WingMakers Forum
Visit SUMBOLA - The Social Reading Platform
Publishers, Authors, Readers, and Talent wanted.


All times are UTC - 5 hours




Post new topic Reply to topic  [ 316 posts ]  Go to page Previous  1 ... 8, 9, 10, 11, 12, 13  Next
Author Message
 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Wed Mar 04, 2015 10:09 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
Microsoft is the predominant OS on most computers in the world. It also is the most prone to malware and viruses and has created the antivrus market amongst others. Wonder if they decided earlier on and in the long term to work with the NSA to purposely allow it to do what it has been doing for years now, (the NSA) with spying? Bill Gates father was high up in the American government and was working in advocating Eugenics which is part and parcel of the overall control program the American government is attempting to completely implement now. Most news reports don't mention that it is Windows hard drives that are infected with malware because Windows has the most backdoors built into it, purposely for that very reason and they monopolized computer companies to do things Microsofts' way or no way at all. Also Google's slogan don't do evil no longer applies. (Has it ever?) Google's creators are the sons of military men high up in the gov echelon, it being the most used search engine in the world. Google is now run by (ex?)military people who advocate and are being part of their Transhumanism agenda. There is nothing nice or in the interest of the well being of humanity in either of these corporations agendas, motivation or incentive. Their plan is to dominate the world in complete control of every aspect of your life. The NSA is the monitor for seeing that agenda through. They all work together. Putin knows this , the Russians aren't so dumb after all no matter what propaganda is presented to the contrary. The truth always comes through and this time not too late. This is the time of transparency and expansiveness after all. And that means its bigger than all of us and especially arrogant corporations and their Controllers who are so controlled by their need to control that they don't see the forest for the trees. This is just my 2 bits.

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Last edited by Shayalana on Fri Mar 06, 2015 2:22 am, edited 1 time in total.

Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Wed Mar 04, 2015 10:14 pm 
Offline
Senior Member
User avatar
 Profile

Joined: Thu Nov 10, 2011 9:24 am
Posts: 383
Here we go with those empty posts again! You doubled up from two to four - what do you think you will accomplish with that? ... I bet you will edit them again and make wall papers out of them with big-ass articles that you post without giving any personal wisdom on the subject!

There is no way you can hide my Valor! There is no way. And you have to be forced to accept it! There is no other way around it. Brace yourself for your downfall, you'll crash hard.


AND YES, you are reading my posts! Do you feel like your trolling is successful ? If you do, then you are delusional, this is the WMF. Do you realize what you have gotten yourself into? If not, then you better realize that there's nothing you can do with your virtueless behavioral to overpower my virtues. There is nothing you can do.

Since you are reading my posts, and like to follow my posts, I have a special video just for you (its got 130 MILLION VIEWS)
https://www.youtube.com/watch?v=otCpCn0l4Wo

I know I know - it would have been much smoother if the video would have started right away, unless it were for YouTube trolling with commercials (or commercials trolling on Youtube -which way is it?), especially on a channel like VEVO. And that poorly edited intro makes the waiting even more teasing. After 7 seconds you get the reward for your patience. Gotta admire the splendid footwork seen in this video and also note the "aggressive" bouncing from those booties :mrgreen:


Oh, while I was writing this you made an interesting post that I can only congratulate you for... congratulations! that makes 5 empty posts in a row (new personal best?) and we are at page 11.

_________________
To live in service of truth, you must first identify the layers of deception that encompass you.
Nature is the "Queen" on the chessboard.


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Fri Mar 06, 2015 12:49 am 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
Are Your Devices Hardwired For Betrayal?

It's an interesting time to be a computer security researcher. Last week, Kaspersky Lab released a report about a new family of malware from an entity they called "The Equation Group". The report demonstrated for the first time that firmware-based attacks, previously only demonstrated in lab settings, have been used in the wild by malware authors. This should serve as a wake up call to security professionals and the hardware industry in general: firmware-based attacks are real and their numbers will only increase. If we don't address this issue now, we risk facing disastrous consequences.

What is Firmware?

Most pieces of hardware on a modern computer are complex enough that they need their own tiny computers in order to operate. Devices such as your hard disk, network card, BIOS, keyboard, USB drives, and video cards all have their own microprocessor, memory, and software—separate from the CPU, RAM, and other components that make up your actual computer. This lower-level software and operating system is called "firmware".

Firmware is not just limited to your computer either. There is firmware in most electronic devices that we use: cellphones, car components, printers, digital cameras, TVs, routers, etc., all contain firmware. Some firmware runs in a privileged position in your system, even though you may not be aware of its existence. For example, the firmware on your video card or monitor can read the pixels on your screen, your hard drive can read any files you write (and write its own files), and your network card can listen to all of your network traffic.

In the Equation Group report, Kaspersky described a class of malware that could replace the firmware of almost any hard drive with a malicious copy, allowing it to read and write files on the drive and re-exploit the system, even if the hard drive were formatted. This is an impressive attack—but this type of attack is not just limited to computer hard drives. Any of the above mentioned devices could have their firmware compromised, and the results would be devastating.

What is the Problem?

Firmware is not inherently a bad thing—it is needed to operate the advanced hardware that comprises today's computing environment. The problem with firmware is that it is often extremely opaque. Most hardware manufacturers do not release the source code for their firmware. In fact, manufacturers will even take steps to try to prevent the reverse engineering of their firmware. Additionally, there is no way for your computer to "see" into the firmware installed on its peripheral components—i.e., there is no way to tell if your firmware is the original firmware that came with the device or if it has been replaced—so there is no way to tell if it is acting maliciously.

Firmware-based malware is still a relatively unexplored field compared to other types of malware. A few different attacks [.pdf] have been demonstrated in lab settings, but so far these attacks have rarely been seen in the wild. Thanks to the Kaspersky report and various Snowden leaks, we now know that the NSA has developed malware that can infect hard drive firmware and potentially even infect the BIOS.1 Firmware-based attacks will only become more of a threat to computer security as they are adopted by other intelligence agencies, not to mention criminals.

Firmware-based attacks can be especially attractive to malware authors, partially because they can be so devastating. There are a few reasons for this:

1. Firmware based malware is hard to detect. A computer has no way to inspect the firmware running on its devices.
2. Firmware based malware is hard to remove. Even a complete reformatting of the hard drive will not get rid of the firmware because the device is infected at a hardware level.
3. Most firmware has never had a public security audit and is closed source. This makes firmware a rich source of potential security bugs and zero-days.
4. Many devices never have their firmware updated, so potential exploits or installed malware may stick around for a long time.

We are thus faced with one of the most pernicious computer security problems we have ever seen. Our hardware devices could be riddled with malware, and we have no way of knowing. We have no way to assure ourselves that we have control over the machines that we use every day of our lives. The very foundation of our technology is rotten and full of termites. The problem of firmware-based malware must be addressed immediately.

How Do We Fix It?

