jump to navigation

Spyware embedded by U.S. in foreign networks, security firm says – Houston Chronicle February 17, 2015

Posted by sandyclaus in NSA, Security, Security State, US Military.
add a comment

Spyware embedded by U.S. in foreign networks, security firm says – Houston Chronicle.

What ISIS Really Wants – The Atlantic February 17, 2015

Posted by sandyclaus in Atheism, Internet Freedom, Politics, Security, Security State.
add a comment

What ISIS Really Wants

The Islamic State is no mere collection of psychopaths. It is a religious group with carefully considered beliefs, among them that it is a key agent of the coming apocalypse. Here’s what that means for its strategy—and for how to stop it.

via What ISIS Really Wants – The Atlantic.

The NSA’s Patents, in One Searchable Database August 2, 2014

Posted by sandyclaus in Academic Technology, NSA, Politics, Security State.
add a comment

What do a voice identifier, an automated translator, a “tamper-indicating” document tube, and a supersecure manhole cover have in common? They’re all technologies for which the secretive National Security Agency NSA has been granted patents by the U.S. government, giving the agency the exclusive rights to its inventions.The four technologies represent a tiny fraction of the more than 270 sleuthy devices, methods, and designs for which the nation’s biggest intelligence agency has been granted a patent since 1979, the earliest year for which public figures are available. As the patent holder, the NSA can license the particular technology — for a fee — to anyone who wants to use it, so long as the patent hasn’t expired.

via The NSA’s Patents, in One Searchable Database.

C.I.A. Admits Penetrating Senate Intelligence Computers – NYTimes.com July 31, 2014

Posted by sandyclaus in CIA, Security State.
add a comment

WASHINGTON — An internal investigation by the Central Intelligence Agency has found that its officers improperly penetrated a computer network used by the Senate Intelligence Committee to prepare its damning report on the C.I.A.’s detention and interrogation program.The report by the agency’s inspector general found that C.I.A. officers created a fake online identity to gain access on more than one occasion to computers used by members of the committee staff, and tried to cover their movements as they rooted around the system, according to an official with knowledge of the investigation’s findings.Continue reading the main storyFEATURED COMMENTJim R. CaliforniaThe separation of powers implications behind this are staggering. I’m a big supporter of the intelligence community and its very difficult job, but this is u-g-l-y, and the punishments severe.349 COMMENTS WRITE A COMMENTA statement issued Thursday morning by a C.I.A. spokesman said that John O. Brennan, the agency’s director, had apologized to the two senior members of the intelligence committee and would set up an internal accountability board to review the issue. The statement said that the board, which will be led by former Senator Evan Bayh, an Indiana Democrat, could recommend “potential disciplinary measures” and “steps to address systemic issues.”

via C.I.A. Admits Penetrating Senate Intelligence Computers – NYTimes.com.

NSA targets Linux Journal as ‘extremist forum’: Report | ZDNet July 4, 2014

Posted by sandyclaus in Computer Security, NSA, Security State.
add a comment

The Linux Journal, a Linux user community website, has been flagged as an “extremist forum” by the United States’ National Security Agency NSA, while its users have been flagged as “extremists” under the agency’s XKeyscore program, according to leaked source code.The source code, which was published this week by German public broadcaster, ARD, also identified at least two German Tor Directory Authority servers — one in Berlin, the other in Nuremberg — as being under surveillance by the NSA.

via NSA targets Linux Journal as ‘extremist forum’: Report | ZDNet.

N.S.A. Director Says Snowden Leaks Hamper Efforts Against Cyberattacks – NYTimes.com March 5, 2014

Posted by sandyclaus in NSA, Politics, Privacy, Security State.
add a comment

WASHINGTON — Gen. Keith B. Alexander, the director of the National Security Agency, said Tuesday that the leaks by the former agency contractor Edward J. Snowden had slowed the effort to protect the country against cyberattacks on Wall Street and other civilian targets.

via N.S.A. Director Says Snowden Leaks Hamper Efforts Against Cyberattacks – NYTimes.com.

NSA To Sanders: We Can’t Tell You If We’re Spying On You In Order To Protect You January 15, 2014

Posted by sandyclaus in NSA, Security, Security State.
add a comment

The National Security Agency on Friday told Sen. Bernie Sanders (I-VT) that it cannot reveal whether the agency has been targeting members of Congress in its metadata collection because doing so would violate privacy provisions accorded to civilians in the program, the Huffington Post reported Tuesday.

\”Among those protections is the condition that NSA can query the metadata only based on phone numbers reasonably suspected to be associated with specific foreign terrorist groups,\” NSA chief Keith Alexander wrote in a letter to Sanders.

via NSA To Sanders: We Can’t Tell You If We’re Spying On You In Order To Protect You.

Former FISA chief judge Bates slams key proposed NSA reforms as unnecessary, counterproductive – 1/14/2014 4:09:17 PM | Newser January 15, 2014

Posted by sandyclaus in NSA, Security, Security State.
add a comment

Speaking for the entire U.S. judiciary, U.S. District Judge John D. Bates sent a letter to the Senate Intelligence Committee saying that appointing an independent advocate to the secret surveillance court is unnecessary and possibly counterproductive, and he slammed other key reforms as adding too heavy a caseload to the secret courts work. In current FISC hearings, judges only hear from the government seeking a spy warrant.

via Former FISA chief judge Bates slams key proposed NSA reforms as unnecessary, counterproductive – 1/14/2014 4:09:17 PM | Newser.

Reclaiming the Radical Imagination: Challenging Casino Capitalism’s Punishing Factories January 13, 2014

Posted by sandyclaus in Occupy, Politics, Security, Security State, Shadow Economy.
add a comment

Chris Hedges is right when he argues that \”any state that has the capacity to monitor all its citizenry, any state that has the ability to snuff out factual public debate through [the] control of information, any state that has the tools to instantly shut down all dissent is totalitarian.\” [7]  While Hedges is aware that this disciplinary culture of fear and repression is rooted in a political economy that treats people as objects and makes the accumulation of capital the subjects of history, he underestimates one important element of the new authoritarianism produced by casino capitalism. That is, what is novel about existing registers of discipline and control is that they operate in a new historical conjuncture in which the relationship among political power, cultural institutions and everyday life has become more powerful and intense in the ability to undermine the radical imagination and the power and capacities of individuals to resist repression and make the crucial decisions necessary to take control over the forces that shape their lives.

via Reclaiming the Radical Imagination: Challenging Casino Capitalism’s Punishing Factories.

Ten Myths About the NSA, Debunked | The Nation January 13, 2014

Posted by sandyclaus in NSA, Security, Security State.
add a comment

The debate Edward Snowden envisioned when he revealed the extent of National Security Agency NSA spying on Americans has taken a bad turn. Instead of a careful examination of what the NSA does, the legality of its actions, what risks it takes for what gains, and how effective the agency has been in its stated mission of protecting Americans, we increasingly have government officials or retired versions of the same demanding—quite literally—Snowden’s head and engaging in the usual fear-mongering over 9/11. They have been aided by a chorus of pundits, columnists, and present as well as former officials offering bumper-sticker slogans like \”If you have nothing to hide, you have nothing to fear,\” all the while claiming our freedom is in direct conflict with our security.It’s time to face these arguments directly. So here are ten myths about NSA surveillance that need debunking. Lets sort them out.

via Ten Myths About the NSA, Debunked | The Nation.