The FBI wants greater authority to hack overseas computers, according to a law professor.
A Department of Justice proposal to amend Rule 41 of the Federal Rules of Criminal Procedure would make it easier for domestic law enforcement to hack into the computers of people attempting to protect their anonymity on the internet.
The change in search and seizure rules would mean the FBI could seize targets whose location is “concealed through technological means”, as per the draft rule (key extract below). Concealed through technological means is legal speak for hosted somewhere on the darknet, using Tor or proxies or making use of VPN technology.
Authority to Issue a Warrant. At the request of a federal law enforcement officer or an attorney for the government: (6) a magistrate judge with authority in any district where activities related to a crime may have occurred has authority to issue a warrant to use remote access to search electronic storage media and to seize or copy electronically stored information located within or outside that district if: (A) the district where the media or information is located has been concealed through technological means; or (B) in an investigation of a violation of 18 U.S.C. § 1030(a)(5), the media are protected computers that have been damaged without authorization and are located in five or more districts.
The DoJ has said that the amendment is not meant to give courts the power to issue warrants that authorise searches in foreign countries. Continue reading
A plot by the Obama administration to impose Internet IDs on Americans is now officially being rolled out, with pilot programs for the controversial online “driver’s license” scheme already beginning in both Michigan and Pennsylvania. According to the White House, the virtual “Identity Ecosystem” being funded and pushed by the federal government is supposed to make the Internet more “secure” and “convenient.” Critics across the political spectrum, however, are warning that the Orwellian scheme only makes it more convenient for the feds to spy on people, control the public, and suppress dissent.
Indeed, critics, who have been sounding the alarm bells for years, say the plot — a version of which is already in place under the brutal communist regime ruling mainland China — represents a major danger to privacy, free speech, Internet freedom, and more. Organizations and activists from virtually every point on the political spectrum are gearing up to “vehemently” oppose the plan and its brazen threats to freedom — not to mention the constitutional and practical problems it entails. Continue reading
Everyone knows about the military-industrial complex, which, in his farewell address, President Eisenhower warned had the potential to “endanger our liberties or democratic process” but have you heard of the “Deep State?”
Mike Lofgren, a former GOP congressional staff member with the powerful House and Senate Budget Committees, joins Bill to talk about what he calls the Deep State, a hybrid of corporate America and the national security state, which is “out of control” and “unconstrained.” In it, Lofgren says, elected and unelected figures collude to protect and serve powerful vested interests. “It is … the red thread that runs through the history of the last three decades. It is how we had deregulation, financialization of the economy, the Wall Street bust, the erosion or our civil liberties and perpetual war,” Lofgren tells Bill.
Lofgren says the Deep State’s heart lies in Washington, DC, but its tentacles reach out to Wall Street, which Lofgren describes as “the ultimate backstop to the whole operation,” Silicon Valley and over 400,000 contractors, private citizens who have top-secret security clearances. Like any other bureaucracy, it’s groupthink that drives the Deep State.
In conjunction with this week’s show, Mike Lofgren has written an exclusive essay, “Anatomy of the Deep State.”
Producer: Gina Kim. Segment Producer: Lena Shemel. Editor: Rob Kuhns. Intro Editor: Sikay Tang.