Hardware manufacturers must take steps to address this problem before more firmware disasters come to pass. In the past, hardware manufacturers have been more worried about physical and side-channel attacks. Manufacturers therefore focused mainly on making their hardware and firmware opaque and tamper-proof in hopes that, if no one could reverse engineer the firmware, then no one would be able to attack it. Unfortunately this defense has proven ineffective. This should serve as a stark reminder of the old adage: "Security through obscurity is no security at all." We need to take back transparency and verifiability in our hardware.

Although this is a daunting problem, it is solvable. To avert this disaster there are three things that must happen right away:

1.Firmware must be properly audited. Hardware manufacturers need to hire security professionals to audit their firmware and publish the results. Preferably, hardware companies should hire full time security staff to make sure that their code is audited before it ever gets installed. Hardware manufacturers could also release the source code for their device's firmware, allowing independent security researchers and laypersons to review the code as well—and perhaps even improve it. People have a right to inspect the code that is running on their computers.
2.Firmware updates must be signed. Firmware updates should be signed by the manufacturers so that we can be sure we are installing trusted code when we upgrade our firmware. Additionally, manufacturers should ensure that there is an easy mechanism for the average user to check the signature and upgrade their firmware. Ideally users would not have to rely on the broken certificate authority system to verify these signatures.
3.We need a mechanism for verifying the integrity of installed firmware. Of course, even if we have signed updates to firmware, some piece of malware could reprogram the firmware already on the device and have a good long life, before it eventually gets updated (if ever). Because of this, we need a way to verify the code on our hardware devices at boot time or run time in a way that can't be subverted by malicious firmware already on the device. 2

None of these things are inherently difficult from a technological standpoint. The hard problems to overcome will be inertia, complacency, politics, incentives, and costs on the part of the hardware companies.

We have given up control of our computing. We are trusting too many different devices—devices we have no reason to trust given that they could be compromised without our knowledge. The time has come to take back control of our computing devices and our security. We must put pressure on hardware companies to ensure that their products are trustworthy, even (and especially) after they leave the factory floor. We must act now to ensure a future where the foundation of computing is secure.

https://www.eff.org/deeplinks/2015/03/h ... r-betrayal

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Fri Mar 06, 2015 1:05 am 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
Russian Researchers Uncover Sophisticated NSA Malware

Over the weekend Russian IT security vendor Kaspersky Lab released a report about a new family of malware dubbed "The Equation Family". The software appears, from Kaspersky's description, to be some of the most advanced malware ever seen. It is composed of several different pieces of software, which Kaspersky Lab reports work together and have been infecting computer users around the world for over a decade. It appears that specific techniques and exploits developed by the Equation Group were later used by the authors of Stuxnet, Flame, and Regin. The report alleges that the malware has significant commonalities with other programs that have been attributed to Western intelligence agencies; Reuters subsequently released an article about the report in which an anonymous former NSA employee claims that the malware was directly developed by the NSA.

Among the most interesting and advanced features of the malware is its ability to compromise and rewrite hard drive firmware. Reprogramming the hard drive itself in this way is a deeper level of compromise than infecting an operating system, and can let the malware re-install itself from a hidden sector of the hard drive even if the drive is securely wiped and reformatted and the OS is reinstalled from scratch. Conventional wisdom about reinstalling operating systems in response to suspected infections may therefore not be enough for the victims of attacks like Equation's.

Antivirus companies regularly try to improve their products by doing malware research—trying to find and analyze new malicious software in the wild. They are in a very good position to see the entire landscape of malicious software and attacks, which today increasingly includes government-sponsored malware. Some observers found it significant that Kaspersky—a Russian firm—was the only company to release a report about the Equation Group, Kaspersky's shorthand name for the anonymous authors of the malware. Many antivirus companies are based in, or have important business interests in, countries that develop government malware, such as the Five Eyes (the U.S., United Kingdom, Australia, New Zealand, and Canada), and these companies may come under pressure to conceal government malware. Having antivirus companies, security companies, and malware researchers in a variety of different jurisdictions is valuable in that they can collaborate on their research and resist this sort of pressure.

The hard drive firmware capabilities of the Equation Group malware and code names that are described in the report match up closely with NSA capabilities and code names previously disclosed in Der Spiegel. That lends credibility to the hypothesis that Equation Group is part of or affiliated with the NSA, which would mark one of the first times that programs or capabilities exposed by journalists were specifically found in the wild. This is a very exciting development; it will be interesting to see if researchers continue to succeed in publicly documenting samples of other nation-state malware and attack tools whose existence has been reported or conjectured.

The report also mentions that the Equation Group used several different 0-day exploits to spread their malware. Some of these exploits were later used by Stuxnet. One of the exploits used was originally used in the 2009 Aurora attack; it was later repurposed by the Equation Group to be used against government officials in Afghanistan. This raises some interesting questions—is the NSA stockpiling 0-day vulnerabilities? Is it doing any reporting of 0-days to the affected companies? How does NSA decide whether or for how long to stockpile such knowledge? EFF filed a lawsuit last year demanding that the NSA answer these questions.

Another important question was promptly raised in the press: given that the Equation Group's software can infect a broad range of hard drives, replacing their firmware with maliciously customized versions, did the hard drive companies collaborate with governments to develop this firmware? Based on the information we have now, it's hard to draw a reliable conclusion one way or the other. A Kaspersky researcher claimed that there is “no way that hard drive firmware could be reverse engineered using public information.” Yet at least two published projects from years past have demonstrated otherwise: a team of researchers in 2013 created a full-fledged hard drive firmware backdoor akin to that used by Equation Group, using only publicly available information and reverse engineering; and that same year an individual researcher achieved a comparable level of access to modify hard drive behavior, again using only reverse engineering and without any manufacturer assistance. These and other projects show it's quite possible to learn to tamper with the components that make up a computer, even without support from the manufacturer.

Seeing these attacks in the wild has spurred new anxiety about whether our hard drives and other parts of our computers could be compromised. (To be clear, the Kaspersky research does not suggest that the manufacturers tampered with the drives, but rather that software, once introduced onto a user's computer, can reprogram them.) What can the hard drive manufacturers do in order to assure users that their drives have not been compromised? Unfortunately, it's not entirely clear; there are a few solutions, but they generally require changing current hard drive designs, potentially in a ways that make them more expensive. What is clear is that hard drive manufacturers must bear the responsibility of assuring customers that their products can't be twisted into tools of the surveillance state.

The long-term problem here is deeper than just the Equation Group's wizardry. Your modern computer is made up of many little computers. Each of those computers can conceivably be infected with malicious software separately from the main computer, but you never see or interact with them directly, so nobody has given much thought to how to secure them, how to scan them for malicious code, or even how to do a forensic analysis on them. Unfortunately, infecting any one of them can give total control over the main computer or the ability to spy on or break some of its activities. It's a problem that has been demonstrated publicly by researchers over and over again. Security researcher Halvar Flake has given an excellent talk demonstrating some of the scope of this problem.

