Lying Surveillance State Bootlickers Tell More Lies in Order to Spy on Americans
Nunes and Clapper want to repeal Massie-Lofgren Amendment requiring warrants and prohibiting NSA efforts to weaken encryption.

Earlier this month the House of Representatives passed the Massie-Lofgren Amendment to the Defense Appropriation bill that would prohibit the National Security Agency (NSA) from (1) rifling through the stored communications of Americans without a warrant, and (2) trying to sabotage Internet security by forcing private companies to weaken the privacy protections of their customers by installing “backdoors” into their software with the goal of enabling domestic surveillance. Under the pretext of monitoring foreign communications, the NSA has amassed a huge database that includes the communications of Americans that its minions claim it has the authority to search without seeking a warrant. The amendment would prohibit the spending of any funds by the NSA for either activity.

Importantly, the amendment which passed by a vote of 255 to 174 would simply require that federal officials who want to look at the communications of an American citizen go get a warrant as provided for by the Fourth Amendment to the U.S. Constitution.

Now the chief Congressional stooge for the surveillance state, chairman of the House Intelligence Committee Devin Nunes (R-Calif.) has sent out a letter urging all of those members of Congress who voted for the Massie-Lofgren Amendment to reconsider and rescind their votes.

Nunes includes a letter from confessed perjuror Director of Central Intelligence James Clapper who claims that the requirement to obtain a warrant would unduly interfere with the identification of terrorist plots in the U.S. As examples, Clapper then mentions such plots as the 9/11 atrocities, Fort Hood, the Underwear Bomber, the Navy Yard shootings, and Boston Marathon bombing. For his part Nunes notes that “in recent weeks, law enforcement agencies have disrupted homegrown terrorist attacks in Garland, Texas and Boston, Massachusetts.” So far as I can tell from news reports, not one of the attacks and plots mentioned by either Clapper or Nunes was identified in advance by NSA surveillance. (And even had they been, tolerating such surveillance is still not worth the damage caused to our civil liberties.)

Everything WILL Change

Only time will tell *what* the change will be, but it will be good. More and more people have been waking up to the reality of what’s actually going on, and we’re ready to fight. The 1% can’t expect to suppress the 99% forever; we will win.


MoneyDJ新聞 2015-07-03 15:16:58 記者 賴宏昌 報導

根據維基解密7月1日公布的美國國家安全局(NSA)文件德國總理梅克爾(Angela Merkel;見圖)在2011年10月11日與個人助理討論時表示,就算進一步減記希臘債務、雅典當局恐怕也無力處理剩餘的債務。此外,梅克爾也懷疑派遣財務專家到希臘會對穩定當地金融情勢有明顯的幫助。

在德國內閣當中,財長Wolfgang Schnaeuble持續強力支持減記希臘債務。法國與歐盟委員會主席Jose Manuel Barroso傾向採用較為溫和的方式來對待希臘,而時任歐洲央行(ECB)總裁的Jean-Claude Trichet則是站在反對的那一方。國際貨幣基金組織(IMF)主席拉加德(Christine Lagarde)被梅克爾形容在希臘議題上態度不明確。 (more…)

View On WordPress

ZIB 1 (ÖGS) - NSA hörte auch deutsche Minister ab - 2015-07-02 19:37

NSA hörte auch deutsche Minister ab Der US-Geheimdienst NSA hat nicht nur das Handy der deutschen Kanzlerin Angela Merkel überwacht sondern auch Minister und hohe Regierungsbeamte besagen Dokumente von WikiLeaks. 8B7D4ADA2063885C526C996DF55B22D8

Le langage de la NSA

1- IN Il s’agit du critère de collecte, exprimé sous la forme d’un «besoin d’information» (Information Need). L’année 2002 est celle où ce «besoin d’information» relatif aux «développements économiques» de la France a été formalisé. On retrouve la mention «2002-204» dans l’extrait de base de données de la NSA publié par Libération, Mediapart et WikiLeaks le 23 juin, qui date d’après nos recoupements de l’année 2010, et qui recense une série de «cibles» identifiées par leur numéro de téléphone. C’est au titre de cet Information Need que le standard du ministère de l’Agriculture a ainsi été espionné.

2- EEI Ce sont les «éléments essentiels d’information» (Essential Elements of Information) qui détaillent plus précisément chaque «besoin d’information» (IN) traité par la NSA. En l’occurrence, les différentes sous-catégories - «relations économiques avec les Etats-Unis», «pratiques entrepreneuriales françaises», «politique française de développement financier» - relatives aux «développements économiques» de la France.

