steve Heymann.
- Reform the Computer Fraud and Abuse Act to reflect the realities of computing and networks in 2013.
Open Access Journals:
- arXiv.org – Open access to 812,816 e-prints in Physics, Mathematics, Computer Science, Quantitative Biology, Quantitative Finance and Statistics
- Open Access Journals
- DOAJ – Directory of Open Access Journals
- Science Citizen – Doing Science in Public
- DOCUMENTA MATHEMATICA
Book Collections on Tor:
This is far from over and the fight to release information from paywalls to the effective public domain has only just begun.
#Anonymous != Selling Gold, #OpIsrael <-> #Realness, Magic Mushrooms - New World Next Week - #CyberWarfare (by @corbettreport)
Welcome to the 150th episode of http://NewWorldNextWeek.com - the video series from Corbett Report and Media Monarchy that covers some of the most important developments in open source intelligence news. This week: Story #1: Cyprus To Sell €400 Million In Gold To Finance Part Of Its Bailout http://ur1.ca/dcarv Flashback: FDR Issues Executive Order 6102 Banning Gold Ownership http://ur1.ca/dcary Related: The Bitcoin Bubble Explained - Understanding The Mathematics Of The Inevitable Bitcoin Crash http://ur1.ca/dc2yc Story #2: Israeli Hackers And Anonymous Continue Their Cyber Strife http://ur1.ca/dcas0 Related: Electronic Arts Wins Worst Company In America Poll Again http://ur1.ca/dcas2 Story #3: First Magic Mushroom Clinical Trial Hits Stumbling Block http://ur1.ca/dcas8 Governments Block Research On Using Magic Mushrooms To Treat Depression http://ur1.ca/dcas9 Flashback: Study Shows ‘Spiritual’ Effects Of Magic Mushrooms http://ur1.ca/dcasc Bonus: Portland Fluoride - Politics, Science And Our (Not-So) Liberal Minds http://ur1.ca/dcasd Visit http://NewWorldNextWeek.com to get previous episodes in various formats to download, burn and share. And as always, stay up-to-date by subscribing to the feeds from Corbett Report http://ur1.ca/39obd and Media Monarchy http://ur1.ca/kuec Thank you. Previous Episode: Korean War, Conspiracy Poll, Phone Tattoo http://ur1.ca/dcase
The Department of Justice will ask a federal court to uphold the secrecy that surrounds the working relationship between Google and the National Security Agency in a hearing that is scheduled for next week.
Privacy watchdog group The Electronic Privacy Information Center (EPIC) is returning to court once again in an effort to disclose more information regarding the widely publicized partnership between the spy agency and the search engine giant.
EPIC is suing to obtain documents that detail the relationship, and will appeal against the NSA’s so-called “Glomar” response, claiming it “could neither confirm nor deny” the existence of any information about its relations with Google, because “such a response would reveal information about NSA’s functions and activities.”
The NSA’s response stated that the agency “works with a broad range of commercial partners and research associations” in order to oversee the security of important information systems, but did not provide any further detail.
The issue rose to prominencein January 2010 following a highly sophisticated and targeted cyber attack on the corporate infrastructure of Google and some twenty other large US companies.
The attack was blamed on the Chinese government, prompting Google to embrace a collaboration with the federal agency in charge of global electronic surveillance.
Anonymous sources informed The Washington Post at the time that “the alliance is being designed to allow the two organizations to share critical information”, adding that the agreement will not allow the NSA access to users’ search details or e-mails.
The DOJ is backing NSA’s Glomar response, as The Legal Times reports:
DOJ’s legal team said that acknowledging whether NSA and Google formed a partnership from a cyber attack would illuminate whether the government “considered the alleged attack to be of consequence for critical U.S. government information systems.”
DOJ said media reports about the alleged Google partnership with NSA do not constitute official acknowledgement.
“If NSA determines that certain security vulnerabilities or malicious attacks pose a threat to U.S. government information systems, NSA may take action,” DOJ Civil Division lawyers wrote in a brief.
In its own opening brief, EPIC argues that records the NSA holds on the subject are not exempt from public disclosure under FOIA request.
“Communications from Google to the NSA do not implicate the agency’s functions and activities, and are therefore not exempt from disclosure.” the brief states.
“Further, some records responsive to EPIC’s FOIA Request concern NSA activities that may fall outside the scope of the agency’s authority. These records are not exempt from disclosure.” it continues.