This attack vector is serious; the solutions are daunting. Hardware manufacturers must ensure that their firmware is open source, can be audited for security, can be updated and replaced by consumers. We must also create ways for average computer users to verify that the firmware on their devices is the firmware that they expected to be there.

We are glad to have an even better understanding of the techniques and tools used by the surveillance state. We still need more transparency from the US Government about the use of 0-day vulnerabilities in intelligence gathering. This report once again demonstrates how important it is that all companies take concrete steps to protect consumer privacy and prove that they are not exposing their customers to surveillance. Some hard drive vendors, asked for comment by the press, pronounced their products completely safe and immune to tampering—even as Kaspersky showed that those same products were actively being exploited. We hope those vendors will reconsider that overconfidence and get to work improving the safety of their products.

https://www.eff.org/deeplinks/2015/02/r ... tion-group

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Sun Mar 15, 2015 12:11 am 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
March 13, 2015 | By Kimberly Carlson and Katitza Rodriguez

Canadians Rally to Defend Their Freedom: A Day of Action to Stop Bill C-51



EFF is encouraging Canadians to join together tomorrow for a day of action against a dangerous bill that’s navigating through the Canadian legislature and threatening to strip its citizens of their rights to privacy and freedom of expression.

Bill C-51, the Anti-Terrorism Act, 2015, introduces a wide range of sweeping changes to how the Canadian government handles its national security and anti-terrorism efforts. The bill just passed its second reading in the conservative-led House of Commons in late February and the government is now hastily rushing to pass it with less than two weeks of debate.

On the surface, this flawed bill seeks to address terrorist threats, but the reality is that its vague wording and excessive measures allow for overreaching security powers to extend to a range of other, less serious contexts than terrorism. While we’re seeing other overreaching legislation on the table in Canada right now, here’s the breakdown of why Bill C-51, in particular, is so concerning to privacy and security experts.

Prior to 1984, Canada’s national police force (RCMP) had the constitutional authority to conduct both clandestine intelligence-gathering and carry out offensive policing powers. With these capabilities, the RCMP, for decades, repeatedly violated some of Canada’s most fundamental democratic laws and values until it was finally realized that only a separation of powers could stop the abuse. In 1984, the RCMP’s intelligence security mandate was lifted and given to the Canadian Security Intelligence Service (CSIS), which was created in order to safeguard against improper policing activities carried out by the RCMP. Bill C-51 seeks to remove this separation of powers, effectively reverting the country back to an era of repressive domestic policing with very little oversight.

The bill would also authorize open-ended information sharing among Canadian agencies for “security purposes,” by enacting the Security of Canada Information Sharing Act. At present, said agencies are compartmentalized under the country’s Privacy Act, which allows Canadians to provide their information to the state (for census, tax compliance, health services, and a range of other purposes) without fear that the information will be used against them. This compartmentalization will no longer exist if Bill C-51 is put into force. These new open-ended exceptions may form the basis for Canada's own Total Information Awareness initiative. Furthermore, there would be an expanded capacity to share information with foreign governments, even though we’ve seen what lax restrictions on information sharing has led to in the past—the unlawful rendition and torture of innocent Canadian citizens.

The bill provides for various censorship provisions as well, criminalizing the act of advocating or promoting “terrorism offences in general.” Such excessively broad definitions make these provisions dangerously subjective—almost certainly chilling speech and endangering innocent social media users whose posts could be misinterpreted. Even bookstores and online platforms such as Amazon may face liability. The bill further empowers CSIS to take unspecified and open-ended “measures,” which may include the overt takedown of multi-use websites or other communications networks without any judicial supervision. CSIS will also be explicitly authorized to violate the laws of other countries.

Lastly, Bill C-51 is problematic for the powers it implicitly grants CSE. CSE is Canada's most secretive, least transparent agency—Michael Hayden, the former director of the NSA, once said he “envied” the agency for its legal agility. CSE is typically prevented from directing its activities at Canadians and from taking offensive actions. However, CSE is legally allowed to help CSIS. In granting CSIS the power to take unspecified “measures,” the Canadian government is unleashing CSE on innocent and unsuspecting Canadians. Digital “measures” could include the false attribution of disreputable content or commentary to individuals, the takedown of legitimate websites or communications services, and the planting of malware on individual computing devices.

Canadians must rally together in defense of privacy and free expression. Learn more about the legislation here and join the fight by participating in a national day of action tomorrow, March 14, to stop Bill C-51. More information at https://stopc51.ca/about-c51.

https://www.eff.org/deeplinks/2015/03/d ... ir-freedom

Image

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Sun Mar 15, 2015 12:19 am 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
Image

Tips, Tools and How-tos for Safer Online Communications


Modern technology has given the powerful new abilities to eavesdrop and collect data on innocent people. Surveillance Self-Defense is EFF's guide to defending yourself and your friends from surveillance by using secure technology and developing careful practices.

Select an article from our index to learn about a tool or issue, or check out one of our playlists to take a guided tour through a new set of skills.


https://ssd.eff.org/


This has extensive information and is loaded with useful tools!

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Thu Mar 19, 2015 9:46 am 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
US Threatened Germany Over Snowden, Vice Chancellor Says

Image

German Vice Chancellor Sigmar Gabriel (above) said this week in Homburg that the U.S. Government threatened to cease sharing intelligence with Germany if Berlin offered asylum to NSA whistleblower Edward Snowden or otherwise arranged for him to travel to that country. “They told us they would stop notifying us of plots and other intelligence matters,” Gabriel said.

The Vice Chancellor delivered a speech in which he praised the journalists who worked on the Snowden archive, and then lamented the fact that Snowden was forced to seek refuge in “Vladimir Putin’s autocratic Russia” because no other nation was willing and able to protect him from threats of imprisonment by the U.S. Government (I was present at the event to receive an award). That prompted an audience member to interrupt his speech and yell out: “why don’t you bring him to Germany, then?”

There has been a sustained debate in Germany over whether to grant asylum to Snowden, and a major controversy arose last year when a Parliamentary Committee investigating NSA spying divided as to whether to bring Snowden to testify in person, and then narrowly refused at the behest of the Merkel Government. In response to the audience interruption, Gabriel claimed that Germany would be legally obligated to extradite Snowden to the U.S. if he were on German soil.

Afterward, however, when I pressed the Vice Chancellor (who is also head of the Social Democratic Party, as well as the country’s Economy and Energy Minister) as to why the German Government could not and would not offer Snowden asylum — which, under international law, negates the asylee’s status as a fugitive — he told me that the U.S. government had aggressively threatened the Germans that if they did so, they would be “cut off” from all intelligence sharing. That would mean, if the threat were carried out, that the Americans would literally allow the German population to remain vulnerable to a brewing attack discovered by the Americans by withholding that information from their government.

