Celebrities against NSA spying. ~ “Stop Watching Us: The Video” #StopTheNSA #F11 #DataLove (by EFForg)
StopWatching.us is a coalition of more than 100 public advocacy organizations and companies from across the political spectrum. Join the movement at https://rally.stopwatching.us. This video harnesses the voices of celebrities, activists, legal experts, and other prominent figures in speaking out against mass surveillance by the NSA. Please share widely to help us spread the message that we will not stand for the dragnet surveillance of our communications.
The Electronic Frontier Foundation (EFF) is a nonprofit civil liberties law and advocacy center that has been fighting the NSA’s unconstitutional spying for years. Learn more at https://eff.org.
#NSA #Whistleblower Russ Tice - Where’s the Pushback?
Identifiable images of bystanders extracted from corneal reflections - @_@
Animated zoom on the cornea of a high-resolution photographic subject. The zoom begins with a passport photo-style framing of the subject, and ends with a full face close-up of a bystander captured in the subject’s corneal reflection. Successive movie frames represent a linear magnification of 6%. Each frame was resized to 720 pixels wide x 540 pixels high using bicubic interpolation to reduce high spatial frequency noise. Contrast was enhanced separately for each frame using the Auto Contrast function in Adobe Photoshop to improve definition. The image sequence was then converted to movie format for viewing.
‘Nothing is beyond our reach’: Evil octopus strangling the world becomes latest US intelligence seal
Billions of dollars annually are being used to fund operations conducted by the United States intelligence community, the likes of which allow the government to eavesdrop on emails, listen to world leaders’ phone calls and about everything in-between.
One thing that budget hasn’t bought, however, is subtlety. The US National Reconnaissance Office launched a top-secret surveillance satellite into space Thursday evening, and the official emblem for the spy agency’s latest mission is, well, certainly accurate, to say the least.
The Office of the Director of National Intelligence live-tweeted Thursday’s launch from Vandenberg Air Force Base in California, and throughout the course of the ordeal made no effort to ignore the logo for the NROL-39 mission.
The latest spy satellite to be sent into orbit by the NRO can be recognized by its seal: a malevolent octopus with furrowed brows that also happens to be wrapping its tentacles around all corners of the Earth.
“Nothing is beyond our reach,” the NRO boasts on the bottom half of the emblem just below the most sinister-looking cephalopod likely ever to be sent into space.
Along with the National Security Agency and more than a dozen others, the NRO is one of 16 federal offices under the directive of DNI James Clapper and is responsible for building and operating the spy satellites used to collect intelligence around the world. NRO-gathered intelligence was reportedly instrumental in the mission that brought US Navy SEAL’s to the home of former al-Qaeda leader Osama bin Laden in 2011, and decades earlier the agency launched a school-bus sized satellite into orbit to spy on Soviets at the height of the Cold War.
This time around the ODNI says the satellite’s payload is mostly classified, but did admit over Twitter that around a dozen mini satellites funded by both the NRO and NASA will be brought along to orbit as well. Another thing they didn’t bother to acknowledge, of course, is how the lack-of-subtlety apparent in the Earth-strangling octopus emblem could quickly be used by critics of the US intelligence community as fodder to further condemn the government for admitting to their sheer and unmatched ability to control the world’s information.
Thursday’s launch of the latest NRO satellite occurred almost exactly six-month-to-the-day after The Guardian and Washington Post newspapers published the first of what has since been revealed to be a trove of leaked national security document showing proof of the NSA’s widespread and extensive ability to monitor people around the world. On June 6 those papers first disclosed evidence in which the NSA was documented to demand telephony metadata from millions of people daily, and a steady stream of leaked files attributed to former intelligence contractor Edward Snowden have since captivated the world while also raising a number of questions.
Reporters with access to the cache of pilfered papers have reportedly released only a sliver of what’s been reported to be 50,000 documents during those six months, but the response has already been widespread. The leaders of countries such as Brazil and Germany have lashed out at the NSA’s behavior, and DNI Clapper and his deputy manning the NSA, Gen. Keith Alexander, have easily become two of the most embattled public figures in Washington.
That being said, you’d think ODNI would reconsider launching a new spy satellite. Or maybe even not put an octopus strangling the Earth on the outside.
“You may want to downplay the massive dragnet spying thing right now,” Chris Soghoian, the chief technologist at the American Civil Liberties Union, tweeted Thursday. “This logo isn’t helping.”
According to a top-secret budget document released by Snowden and first reported on in August, the NRO is in the midst of modernizing their signals intelligence, geospatial and communications system to replace current capabilities.