EPIC believes that any burgeoning partnership between Google and the government spy force responsible for warrantless monitoring of Americans’ phone calls and e-mails in the wake of 9/11 raises significant privacy concerns.
“Google provides cloud-based services to consumers, not critical infrastructure services to the government,” EPIC attorney Marc Rotenberg said, noting that the group’s records request does not seek documents about NSA’s role to secure government computer networks.
A three-judge panel of the U.S. Court of Appeals for the D.C. Circuit will preside over the hearing, scheduled for March 20.
Google’s partnership with the intelligence network is not new. As we reported in late 2006, An ex-CIA agent Robert David Steele has claimed sources told him that CIA seed money helped get the company off the ground
Speaking to the Alex Jones Show, Steele elaborated on previous revelations by making it known that the CIA helped bankroll Google at its very inception. Steele named Google’s CIA point man as Dr. Rick Steinheiser, of the Office of Research and Development.
“I think Google took money from the CIA when it was poor and it was starting up and unfortunately our system right now floods money into spying and other illegal and largely unethical activities, and it doesn’t fund what I call the open source world,” said Steele, citing “trusted individuals” as his sources for the claim.
“They’ve been together for quite a while,” added Steele.
The NSA’s involvement with Google should be treated as highly suspect, given the agency’s track record and its blatant disregard for the Fourth Amendment.
A set of documents obtained by the Electronic Frontier Foundation (EFF) in June 2007 revealed that US telco AT&T allowed the NSA to set up a ‘secret room’ in its offices to monitor internet traffic.
The discovering prompted a lawyer for an AT&T engineer to allege that “within two weeks of taking office, the Bush administration was planning a comprehensive effort of spying on Americans” That is BEFORE 9/11, before the nation was embroiled in the freedom stripping exercise commonly known as the “war on terror” had even begun.
In late 2007, reports circulated that the NSA had increasing control over SSL, now called Transport Layer Security, the cryptographic protocol that provides secure communications on the internet for web browsing, e-mail, instant messaging, and other data transfers.
In 2008, Google denied that it had any role in the NSA’s “terrorist” surveillance program, after first refusing to say if they have provided users private data to the federal government under the warrantless wiretapping initiative.
However, it is clear where Google’s interests lie given that the company is supplying the software, hardware and tech support to US intelligence agencies in the process of creating a vast closed source database for global spy networks to share information.
The government supply arm of Google has also reportedly entered into a number of other contracts, details of which it says it cannot share.
Google’s approach to privacy also came under scrutiny more recently when it was discovered that the company was essentially vacuuming up WiFi network data as it gathered images for its Streetview program.
Google insisted that the practice was a mistake, even though information published in January 2010 revealed that the data collection program was a very deliberate effort to assemble as much information as possible about U.S. residential and business WiFi networks.
The FBI will combine the methods developed after Sept. 11 to combat terrorism, along with old-fashion gumshoe practices, to battle cybercriminals.
“Terrorism remains the FBI’s top priority, but in the not too distant future we anticipate that the cyberthreat will pose the No. 1 threat to our country,” FBI Director Robert Mueller said in a March 1 keynote address to the RSA security conference in San Francisco. “We need to apply the lessons of fighting terrorism and apply them to cybercrime.”
After the 2001 terrorist attacks, the FBI expanded its joint terrorism task forces that include bureau agents, local and state law enforcement officers and the military to more than 100. “We are developing a similar model to fight cybercrime to build our capabilities as well as those of state and local law enforcement,” Mueller said.
But, Mueller said, proven law enforcement methods will be employed to catch cybercriminals. “We must rely on the traditional capabilities of the FBI: sources and wires,” he said. “We must cultivate the sources necessary to infiltrate criminal online networks, to collect the intelligences, to prevent the next attack and to topple the network from inside.”
Mueller also said he sees terrorists, who employ the Internet to recruit and plan physical attacks, to begin causing digital damage as well. “To date, terrorists have not used the Internet to launch a full-scale cyberattack, but we cannot underestimate their intent,” he said. “In one hacker recruiting video, a terrorist proclaims that cyber warfare will be the warfare of the future.”