3- SECRET C’est le troisième niveau de classification utilisé aux Etats-Unis, en dessous de «Core Secret» et «Top Secret». Il concerne des éléments dont la divulgation causerait un «dommage sérieux» à la sécurité nationale. Selon un rapport américain, plus de 3,6 millions de personnes avaient accès en 2013 à ce type d’information.

4- REL TO USA, AUS, CAN, GBR, NZL«REL TO» est la forme abrégée de «Authorized for release to», autrement dit ce qui peut être partagé avec les partenaires de la NSA. Sont recensés, aux côtés des Etats-Unis, l’Australie, le Canada, la Grande-Bretagne et la Nouvelle-Zélande. A savoir les cinq pays de l’accord UK-USA, un traité de coopération en matière de renseignement, signé secrètement en 1946. Pour désigner l’alliance des services de renseignement de ces pays, on parle de «Five Eyes» (FVEY), soit «cinq yeux».

5- U//FOUO«Unclassified/For Official Use Only» (non-classifié, à usage officiel uniquement) est une désignation utilisée par (…) Lire la suite sur Liberation.fr

Irak : la riposte française démasquée
Espionnage économique : le sale jeu américain
Commerce : tactique hasardeuse de Paris
Crise : Pessimisme chez Moscovici
Pétrole : l’ambiguïté de Baroin

July 1, 2015 - NSA's XKEYSCORE Spy System on the World's Private Internet Communications — 48 TOP SECRET Documents from Edward Snowden via The Intercept.

Illustrations by Blue Delliquanti and David Axe for The Intercept.

The Intercept, July 1, 2015: “These facts bolster one of Snowden’s most controversial statements, made in his first video interview published by The Guardian on June 9, 2013. ‘I, sitting at my desk,’ said Snowden, could ‘wiretap anyone, from you or your accountant, to a federal judge to even the president, if I had a personal email.’

Indeed, training documents for XKEYSCORE repeatedly highlight how user-friendly the program is: with just a few clicks, any analyst with access to it can conduct sweeping searches simply by entering a person’s email address, telephone number, name or other identifying data. There is no indication in the documents reviewed that prior approval is needed for specific searches.”

Germany Appoints Judge to Review BND-NSA SIGINT Targeting

July 1, 2015

Germany appoints senior judge to inspect list of NSA targets


July 1, 2015

Germany on Wednesday named a former senior judge as special investigator to inspect a list of targets that German intelligence tracked on behalf of the U.S. National Security Agency (NSA), causing a political uproar.

Critics have accused Chancellor Angela Merkel’s staff of giving the German BND foreign intelligence agency the green light to help the NSA spy on European firms and officials, triggering a scandal that has dented Merkel’s popularity.

Espionage is an especially sensitive issue in Germany because of abuses in the Nazi and Communist eras. Revelations by former NSA contractor Edward Snowden about wide-ranging U.S. spying in close ally Germany caused outrage, which was compounded by allegations that the BND was complicit.

Merkel’s coalition agreed on Kurt Graulich, a former judge at the Federal Administrative Court, to be the special investigator, according to the head of the parliamentary committee investigating NSA practices, Christian Flisek.

Opposition lawmakers had asked for details of the list, which is considered crucial to establishing whether German intelligence officials were at fault in helping the NSA.

But the chancellery has said it does not expect the U.S. government to formally agree in the immediate future to a public airing of the list. It therefore suggested appointing a “trusted individual” who alone would see its contents.

Last month, Merkel’s office told the committee in a letter seen by Reuters that the investigator’s mandate would be such that he could answer questions posed by lawmakers albeit without “disclosing concrete content from the list”.

The chancellery proposed that the investigator be allowed to inspect the list of targets, including the IP addresses of individual computers, and report back to the committee.

Tsahal, l'école des start-up d'Israël

Tsahal, l'école des start-up d'Israël
By Sandrine Cassini

Poussé par sa situation géopolitique et porté par un écosystème favorable aux start-up, le pays s'est fait une place de choix dans la cybersécurité. Beaucoup d'entrepreneurs ont fait leur service ou un début de carrière au sein de l'unité 8200, la NSA locale.