Looking at the NROL-39 logo, people could be forgiven for mistaking it for a version of the Lovecraftian elder god Cthulhu, who wants to swallow the Earth whole. But that is not the only National Reconnaissance Office emblem with an interesting spin on the space-spying theme: others include Masonic motifs, superhero ones and a few more that, frankly, defy easy classification.
cc: #Anonymous >> Worst-Case Scenario for Oil Sands Industry Has Come to Life, Leaked Document Shows #NOKXL #DGR #RiseUp #FightBack
As environmentalists began ratcheting up pressure against Canada’s tar sands three years ago, one of the world’s biggest strategic consulting firms was tapped to help the North American oil industry figure out how to handle the mounting activism. The resulting document, published online by WikiLeaks, offers another window into how oil and gas companies have been scrambling to deal with unrelenting opposition to their growth plans.
The document identifies nearly two-dozen environmental organizations leading the anti-oil sands movement and puts them into four categories: radicals, idealists, realists and opportunists—with how-to’s for managing each. It also reveals that the worst-case scenario presented to industry about the movement’s growing influence seems to have come to life.
The December 2010 presentation by Strategic Forecasting, or Stratfor, a global intelligence firm based in Texas, mostly advised oil sands companies to ignore or limit reaction to the then-burgeoning tar sands opposition movement because “activists lack influence in politics.” But there was a buried warning for industry under one scenario: Letting the movement grow unopposed may bring about “the most significant environmental campaign of the decade.”
"This worst-case scenario is exactly what has happened," partly because opposition to tar sands development has expanded beyond nonprofit groups to include individual activists concerned about climate change, said Mark Floegel, a senior investigator for Greenpeace. “The more people in America see Superstorm Sandys or tornadoes in Chicago, the more they are waking up and joining the fight.”
[View the documents at Inside Climate News]
Since the presentation was prepared, civil disobedience and protests against the tar sands have sprung up from coast to coast. The movement has helped delay President Obama’s decision on the Keystone XL pipeline—designed to funnel Canada’s landlocked oil sands crude to refineries on the Gulf Coast—and has held up another contentious pipeline in Canada, the Northern Gateway to the Pacific Coast.
The Power Point document, titled “Oil Sands Market Campaigns,” was recently made public by WikiLeaks, part of a larger release of hacked files from Stratfor, whose clients include the Departments of Homeland Security and Defense, Lockheed Martin, Raytheon and the American Petroleum Institute, the oil industry lobby. It appears to have been created for Calgary-based petroleum giant Suncor Energy, Canada’s largest oil sands producer.
The company told InsideClimate News that it did not hire Stratfor and never saw such a presentation. Suncor is mentioned 11 times in the document’s 35 pages and all of Stratfor’s advice seems to be directed at the energy company. For example, one slide says, “Campaign ends quickly with a resolution along the lines Suncor had wanted.” In several emails released by WikiLeaks, Stratfor employees discuss a $14,890 payment Suncor owes the company for two completed projects, though no details were provided.
The presentation is the latest in a series of revelations that suggest energy companies—which for most of their history seemed unfazed by activists—have been looking for ways to dilute environmentalists’ growing influence.
Earlier this year, TransCanada, the Canadian energy company behind the Keystone XL, briefed Nebraska law enforcement authorities on how to prosecute demonstrators protesting the 1,200-mile project. In 2011, Range Resources, an oil and gas company, allegedly hired combat veterans with experience in psychological warfare to squash opposition of natural gas drilling.
"The Stratfor presentation isn’t a complete surprise," said Scott Parkin, a senior campaigner for the Rainforest Action Network and volunteer organizer for Rising Tide North America, both grassroots environmental groups. “As opposition has grown, coal, oil and gas companies are all starting to put more money into responding—from surveillance to protection to public relations.”
Who Was Targeted?
For each of Stratfor’s categories of environmental activist—radicals, idealists, realists and opportunists—the presentation explains how their campaigns are structured and how the fossil fuel industry could deal with them.
Three grassroots organizations—Rising Tide North America, Oil Change International and the Indigenous Environmental Network—were labeled radicals. Greenpeace and the Rainforest Action Network were classified as a cross between radicals and idealists. Sierra Club, the nation’s largest environmental group, Amnesty International and Communities for a Better Environment, among others, were labeled idealists. Several mainstream environmental groups, including the National Wildlife Federation, World Wildlife Fund, Natural Resources Defense Council and Ceres, a nonprofit that organizes businesses, investors and public interest groups, were called realists.
It then lays out tactics the groups would use to push for change. They include holding demonstrations outside annual meetings and marketing events, generating fear of oil spills and other environmental disasters, targeting CEOs and their families, collaborating with other green groups, and splitting the fossil fuel industry on the issue by praising companies working with activists and publicly shaming those that aren’t.