The FBI director echoed remarks he made at RSA Conference 2010, calling for cooperation between government and the private sector to share information on cybersecurity threats (see FBI Chief Calls for Business Cooperation). Mueller pointed out that it’s often business that first identities cyberthreats and it shouldn’t fear notifying the FBI when a breach occurs. He backed legislation before Congress that would encourage information sharing between government and business that would protect corporate secrets. Many businesses don’t want to fess up to a breach because it could harm them with stakeholders.
Mueller also called for enactment of a national breach notification law that would supersede 47 separate state laws. A national breach notification law is seen as easing compliance by businesses that operate in multiple states.
The National Institute of Standards and Technology is establishing the National Cybersecurity Center of Excellence, a public-private collaboration aimed at accelerating the widespread adoption of integrated cybersecurity tools and technologies.
NIST Director Patrick Gallagher, at ceremonies on Feb. 21, said the center would unite “the best minds and provide them with the best tools to create and test solutions that will make online transactions of all kinds safer.”
Using a $10 million appropriation, NIST and its partners will provide a state-of-the-art computing facility near its Gaithersburg, Md., campus, where researchers from NIST will work with users and vendors of cybersecurity products and services. The center will host multi-institutional, collaborative efforts that build on expertise from industry and government.
According to NIST, the center will undertake carefully developed use cases - comprehensive requirements and test plans to address specific cybersecurity challenges - that should lead to practical, interoperable approaches for real world needs of complex IT systems.
A NIST factsheet outlines examples of projects the center could tackle, including:
- Health IT solutions that employ open interface standards to encourage interoperability, flexibility and competition, while allowing wide broadband remote access and high levels of privacy and security.
- Cloud computing offerings that furnish strong methods for knowing the physical location of sensitive data and for monitoring and verifying permissions for data movement among cloud servers.
- Mobile computing solutions that provide trusted ways for organizations to communicate with their employees on their personally owned devices and yet protect that data if the device is lost or stolen or if the employee no longer works for the organization.
By hastening the implementation of state-of-the-art cybersecurity tools, NIST said, the center would enhance trust in American IT communications, data and storage systems; lower risk for companies and individuals in the use of IT systems; and encourage development of innovative, job-creating cybersecurity products and services.
Fostering America’s Cybersecurity Industry
NIST is part of the Department of Commerce, and among its roles is to promote American technological innovation, and the institute says the improved trust resulting from the center’s initiatives should support the development and adoption of innovative business processes to improve operational efficiency, reap significant financial benefits for public and private institutions, promote entrepreneurship and create new jobs and career opportunities.
NIST said additional center projects could focus on cryptography; continuous monitoring; identification, authentication and authorization in public-private sectors; or cybersecurity curriculum development.
The state of Maryland and Montgomery County, where NIST is situated, joined NIST in sponsoring the center. Maryland officials see the development of cybersecurity solutions and products as an economic development driver for that part of the state. The National Security Agency is based in Fort Meade in adjacent Anne Arundel County. Montgomery County also borders on Washington.
“Maryland is uniquely poised to contribute to the rapidly growing cybersecurity industry,” Maryland Lt. Gov. Anthony Brown said at ceremonies launching the center. “The addition of the National Cybersecurity Center of Excellence will help build on our progress by enhancing coordination between the federal, state and local governments, as well as our partners in the private sector.”
#Anonymous - Global #CyberWarfare I
January 21st 2012.
Citizens of the World.
We are Anonymous.
We have been watching recent events as they have slowly but surely unfolded, from the distortion and destruction of the first amendment to legalize and justify political bribery, to the dawn of a new political struggle consisting of millions of citizens crying out in indignation at this misappropriation of the judicial system, and to the very proposal of the so called, “Stop Online Piracy Act”, SOPA, without any concern to ethicality, morality, or responsibility. We have witnessed the recent actions this ‘Corporatocratic’ government has taken the means by which it has justified shutting down megaupload.com, a site that served, and continues to serve, as a very legitimate means of transferring information.
Suffice to say, we are angry.
These recent actions directly oppose the values we uphold, as well as the values of the founding fathers of the United States government. The freedom of information must never be infringed upon, and that the government exists to serve the will of the people, not the will of the financial elite.
They have already been forewarned of the technology at our disposal to defend our right to access information. The legislative entities and Governmental bodies that attempt to impose their law upon what is not theirs need to be forced to understand that we arer a sovereign entity beyond your control.
