TOR users become FBI’s No.1 hacking target after legal power grab | Register

The FBI wants greater authority to hack overseas computers, according to a law professor.

A Department of Justice proposal to amend Rule 41 of the Federal Rules of Criminal Procedure would make it easier for domestic law enforcement to hack into the computers of people attempting to protect their anonymity on the internet.

 The change in search and seizure rules would mean the FBI could seize targets whose location is “concealed through technological means”, as per the draft rule (key extract below). Concealed through technological means is legal speak for hosted somewhere on the darknet, using Tor or proxies or making use of VPN technology.

Authority to Issue a Warrant. At the request of a federal law enforcement officer or an attorney for the government: (6) a magistrate judge with authority in any district where activities related to a crime may have occurred has authority to issue a warrant to use remote access to search electronic storage media and to seize or copy electronically stored information located within or outside that district if: (A) the district where the media or information is located has been concealed through technological means; or (B) in an investigation of a violation of 18 U.S.C. § 1030(a)(5), the media are protected computers that have been damaged without authorization and are located in five or more districts.

The DoJ has said that the amendment is not meant to give courts the power to issue warrants that authorise searches in foreign countries. Continue reading

Advertisements

Comcast calls rumor that it disconnects Tor users “wildly inaccurate” | Ars Technica

Comcast calls rumor that it disconnects Tor users “wildly inaccurate” | Ars Technica.

Obama’s Internet ID Plot Being Tested in Two States | New American

A plot by the Obama administration to impose Internet IDs on Americans is now officially being rolled out, with pilot programs for the controversial online “driver’s license” scheme already beginning in both Michigan and Pennsylvania. According to the White House, the virtual “Identity Ecosystem” being funded and pushed by the federal government is supposed to make the Internet more “secure” and “convenient.” Critics across the political spectrum, however, are warning that the Orwellian scheme only makes it more convenient for the feds to spy on people, control the public, and suppress dissent.

Indeed, critics, who have been sounding the alarm bells for years, say the plot — a version of which is already in place under the brutal communist regime ruling mainland China — represents a major danger to privacy, free speech, Internet freedom, and more. Organizations and activists from virtually every point on the political spectrum are gearing up to “vehemently” oppose the plan and its brazen threats to freedom — not to mention the constitutional and practical problems it entails. Continue reading

The Deep State Hiding in Plain Sight | Moyers

Everyone knows about the military-industrial complex, which, in his farewell address, President Eisenhower warned had the potential to “endanger our liberties or democratic process” but have you heard of the “Deep State?”

Mike Lofgren, a former GOP congressional staff member with the powerful House and Senate Budget Committees, joins Bill to talk about what he calls the Deep State, a hybrid of corporate America and the national security state, which is “out of control” and “unconstrained.” In it, Lofgren says, elected and unelected figures collude to protect and serve powerful vested interests. “It is … the red thread that runs through the history of the last three decades. It is how we had deregulation, financialization of the economy, the Wall Street bust, the erosion or our civil liberties and perpetual war,” Lofgren tells Bill.

Lofgren says the Deep State’s heart lies in Washington, DC, but its tentacles reach out to Wall Street, which Lofgren describes as “the ultimate backstop to the whole operation,” Silicon Valley and over 400,000 contractors, private citizens who have top-secret security clearances. Like any other bureaucracy, it’s groupthink that drives the Deep State.

In conjunction with this week’s show, Mike Lofgren has written an exclusive essay, “Anatomy of the Deep State.”

Producer: Gina Kim. Segment Producer: Lena Shemel. Editor: Rob Kuhns. Intro Editor: Sikay Tang.

Please Repost : The NSA Keyword list

Just give the guys at NSA something to make the screen light up, please send this list by email, text, fax and social media to everyone you know, and some that you don’t. Grey Enigma. _________________________________

Assassination Attack Domestic security Drill Exercise Cops Law enforcement Authorities Disaster assistance Disaster management DNDO (Domestic Nuclear Detection Office) National preparedness Mitigation Prevention Response Recovery Dirty bomb Domestic nuclear detection Emergency management Emergency response First responder Homeland security Maritime domain awareness (MDA) National preparedness initiative Militia Shooting Shots fired Evacuation Deaths Hostage Explosion (explosive) Police Disaster medical assistance team (DMAT) Organized crime Gangs National security State of emergency Security Breach Threat Standoff SWAT Screening Lockdown Bomb (squad or threat) Crash Looting Riot Emergency Landing Pipe bomb Continue reading

101 Ways You Are Being Tracked | CodeName Insight

The recent release of the NSA spying documents is just the tip of the iceberg when it comes to ways that you are being tracked. Consider your activities and how they can be tracked via:

  1. Cell phone usage
  2. Smartphone apps
  3. Cell phone cloning
  4. Social media post/tweets/etc
  5. Items you buy with store rewards cards
  6. Items you buy online
  7. Items you buy with credit/debit cards
  8. Your car’s GPS system/On Star system
  9. Your library activity (recorded via your library card)
  10. Your internet (ISP) activity
  11. Red-light/traffic cameras
  12. Private, public, and government security cameras Continue reading