The presentation says that while environmental groups are publicly fighting to stop the expansion of the oil sands, their “real demand” is for fossil fuel companies to adopt a “global code of conduct”—a set of best practices not required by law, but that take into consideration things like greenhouse gas reduction policies and human rights.
The Power Point also describes all the ways fossil fuel companies like Suncor could choose to react to green groups’ campaigns, such as limiting contact with the organizations, intentionally delaying negotiations, developing its own environmental initiatives to overshadow activists’ demands, or simply not responding. It provides the pros and cons of each public relations decision, as well as the best- and worst-case outcomes for each.
For example, Stratfor said that choosing not to respond could be useful because in 2010, “activists are not stopping oil sands’ growth and they have no power in Alberta or Ottawa. Chance of success with U.S. government is slim.” The best outcome from a no-response strategy, according to the presentation, is that green “groups move to fracturing [natural gas fracking] or some other venue to press for the first major code of conduct.”
Stratfor would not answer questions about the presentation because it has a policy not to comment on any of the WikiLeaks documents.
Several environmental groups named in the Stratfor presentation said they weren’t surprised by the consulting firm’s assessment of their work, but were disappointed, especially by its assumption that all they wanted was a code of conduct.
"The environmental community has been very united in saying that we need to stop tar sands expansion and clean up the mess already made there," said Susan Casey-Lefkowitz, director of the Natural Resources Defense Council’s international program. “That’s the only real path forward if we’re going to protect not only the health of communities on the ground in the boreal forests near the tar sands region, but also around the world from the impacts of climate change. We’re not looking for a code of conduct.”
For many, the leaked presentation provided proof that their work was having an impact, boosting their confidence to keep protesting.
"Knowing that groups like Stratfor are targeting us, surveying us, and also analyzing us shows how powerful these movements have become," said Parkin of the Rainforest Action Network and Rising Tide North America. "Obviously this wasn’t meant for public consumption, but this doesn’t intimidate us. If anything, it emboldens us. It encourages us to push harder."
I have to tell you, though, I’m deeply suspicious some of the NSA’s assertions.
They seem to be claiming that they have cracked nearly everything, and that they have backdoor access to privacy software. But this is practically impossible.
A lot of encryption software used today is actually ‘open source’. This means that the software code is freely available to anyone.
GNU Privacy Guard (GPG) is a great example. GPG is an open-source, free alternative version of Phil Zimmerman’s original PGP software. And it’s widely used to encrypt files and emails.
But because GPG is open-source, the software code is available for anyone to view, inspect, and modify. If there were any backdoor access for the NSA, thousands of people would see this.
Not to mention, to penetrate a single 2048-bit encryption key can take anywhere from thousands of years to tens of millions of years, even with the fastest supercomputers.
Consequently, it’s IMPOSSIBLE for the NSA to have cracked everything. And my assessment is that this is an intimidation campaign.
The NSA wants people to think that they have this capability.
And if everyone thinks that the NSA is Big Brother’s Big Brother, all-seeing and all-knowing, then not only will everyone be terrified, but everyone will simply stop using encryption.
After all, why bother going through the hassle of encrypting/decrypting if the NSA can still read the contents of your email?
It’s in the NSA’s interest for people to think that the agency is almighty. I don’t buy it. These people are seriously vile. But they don’t have superpowers.
When done properly, email encryption is still a good option. And there are a number of open-source tools out there to consider using.
#SPREADTHIS -> (AMY GOODMAN): ‘What are you facing? When you say “the lesser of two evils,” what was the other choice?’ *
(LADAR LEVISON): ‘Unfortunately, I can’t talk about that. I would like to, believe me. I think if the American public knew what our government was doing, they wouldn’t be allowed to do it anymore, which is why I’m here in D.C. today speaking to you.’
I watched an interview about this last weekend. If you don’t know the details, I strongly suggest you read up and be horrified and write letters and vote because holy crap, this is not how the US should be running. (via monkeyfrog)
Silent Circle’s thing has always been the promise of end-to-end secure communications, and that drive is apparently causing it to shut down the Silent Mail email service. Reasons cited in a blog post by CTO Jon Callas include the insecure nature of email protocols and preemptively avoiding the outside (read:FISA) pressures that prompted Lavabit to close its doors. Silent Circle says it hadn’t received any “subpoenas, warrants, security letters, or anything else”. Still, CEO Michael Janke tells TechCrunch he believed the government would come knocking due to certain high profile users of the service. Its phone, video and text products remain operational and claim to be “secure as ever”, if you’re wondering.
