- Dec 2024
-
www.youtube.com www.youtube.com
-
18:30 the fundamental problem is that ALL "consumer grade" hardware has backdoors.<br /> hardware backdoors, closed-source firmware, closed-source drivers, closed-source operating systems, ...<br /> and even without backdoors, you always have compromising emissions = tempest:
spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations
Tags
Annotators
URL
-
- Nov 2024
- Nov 2023
-
www.youtube.com www.youtube.com
-
blah. this surveillance system is one big personality test.<br /> the problem is, they do not want a balance of all personality types or "natural order",<br /> but they do a one-sided selection by personality type.<br /> aka socialdarwinism, socialism, survival of the social, social credit score, civilization, high culture, progress, "made order", human laws, human rights, humanism, ...
-
- Sep 2021
-
pluralistic.net pluralistic.net
-
Technology changes the nature of both of these collapses. Take guard labor: mass surveillance and technological controls make it cheaper than at any time in history to isolate and neutralize political threats to elite rule. How much cheaper? Well, in 1989, the Stasi employed one in sixty East Germans to spy on the whole nation. Today, the NSA spies on the whole world, at a spy:subject ratio that's more like 1:10,000 – two orders of magnitude more efficient than the spies of a generation ago. That's a huge productivity gain, and it's all thanks to digital technology.
Cory Doctorow estimates that mass surveillance technology has enabled an efficiency of two orders of magnitude between the East German Stasi (1:60) and the American NSA (1:10,000) which provides a huge productivity gain for guard labor to enable massive wealth inequality.
Tags
Annotators
URL
-
- Aug 2021
-
fromthemachine.org fromthemachine.org
-
Not Found The requested URL was not found on this server. Apache/2.4.29 (Ubuntu) Server at fromthemachine.org Port 80
Literally, if Florida sends me to the psych ward again initiate legal action against Washington DC, the State of FLorida, and every doctor and practitioner who has ever signed Baker Act, 5150 or the like across the country,
Per me. FIND THEM. @NSAGOV
Tags
Annotators
URL
-
- Oct 2020
-
-
In at least one instance, a foreign adversary was able to take advantage of a back door invented by U.S. intelligence, according to Juniper Networks Inc, which said in 2015 its equipment had been compromised. In a previously unreported statement to members of Congress in July seen by Reuters, Juniper said an unnamed national government had converted the mechanism first created by the NSA.
NSA gets Juniper to put a backdoor in one of their products. The product gets compromised by a foreign government in 2015.
-
- Jun 2020
-
www.forbes.com www.forbes.com
-
Messaging platforms are either secure or they’re not. NSA, it would seem, tends to agree.
-
“End-to-end encryption,” NSA says, “is encrypted all the way from sender to recipient(s) without being intelligible to servers or other services along the way... Only the originator of the message and the intended recipients should be able to see the unencrypted content. Strong end-to-end encryption is dependent on keys being distributed carefully.” So, no backdoors then.
-
On April 24, the U.S. National Security Agency published an advisory document on the security of popular messaging and video conferencing platforms. The NSA document “provides a snapshot of best practices,” it says, “coordinated with the Department of Homeland Security.” The NSA goes on to say that it “provides simple, actionable, considerations for individual government users—allowing its workforce to operate remotely using personal devices when deemed to be in the best interests of the health and welfare of its workforce and the nation.” Again somewhat awkwardly, the NSA awarded top marks to WhatsApp, Wickr and Signal, the three platforms that are the strongest advocates of end-to-end message encryption. Just to emphasize the point, the first criteria against which NSA marked the various platforms was, you guessed it, end-to-end encryption.
-
- Nov 2019
-
-
Überwachung
Abseits vom Kapital, welches aus solcher Überwachung geschlagen wird, erscheint mir die Überwachung an sich als ebenso interessant. Beispielsweise die staatliche Überwachung Aller aus Gründen der "inneren Sicherheit". Diese wir am Beispiel der Folgen von 9/11 und der Snowden-Affäre von eben diesem in der 1368. Folge des Podcasts "The Joe Rogan Experience" im Detail aufgeschlüsselt.
-
-
-
Überwachungs
Abseits vom Kapital, was aus solcher Überwachung geschlagen wird, erscheint mir die Überwachung an sich als ebenso interessant. Beispielsweise die staatliche Überwachung Aller aus Gründen der "inneren Sicherheit". Diese wird am Beispiel der Folgen von 9/11 und der Snowden-Affäre von eben diesem in der 1368. Folge des Podcasts The Joe Rogan Experience im Detail aufgeschlüsselt.
-
- Apr 2019
-
techcrunch.com techcrunch.com
-
The report also noted a 27 percent increase in the number of foreigners whose communications were targeted by the NSA during the year. In total, an estimated 164,770 foreign individuals or groups were targeted with search terms used by the NSA to monitor their communications, up from 129,080 on the year prior.