We therefore have declared as one collective, that the cyberspace domain be independent from the United States government and from any tyrannical laws they seek to impose upon us.
They claim there are problems amongst us that need to be solved. They use this as an excuse to invade our precincts.
They are wrong.
We are creating a world where anyone, anywhere, may express his or her beliefs, no matter how singular, without fear of retribution or of being coerced into silence or conformity.
Their legal concepts of property, expression, identity, movement, and context do not apply to us. They are all based on matter, and there is no matter here. We are a sovereign nation, and we intend on staying as such.
Citizens of the Global Community, join us. Let us defend our home, the internet.
Operation Revenge, engaged.
Operation Megaupload, engaged.
Operation Blackout, engaged.
We are Anonymous.
We are Legion.
We do not Forgive.
We do not Forget.
To the United States Government, you should’ve expected us.
WASHINGTON—A former top U.S. cybersecurity official says America’s computer systems are so vulnerable to attack that it should deter U.S. leaders from going to war with other nations.
Richard Clarke, a top adviser to three presidents, joined a number of U.S. military and civilian experts Monday in offering a dire assessment of America’s cybersecurity, saying the country simply can’t protect its critical networks.
Clarke says if he was a advising the president he would warn against attacking other countries because many could launch devastating cyberattacks that could destroy power grids, banking networks or transportation systems.
He says securing networks will require more government regulation and a commitment by the U.S. to respond harshly to efforts by China and others that use cyberattacks to steal sensitive corporate or government data.
The Federal Reserve Plans to Identify “Key Bloggers”, Monitor Conversations about The Fed on Facebook, Twitter, Forums & Blogs #NWO #CyberWarfare #SockPuppets #Surveillance #Globalization
The Federal Reserve wants to know what you are saying about it. In fact, the Federal Reserve has announced plans to identify “key bloggers” and to monitor “billions of conversations” about the Fed on Facebook, Twitter, forums and blogs.
This is yet another sign that the alternative media is having a dramatic impact.
As first reported on Zero Hedge, the Federal Reserve Bank of New York has issued a “Request for Proposal” to suppliers who may be interested in participating in the development of a “Sentiment Analysis And Social Media Monitoring Solution”. In other words, the Federal Reserve wants to develop a highly sophisticated system that will gather everything that you and I say about the Federal Reserve on the Internet and that will analyze what our feelings about the Fed are. Obviously, any “positive” feelings about the Fed would not be a problem. What they really want to do is to gather information on everyone that views the Federal Reserve negatively. It is unclear how they plan to use this information once they have it, but considering how many alternative media sources have been shut down lately, this is obviously a very troubling sign.
You can read this “Request for Proposal” right here. Posted below are some of the key quotes from the document (in bold) with some of my own commentary in between the quotes….
“The intent is to establish a fair and equitable partnership with a market leader who will who gather data from various social media outlets and news sources and provide applicable reporting to FRBNY. This Request for Proposal (“RFP”) was created in an effort to support FRBNY’s Social Media Listening Platforms initiative.”
A system like this is not cheap. Apparently the Federal Reserve Bank of New York believes that gathering all of this information is very important. In recent years, criticism of the Federal Reserve has become very intense, and most of this criticism has been coming from the Internet. It has gotten to the point where the Federal Reserve Bank of New York has decided that it had better listen to what is being said and find out who is saying it.
“Social media listening platforms are solutions that gather data from various social media outlets and news sources. They monitor billions of conversations and generate text analytics based on predefined criteria. They can also determine the sentiment of a speaker or writer with respect to some topic or document.”
The Federal Reserve Bank of New York intends to listen in on “billions of conversations” and to actually determine the “sentiment” of those that are participating in those conversations.
Of course it will be those conversations that are “negative” about the Federal Reserve that will be setting off the alarm bells.
“Identify and reach out to key bloggers and influencers”
Uh oh. So they plan to “identify” key bloggers and influencers?
What exactly do they plan to do once they “identify” them?
“The solution must be able to gather data from the primary social media platforms –Facebook, Twitter, Blogs, Forums and YouTube.”
Hopefully you understand this already, but nothing posted on the Internet is ever anonymous. Everything on the Internet is gathered by a vast host of organizations and is used for a wide variety of purposes. Data mining has become a billion dollar industry, and it is only going to keep growing.
You may think that you are “anonymous” when you criticize organizations like the Fed, but the truth is that if you are loud enough they will see it and they will make a record of it.