This is not the first time the U.S. has purportedly threatened an allied government to withhold evidence of possible terror plots as punishment. In 2009, a British national, Binyam Mohamed, sued the U.K. Government for complicity in his torture at Bagram and Guantanamo. The High Court ordered the U.K. Government to provide Mohamed’s lawyers with notes and other documents reflecting what the CIA told British intelligence agents about Mohamed’s abuse.

In response, the U.K. Government insisted that the High Court must reverse that ruling because the safety of British subjects would be endangered if the ruling stood. Their reasoning: the U.S. Government had threatened the British that they would stop sharing intelligence, including evidence of terror plots, if they disclosed what the Americans had told them in confidence about Mohamed’s treatment – even if the disclosure were ordered by the High Court as part of a lawsuit brought by a torture victim. British government lawyers even produced a letter from an unnamed Obama official laying out that threat.

In the Mohamed case, it is quite plausible that the purported “threat” was actually the by-product of collaboration between the U.S. and U.K. governments, as it gave the British a weapon to try to scare the court into vacating its ruling: you’re putting the lives of British subjects in danger by angering the Americans. In other words, it is quite conceivable that the British asked the Americans for a letter setting forth such a threat to enable them to bully the British court into reversing its disclosure order.

In the case of Germany, no government official has previously claimed that they were threatened by the U.S. as an excuse for turning their backs on Snowden, whose disclosures helped Germans as much as any population outside of the U.S. Pointing to such threats could help a German political official such as the Vice Chancellor justify what is otherwise an indefensible refusal to protect the NSA whistleblower from persecution at home, though it seems far more plausible – given far more extremist U.S. behavior in the Snowden case – that Gabriel’s claims are accurate.

Nonetheless, one of two things is true: 1) the U.S. actually threatened Germany that it would refrain from notifying them of terrorist plots against German citizens and thus deliberately leave them vulnerable to violent attacks, or 2) some combination of high officials from the U.S. and/or German governments are invoking such fictitious threats in order to manipulate and scare the German public into believing that asylum for Snowden will endanger their lives. Both are obviously noteworthy, though it’s hard to say which is worse.

Photo: Markus Schreiber/AP

https://firstlook.org/theintercept/2015 ... llor-says/

What makes them think Snowden would even want to go to Germany. Russia is treating him very well and there is no worry about Russia being an ally of the US who could turn on him.

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Thu Mar 19, 2015 9:01 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
Senate Intelligence Committee Advances Terrible "̶C̶y̶b̶e̶r̶s̶e̶c̶u̶r̶i̶t̶y̶"̶ ̶B̶i̶l̶l̶ Surveillance Bill in Secret Session


By Cora Currier

Image



Wikipedia is suing the NSA over surveillance programs that involve tapping internet traffic en masse from communications infrastructure in the U.S. in order to search it for intelligence purposes.

The lawsuit argues that this broad surveillance, revealed in documents leaked by former NSA contractor Edward Snowden, violates the First Amendment by chilling speech and the open exchange of information, and that it also runs up against Fourth Amendment privacy protections.

“The surveillance that we’re challenging gives the government virtually unfettered access to U.S. communications and the content of those communications,” said Patrick Toomey, an attorney with the American Civil Liberties Union, which is bringing the litigation on behalf of the Wikimedia Foundation, which operates Wikipedia, and a group of human rights and media organizations including The Nation magazine and Amnesty International, who say that their sensitive overseas communications are imperiled by the NSA’s snooping.

So-called “upstream” surveillance involves direct access to the physical cables, switches and routers that enable the flow of information across the internet. With its upstream efforts, the agency essentially copies virtually all international text-based communications — emails, instant messages, web searches and the like — and searches them for terms related to its investigations. In the process, purely domestic conversations can also be swept up and retained by the NSA.

“The NSA copies and reviews the communications of millions of innocent people to determine whether they are discussing or reading anything containing the NSA’s search terms,” ACLU lawyers wrote in their complaint filed today in the United States District Court in Maryland. “Its purpose is to identify not just communications that are to or from the NSA’s targets but also those that are merely ‘about’ its targets.”

In an op-ed in today’s New York Times announcing the lawsuit, Wikipedia’s co-founder, Jimmy Wales, and Lila Tretikov, executive director of the Wikimedia Foundation, cited the tens of thousands of volunteers who write and edit Wikipedia entries around the world.

Many of those volunteer contributors, they note, “prefer to work anonymously, especially those who work on controversial issues or who live in countries with repressive governments.” The fear that the NSA could be collecting information on contributors, and perhaps sharing that intelligence with other governments, “stifles freedom of expression and the free exchange of knowledge that Wikimedia was designed to enable.”

With billions of users worldwide, Wikipedia processes countless international communications and requests for data from its servers. As one NSA slide from the Snowden files indicates, the NSA is interested in HTTP, the protocol for those requests, “because nearly everything a typical user does on the Internet uses” it. The slide includes a picture of Wikipedia’s logo. (An administration official told Reuters, “We’ve been very clear about what constitutes a valid target of electronic surveillance. The act of innocuously updating or reading an online article does not fall into that category.”)

Upstream collection occurs under the Foreign Intelligence Surveillance Act, or FISA, a law passed in the 1970s to regulate overseas spying, and amended in 2008 to allow collection of Americans’ international communications under more expansive terms — so long as the NSA’s target is a foreigner outside the U.S., and it involves broadly defined “foreign intelligence information.”

In addition to constitutional questions, the new lawsuit argues that the 2008 law, expansive though it is, still “authorizes surveillance only of targets’ communications; it does not authorize surveillance of everyone.”

Nicole Navas, a spokeswoman with the Justice Department, said in an email that the department is “reviewing the complaint.”

If the case moves forward at all, it will reflect the impact of Snowden’s revelations.

A previous challenge by Amnesty International and others to warrantless spying on Americans’ international conversations was tossed out because the court said the plaintiffs couldn’t prove that their communications could be monitored under the 2008 FISA Amendments Act. The Supreme Court upheld that decision in February 2013, just a few months before the first Snowden documents were published.

The Snowden documents, and subsequent admissions by the government, said Toomey, “have made clear that the government it not just monitoring targets, but that in order to find the communications of those targets it is monitoring the communications of nearly everyone. That broadens the scope of the surveillance at issue, and removes some of the obstacles [to getting standing] that we encountered in the previous case.”

Separate challenges to the constitutionality of collecting metadata on domestic calls, under Section 215 of the Patriot Act, are awaiting decisions in three federal appeals courts.

Photo: Gregory Bull/AP

https://firstlook.org/theintercept/2015 ... veillance/

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Thu Mar 19, 2015 9:06 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
What’s Scarier: Terrorism, or Governments Blocking Websites in its Name?

By Glenn Greenwald

Image

The French Interior Ministry on Monday ordered that five websites be blocked on the grounds that they promote or advocate terrorism. “I do not want to see sites that could lead people to take up arms on the Internet,” proclaimed Interior Minister Bernard Cazeneuve.

