İzmir'de yaşayan arkadaşlar dikkat!

İzmir'i hiç bilmeyen-neredeyse- biri olarak kpss sınav yerimin açıklanmış olmasından mütevellit bir sualim olacak, İzmir otogarından olmak üzere:


Adresine hangi şehir içi hat ile gidebilirim? Otogara uzaklığı ne kadar? Taksiye binsem kaç para kitler? Yürüyecek kadar yakınsa 1-2 km- kaç dakikada varabilirim?

Cevapları mesaj ya da yorum olarak atabilirsiniz. Hepinize hayırlı iftarlar iyi akşamlar.

Das Ende des Rechtsstaates - Gesetze gelten nichts mehr.

Das Ende des Rechtsstaates - Gesetze gelten nichts mehr.

Die NSA, der britische GCHQ und andere westliche Geheimdienste greifen in großem Umfang internationale Kommunikation ab, spionieren Unternehmen sowie staatliche Stellen aus und verpflichten Dienstleister im Geheimen zur Kooperation. Einzelheiten dieses totalen Überwachungssystems enthüllen streng geheime Dokumente, die der Whistleblower und ehemalige NSA-Analyst Edward Snowden an sich gebracht und an Medien weitergegeben hat.

Berichte und Zusammenfassungen zur NSA-Affäre

Was bisher geschah: Zeitleiste zum NSA-Überwachungsskandal

Diskussions-Forum: NSA-Skandal

Analysen und Kommentare: Ein Jahr NSA-Skandal

Was bisher geschah: Der NSA-Skandal im Jahr 1 nach Snowden

Die Überwachung durch NSA & Co. gefährdet die Demokratie

Warum die NSA-Affäre alle angeht

BND/NSA-Skandal: Offenbar noch mehr kritische Selektoren entdeckt

  • Kein Ende der Selektoren: In der BND-Zentrale in Pullach wurden einem Zeitungsbericht zufolge mehr als 400.000 neue Suchbegriffe der NSA entdeckt,…
    BND-Skandal: Ultimatum an die Bundesregierung
    In den Streit um die Herausgabe der Listen mit bedenklichen NSA-Selektoren für die BND-Überwachung könnte wieder Bewegung kommen. Die G 10-Kommission…
    Selektoren-Streit: G 10-Kommission untersagt BND-Überwachungen
    Die G 10-Kommission soll dem BND Überwachung genehmigen, die Grundrechte berührt. Aktuell wollen die Kontrolleure wissen, welche problematischen…

Everything WILL Change

Only time will tell *what* the change will be, but it will be good. More and more people have been waking up to the reality of what’s actually going on, and we’re ready to fight. The 1% can’t expect to suppress the 99% forever; we will win.

Une note de la NSA, comment ça marche ?

1 TOP SECRET C’est le plus haut niveau de classification utilisé aux Etats-Unis, dans la mesure où leur publication pourrait entraîner des «dommages exceptionnellement graves» à la sécurité nationale du pays. Sur les 4,8 millions d’Américains autorisés à consulter des documents classifiés, 1,4 million étaient habilités «TOP SECRET» en 2012.

2 COMINT En matière de renseignement d’origine électromagnétique (ROEM en français, SIGINT - SIGnal INTelligence - en anglais), COMINT (COMmunication INTelligence) désigne l’écoute des télécommunications.

3 GAMMA «COMINT» est le niveau de classification de base en matière de SIGINT, les documents «encore plus hautement protégés» sont, eux, classifiés «COMINT GAMMA».

4 ORCON Le terme ORiginator CONtrolled indique que toute dissémination du document doit être validée par le service qui en est à l’origine.

5 NOFORN NO FOReign National, qui interdit la distribution du document classifié à tout citoyen non américain, même s’il peut accéder à d’autres documents classifiés. A contrario, les documents qui peuvent être partagés avec les partenaires de la NSA portent la mention REL TO («authorized for release to») suivi du code des pays concernés.

6 NSA National Security Agency : l’agence américaine en charge de la surveillance et de l’espionnage des télécommunications. Elle emploierait entre 30 000 et 40 000 espions et disposerait d’un budget annuel de plus de 10 milliards de dollars (8,9 milliards d’euros).

7 Global SIGINT Highlights C’est le titre donné aux rapports de la NSA sur les informations et renseignements les plus intéressants qu’elle a pu intercepter.