July 1, 2015 at 01:00AM
via Les Echos - actualité à la Une des Echos.fr http://ift.tt/1KpS5n6

ZIB 1 - NSA hörte auch deutsche Minister ab - 2015-07-02 19:37

NSA hörte auch deutsche Minister ab Der US-Geheimdienst NSA hat nicht nur das Handy der deutschen Kanzlerin Angela Merkel überwacht sondern auch Minister und hohe Regierungsbeamte besagen Dokumente von WikiLeaks. 0204BAFA938BA12FB0E702C2BDDC42EE

Lying Surveillance State Bootlickers Tell More Lies in Order to Spy on Americans

Lying Surveillance State Bootlickers Tell More Lies in Order to Spy on Americans

By Ronald Bailey Earlier this month the House of Representatives passed the Massie-Lofgren Amendment to the Defense Appropriation bill that would prohibit the National Security Agency (NSA) from (1) rifling through the stored communications of Americans without a warrant, and (2) trying to sabotage Internet security by forcing private companies to weaken the privacy protections of their customers…

View On WordPress

United States Apr Caseshiller 20 Mm Nsa Increase to +1.1 % (fcast 1.1 %) Vs Prev 0.9 %

The material has been provided by InstaForex Company – www.instaforex.com

The post United States Apr Caseshiller 20 Mm Nsa Increase to +1.1 % (fcast 1.1 %) Vs Prev 0.9 % appeared first on Trade247.no - din kilde til valutahandel og trading.

Announcement of the Temporary Resumption of Bulk SIGINT Collection by NSA

July 1, 2015

Joint Statement by the Department of Justice and the Office of the Director of National Intelligence on the Declassification of the Resumption of Collection Under Section 215 of the USA Patriot Act as Amended by the USA Freedom Act

Department of Justice and Director of National Intelligence

June 30, 2015

Yesterday, the Foreign Intelligence Surveillance Court (FISC) issued an opinion and primary order approving the government’s application to renew the Section 215 bulk telephony program.  The USA FREEDOM Act of 2015 banned bulk collection under Section 215 of the USA PATRIOT Act, but provided a new mechanism to allow the government to obtain data held by the providers.  To ensure an orderly transition to this new mechanism, the USA FREEDOM Act provides for a 180-day transition period during which the existing National Security Agency (NSA) bulk telephony metadata program may continue.  After considering the views of amici, the court held that the continuation of the NSA’s bulk telephony metadata program during the transition period remains consistent with both the statute and the Fourth Amendment.

As background, early last year in a speech at the Department of Justice, President Obama announced a transition that would end the Section 215 bulk telephony metadata program as it previously existed. The President directed the intelligence community and the Attorney General to develop options for a new approach to match the capabilities and fill gaps that the Section 215 program was designed to address without the government holding this metadata.  After carefully considering the available options, the President announced in March 2014 that the best path forward is that the government should not hold this data in bulk, and that the data should remain at the telephone companies with a legal mechanism in place that would allow the government to obtain data pursuant to individual orders from the FISC approving the use of specific numbers for such queries.

President Obama also noted that legislation would be required to implement this option and he called on Congress to enact this important change.  The administration subsequently worked closely with members of Congress to enact the president’s proposal.  On June 2, 2015, Congress passed and President Obama signed the USA FREEDOM Act of 2015, which reauthorized several important national security authorities; banned bulk collection under Section 215 of the USA PATRIOT Act, under the pen register and trap and trace provisions found in Title IV of FISA, and pursuant to National Security Letters; and adopted the new legal mechanism proposed by the President.

As in past primary orders in effect since February 2014, and consistent with the president’s direction, the court’s new primary order requires that during the transition period, absent a true emergency, telephony metadata can only be queried after a judicial finding that there is a reasonable, articulable suspicion that the selection term is associated with an approved international terrorist organization.  In addition, the query results must be limited to metadata within two hops of the selection term instead of three.

In addition to the release of the court’s opinion, the administration is undertaking a declassification review of this most recent primary order, and when complete, the Office of the Director of National Intelligence will post the document to its website and icontherecord.tumblr.com [external link].

FISC Opinion and Order

Une note de la NSA, comment ça marche ?

1 TOP SECRET C’est le plus haut niveau de classification utilisé aux Etats-Unis, dans la mesure où leur publication pourrait entraîner des «dommages exceptionnellement graves» à la sécurité nationale du pays. Sur les 4,8 millions d’Américains autorisés à consulter des documents classifiés, 1,4 million étaient habilités «TOP SECRET» en 2012.