When the block functions properly, visitors to those banned sites, rather than accessing the content of the sites they chose to visit, will be automatically redirected to the Interior Ministry website. There, they will be greeted by a graphic of a large red hand, and text informing them that they were attempting to access a site that causes or promotes terrorism: “you are being redirected to this official website since your computer was about to connect with a page that provokes terrorist acts or condones terrorism publicly.”

No judge reviews the Interior Ministry’s decisions. The minister first requests that the website owner voluntarily remove the content he deems transgressive; upon disobedience, the minister unilaterally issues the order to Internet service providers for the sites to be blocked. This censorship power is vested pursuant to a law recently enacted in France empowering the interior minister to block websites.

Forcibly taking down websites deemed to be supportive of terrorism, or criminalizing speech deemed to “advocate” terrorism, is a major trend in both Europe and the West generally. Last month in Brussels, the European Union’s counter-terrorism coordinator issued a memo proclaiming that “Europe is facing an unprecedented, diverse and serious terrorist threat,” and argued that increased state control over the Internet is crucial to combating it.

The memo noted that “the EU and its Member States have developed several initiatives related to countering radicalisation and terrorism on the Internet,” yet argued that more must be done. It argued that the focus should be on “working with the main players in the Internet industry [a]s the best way to limit the circulation of terrorist material online.” It specifically hailed the tactics of the U.K. Counter-Terrorism Internet Referral Unit (CTIRU), which has succeeded in causing the removal of large amounts of material it deems “extremist”:

Image

In addition to recommending the dissemination of “counter-narratives” by governments, the memo also urged EU member states to “examine the legal and technical possibilities to remove illegal content.”

Exploiting terrorism fears to control speech has been a common practice in the West since 9/11, but it is becoming increasingly popular even in countries that have experienced exceedingly few attacks. A new extremist bill advocated by the right-wing Harper government in Canada (also supported by Liberal Party leader Justin Trudeau even as he recognizes its dangers) would create new crimes for “advocating terrorism”; specifically: “every person who, by communicating statements, knowingly advocates or promotes the commission of terrorism offences in general” would be a guilty and can be sent to prison for five years for each offense.

In justifying the new proposal, the Canadian government admits that “under the current criminal law, it is [already] a crime to counsel or actively encourage others to commit a specific terrorism offence.” This new proposal is about criminalizing ideas and opinions. In the government’s words, it “prohibits the intentional advocacy or promotion of terrorism, knowing or reckless as to whether it would result in terrorism.”

There can be no doubt that such new criminal laws are specifically intended to ban ideas these governments dislike. The Canadian Centre for Policy Alternatives lays out numerous ways that the law will allow the government to imprison people for the expression of political ideas:

The new offence will bring within its ambit all kinds of innocent speech, some of which no doubt lies at the core of freedom of expression values that the Charter was meant to protect. . . .Even if the government exercises restraint in laying charges and arresting people, the result is an inevitable chill on speech. Students will think twice before posting an article on Facebook questioning military action against insurgents overseas. Journalists will be wary of questioning government decisions to add groups to Canada’s list of terrorist entities.

If someone argues that continuous Western violence and interference in the Muslim world for decades justifies violence being returned to the West, or even advocates that governments arm various insurgents considered by some to be “terrorists,” such speech could easily be viewed as constituting a crime.

To calm concerns, Canadian authorities point out that “the proposed new offence is similar to one recently enacted by Australia, that prohibits advocating a terrorist act or the commission of a terrorism offence-all while being reckless as to whether another person will engage in this kind of activity.” Indeed, Australia enacted a new law late last year that indisputably targets political speech and ideas, as well as criminalizing journalism considered threatening by the government.

Punishing people for their speech deemed extremist or dangerous has been a vibrant practice in both the U.K. and U.S. for some time now, as I detailed (coincidentally) just a couple days before free speech marches broke out in the West after the Charlie Hebdo attacks. Those criminalization-of-speech attacks overwhelmingly target Muslims, and have resulted in the punishment of such classic free speech activities as posting anti-war commentary on Facebook, tweeting links to “extremist” videos, translating and posting “radicalizing” videos to the Internet, writing scholarly articles in defense of Palestinian groups and expressing harsh criticism of Israel, and even including a Hezbollah channel in a cable package.

In this regard, having the French Interior Ministry now unilaterally block websites is the next logical step in this growing attack on free speech by Western governments in the name of stopping extremism and radicalism. The large red hand of state censors over the Internet is a perfect symbol of the prevailing mindset in the West, whose fondness for self-righteously condemning China and Iran for their attempts to control Internet content is bottomless. The ironic mass arrests by France of people who “glorify” terrorism — carried out in the immediate aftermath of the Paris “free speech” rally — largely targeted that country’s Muslims.

Let’s briefly note the futility of the French efforts: in the way that censorship efforts fail generally and are particularly doomed to failure in the Internet era. I’m currently in Germany, just a few miles from the French border, and am able to access all the banned sites. Reports suggest that the French government failed miserably on technical grounds to block the targeted sites, as at least four of the five are still fully available even in France. The owner of the hosting company for one of the banned sites, islamic-news.info, insisted on Twitter yesterday that he was never contacted with any request to remove offending material.

Beyond the technical issues, trying to legislate ideas out of existence is a fool’s game: those sufficiently determined will always find ways to make themselves heard. Indeed, as U.S. pop star Barbra Streisand famously learned, attempts to suppress ideas usually result in the greatest publicity possible for their advocates and/or elevate them by turning fringe ideas into martyrs for free speech (I have zero doubt that all five of the targeted sites enjoyed among their highest traffic dates ever today as a result of the French targeting).

But the comical futility of these efforts is exceeded by their profound dangers. Who wants governments to be able to unilaterally block websites? Isn’t the exercise of this website-blocking power what has long been cited as reasons we should regard the Bad Countries — such as China and Iran — as tyrannies (which also usually cite “counterterrorism” to justify their censorship efforts)?

Image

As those and countless other examples prove, the concepts of “extremism” and “radicalizing” (like “terrorism” itself) are incredibly vague and elastic, and in the hands of those who wield power, almost always expand far beyond what you think it should mean (plotting to blow up innocent people) to mean: anyone who disseminates ideas that are threatening to the exercise of our power. That’s why powers justified in the name of combating “radicalism” or “extremism” are invariably — not often or usually, but invariably — applied to activists, dissidents, protesters and those who challenge prevailing orthodoxies and power centers.

My arguments for distrusting governments to exercise powers of censorship are set forth here (in the context of a prior attempt by a different French minister to control the content of Twitter). In sum, far more damage has been inflicted historically by efforts to censor and criminalize political ideas than by the kind of “terrorism” these governments are invoking to justify these censorship powers.