“The solution must provide real-time monitoring of relevant conversations. It should provide sentiment analysis (positive, negative or neutral) around key conversational topics.”
Why do they need to perform “sentiment analysis”?
If someone is identified as being overly “negative” about the Fed, what will they do about it?
“The solution should provide an alerting mechanism that automatically sends out reports or notifications based a predefined trigger.”
This sounds very much like the kind of “keyword” intelligence gathering systems that are currently in use by major governments around the globe.
Very, very creepy stuff.
Are you disturbed yet?
For those of us that write about the Federal Reserve a lot, this is very sobering news.
I wonder what the Fed will think about the following articles that I have posted on this site….
What is their “Social Media Monitoring Solution” going to think about those articles?
Unfortunately, this is all part of a very disturbing trend.
Recently, a very creepy website known as “Attack Watch” was launched to gather information on those saying “negative” things about Barack Obama.
Suddenly, everyone seems obsessed with what you and I are saying.
This just shows how the power of the alternative media is growing.
Not only that, but it seems as though the government also wants to gather as much information on all of us as possible.
For example, a new rule is being proposed by the Department of Health and Human Services that would force health insurance companies to submit detailed health care information about all of their customers to the federal government.
Every single day our privacy is being stripped away a little bit more.
But now it is often not just enough for them to know what we are doing and saying. Instead, the “authorities” are increasingly stepping in to silence important voices.
One of the most recent examples of this was when Activistpost was taken down by Google. We are still awaiting word on why this was done.
Sadly, the silencing of Activistpost is far from an isolated incident.
Hordes of YouTube accounts have been shut down for their political viewpoints.
Quite a few very prominent alternative media websites have been censored or attacked because of what they stand for.
So why is this happening? Well, it turns out that the power of the alternative media is growing. According to a new survey by the Pew Research Center for The People & The Press, 43 percent of Americans say that they get their news on national and international issues from the Internet. Back in 1999, that figure was sitting at just 6 percent.
The American people are sick and tired of getting “canned news”, and they are increasingly turning to the Internet in a search for the truth.
As I have written about previously, the mainstream media in this country is overwhelmingly dominated by just 6 very powerful corporations….
Today, ownership of the news media has been concentrated in the hands of just six incredibly powerful media corporations. These corporate behemoths control most of what we watch, hear and read every single day. They own television networks, cable channels, movie studios, newspapers, magazines, publishing houses, music labels and even many of our favorite websites. Sadly, most Americans don’t even stop to think about who is feeding them the endless hours of news and entertainment that they constantly ingest. Most Americans don’t really seem to care about who owns the media. But they should. The truth is that each of us is deeply influenced by the messages that are constantly being pounded into our heads by the mainstream media. The average American watches 153 hours of television a month. In fact, most Americans begin to feel physically uncomfortable if they go too long without watching or listening to something. Sadly, most Americans have become absolutely addicted to news and entertainment and the ownership of all that news and entertainment that we crave is being concentrated in fewer and fewer hands each year.
The “news” that we get from various mainstream sources seems to always be so similar. It is as if nearly all mainstream news organizations are reading from the same script. The American people know that they are not getting the whole truth and they have been increasingly looking to alternative sources.
The monopoly over the news that the mainstream media once possessed has been broken. The alternative media is now creating some huge problems for organizations that were once very closely protected by the mainstream media.
The American people are starting to wake up and they are starting to get very upset about a lot of the corruption that has been going on in our society.
But it turns out that the “authorities” don’t like it too much when Americans try to actually exercise free speech in America today. For example, you can see recent video of female protesters in New York City being penned in by police and then brutally maced right here.
Are you sickened by that?
You should be.
What the “authorities” want is for us to shut up, sit in our homes and act as if nothing wrong is happening.
Meanwhile, they seem determined to watch us more closely than ever.
So are you going to be afraid to talk negatively about the Federal Reserve now that you know that they are going to be watching what you say on the Internet?
As hackers and hostile nations launch increasingly sophisticated cyberattacks against U.S. defense contractors, the Pentagon is extending a pilot program to help protect its prime suppliers.
That program could possibly serve as a model for other government agencies. It is being evaluated by the Department of Homeland Security, as part of a potential effort to extend similar protections to power plants, the electric grid and other critical infrastructure.