8 Executive Edition Indique que ces comptes rendus sont à destination des principaux chefs et responsables de la NSA et de la communauté du renseignement américain.

9 TS//SI-G//OC/NF pour TOP SECRET//Special Intelligence (SI)-GAMMA//ORIGINATOR CONTROLLED (ORCON)/NO FOReign National (NOFORN). En matière de COMINT, Special Intelligence est le terme utilisé pour désigner et contrôler les (…)

Lire la suite sur Liberation.fr

Micros climat à l’Élysée
Sarkozy, ce sauveur
Quand Sarkozy jouait les médiateurs au Moyen-Orient
A Paris, l’oreille interne de l’ambassade américaine
RRND — 06/24/15 - - Thomas L. Knapp

RRND — 06/24/15 – – Thomas L. Knapp

By Thomas L. Knapp ***** RATIONAL REVIEW NEWS DIGEST The Freedom Movement’s Daily Newspaper Volume XIII, Issue #3,224 Wednesday, June 24th, 2015 440 email subscribers http://rationalreview.news-digests.com ***** In the News: 1) WikiLeaks: NSA eavesdropped on the last three French presidents 2) Syria: Kurdish fighters push closer to Islamic State HQ 3) NM: Albuquerque cops face murder charges in…

View On WordPress

Junior Open

Photo by k4wtnb


静岡県の豊浜海岸で開催された【NSA 】ジュニアオープンに行ってきました!! 












View On WordPress

NSA and GCHQ repeatedly targeted Kaspersky and others

UK and US intelligence services have been relentlessly pursuing Kaspersky Labs and other antivirus software companies to gain detailed information on users.

First reported by The Intercept, the US National Security Agency (NSA) and UK GCHQ used reverse engineering to gain access to antivirus software and monitored web and email traffic to gain intelligence about users and the antivirus companies themselves.

The information, which was contained in documents released by NSA whistleblower Edward Snowden, explained that the UK’s intelligence agency applied for warrants to use software reverse engineering (SRE) in order to learn more about the software for future tactical use.

GCHQ applied for the warrant as it believed it needed legal cover because otherwise it could be seen as unlawful and may have amounted to copyright infringement. SRE is a technique that involves reversing thousands of commands that tell a computer what to do and producing a format that is far easier for a human to understand.

“Personal security products such as the Russian anti-virus software Kaspersky continue to pose a challenge to GCHQ’s CNE [Computer Network Exploitation] capability and SRE is essential in order to be able to exploit such software and to prevent detection of our activities,” the warrant renewal request said.

On the other side of the Atlantic, an NSA research team discovered in 2008 that Kaspersky software was sending sensitive user information back to its own servers and found out that this was simple enough to intercept and then used it to track users.

It managed to pick up this information from “User-Agent” strings in HTTP header requests and then used these to uniquely identify the devices owned by Kaspersky antivirus users. Kaspersky later denied this was possible in an email sent to The Intercept yet various Twitter users have been able to achieve the same result.

Email eavesdropping

The NSA goes further than that still. It’s further claimed that in a presentation given in 2010 on Project CAMBERDADA the agency admitted to monitoring the email accounts of different companies to find flaws in antivirus software.

Neither agency responded to the story when asked for a comment and the latest news comes in the same month that Kaspersky claimed it had been targeted by an intrusion that got to the very centre of its systems.

%3Cbr%3E%3Cbr%3E%3Ca%20href=“>…read more
RRND — 06/24/15 - - Thomas L. Knapp

RRND — 06/24/15 – – Thomas L. Knapp

By Thomas L. Knapp ***** RATIONAL REVIEW NEWS DIGEST The Freedom Movement’s Daily Newspaper Volume XIII, Issue #3,224 Wednesday, June 24th, 2015 440 email subscribers http://rationalreview.news-digests.com ***** In the News: 1) WikiLeaks: NSA eavesdropped on the last three French presidents 2) Syria: Kurdish fighters push closer to Islamic State HQ 3) NM: Albuquerque cops face murder charges in…

View On WordPress

New Post has been published on Cryptonewz.com

New Post has been published on http://cryptonewz.com/welcome-to-minds-like-facebook-but-without-the-snooping/

Welcome to Minds: Like Facebook But without the Snooping

Facebook has never been known for security and user privacy. Now a new open-source social network Minds is poised to fill that void by using real encryption and not storing any user information so nothing can be handed over to the NSA.