And whatever else may be true, few things are more inimical to, or threatening of, Internet freedom than allowing functionaries inside governments to unilaterally block websites from functioning on the ground that the ideas those sites advocate are objectionable or “dangerous.” That’s every bit as true when the censors are in Paris, London, and Ottawa, and Washington as when they are in Tehran, Moscow or Beijing.

https://firstlook.org/theintercept/2015 ... ites-name/

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Thu Mar 26, 2015 9:51 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
SPIEGEL's Top NSA Reports

Image


Prying Eyes: Inside the NSA's War on Internet Security http://www.spiegel.de/international/ger ... 010361.htm

Obama's Lists: A Dubious History of Targeted Killings in Afghanistan http://www.spiegel.de/international/wor ... 10358.html

Spying Together: Germany's Deep Cooperation with the NSA http://www.spiegel.de/international/ger ... 75445.html

The NSA in Germany: Snowden's Documents Available for Download http://www.spiegel.de/international/the ... 75917.html

New NSA Revelations: Inside Snowden's Germany File http://www.spiegel.de/international/ger ... 75441.html

'A' for Angela: GCHQ and NSA Targeted Private German Companies and Merkel http://www.spiegel.de/international/ger ... 61444.html

NSA's Secret Toolbox: Unit Offers Spy Gadgets for Every Need http://www.spiegel.de/international/wor ... 41006.html

Inside TAO: Documents Reveal Top NSA Hacking Unit http://www.spiegel.de/international/wor ... 40969.html

Friendly Fire: How GCHQ Monitors Germany, Israel and the EU http://www.spiegel.de/international/wor ... 40135.html

Embassy Espionage: The NSA's Secret Spy Hub in Berlin http://www.spiegel.de/international/ger ... 30205.html

iSpy: How the NSA Accesses Smartphone Data http://www.spiegel.de/international/wor ... 21161.html

Codename 'Apalachee': How America Spies on Europe and the UN http://www.spiegel.de/international/wor ... 18625.html

Cover Story: How the NSA Targets Germany and Europe http://www.spiegel.de/international/wor ... 08609.html




http://www.spiegel.de/international/world/

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Thu Mar 26, 2015 10:03 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
Documents Reveal Canada’s Secret Hacking Tactics

By Ryan Gallagher

Image

Canada’s electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries’ infrastructure, according to newly revealed classified documents.

Communications Security Establishment, or CSE, has also covertly hacked into computers across the world to gather intelligence, breaking into networks in Europe, Mexico, the Middle East and North Africa, the documents show.

The revelations, reported Monday by CBC News in collaboration with The Intercept, shine a light for the first time on how Canada has adopted aggressive tactics to attack, sabotage and infiltrate targeted computer systems.

The latest disclosures come as the Canadian government debates whether to hand over more powers to its spies to disrupt threats as part of the controversial anti-terrorism law, Bill C-51.

Christopher Parsons, a surveillance expert at the University of Toronto’s Citizen Lab, told CBC News that the new revelations showed that Canada’s computer networks had already been “turned into a battlefield without any Canadian being asked: Should it be done? How should it be done?”

According to documents obtained by The Intercept from National Security Agency whistleblower Edward Snowden, CSE has a wide range of powerful tools to perform “computer network exploitation” and “computer network attack” operations. These involve hacking into networks to either gather intelligence or to damage adversaries’ infrastructure, potentially including electricity, transportation or banking systems. The most well-known example of a state-sponsored “attack” operation involved the use of Stuxnet, a computer worm that was reportedly developed by the United States and Israel to sabotage Iranian nuclear facilities.

One document from CSE, dated from 2011, outlines the range of methods the Canadian agency has at its disposal as part of a “cyber activity spectrum” to both defend against hacking attacks and to perpetrate them. CSE says in the document that it can “disable adversary infrastructure,” “control adversary infrastructure,” or “destroy adversary infrastructure” using the attack techniques. It can also insert malware “implants” on computers to steal data.

The document suggests CSE has access to a series of sophisticated malware tools developed by the NSA as part of a program known as QUANTUM. As The Intercept has previously reported, the QUANTUM malware can be used for a range of purposes — such as to infect a computer and copy data stored on its hard drive, to block targets from accessing certain websites, or to disrupt their file downloads. Some of the QUANTUM techniques rely on redirecting a targeted person’s internet browser to a malicious version of a popular website, such as Facebook, that then covertly infects their computer with the malware.

According to one top-secret NSA briefing paper, dated from 2013, Canada is considered an important player in global hacking operations. Under the heading “NSA and CSEC cooperate closely in the following areas,” the paper notes that the agencies work together on “active computer network access and exploitation on a variety of foreign intelligence targets, including CT [counter terrorism], Middle East, North Africa, Europe, and Mexico.” (The NSA had not responded to a request for comment at time of publication. The agency has previously told The Intercept that it “works with foreign partners to address a wide array of serious threats, including terrorist plots, the proliferation of weapons of mass destruction, and foreign aggression.”)

Notably, CSE has gone beyond just adopting a range of tools to hack computers.

According to the Snowden documents, it has a range of “deception techniques” in its toolbox. These include “false flag” operations to “create unrest,” and using so-called “effects” operations to “alter adversary perception.” A false-flag operation usually means carrying out an attack, but making it look like it was performed by another group — in this case, likely another government or hacker. Effects operations can involve sending out propaganda across social media or disrupting communications services. The newly revealed documents also reveal that CSE says it can plant a “honeypot” as part of its deception tactics, possibly a reference to some sort of bait posted online that lures in targets so that they can be hacked or monitored.

The apparent involvement of CSE in using the deception tactics suggests it is operating in the same area as a secretive British unit known as JTRIG, a division of the country’s eavesdropping agency, Government Communications Headquarters, or GCHQ. Last year, The Intercept published documents from Snowden showing that the JTRIG unit uses a range of effects operations to manipulate information online, such as by rigging the outcome of online polls, sending out fake messages on Facebook across entire countries, and posting negative information about targets online to damage their reputations.

CSE declined to comment on any specific details contained in the latest revelations. In a general statement issued to The Intercept and CBC News, a spokesman for the agency said: “In moving from ideas or concepts to planning and implementation, we examine proposals closely to ensure that they comply with the law and internal policies, and that they ultimately lead to effective and efficient ways to protect Canada and Canadians against threats.”

The spokesman said that some of the Snowden documents do “not necessarily reflect current CSE practices or programs.” But he refused to explain which capabilities detailed in the documents the agency is not using, if any. Doing so, he said, would breach the Security of Information Act, a Canadian law designed to protect state secrets.

https://firstlook.org/theintercept/2015 ... t-arsenal/

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Sun Apr 05, 2015 8:53 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
EU to Europeans: Abandon Facebook to Avoid US Spying

European Union citizens who want to keep their information private from United States intelligence services should close their Facebook accounts, the European Commission warned, finding that current EU legislation does not protect citizens’ data.