In his speech yesterday, Obama said that information available online fuels ‘violent agendas’ through ‘hateful propaganda’ that drives terrorism. Warning that ‘internet materials’ are fueling domestic terror threats and actually causing people to go out and commit mass acts of terrorism, Obama is once again following in the footsteps of his fellow control freak associates in assaulting the openness of the internet that is now a hot spring for alternative news amid the frozen depths of the mainstream media.
In the speech, Obama said:
“Today, a person can consume hateful propaganda, commit themselves to a violent agenda and learn how to kill without leaving their home.”
The simple reality is that the internet is the largest threat to corrupt government officials. It’s how we managed to break open the entire IRS scandal that has blown up in Obama’s face and led to calls for criminal action against top officials responsible for targeting Constitution-based groups with phony financial assaults. It’s also how we know about the truth surrounding Benghazi and what went down there. An event that has also generated serious awareness and even calls for impeachment.
Internet-Based Alt News Growing At Record Levels
So it should come as no surprise to find that Obama and others want the internet to be not only monitored by the government, but regulated as well. By using the ever-looming threat of domestic terrorism, it is simple to trace back extremists to certain internet sites that can be used as catalysts to enact legislation that endangers and annihilates internet freedom. Specifically, people like myself and others can be targeted in these crackdowns in order to give alternative news sources a bad name.
Obama’s latest speech is similar to his previous, in which he warns against those who question what he calls our ‘brave’ new government and warn of tyranny and corruption within it. The bottom line is that Obama is setting the stage here, as he has been for quite a while along with others, for an informational crusade against websites and blogs that dare to criticize government. Already labeled as ‘conspiracy’ and ‘extremist’ websites for even asking the simplest questions of government, the fight against net neutrality and alternative news sources is about to be taken to a whole new level.
Biometric Database of All Adult Americans Hidden in Immigration Reform | #GIG | #NWO | #GlobalInformationGrid | #InternetOfThings | #SystemsOfControl | #InvasionOfPrivacy
The immigration reform measure the Senate began debating yesterday would create a national biometric database of virtually every adult in the U.S., in what privacy groups fear could be the first step to a ubiquitous national identification system.
Buried in the more than 800 pages of the bipartisan legislation (.pdf) is language mandating the creation of the innocuously-named “photo tool,” a massive federal database administered by the Department of Homeland Security and containing names, ages, Social Security numbers and photographs of everyone in the country with a driver’s license or other state-issued photo ID.
Employers would be obliged to look up every new hire in the database to verify that they match their photo.
This piece of the Border Security, Economic Opportunity, and Immigration Modernization Act is aimed at curbing employment of undocumented immigrants. But privacy advocates fear the inevitable mission creep, ending with the proof of self being required at polling places, to rent a house, buy a gun, open a bank account, acquire credit, board a plane or even attend a sporting event or log on the internet. Think of it as a government version of Foursquare, with Big Brother cataloging every check-in.
“It starts to change the relationship between the citizen and state, you do have to get permission to do things,” said Chris Calabrese, a congressional lobbyist with the American Civil Liberties Union. “More fundamentally, it could be the start of keeping a record of all things.”
For now, the legislation allows the database to be used solely for employment purposes. But historically such limitations don’t last. The Social Security card, for example, was created to track your government retirement benefits. Now you need it to purchase health insurance.
“The Social Security number itself, it’s pretty ubiquitous in your life,” Calabrese said.
David Bier, an analyst with the Competitive Enterprise Institute, agrees with the ACLU’s fears.
“The most worrying aspect is that this creates a principle of permission basically to do certain activities and it can be used to restrict activities,” he said. “It’s like a national ID system without the card.”
For the moment, the debate in the Senate Judiciary Committee is focused on the parameters of legalization for unauthorized immigrants, a border fence and legal immigration in the future.
The committee is scheduled to resume debate on the package Tuesday.
Thanx @PamelaDrew ~ ‘Whistleblowers fight fear to expose world’s dark secrets’
RT talks to the Director of the Centre for Investigative Journalism, Gavin MacFadyen, about the difficulties whistleblowers face when trying to promote transparency.
#AaronSwartz - @Cryptomeorg’s open access guerilla warfare has released a library of #ebooks and papers relating to #cyberwar, #surveillance state, #propaganda, #crypto and #cybersecurity
For those that are hungry for knowledge, these are feasting times. Caches of knowledge are being released all over the place. Cryptome has been releasing a collection of ebooks that are very interesting for /r/evolutionReddit.
Thank you Cryptome!