1.4 Billion (Vulnerable) Users

Facebook is the most successful social network ever conceived, inline or offline, currently claiming over 1.4 billion users overall. This makes it about five times as popular as Twitter in user base. The last decade has clearly been all about Facebook, whether you are a social butterfly or a business looking to reach its massive following.

Younger demographics are heading more and more to Instagram and other networks that aren’t “their parents” social network. What’s more is that new holes in Facebook’s user agreements for 2015 have opened the door for government and other third parties to access user information.

General standards for user privacy appear to have been compromised, and this has created a new opportunity in the market. If there is room for a safer social network, Minds.com is looking to fill that space through encryption.

Encryption has been around for decades, used by national governments and militaries to your local bank’s online services. Now, digital currencies like bitcoin have shown that encryption can help anyone do more online while protecting users’ identity.

Privacy focus

Minds looks to do the same for the social network concept and has released a new mobile app for iOS and Android. The app is open-source and is encrypted, so only the intended receiver gets the message. Chief executive Bill Ottman says this is the first encrypted social network app on the market. Ottman told CNet:

“A lot of companies will claim privacy and say they’re encrypted. But it’s not real encryption because we have no way of inspecting the code to see if there are backdoors.”

Ottman also notes a very important feature of Minds is the lack of collection of user information. Since no user information is collected by Minds, there is nothing to confiscate in case the NSA or other federal agency tries to strong-arm Minds like they’ve done to Yahoo and others. Ottman:

“If intelligence agencies ask for user data, we can’t give it to them because we don’t have it ourselves.”

Minds profit model is not based on banner ads but on upsells of services and points that let users expose posts beyond their followers. Users earn points for free by using the service as an active member while users’ posts automatically go out to all of their followers, like Twitter.

Keep in mind that all is not perfect at Minds and it is still in beta. The sign-up page asks you to agree to the terms and conditions (only an email, username, and password are required), but when you go to read them, there are no terms and conditions listed at all. Does that mean that there are no holds barred on your end? Their end?

Just like encryption has spread to digital currency, it looks ready to populate many common online networks to protect the privacy of users. The days of social networks as simple, centralized data mines for governments and private interests may be coming to an end as minds may be the first of a new generation of privacy-conscious social networks.

Do you still use Facebook? Are encrypted social networks the next big thing? Share above and comment below.

Did you enjoy this article? You may also be interested in reading these ones

Public Sector Cyber Security News 2015-022

Compiled by Scott Jarkoff for Intel Security Japan


  1. NSA Hacked? China and Russia Almost Definitely Have the Snowden Docs
  2. ‘Lotus Blossom’ Cyber-espionage Campaign Stretches Back 3 Years
  3. Federal law enforcers want separate database for protection after OPM security ‘blunder’
  4. RLE Wind Turbine HMI Stores Passwords in Plaintext, ICS-CERT Issues Advisory
  5. Adm. Zukunft Unveils New Coast Guard Cyber Strategy
  6. Federal CIO: Cyber is “Our Most Important Mission Today”

1. NSA Hacked? China and Russia Almost Definitely Have the Snowden Docs

Which brings me to the second potential source of these documents to foreign intelligence agencies: the US and UK governments themselves. I believe that both China and Russia had access to all the files that Snowden took well before Snowden took them because they’ve penetrated the NSA networks where those files reside. After all, the NSA has been a prime target for decades.

Those government hacking examples above were against unclassified networks, but the nation-state techniques we’re seeing work against classified and unconnected networks as well. In general, it’s far easier to attack a network than it is to defend the same network. This isn’t a statement about willpower or budget; it’s how computer and network security work today. A former NSA deputy director recently said that if we were to score cyber the way we score soccer, the tally would be 462–456 twenty minutes into the game. In other words, it’s all offense and no defense.

2. 'Lotus Blossom’ Cyber-espionage Campaign Stretches Back 3 Years

“The group relies on spear phishing attacks to infect its users, often using a malicious office document and decoy file containing content relevant to the target’s occupation or interests,” according to a report from Palo Alto Networks’ Unit 42 team. “The spear phishing attachment typically includes exploit code for a well-known Microsoft Office vulnerability, CVE-2012-0158, which is used to install the Trojan on the system and then display the decoy file, tricking the user into thinking the file opened correctly.”