EC attorney Bernhard Schima made that comment in a case brought by privacy campaigner Maximilian Schrems. The case examines whether the data of EU citizens should be considered safe if sent to the US in light of mass data tracking revealed by National Security Administration whistleblower Edward Snowden.
“You might consider closing your Facebook account, if you have one,” Schima told attorney general Yves Bot in a hearing of the case at the European court of justice in Luxembourg.

At issue is the current Safe Harbour framework, which covers the transmission of EU citizens’ data across the Atlantic to the US. Without the framework, it is against EU law to transmit private data outside of the EU. The case collects complaints lodged against Apple, Facebook, Microsoft, Microsoft-owned Skype and Yahoo.

Safe Harbour states that US data protection rules are adequate if information is passed by companies on a “self-certify” basis. But Schrems maintains that the US no longer qualifies for such a status due to its tracking programs, so companies operating inside the EU should not be allowed to transfer data to the US.

When asked directly, the commission could not confirm that the Safe Harbour rules, as they currently stand, provide adequate protection of EU citizens’ data.

The case argues that the US government’s Prism data collection program, revealed by Snowden in leaked NSA files, in which which EU citizens’ data held by US companies is passed on to US intelligence agencies, breaches the EU’s Data Protection Directive “adequacy” standard for privacy protection, meaning that the Safe Harbour framework no longer applies.

Poland and a few other member states as well as advocacy group Digital Rights Ireland joined Schrems in arguing that the Safe Harbour framework cannot ensure the protection of EU citizens’ data and therefore is in violation of the two articles of the Data Protection Directive.

The commission, however, argued that Safe Harbour is necessary both politically and economically and that it is still a work in progress.

https://sumbola.com/articles/486/eu-to- ... -us-spying

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Mon Apr 06, 2015 5:15 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
Just maybe Putin is right about the internet being "controlled" and by more than just the American NSA. :shock:

ALIEN PRESENCE ON THE INTERNET

posting an aricle by Richard Alan Milller, with his permission

About ten years ago (1993), Time Magazine interviewed ten major computer experts about the direction and goals that industry was moving. One thing stood out above all other visions and opinions. All ten indicated that there was a “presence” on the Internet, and no one had a clue as to what it all meant.

How this was first observed was that search engines used at that time should have given consistent responses to the same question asked at the same time. But, they did not, and the big question was why? Boolean Logic systems dictate that they must, or there was another “variable” involved, one yet to be identified.

It was at this same time that NASA created the popular screen saver called CETI, to calculate possible planets around known stars. The algorithm used was a form of quantum computation math, now used by IBM to create a super computer from a network of PCs. Known as “Big Blue,” this system only requires 357 PCs. It can duplicate a Cray super cooled computer for speed and accuracy.

This means that at any given time where a University has 357 screen savers (CETI) online, a supercomputer can becomes existent. Now, if there are 357 Universities where this happens at the same time, a type of self-organizing consciousness is postulated to form.

Current software available for use at phone companies now include the ability to not only determine call waiting, but can also determine the specific mood by the way the keystrokes have been entered. Irritated persons are routed to special handlers, as an example of this developing software.

Image
Internet mapping project weaves colorful web 18:50 28 November 03 NewScientist.com news service

Each color on this Opte map represents a region;

North America, blue; Europe/Middle East/Central Asia/Africa, green; Latin America, yellow;
Asia Pacific, red;
Unknown, white.
(Image: Opte.org)

It is not a stretch to postulate the probability of where that technology can go in the next ten years. Given the idea that something already knows this software (like everything of man on the Internet), it is possible that the search engine discrepancies might be a form of directional MEMEs.

The next question to ask is: what came first, man or computer? When one realizes that many of the soil properties also exhibit quantum computation algorithms, it is not hard to conceive that current chip (made from sand) physics was here before man. And now there is a second possible alien. The Genome Project also uses these forms of networking.

This, by the way, is the basic premise in the new movie Terminator 3, where machines decide to take over and eliminate man.


http://www.projectcamelotportal.com/201 ... e-internet



and... some very good points are brought up in this discussion with Laura Eisenhower and Alfred Lambremont Webre. She talks about super computers being underneath places like Stonehenge because of the leylines there and other places on the planet where the leylines make a difference in the magnitude of energy used to influence beliefs through various rituals taking place in these places. As usual, for your discernement. So much depends on our beliefs and how aware of them we are not to speak about living a heart based life. :?)

Laura Magdalene Eisenhower: ET invasion has already occurred and governments do not want us to know

https://www.youtube.com/watch?v=OdfIuTm2VuM

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Thu Apr 09, 2015 6:03 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
Google’s New Algorithm Will Only Show You ‘What They Say Is True’



While most of us have been busy thinking about net neutrality, guess what Google has been doing. The leading search engine has decided to change the criteria it uses for ranking content on the internet, so that content will no longer be ranked by popularity, as it has been since the beginning. The new ranking system will instead use what it has determined to be ‘truth’ as its ranking tool. This Orwellian move opens the door for Google to homogenize thought and become the global arbiters of truth, with the ability to send content it declares as ‘untrue’ into the dustbin of obscurity.

The term ranking refers to the position at which a particular site appears in the results of a search engine query. A site or a web page is said to have a high ranking when it appears at or near the top of the list of results provided by a search. Under Google’s current set up, the higher the number of incoming links to a website or page, the higher the ranking. The content is considered too, but much of it is about popularity.

According to Hal Hodson writing for New Scientist:

“This system has brought us the search engine as we know it today, but the downside is that websites are full of misinformation that can rise up the rankings, if enough people link to them.”

Misinformation? A recently published paper from Google outlines how it’s going to take care of that, by giving each website or page a ‘truth score’ determined by counting the number of ‘incorrect facts’ on its pages. A website having few ‘false facts’ will be considered trustworthy and will be able to rise in the rankings. The score computed for each page will be known as its Knowledge-Based Trust score.

Google’s software will tap into its new Knowledge Vault, an automated data base currently being hailed as the largest store of knowledge in human history. The Knowledge Vault gathers and merges information from across the internet into a base of ‘facts’ about the world, and the people who live in it. These are facts the software agrees on and considers a proxy for truth, based on their being accepted as truth by the majority of people.

Websites that contain information contradictory to what is in the Knowledge Vault, known as ‘untruth,s’ will be kicked down to the bottom of the ranking, where few eyeballs venture to go.

As an example, let’s look at some possibilities for truth:

Possible truth #1: Vaccine makers are altruistic and have our best interests at heart. The vaccines they make are safe and lead to better overall health and longevity.

Possible truth #2: Vaccines are loaded with toxic chemicals, don’t work as advertised, and lead to ruined natural immunity and outbreaks of disease. They are made by greedy people.

Possible truth #3: There is some truth and some untruth in each of the other possibilities.