2 COMINT En matière de renseignement d’origine électromagnétique (ROEM en français, SIGINT - SIGnal INTelligence - en anglais), COMINT (COMmunication INTelligence) désigne l’écoute des télécommunications.

3 GAMMA «COMINT» est le niveau de classification de base en matière de SIGINT, les documents «encore plus hautement protégés» sont, eux, classifiés «COMINT GAMMA».

4 ORCON Le terme ORiginator CONtrolled indique que toute dissémination du document doit être validée par le service qui en est à l’origine.

5 NOFORN NO FOReign National, qui interdit la distribution du document classifié à tout citoyen non américain, même s’il peut accéder à d’autres documents classifiés. A contrario, les documents qui peuvent être partagés avec les partenaires de la NSA portent la mention REL TO («authorized for release to») suivi du code des pays concernés.

6 NSA National Security Agency : l’agence américaine en charge de la surveillance et de l’espionnage des télécommunications. Elle emploierait entre 30 000 et 40 000 espions et disposerait d’un budget annuel de plus de 10 milliards de dollars (8,9 milliards d’euros).

7 Global SIGINT Highlights C’est le titre donné aux rapports de la NSA sur les informations et renseignements les plus intéressants qu’elle a pu intercepter.

8 Executive Edition Indique que ces comptes rendus sont à destination des principaux chefs et responsables de la NSA et de la communauté du renseignement américain.

9 TS//SI-G//OC/NF pour TOP SECRET//Special Intelligence (SI)-GAMMA//ORIGINATOR CONTROLLED (ORCON)/NO FOReign National (NOFORN). En matière de COMINT, Special Intelligence est le terme utilisé pour désigner et contrôler les (…)

Lire la suite sur Liberation.fr

Micros climat à l’Élysée
Sarkozy, ce sauveur
Quand Sarkozy jouait les médiateurs au Moyen-Orient
A Paris, l’oreille interne de l’ambassade américaine
RRND — 06/24/15 - - Thomas L. Knapp

RRND — 06/24/15 – – Thomas L. Knapp

By Thomas L. Knapp ***** RATIONAL REVIEW NEWS DIGEST The Freedom Movement’s Daily Newspaper Volume XIII, Issue #3,224 Wednesday, June 24th, 2015 440 email subscribers http://rationalreview.news-digests.com ***** In the News: 1) WikiLeaks: NSA eavesdropped on the last three French presidents 2) Syria: Kurdish fighters push closer to Islamic State HQ 3) NM: Albuquerque cops face murder charges in…

View On WordPress

New Leak: NSA Spied on German Ministers, Reports

July 1, 2015

NSA Also Spied on Several German Ministers, Media Reports Say


July 1, 2015

BERLIN —  The U.S. National Security Agency (NSA) has spied not only on German Chancellor Angela Merkel, but also on numerous high-ranking government members such as the economy and finance ministers, German media reported on Wednesday.

Revelations by former NSA contractor Edward Snowden about wide-ranging U.S. spying have caused outrage in close ally Germany where privacy is an especially sensitive issue after the extensive surveillance by Communist East Germany’s Stasi secret police and by the Gestapo in the Nazi era.

The spying scandal was compounded by allegations that the German BND foreign intelligence agency helped the NSA and tracked other European targets on behalf of the NSA.

In the latest development, the German newspaper Sueddeutsche Zeitung and broadcasting network ARD reported, based on Wikileaks documents, that the NSA targeted 69 telephone numbers in the German government administration.

Among the officials being targeted were Economy Minister and Vice Chancellor Sigmar Gabriel as well as several of his deputy ministers, the reports said. British intelligence agencies were also involved in some of the operations, they said.

Germany and the United States have been at odds over the NSA spying practices since Snowden’s revelations showed Washington had listened in on many of its allies, including Merkel.

However, Germany’s top public prosecutor last month closed a year-long investigation into the suspected tapping of Merkel’s cell phone by U.S. spies, saying evidence that would stand up in court was lacking.

NSA and GCHQ repeatedly targeted Kaspersky and others

UK and US intelligence services have been relentlessly pursuing Kaspersky Labs and other antivirus software companies to gain detailed information on users.

First reported by The Intercept, the US National Security Agency (NSA) and UK GCHQ used reverse engineering to gain access to antivirus software and monitored web and email traffic to gain intelligence about users and the antivirus companies themselves.