The attackers used a backdoor Trojan named Elise after the sports car made by Group Lotus PLC of the United Kingdom. The tool appears to be unique to the group, and has morphed over time.

3. Federal law enforcers want separate database for protection after OPM security ‘blunder’

“Action must be taken to protect these federal law enforcement officers and their families,” stated a Federal Law Enforcement Officers Association memo dated Tuesday. “Lifetime credit monitoring needs to be provided for the victims of this breach. Additionally, to remedy this gross incompetence, OPM must implement new preventative measures and should move background investigations back under the FBI and install a separate database for officers and their families and those with security clearances.”

But that may prove to be a pricey endeavor.

The cost of creating a separate database inside an existing database could range from $25,000 to $250,000, depending on the size and type of system used by the Office of Personnel Management, said Keith Alsheimer, chief marketing officer for EnterpriseDB, an open source database provider that works with various government agencies.

4. RLE Wind Turbine HMI Stores Passwords in Plaintext, ICS-CERT Issues Advisory

Researcher Maxim Rupp discovered the vulnerability in the Nova-Wind Turbine HMI and reported it to the vendor. However, the vendor has been unresponsive and ICS-CERT issued an advisory about the vulnerability in order to warn users.

The vulnerability results from the fact that the software stores user credentials in plaintext, making the turbines attractive targets for attackers. If an attacker gains access to the credentials, he would be able to perform any action he chose on the device.

“Independent researcher Maxim Rupp has identified an unsecure credential vulnerability in the RLE International GmbH Nova-Wind Turbine HMI. RLE has been unresponsive in validating or addressing the alleged vulnerability. ICS-CERT is releasing this advisory to warn and protect critical asset owners of this serious issue,” the advisory says.

5. Adm. Zukunft Unveils New Coast Guard Cyber Strategy

“What is modern warfare going to look like in the 21st century?” asked Adm. Paul Zukunft. “Not that long ago,” he said, workers aboard a mobile offshore drilling unit unwittingly downloaded malware that scrambled the system that kept the floating platform stable. “They drifted off the well site,” the Coast Guard commandant said — with the drill pipe still attached and the well still pumping oil.

“Fortunately, the blowout preventer kicked in and shut it down,” Zukunft continued, preventing a disastrous spill. (It was the blowout preventer that failed on the Deepwater Horizon, where Zukunft coordinated the federal response in 2010). But a more sophisticated cyber attack on US oil and gas could be devastating, and there are people out there with the motive and the means to do it. Russia just happens to have some of the sharpest hackers on the planet, a worsening relationship with the US, and a massive share of the European and Asia natural gas markets.

6. Federal CIO: Cyber is “Our Most Important Mission Today”

Scott said strengthening the federal cybersecurity posture across government agencies is the only way to fully “restore public confidence in government and institutions,” which has undoubtedly decreased following the slew of hacks, breaches and negative cyber-related recent headlines.

Scott, only about four months into his new job as the government’s top techie, has been swift to react to the nation’s cybersecurity issues.

Last week, the White House – led by Scott – launched a 30-day ‘cybersecurity sprint’ to assess and improve agency’s cybersecurity processes, resources and priorities. Emergency procedures include tightening controls for “privileged users” and network administrators, upping the use of multifactor authentication and immediately patching critical software vulnerabilities.

Η βρετανική (MI6) απέσυρε μυστικούς πράκτορες από το εξωτερικό υπό τον φόβο της «αποκάλυψης» τους

Η βρετανική Μυστική Υπηρεσία Πληροφοριών, MI6, απέσυρε πολλούς  μυστικούς πράκτορες από το εξωτερικό υπό τον φόβο της «αποκάλυψης», λόγω της υπερ- δραστηριοποίησης των ρωσικών και κινεζικών αντιστοίχων υπηρεσιών . 

Ο λόγος αφορά κυρίως τα
αρχεία που έχουν  στα « χέρια τους» οι ρωσικές υπηρεσίες ασφαλείας , τα οποία έχουν  κλαπεί από την αμερικανική Εθνική Υπηρεσία Ασφαλείας (NSA), από τον Αμερικανό πράκτορα,  Έντουαρντ Σνόουντεν, αναφέρει η εφημερίδα The Sunday Times.