-
The data, published Tuesday by the Office of the Director of National Intelligence (ODNI), revealed a 28 percent rise in the number of targeted search terms used to query massive databases of collected Americans’ communications.
-
-
palant.de palant.de
-
LastPass is run by LogMeIn, Inc. which is based in United States. So let’s say the NSA knocks on their door: “Hey, we need your data on XYZ so we can check their terrorism connections!” As we know by now, NSA does these things and it happens to random people as well, despite not having any ties to terrorism. LastPass data on the server is worthless on its own, but NSA might be able to pressure the company into sending a breach notification to this user.
-
- Feb 2018
-
-
The NSA must be psyched about this.
-
- Sep 2017
-
blackboard.gwu.edu blackboard.gwu.edu
-
The military superiority of states did not guarantee vic-tory over the much weaker NSAs and many have gone down in defeat. Van Creveld arguesthat twentieth- and twentieth-first-century armed forces“are helpless infighting off smallgroups of often ill trained, ill funded, ill equipped terrorists.
Van Creveld highlights, if overstates, the difficulty states have in combating NSAs. *Historically, states used slaughter of innocents and scorched earth tactics to suppress revolts by NSAs... current weaponry as well as media technologies makes these sort of repressive tactics unfeasible in the post WWII period
-
- Oct 2016
-
www.cato.org www.cato.org
-
Patrick G. Eddington of the Cato Institute says a report from the DoJ shows that Edward Snowden's actions were in the public interest, and President Obama should pardon him, or at least dismiss the charges.
-
- Sep 2015
-
netzpolitik.org netzpolitik.org
-
Hahn: Welche BND-Selektoren hat NSA geprüft? W.O.: Alle, die in Bad Aibling waren und gesteuert werden sollen. Hahn: Wird ja Geheimnis um Auftragsprofil des BND (APB) gemacht. Aber USA können das ja aus BND-Selektoren ablesen? W.O.: USA wissen, wonach BND in Bad Aibling sucht, ja. Hahn: Aber es wird nicht alles eingespeist in Bad Aibling? W.O.: Nein, gibt Sperrvermerke. Darf ist das sagen? Wolff: Ja, grob. W.O.: Es gibt Sperrvermerke für Selektoren gegenüber bestimmten AND. (!)
-
Notz: IP-Datenbank war nur US-Selektoren, BND hat ja eigene. W.O.: Ja. Notz: Hatte NSA Zugriff darauf? W.O.: Ja, bis 2012.
-
- Jun 2015
-
www.nytimes.com www.nytimes.com
-
The World Says No to Surveillance
I think it's interesting that this op-ed came out on the same day as another one "saying no" to a different, but related kind of surveillance: Facebook's monitoring of user activity for commercial purposes.
Here's a leaked Prism slide explaining their interest in how "typical users" behave on the Internet:
-
- May 2015
-
www.nbcnews.com www.nbcnews.com
-
a never-used program to monitor potential "lone wolf" suspects who haven't been tied to terrorist groups
How are we supposed to believe this hasn't been used when the Director of National Intelligence, James Clapper, is widely regarded by the public to have lied to Congress under oath about surveillance programs?
-
-
theoldreader.com theoldreader.com
-
Congress needs to start over from a blank sheet of paper, "knowing what we know now", as they say.
-
- Jan 2015
-
newleftreview.org newleftreview.org
-
After 2004, I believed the story that the protesters in Ukraine and elsewhere were mobilized through text messaging and blogs.
believes the story ... it's a story he believes.
-
We were supposed to be saving the world by helping to promote democracy, but it seemed clear to me that many people, even in countries like Belarus or Moldova, or in the Caucasus, who could have been working on interesting projects with new media on their own, would eventually be spoiled by us.
Applies to these activities wherever undertaken, including any country in the West, he just so happens to be interested in former Soviet Block countries
-
- Sep 2014
-
-
Wir mussten lernen, dass das Netz inzwischen eine Überwachungsmaschinerie ist, und zwar nicht nur für sich selbst, sondern für die gesamte Welt. Dieser Missbrauch des Internets war in dieser Intensität neu für mich.
Interessant, wie Lobo selbst stellung dazu nimmt, aber die Tragweite seines Projektes nicht mitnimmt.
-
- Jun 2014
-
www.nytimes.com www.nytimes.com
-
Where can we find this new Google encryption toolkit?
-
- Sep 2013
-
thedeadcanary.wordpress.com thedeadcanary.wordpress.com
-
glenn greenwald’s piece yesterday in the guardian
This was back in May, before the first of the Snowden revelations. Here's the article I reference. My how things have changed. There's a spreadsheet someone put together of what we've learned so far.
-