Just give the guys at NSA something to make the screen light up, please send this list by email, text, fax and social media to everyone you know, and some that you don’t. Grey Enigma. _________________________________
Assassination Attack Domestic security Drill Exercise Cops Law enforcement Authorities Disaster assistance Disaster management DNDO (Domestic Nuclear Detection Office) National preparedness Mitigation Prevention Response Recovery Dirty bomb Domestic nuclear detection Emergency management Emergency response First responder Homeland security Maritime domain awareness (MDA) National preparedness initiative Militia Shooting Shots fired Evacuation Deaths Hostage Explosion (explosive) Police Disaster medical assistance team (DMAT) Organized crime Gangs National security State of emergency Security Breach Threat Standoff SWAT Screening Lockdown Bomb (squad or threat) Crash Looting Riot Emergency Landing Pipe bomb Continue reading
The recent release of the NSA spying documents is just the tip of the iceberg when it comes to ways that you are being tracked. Consider your activities and how they can be tracked via:
- Cell phone usage
- Smartphone apps
- Cell phone cloning
- Social media post/tweets/etc
- Items you buy with store rewards cards
- Items you buy online
- Items you buy with credit/debit cards
- Your car’s GPS system/On Star system
- Your library activity (recorded via your library card)
- Your internet (ISP) activity
- Red-light/traffic cameras
- Private, public, and government security cameras Continue reading
Encryption may end up being the biggest trend in 2013, as the concept, usage and term itself move from the realm of computer geeks and hackers into mainstream consciousness. The reason why such a moment must occur relates to the fact that governments and intelligence agencies the world over are rapidly moving in the direction of spying on their citizenry twenty four hours a day, seven days a week. Those of us that don’t like this privacy invasion will have to move toward encrypting as much of our daily lives as possible. Continue reading
If President Obama, John McCain (R., AZ), Lindsey Graham (R., SC), Marco Rubio (R., FL), Lindsey Graham (R., SC.), Charles Schumer (D., NY.), Jeff Flake (R., AZ.), Michael Bennet (D., CO.), and implicated child molester Robert Menendez (D., N.J.), get their way, it will soon be law that if you want to board an airplane, to vote, to purchase a firearm, hold a job and basically buy and sell anything, then you will be required to submit to a National ID Card which will soon become part of a global ID system.
In effect, the proposed national and soon-to-be global ID card will serve as a permission slip to do all of the ordinary things that you presently have the right to do as an ordinary American citizen. Of course, if you are the president, or one of these senatorial traitors and your intention is to eliminate U.S. sovereignty by requiring American citizens to become a part of a global identification system, then this is a requisite step in this treasonous give away of our country. Of course, the good senators are not calling this a national ID because that has been tried, opposed and rejected back in 2008. These senators are cloaking their treason under the guise that the implementation of this universal ID system is an immigration issue.
The Immigration Trojan Horse. The National ID and soon to be Global ID system is being sold to the rank and file of Congress as a means to control terrorism and to further prevent illegal immigration. Showing ID’s to board a plane on 9/11 did not prevent the destruction of the Twin Towers now did it? And we have drones and satellites which can read the inscription on a dime from the upper reaches of the atmosphere and we can’t identify and stop foreign nationals from crossing our borders? Our government does want to stop illegal immigration. And now we are being asked to swallow the myth that only an ID can prevent illegal immigration. Only a member of Congress who is more focused on becoming enriched at their insider-trading potential would be distracted enough to fall for this ridiculous excuse. And when one considers that a bi-partisan group of congressman are trying to simultaneously create a path to citizenship for all illegal alien residents, this justification of requiring a national ID to solve the immigration issues of this country is based wholly on deception. Continue reading
We’ve discussed many times before—hardly a month goes by without some major action against Internet users… from Obama’s ‘kill switch’, to ACTA, SOPA and PIPA, to stasi tactics against people like Kim Dotcom. Online privacy is becoming more important by the day. And nobody is going to give it to you, you have to take steps yourself to secure it. Below are five different tools and services that will get you started:
1. Tor Browser – Tor is a great weapon in the fight for online anonymity as it allows you to surf the web without giving up your location and other personal data to the websites you visit. The Tor Browser Bundle is the easiest and most secure way to get started; simply download it, and start surfing the web with the Tor Browser. It’s available for Windows, Mac, and Linux. Learn more about and download the Tor Browser Bundle here Continue reading
The grey man directive, some say, cannot be learned. Some insist that being a grey man is just something you are–or you’re not. In this article and companion video, we take you inside the mind of a grey man, a man that understands the importance of blending in, careful to exist in the fringes between the pendulum swings of social paradigms. In most urban survival situations we will likely face at home, being grey is your best course of action to avoid kinetic confrontation. There is no complete manual on how to be grey; no written instruction to guide you. It’s instinctual, environmental, and situational dependent.
via Survival Think Tank: The Grey Man Directive.
