Guess Who Wasn’t Invited to the CIA’s Hacker Jamboree?

Apple, that’s who. Or Microsoft, or any of the other vendors whose products US government contractors have successfully exploited according to a recent report in the Intercept. While we’re not surprised that the Intelligence Community is actively attempting to develop new spycraft tools and capabilities—that’s their job—we expect them to follow the administration’s rules of engagement. Those rules require an evaluation under what’s known as the “Vulnerabilities Equities Process.” In the White House’s own words , the process should usually result in disclosing software vulnerabilities to vendors, because “in the majority of cases, responsibly disclosing a newly discovered vulnerability is clearly in the national interest.” Nevertheless, the Intercept article describes an annual CIA conference known as the Trusted Computing Base (TCB) Jamboree 1 at which members of the intelligence community present extensively on software vulnerabilities and exploits to be used in spying operations. At the 2012 TCB Jamboree, presenters […] Read More

Floridians, Help Us Stop Your State From Outlawing Anonymous Websites

Floridians, we need your help to stop a dangerous anti-anonymity bill. This week, the Florida state legislature is considering a bill that would make it illegal to run any website or service anonymously, if the site fits a vague category of “disseminat[ing]” “commercial” recordings or videos—even the site owner’s own work. Outlawing anonymous speech raises a serious First Amendment problem, and laws like this one have been abused by police and the entertainment industry. The bill, which is moving through Florida House and Senate committees this week, requires anyone who operates a website or Internet service to “disclose his or her true and correct name, physical address, and telephone number or e-mail address.” It would apply to any website or service “dealing in substantial part in the electronic dissemination of commercial recordings or audiovisual works, directly or indirectly,” to Florida consumers. A great many websites could be de-anonymized by […] Read More

Net Neutrality Fast Facts

http://ift.tt/1BBXPIu The Federal Communications Commission just approved new rules that allow it to regulate the Internet like a utility, establishing net neutrality. But only for now. The move has some very powerful opponents, starting with the cable and telecom companies  — companies that control most of the Internet infrastructure, seem likely to take the issue to court, and have many friends in Congress. In recent days and weeks the primary opposition in Congress to a move to establish net neutrality was led by Republicans, who do indeed get a lot of support from the big telecoms and cable companies — but it’s by no means a partisan issue. Many Democrats also have close ties to these companies. We’ve compiled some fast facts below on the influence wielded in Washington by the four biggest opponents of net neutrality and just who their friends are: Comcast: Comcast, the cable, Internet and […] Read More

Cometh The Censor

Submitted by Fred Reed via Fred On Everything blog, I see with no surprise that Washington is stepping up its campaign to censor the internet. It had to come, and will succeed.  It will put paid forever to America’s flirtation with freedom. The country was never really a democracy, meaning a polity in which final power rested with the people. The voters have always been too remote from the levers of power to have much influence. Yet for a brief window of time there actually was freedom of a sort. With the censorship of the net—it will be called “regulation”—the last hope of retaining former liberty will expire. Over the years freedom has declined in inverse proportion to the reach of the central government. (Robert E. Lee: “I consider the constitutional power of the General Government as the chief source of stability to our political system, whereas the consolidation […] Read More

5 Things Busy People Can Do to Fight the Rising Control System

Bernie Suarez Activist Post Want to implement small-scale, realistic tasks in your own life to strike back at the control system? Have you been seeing the daily headlines, the lies, the deceit and the global enslavement agenda in full swing and feeling that you aren’t doing enough to fight back because of your busy schedule? Feeling helpless and overwhelmed by the idea that a small group of psychopaths at the very top would push for a global order that involves their full enjoyment of life while you and the rest of humanity live as miserable slaves forever? Don’t have time to be a full-time activist, be involved in marches, or downright challenge the court system? Wondering what small things you can do to fight back as you deal with the hustle and bustle of your own life working to pay bills, obtain an education, or raising children? Here are […] Read More

Anonymous ‘Hacktivists’ Say Police Aren’t Solving Case Where Girl Was Burned To Death So They Will

Police not doing their job is hardly something new… But now the hacktivist group Anonymous has said that they will do the job of law enforcement investigators for them, since they are apparently unwilling or unable to make an arrest in the Jessica Chambers murder case. The case of Jessica’s murder horrified Mississippi’s after the young girl was found burned alive near her vehicle, nearly two weeks ago. Ben Chambers, the father of the 19-year-old Mississippi girl said he wants the killer or killers locked in solitary confinement, saying that “I promise as long as I have breath in me I can talk to people and make sure they’re not comfortable in there.” On December 6th, Jessica was found walking away from her burning vehicle. She had burns covering over 98% of her body. No arrests have been made yet, and Anonymous says that this is because the small, […] Read More

Censoring the Web Isn’t the Solution to Terrorism or Counterfeiting. It’s the Problem.

It’s an attractive idea because if you don’t think too hard, it appears to be a political no-brainer. It allows governments to avoid addressing the underlying social problem—a long and costly process—and instead simply pass the buck to Internet providers, who can quickly make whatever content has raised rankles “go away.” Problem solved! Except, of course, that it isn’t. Amongst the difficult social problems that Web censorship is often expected to solve are terrorism, child abuse and copyright and trade mark infringement. In recent weeks some further cases of this tactic being vainly employed against such problems have emerged from the United Kingdom, France and Australia. UK Court Orders ISPs to Block Websites for Trade Mark Infringement In a victory for luxury brands and a loss for Internet users, the British High Court last month ordered five of the country’s largest ISPs to block websites selling fake counterfeit goods. Whilst alarming […] Read More

5 Reasons To Question Apple’s Data Security

Submitted by Mike Krieger of Liberty Blitzkrieg blog, I’m the furthest thing in the world from a technology or security expert, but what I have learned in recent years is that a dedicated, sophisticated and well funded hacker can pretty much own your data no matter how many precautions you take. Nevertheless, the major technology companies on the planet shouldn’t go out of their way to make this as easy as possible. In the wake of the theft of private images from several prominent celebrities, many people are rightly wondering whether how vulnerable their data is. The answer appears to be “very,” and if you use Apple, the following article from Slate may leave you seething with a sense of anger and betrayal. David Auerbach wrote the following for Slate. Read it and weep:   In the wake of the theft of the private data and photos of dozens of celebrities, there […] Read More