Efforts to better harden the networks of defense contractors come as Pentagon analysts investigate a growing number of cases involving the mishandling or removal of classified data from military and corporate systems. Intrusions into defense networks are now close to 30 percent of the Pentagon’s Cyber Crime Center’s workload, according to senior defense officials. And they say it continues to increase.
The Pentagon’s pilot program represents a key breakthrough in the Obama administration’s push to make critical networks more secure by sharing intelligence with the private sector and helping companies better protect their systems. In many cases, particularly for defense contractors, the corporate systems carry data tied to sensitive U.S. government programs and weapons.
-AP Computer hard drives, from closed criminal… View Full Caption
So far, the trial program involves at least 20 defense companies. It will be extended through mid-November, amid ongoing discussions about how to expand it to more companies and subcontractors.
“The results this far are very promising,” said William Lynn, the deputy secretary of defense who launched the program in May.
Lynn, who will leave office in early October, said the government should move as quickly as possible to expand the protections to other vital sectors.
A senior DHS official said no decisions have been made, but any effort to extend the program — including to critical infrastructure — faces a number of challenges.
The official, who spoke on condition of anonymity because the program review is ongoing, said it would be helpful if Congress would pass legislation that explicitly says DHS is responsible for helping private sector companies protect themselves against cyberattack. Also, the legislation should say that companies can be protected from certain privacy and other laws in order to share information with the government for cybersecurity purposes, the official said.
Senior U.S. leaders have been blunt about the escalating dangers of a cyberattack, and have struggled to improve the security of federal networks while also encouraging the public and corporate America to do the same.
“Cyber actually can bring us to our knees,” said Adm. Mike Mullen, chairman of the Joint Chiefs of Staff, adding that at some point the Pentagon may need to develop some type of governing structure similar to how the U.S. and allies monitor and limit nuclear weapons.
Data compiled by the Defense Cyber Crime Center shows that the number of investigations handled by analysts there has more than tripled over the past 10 years. And a growing number of them involve defense contractors — including those participating in the pilot program.
Via Before Its News – September 24, 2011
First, YouTube meddled with the view counts of folks like Alex Jones over at Info Wars and Prison Planet. Then Flickr, MySpace and Facebook began censoring comments and material. Now an increasing number of independent online media is beginning to feel the sharp edge of the blade.
Amazon & Wikileaks
When Wikileaks went under fire for its publication of material such as the quarter million diplomatic cables (or Pentagon Papers 2), Amazon decided to pull the plug on its service to the whistleblower website.attended the most recent Bilderberg group meeting in St. Moritz, Switzerland.publication of the few Bilderberg meeting documents available a week before their meet in Greece of 2009. They had been obtained from the author of Illuminati Conspiracy Archive, whose website seems to have become now defunct. Apparently, they had floated around on the net some years before, to have been taken down, and this author figured it wise to republish the few documents available to aid research.written extensively on this topic. Daniel Estulin of Bilderberg fame has also recently published a book on the deceptive nature of Wikileaks and its use as a tool of disinformation, the results of which we are now witnessing. Founder of Cryptome (John Young) worked with “Wikileaks” in its infancy and left after growing suspicion.
Subsequently, we found out that the CEO and founder of Amazon
Is it any wonder that Amazon too has joined the bandwagon? Average Joe’s who shot to fame and fortune, respective business empire founders such as Jeff Bezos and Bill Gates, have been enticed by the club of “good old boys” and awoken that innate and evil human desire to play God with the rest of us.
This author was responsible for the Wikileaks
A final disclaimer on the subject of Wikileaks. This author believes Wikileaks to be a “US Government con job.” Esteemed analyst William Engdahl has .
Don’t Tread on Me
A few weeks ago, Silver Shield’s popular economic and political commentary blog had been hacked. He has been wildly popular with his Sons of Liberty Academy and drive to make people aware of the true nature of the monetary system, suggesting the purchase of physical silver as one way to be free of the false paradigm. A similar hack had also been perpetrated against Freedom Force International a few years ago.
SGT Report and Bank of America
Just recently, SGT Report, who provides excellent economic reality and freedom related reporting, had been subjected to COINTELPRO commentary assault by the Wall Street-Pentagon nexus which includes Bank of America. See the site editor’s excellent detective work HERE.