Η εφημερίδα υποστήριξε την Κυριακή επικαλούμενη ανώτερους Βρετανούς  αξιωματούχους , ότι η  Μόσχα έχει αποκτήσει πρόσβαση σε πάνω από 1.000.000 διαβαθμισμένα αρχεία,  που περιέχουν στοιχεία  για  μυστικές  πληροφορίες και στοιχεία που θα μπορούσαν να χρησιμοποιηθούν για τον εντοπισμό Βρετανών και Αμερικανών κατασκόπων, αναφέρει η ιστοσελίδα Sputnik.

Πηγή στην «Ντάουνινγκ Στριτ» δήλωσε στην εφημερίδα Sunday Times ότι «πράκτορες έπρεπε να μετακινηθούν , διακόπτοντας τις αποστολές τους και την ροή  ζωτικών σημασίας πληροφοριών, αν και δεν υπάρχει «καμία απόδειξη ότι είχε γίνει  ζημία», ως αποτέλεσμα της αναφερόμενης διαρροής λόγω  Σνόουντεν.

Ωστόσο, ένας ανώτερος αξιωματούχος από το βρετανικό Υπουργείο Εσωτερικών είπε στην εφημερίδα ότι, ο  Σνόουντεν έχει «αίμα στα χέρια του», και ότι Βρετανοί πράκτορες  έχουν μπει στο στόχαστρο των ρωσικών και των κινεζικών υπηρεσιών , λόγω των  κρυπτογραφημένων αρχείων του πρώην Αμερικανού πράκτορα. .

Σε ανάλυση από την ιστοσελίδα μας pentapsostagma.gr, o Edward Snowden έχει διαρρεύσει λεπτομέρειες για τα μυστικα κατασκοπευτικά προγράμματα των ΗΠΑ και της Βρετανίας το 2013, αφού διέφυγε από τις Ηνωμένες Πολιτείες για το Χονγκ Κονγκ, προκαλώντας ανείπωτη «ζημιά» στις ΗΠΑ. .

Οι Ηνωμένες Πολιτείες κατηγόρησαν τον Σνόουντεν για κλοπή και μη εξουσιοδοτημένη διανομή  διαβαθμισμένων πληροφοριών, κάτι που αποτελεί κακούργημα βάσει του νόμου περί κατασκοπείας των ΗΠΑ.

Τον Ιούνιο του 2013, Σνόουντεν έφτασε στο αεροδρόμιο Σερεμέτιεβο της Μόσχας, όπου  διέμεινε  στην διεθνή ζώνη ,  για πάνω από ένα μήνα, πριν από τη λήψη ενός  προσωρινού ασύλου ενός χρόνου στη Ρωσία,  το οποίο ς αργότερα αναβαθμίστηκε σε  χορήγηση άδειας διαμονής έως το 2017.

Ο ιδρυτής των WikiLeaks Julian Assange είπε τον Απρίλιο ότι ούτε οι Ρώσοι ούτε οι Κινέζοι είχαν εμπλακεί στην άφιξη Σνόουντεν στην Ρωσία.


περισσότερα στο attikanea.blogspot.gr
傳俄陸獲史諾登文件 英撤回特工

(路透倫敦14日電)英國「星期泰晤士報」(SundayTimes)報導,俄羅斯和中國大陸取得了美國「深喉嚨」史諾登爆料文件中的高機密情報後,英國已撤回部分特工,不讓他們在「敵對國家」執行任務。 星期泰晤士報引述英國首相卡麥隆(DavidCameron)辦公室、內政部和安全單位不具名官員的話報導,英國對外情報機構軍情六處(MI6)已從部分國家撤回數名特工。

史諾登(Edward Snowden)是美國國家安全局(NSA)承包公司前雇員,2013年披露機密文件後逃離美國,最後在俄羅斯獲得臨時庇護。 星期泰晤士報引述官員的話說,俄羅斯和大陸都成功破解加密文件,其中包含秘密情報技術細節,恐怕會讓英國和美國間諜身分曝光。

然而報導也說,卡麥隆辦公室1名官員表示「沒有證據顯示有任何人受到傷害」。 卡麥隆辦公室發言人不願向路透社發表評論,英國情報部門代表也沒有回應記者置評要求。中央社(翻譯)