The Department of Homeland Security’s production of domestic intelligence has increased substantially over the last few years according to a brochure of “intelligence products” published last month by Cryptome. The 2012 DHS Intelligence Enterprise Product Line Brochure is “a standardized catalogue of intelligence reports and products that represent the full breadth” of the agency’s analytical capabilities. It provides descriptions of each type of product created by the DHS Intelligence Enterprise as well as the classification level and instructions on how DHS “customers” can obtain the products. Continue reading
Project censored: The expanding police state tops the annual list of stories under-reported by the mainstream media, By Yael Chanoff – Thursday, October 11,2012
People who get their information exclusively from mainstream media sources may be surprised at the lack of enthusiasm on the left for President Barack Obama in this crucial election. But that’s probably because they weren’t exposed to the full online furor sparked by Obama’s continuation of his predecessor’s overreaching approach to national security, such as signing the 2012 National Defense Authorization Act, which allows the indefinite detention of those accused of supporting terrorism, even U.S. citizens.
We’ll never know how this year’s election would be different if the corporate media adequately covered the NDAA’s indefinite detention clause and many other recent attacks on civil liberties. What we can do is spread the word and support independent media sources that do cover these stories. That’s where Project Censored comes in. Continue reading
“Cubic is the world’s leading provider of automated payment and fare collection systems and services for the transportation industry.” Cubic’s purchase of Abraxas in 2010 for $124 million (US) in cash made sense looking at where the $1.2 billion dollar Cubic Company does business. A large chunk of that money comes from its Defense Systems and Mission Support Operations segments (where Abraxas is apparently operating). Roughly $415 million comes from its Transportation division.
Cubic’s acquisition of Abraxas and its magic bag full of electronic tracking/snooping tools was made two years prior to the 2012 Olympic Games in London.In 2011. The transit authority there had recently installed video cameras on all of its 191 buses. Continue reading
“I Lived. I Died. Now Mind Your Own Business.” That’s how I want my tombstone to read.
What do I have to hide? Everything! Which is to say, every piece of personal information someone or something demands to know is something I don’t want to tell because no one has the right to demand access to my life.
The right to privacy rests largely on a presumption of innocence. It assumes that — in the absence of evidence of wrongdoing — an individual has a right to shut his front door and tell other people (including government) to mind their own business. Continue reading
Disclaimer: The following is a series of fictional accounts of theoretical situations. However, the information contained within was taken from established scientific journals on covered technology and military studies of real life combat scenarios. Alt-Market does not condone the use of any of the tactics described within for “illegal” purposes. Obviously, the totalitarian subject matter portrayed here is “pure fantasy”, and would never be encountered in the U.S. where politicians and corporate bankers are forthright, honest, and honorable, wishing only the sweetest sugar coated chili-dog best for all of mankind…
Imagine, if you will, a fantastic near future in which the United States is facing an unmitigated economic implosion. Not just a mere market crash, or a stint of high unemployment, but a full spectrum collapse driven by unsustainable debt spending and hyperinflationary printing. The American people witness multiple credit downgrades of U.S. Treasury mechanisms, the dollar loses its reserve status, devaluation of the currency runs rampant, and the prices of commodities and imported goods immediately skyrocket. Continue reading
The one thing about cash is that it is anonymous. And that’s the one thing that intrusive governments don’t like about it.
via Cash for Freedom by Charles Goyette via Lew Rockwell.
” Recently the search giant Google has attempted to provide a less evil option for their National Security Affairs (NSA) and Department of Homeland Security (DHS) partners for monitoring American citizens by allowing Google users to modify the profile of ad distribution that the NSA and Department of Homeland Security use to profile potential terrorists. This system was originally called the “Google Cleaner” and was developed by a google employee who is now dead. New Evidence – The DHS and NSA Use Google to Profile You
Most are unaware of the cookies that Google uses to track your behavior on the internet…
go here New Evidence – The FBI Uses Google to Profile You – coupmedia.org.
There’s plenty of reason to be concerned Big Brother is watching. We’re paranoid not because we have grandiose notions of our self-importance, but because the facts speak for themselves.
Here’s our short list of nine reasons that Wired readers ought to wear tinfoil hats, or at least, fight for their rights and consider ways to protect themselves with encryption and defensive digital technologies.
go here: 9 Reasons Wired Readers Should Wear Tinfoil Hats | Threat Level | Wired.com.
“… The Constitution protects our right to be free from unreasonable searches and seizures by the government. At the same time, searches by the government exist against a very different backdrop from when the Fourth Amendment was written. How do we guard our “space” when it is neutralized as mere geography-beyond-the-house rather than the mobile positioning of the body politic? We live in an era when new technologies make the most personal information easily accessible, whether the government collects it or not.