- Aaron Swartz: Oxford Dictionary of Slang
- Aaron Swartz: Postcolonialism Introduction
- Aaron Swartz: End of the World Guide
- Aaron Swartz: Power Sex Suicide
- Aaron Swartz: March of Unreason
- Aaron Swartz: Global Catastrophes Introduction
- Aaron Swartz: Surviving Armageddon
- Aaron Swartz: Emerald Planet
- Aaron Swartz: Magic Universe
- Aaron Swartz: Information Society Theories
- Aaron Swartz: Democracy Inc: Totalitarianism
- Aaron Swartz: Governing Global E-Networks
- Aaron Swartz: Information Arts, Science, Tech
- Aaron Swartz: Wireless Internet Security
- Aaron Swartz: Internet Jurisdiction-Regulation
- Aaron Swartz: InfoTech Moral Philosophy
- Aaron Swartz: Thinking in Action On the Internet
- Aaron Swartz: Who Controls the Internet?
- Aaron Swartz: US-UK Spy Cooperation Post-911
- Aaron Swartz: Government Secrecy in Net Age
- Aaron Swartz: US Telecom Policy in Net Age
- Aaron Swartz: Cybercrime Principles
- Aaron Swartz: Cybersecurity Law and Economics
- Aaron Swartz: Global Transparency Perils-Promise
- Aaron Swartz: Cryptography and Complexity
- Aaron Swartz: Guerilla Open Access Manifesto
- Aaron Swartz: Marketing Rebellion (ie WikiLeaks)
- Aaron Swartz: Munitions of the Mind: Propaganda
- Aaron Swartz: Citizen Spy: TV Spying Propaganda
- Aaron Swartz: Spy Wars, Moles, Deadly Games
- Aaron Swartz: Spying Blind: CIA, FBI, 9/11
- Aaron Swartz: The Culture of Conspiracy
- Aaron Swartz: Norms in a Wired World
- Aaron Swartz: Prison State: Mass Incarceration
- Aaron Swartz: Media, Politics, Network Society
- Aaron Swartz: Internet Scientific Collaboration
- Documents Allegedly Downloaded by Aaron Swartz
- Aaron Swartz: Disposable Women of Global Capital
- Aaron Swartz: Achieving Human Rights
- Aaron Swartz: Constructing Knowledge in Networks
- USA v. Aaron Swartz Terminated
- Aaron Swartz: Managing InfoSys Emotional Intel
- Aaron Swartz: MIT Compile of Cognitive Sciences
- Aaron Swartz: Philosphy and Computing
- Aaron Swartz: Acts of Rebellion
- Aaron Swartz: Media Psychology
- Aaron Swartz: Interrogation-Confession Handbook
- Aaron Swartz: Psychology Law Truth and Lies
- Aaron Swartz: Psychology of Spying Analysis
- Aaron Swartz: Psychiatric Slavery
- O’Reilly donating ebook “Open Government” as a tribute to Aaron Swartz
- 18,592 scientific publications totaling 33GiB, all from Philosophical Transactions of the Royal Society and which should be available to everyone at no cost, but most have previously only been made available at high prices through paywall gatekeepers like JSTOR.
- Links scraped from Twitter hashtag #pdftribute
- Github for research. Searchable paper repository. Easy upload, perhaps with a tweet. Brought to you by a collaboration of the people behind pdftribute.net
- The Papester Collective. Need to get behind a paywall? Send a tweet.
- Open Access in Memoriam. Collecting email addresses for those interested in being a part of open access efforts going forward – based on the #pdftribute hashtag
- Operation Angel: Phase Two
- Also, if anyone is interested in helping build a P2P darknet library on retroshare, i2p and Tor – send me a PM. Basically, the aim is to build an unbreakable body of books and scientific papers accessible to all. But staying with the general eR theme of pushing darknet P2P as the final solution to a free information society.
- I also a very wildcard idea; but looking for someone who is familiar with using bots to submit to reddit.
White House Petitions:
- Remove United States District Attorney Carmen Ortiz from office for overreach in the case of Aaron Swartz.
- Fire Assistant U.S. Attorney Steve Heymann.
- Reform the Computer Fraud and Abuse Act to reflect the realities of computing and networks in 2013.
Open Access Journals:
- arXiv.org – Open access to 812,816 e-prints in Physics, Mathematics, Computer Science, Quantitative Biology, Quantitative Finance and Statistics
- Open Access Journals
- DOAJ – Directory of Open Access Journals
- Science Citizen – Doing Science in Public
- DOCUMENTA MATHEMATICA
Book Collections on Tor:
This is far from over and the fight to release information from paywalls to the effective public domain has only just begun.