The information, which was contained in documents released by NSA whistleblower Edward Snowden, explained that the UK’s intelligence agency applied for warrants to use software reverse engineering (SRE) in order to learn more about the software for future tactical use.

GCHQ applied for the warrant as it believed it needed legal cover because otherwise it could be seen as unlawful and may have amounted to copyright infringement. SRE is a technique that involves reversing thousands of commands that tell a computer what to do and producing a format that is far easier for a human to understand.

“Personal security products such as the Russian anti-virus software Kaspersky continue to pose a challenge to GCHQ’s CNE [Computer Network Exploitation] capability and SRE is essential in order to be able to exploit such software and to prevent detection of our activities,” the warrant renewal request said.

On the other side of the Atlantic, an NSA research team discovered in 2008 that Kaspersky software was sending sensitive user information back to its own servers and found out that this was simple enough to intercept and then used it to track users.

It managed to pick up this information from “User-Agent” strings in HTTP header requests and then used these to uniquely identify the devices owned by Kaspersky antivirus users. Kaspersky later denied this was possible in an email sent to The Intercept yet various Twitter users have been able to achieve the same result.

Email eavesdropping

The NSA goes further than that still. It’s further claimed that in a presentation given in 2010 on Project CAMBERDADA the agency admitted to monitoring the email accounts of different companies to find flaws in antivirus software.

Neither agency responded to the story when asked for a comment and the latest news comes in the same month that Kaspersky claimed it had been targeted by an intrusion that got to the very centre of its systems.

%3Cbr%3E%3Cbr%3E%3Ca%20href=“>…read more
New Post has been published on Cryptonewz.com

New Post has been published on http://cryptonewz.com/welcome-to-minds-like-facebook-but-without-the-snooping/

Welcome to Minds: Like Facebook But without the Snooping

Facebook has never been known for security and user privacy. Now a new open-source social network Minds is poised to fill that void by using real encryption and not storing any user information so nothing can be handed over to the NSA.

1.4 Billion (Vulnerable) Users

Facebook is the most successful social network ever conceived, inline or offline, currently claiming over 1.4 billion users overall. This makes it about five times as popular as Twitter in user base. The last decade has clearly been all about Facebook, whether you are a social butterfly or a business looking to reach its massive following.

Younger demographics are heading more and more to Instagram and other networks that aren’t “their parents” social network. What’s more is that new holes in Facebook’s user agreements for 2015 have opened the door for government and other third parties to access user information.

General standards for user privacy appear to have been compromised, and this has created a new opportunity in the market. If there is room for a safer social network, Minds.com is looking to fill that space through encryption.

Encryption has been around for decades, used by national governments and militaries to your local bank’s online services. Now, digital currencies like bitcoin have shown that encryption can help anyone do more online while protecting users’ identity.

Privacy focus

Minds looks to do the same for the social network concept and has released a new mobile app for iOS and Android. The app is open-source and is encrypted, so only the intended receiver gets the message. Chief executive Bill Ottman says this is the first encrypted social network app on the market. Ottman told CNet:

“A lot of companies will claim privacy and say they’re encrypted. But it’s not real encryption because we have no way of inspecting the code to see if there are backdoors.”

Ottman also notes a very important feature of Minds is the lack of collection of user information. Since no user information is collected by Minds, there is nothing to confiscate in case the NSA or other federal agency tries to strong-arm Minds like they’ve done to Yahoo and others. Ottman:

“If intelligence agencies ask for user data, we can’t give it to them because we don’t have it ourselves.”

Minds profit model is not based on banner ads but on upsells of services and points that let users expose posts beyond their followers. Users earn points for free by using the service as an active member while users’ posts automatically go out to all of their followers, like Twitter.

Keep in mind that all is not perfect at Minds and it is still in beta. The sign-up page asks you to agree to the terms and conditions (only an email, username, and password are required), but when you go to read them, there are no terms and conditions listed at all. Does that mean that there are no holds barred on your end? Their end?

Just like encryption has spread to digital currency, it looks ready to populate many common online networks to protect the privacy of users. The days of social networks as simple, centralized data mines for governments and private interests may be coming to an end as minds may be the first of a new generation of privacy-conscious social networks.

Do you still use Facebook? Are encrypted social networks the next big thing? Share above and comment below.

Did you enjoy this article? You may also be interested in reading these ones