Activist Post & Google via Blogger
The excellent Activist Post, to which Global Governance Archive is a frequent contributor, seems to have just been taken down by Google-owned Blogger. Recall that Google CEO Eric Schmidt also attended the last Bilderberg meeting.
Rick Rozoff (Stop NATO) & WordPress
Yahoo & the Day of Rage
Finally, we have Yahoo censoring the Day of Rage attempts to coordinate their occupation of Wall Street.
Full Spectrum Dominance
This insane Pentagon doctrine seeks to dominate land, air, sea, outer space, inner space and cyber space. It seeks “informational superiority” which is defined as “the capability to collect, process and disseminate an uninterrupted flow of information while exploiting or denying adversary’s ability to do the same.”
Prepare for the Cyber False Flag
Corporate interests have been co-opted by the global elites and their secret societies. Bilderberg 2011 saw the coming together of Google, Facebook, LinkedIn and Amazon, among others. We are now only beginning to witness the outcome of their policy agenda. Companies are being bought up and merged by the new world elites, with Skype going to NSA Microsoft and YouTube to CIA Google.
As the few, the wise, those that enter through the narrow gate have long been warning and preparing for such issues as food storage, survivalism and spiritual preparedness, our essential lines of communication are gradually being cut. Skynet is becoming self-aware. Take all preventative measures and bat down the hatches. There be a storm on the horizon. Godspeed.
Former NSA director calls for creation of a “digital Blackwater” - #CyberWarfare
Gen. Michael Hayden, former head of the NSA and the CIA under Bush, called for the USG to cover its cybersecurity and cyberwarfare needs by creating a “digital Blackwater.” It’s nice to note that Bush-era cronies never admit defeat or error, even in the face of overwhelming evidence and mountains of embarrassing anecdotes. I mean, it’s not like Blackwater ever did anything embarrassing, right?
Check out the video of Hayden making his recommendations at RawReplay.
Court Refuses to Return Seized Domain Name, Claims Shutting Down Speech Doesn’t Cause a Substantial Hardship
In a cursory opinion issued today that left us scratching our heads, a federal judge has ruled that the government does not have to return a domain name seized by Immigration and Customs Enforcement (ICE), because its seizure did not create a substantial hardship. Really?
Puerto 80 is the Spanish company behind popular sports streaming sites Rojadirecta.com and Rojadirecta.org, which were both seized by U.S. ICE earlier this year — even though a Spanish court found they did not violate copyright law. Puerto 80 filed a petition to have the sites released pending a trial on the merits of the case. The petition explained that government’s seizure and continued control of the site was seriously damaging Puerto 80′s business and also infringed on its readers’ First Amendment right to access its content. EFF, with co-amici Public Knowledge and Center for Democracy and Technology, submitted an amicus brief that elaborated on the First Amendment issues.
Puerto 80′s petition explained that while the company can host content elsewhere, its usual visitors might not know how to find it. Too bad, said the court. “Rojadirecta has a large internet presence and can simply distribute information about the seizure and its new domain to its customers,” it declared. Perhaps the court thinks Puerto 80 should buy some Google ads? Would the court come to the same conclusion if the site in question was youtube.com? (Maybe so, which is even more frightening).
And the court’s First Amendment analysis is flatly wrong. Puerto 80 (and EFF) explained to the court that cutting off access to the site also meant cutting off access to clearly legal content, such as discussion forums. The court dismissed these concerns with a wave:
Although some discussion may take place in the forums, the fact that visitors must now go to other websites to partake in the same discussions is clearly not the kind of substantial hardship that Congress intended to ameliorate in enacting § 983 [the statute that allows for the return of seized property].
Here’s the thing: the Supreme Court doesn’t agree. The fact that you can get information via a second route does not mean that there is no speech problem with shutting down the first one. In a 1939 case, Schneider v. New Jersey, for example, the Supreme Court held that
one is not to have the exercise of his liberty of expression in appropriate places abridged on the plea that it may be exercised elsewhere.”
It repeated this basic tenet some forty years later in Va. State Bd. of Pharmacy v. Va. Citizens Consumer Council, Inc.:
We are aware of no general principle that freedom of speech may be abridged when the speaker’s listeners could come by his message by some other means … .”
As if misapplying the relevant substantive First Amendment analysis weren’t bad enough, the court failed to even address the fatal procedural First Amendment flaws inherent in the seizure process: namely, that a mere finding of “probable cause” does not and cannot justify a prior restraint. How the court can conclude that the seizure satisfies the First Amendment in this regard is a mystery.