Our private lives are available “privately” everywhere, even if it’s deemed “data mining” by businesses. The market for information is as thorough as a laser; it is as inescapable as the air we breathe: our lives are online. Our medical records are stored in “clouds.” We date through websites. Our genetic code is decipherable from any bit of discarded bubble gum. “Private” security cameras aim their ceaselessly gathering gaze on every public street. Our cellphones blip our location to satellites in space. People send compromising pictures of themselves in “sext” messages that can never be retracted. If our neighbor wishes to surveil us or to stalk us, we are all too vulnerable…”
via Do We Have Any Right to Privacy Outside Our Homes? | The Nation.
“… Upon arriving in the morning, according to the Associated Press, each student at the CCC-George Miller preschool will don a jersey with a stitched in RFID chip. As the kids go about the business of learning, sensors in the school will record their movements, collecting attendance for both classes and meals. Officials from the school have claimed they’re only recording information they’re required to provide while receiving federal funds for their Headstart program.
However, the story has caught the attention of both the ACLU and the Electronic Frontier Foundation, who have expressed alarm at the potential infringement of privacy rights. Together, they have submitted a letter of concern to school officials, including a request that they clarify what security precautions were put in place with the program.
This is not the first time a school has tried to track its students with RFID. In 2005, according to the AP, another grade school in California handed out RFID badges and was met with an equal amount of outrage from the ACLU and privacy rights watch dogs…”
via Goodbye Roll Call, Hello RFIDs – IEEE Spectrum.
Now that you’ve taken the red pill and realized the realities of living a life connected to the Internet, how can you better protect yourself in the future? There are several basic tools available for the privacy-conscious; most of them free…
If you would like to keep Facebook in check and minimize its invasion into your online life, check out Disconnect, a browser extension available for Firefox, Chrome, and Safari. The purpose of this extension is to “help people understand and control the data they share online.” Disconnect will disable third-party tracking, depersonalize searches, identify and block information requests from websites, and allows the user to easily unblock these requests if so chosen..
The service Google Alerts will actually send regular email updates every time your name is queried. Both of these simple steps can help you monitor the information other people are looking at pertaining to you and where they are accessing it from. Now that you have this handy guide to walk you through how to purge that data, channel your inner-Jason Bourne every so often and control your data like the secret agent you always wanted to be! Be sure to check out a related article by online privacy expert Dan Tynan for more information.
To help further minimize your digital footprint, privacy advocate Moxie Marlinspike created a service called GoogleSharing, which allows users to search through Google without being tracked. The technology scrambles search requests that are sent to Google, making it impossible to tell where or from whom the request is coming from…
Even with these precautions there is no absolute way to make your information available only to you. Once something is done online, expect it to be there forever. Don’t bother thinking you can hide anything online because there is nowhere to hide.
The best strategy for reducing your footprint is to remember to step back every once in awhile, and not rely on the Internet to service every facet of your life. Every picture doesn’t need to be geo-tagged; every new social media site does not have to be joined permanently. Every detail of your personal life does not have to be put on display for others to see. Just like you take steps to protect your physical information, remember to take steps to monitor and protect your digital information as well.via Maximum PC | How To Erase Your Digital Footprint – Page 2.
[Also, click here for ‘Privacy Tools’]
via TMI Nation – Reason Magazine.
…But what may be most unnerving about the Web is not how it empowers malicious smear merchants but how it standardizes chronic self-disclosure through mechanisms as innocuous as Facebook “likes,” and how it allows content aggregators to amass the tiny truths we disclose about ourselves in ways we can neither predict nor control. Imagine car insurers monitoring your tweetstream to see how often you use Foursquare to check-in at bars at least 30 miles from your apartment. Imagine dating sites assigning you a narcissism quotient based on how often you review hair salons and Pilates instructors on Yelp.com.
As indiscreetly as we live now, it is possible that in 2013 we may look back to 2011 as a golden era of privacy. Flickr, Facebook, and other social media sites today are filled with millions of photos that could prove embarrassing in certain contexts, but for the most part the people in those photos remain unidentified. That’s changing fast. “When combined with facial recognition and the power of Google to find obscure information, the possibility of damage to reputation is obvious,” Fertik writes. “Anyone photographed (accidentally or intentionally) near an adult bookstore could be identified by name and made subject to ridicule by his peers…