This ruling is profoundly disappointing, to say the least. And it certainly doesn’t bode well for the rights of folks whose websites might be targeted under the PROTECT-IP Act now pending in Congress.
When the history of 2011 is written, it may well be remembered as the Year of the Hacks. McAfee publish a new report that it says is one of the most comprehensive analysis ever revealed of victim profiles from a five-year long targeted operation by a specific actor dubbed Operation Shady RAT.
McAfee released a 14-page report that details the largest coordinated cyber attack recorded to date. This particular attack, possibly orchestrated by China, broke into 72 organizations over the course of five years.The targets include the US, Canada, Taiwan, India, South Korea, and Vietnam. The attack also hit the UN, the International Olympic Committee, the World Anti-doping agency, defense contractors, tech companies and more. Most attacks lasted less than a month, but some, like that on the UN Secretariat, lasted for almost two years.
McAfee say learned of the extent of the hacking campaign in March this year, when its researchers discovered logs of the attacks while reviewing the contents of a ‘command and control’ server directing some of the attacks, which they had discovered in 2009 as part of an investigation into security breaches at defense companies.
The name they gave the attacks, Operation Shady RAT, refers to the acronym for ‘remote access tool,’ a type of software that allows users to to access computer networks. They say that it is possible that further attacks from the same source may still be going undetected. While McAfee have not suggested who may be behind the attacks, other security experts have suggested that China is the likeliest candidate.
This is a problem of massive scale that affects nearly every industry and sector of the economies of numerous countries, and the only organizations that are exempt from this threat are those that don’t have anything valuable or interesting worth stealing.
The content of This News Operation Shady RAT - Biggest Cyber Attacks in history uncovered and Other Information is provided by Various Sources (Emails, Messages, etc..) for Educational Purpose & Security Awareness only. If any Law Enforcement Agency or Related Company needs Information, Please Feel free to Contact Us. Thank You !
Las Vegas (CNN) — The former director of the CIA’s Counterterrorism Center raised concerns Wednesday about an impending “code war” in which hackers will tamper not just with the Internet but with technology that runs real-world infrastructure.
Somewhat fittingly, Cofer Black’s keynote talk at the Black Hat hacker conference at Caesars Palace in Las Vegas was interrupted by a literal alarm: flashing lights, sirens and the whole bit.
“Attention, please. Attention, please,” a robotic woman’s voice said repeatedly as Black smiled, apparently confused. “We are currently investigating the alarm signal you are hearing. Please remain calm.”
After a pause and some laughs from the audience, Black kept going.
“This is a very delicate window into our future,” he told the hackers. “Cold war, global war on terrorism and now you have the code war — which is your war.”
It’s unclear what caused the alarm — whether it was planned to help make Black’s point, was an accident or was the result of a hack. Black Hat is a computer security conference attended by thousands of hackers.
One Black Hat spokeswoman said that sort of thing happens every year at this event, and she’s not sure exactly what causes the alarms.
Another said it wasn’t a hack. “With over 6,500 people in here it’s hard to control who pulls the alarm!” Natalia Wodecki wrote in an e-mail.
In any event, Black’s siren-punctuated words carry weight, since he’s credited with warning the United States government about a September 11-type terrorist attack in August 2001. Black recalled the moment he told defense officials about the threat of al Qaeda, and he compared that moment to his Black Hat talk.
Officials should be more concerned about a cyberattack, he said.
“People say, ‘Were you surprised when 9/11 took place?’ and I can tell you neither myself nor my people in counterterrorism were surprised at all. Instead it was a strange validation of what we had anticipated had indeed taken place. …
“In the technology world, you may face similar issues in the future.”
He referenced last year’s Stuxnet computer worm, which some researchers think was designed to attack Iran’s nuclear facilities.
“I’m here to tell ya … the Stuxnet attack is the Rubicon of our future,” he said. “I don’t necessarily understand how this was executed, but the important points are (that) it was really expensive, so a nation-state had to be involved.”
Hacking, once see as “college pranks,” has moved “into physical destruction of a national resource,” he said. “This is huge.”
He left the talk on an optimistic note, calling on security researchers in the audience to work to prevent such attacks.
“We’re all in this together, and we’re counting on you,” he said.