If the majority of people believe possible truth # 1, it will indeed become ‘truth’ at Google, and the website that sponsors this ‘truth’ will advance in the search rankings. And if the least number of people believe possible truth #2, the website carrying it will decline in the search rankings, and may be headed for obscurity at the bottom of the rankings list. The outcome of a website sponsoring possible truth #3 would probably be to maintain its current ranking position.

As of now, the Knowledge Vault has accumulated 2.8 billion ‘facts’. Of these, many million are rated as confident facts, meaning Google’s model gives them a more than 90 percent chance of being true. The Knowledge Vault cross-references new facts with what are already known, giving the system some fluidity.

The new system is not live and there have been no timelines announced for its implementation. As knowledge of this new ranking system spreads, concerns are sure to be raised. Whether or not the other search engines follow the lead of Google may be a determining factor.

https://sumbola.com/articles/437/google ... ay-is-true


Duckduckgo.com is a great search engine. I almost never use google, unfortunately they now own Youtube but if they try censoring that too much they will lose many to other free video sites. It will happen eventually. This is the age of transparency and google is working in cahoots with the the Department of Defense in the US and for all the secrecy and deception that goes on there its only a matter of time before the truth reveals all.

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Last edited by Shayalana on Sun Feb 07, 2016 7:34 pm, edited 2 times in total.

Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Sat Apr 11, 2015 8:00 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
FIGHT 215 This is our last chance to stop mass surveillance under the Patriot Act

https://fight215.org/

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Sat Apr 11, 2015 8:04 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
Crypto & Privacy Village is Heading to Tribeca Film Festival

EFF, Tony Arcieri, Justin Culbertson, Whitney Merrill, and Peter Teoh are excited to announce that we’ll be bringing the Crypto & Privacy Village to the Tribeca Film Festival. The Crypto & Privacy Village is a place to pick up tips and tricks about computer security and privacy and learn about encryption, and we’re excited to bring that experience to the international film community. DEF CON and the Tribeca Film Festival will be hosting the Village April 23 to 25 at Spring Studios. We hope you'll catch us there!

Our appearance at Tribeca builds on a successful inaugural Crypto & Privacy Village at last year's DEF CON 22. The first ever Crypto & Privacy Village included a wide array of events and resources, including talks by security professionals and guides on how to secure devices. It also provided a place to hang out, talk crypto, or just play some games and puzzles.

Image

Our appearance at Tribeca builds on a successful inaugural Crypto & Privacy Village at last year's DEF CON 22. The first ever Crypto & Privacy Village included a wide array of events and resources, including talks by security professionals and guides on how to secure devices. It also provided a place to hang out, talk crypto, or just play some games and puzzles.

Taking the Village to the Tribeca Film Festival will bring a fun, interactive, and in-depth discussion of privacy and cryptography—the science of securing communications—to a whole new audience. The Village at Tribeca will be housed on the sixth floor of Spring Studios. The studios are intended to be the central hub for Tribeca attendees and will have various talks, shows, and exhibits. The Village will offer attendees talks on important computer security topics, hands on activities, and practical tips and tricks for better security. It will also feature art, puzzles, how-to guides, and some of our favorite movie clips about hacking.

The Crypto & Privacy Village at Tribeca is especially exciting because it signals the growing understanding that everyone should be concerned about computer security and privacy—including filmmakers and film lovers. That’s not accidental. After all, digital security was essential to the making of Laura Poitras's Academy award winning documentary CITIZENFOUR.

We'll be joined by DEF CON Village veterans the Lockpick Village, Tamper Evident Village, and the Hardware Hacking Village. We’re excited to bring a part of DEF CON—and better computer security—to Tribeca.

Get ready!

https://www.eff.org/deeplinks/2015/04/c ... m-festival

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Mon Apr 27, 2015 6:44 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
Last Week Tonight with John Oliver: Government Surveillance (HBO)

Published on Apr 5, 2015

There are very few government checks on what America’s sweeping surveillance programs are capable of doing. John Oliver sits down with Edward Snowden to discuss the NSA, the balance between privacy and security, and dick-pics.

https://www.youtube.com/watch?v=XEVlyP4_11M

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Sun Feb 07, 2016 7:27 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
DOCUMENTARY: Edward Snowden - Terminal F (2015)

https://www.youtube.com/watch?v=Nd6qN167wKo

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Sat Mar 12, 2016 11:44 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
For some reason Homeland Security has become concerned as of late about getting CONSENT to do their nasty dirty business and they still think that the majority of the mainstream are too stupid to figure this game out.. Hmmmm....something is amiss...BTW Oliver Stone did a movie about Snowden with Snowden's suggestions and it couldn't be filmed in the US because the secret service would show up on set disrupting it. So it went to Europe where it was done without a hitch. Few Americans were willing to fund or support it out of fear of reprecussions. That the American gov is concerned about consent is a good sign. It shows how worried they are. They should be. It's amazing how much they lie and believe their own lies. No wonder the truth is sooo frightening to them. The gig is up.

‘That’s horse sh*t!’: FBI can already unlock iPhone without Apple’s help – Snowden

Image

NSA whistleblower Edward Snowden said that the FBI’s claim to need Apple to unlock the iPhone a San Bernardino shooter is a sham.

The FBI says that only Apple has the ability to crack the work phone left behind by the San Bernardino terrorists, and last month convinced a federal judge to compel the tech giant to write a custom operating system with intentionally weakened security mechanisms. Apple is refusing to do so, and said that it is willing to take the fight to the Supreme Court.

con't ...

https://www.rt.com/usa/335054-snowden-apple-fbi-fight/

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Sun Mar 13, 2016 12:12 am 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
I love that Russia sanctions Snowden one of America's own or so they thought. It's a continual slap in the face of the American "secret" government and undermines everything they try to do to keep up the old story. They do not have a new script to play especially since they never anticipated what Snowden did. Wikileaks was bad enough and they thought they got a handle on it by inhumanely torturing (redundant here , torture is inhumane), Chelsey Manning and keeping Assange captive in the Embassy in London.. They never thought someone like Snowden would do what he did and the others that are yet to play their role. This tryanny is failing and falling. They more they do to cling to it the harder the fall. Notice there is nothing new in how they react to it. They are looping with the same old same old tactics which haven't worked and obviously will not work now. They are too panicked to be able to create anything new. That only comes from a place without fear or deception in these times of transparency and truth. And btw Snowden is free to leave Russia as far as Russia is concerned, they are not forcing him to stay. He choses to stay.

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Last edited by Shayalana on Tue Mar 15, 2016 5:13 pm, edited 2 times in total.

Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Sun Mar 13, 2016 12:18 am 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
What we know as the internet, is but a tip of the iceberg. There is the deeper web which is by a magnitude at least 25 times larger and/or more vast then the internet we know. Few know just who or what lurks there. This is why I find it ridiculous fearing any government thinking themself powerful enough to absolutely control the web. :roll: Which one? Just think, the people who are aware of the Deep Web and know how to navigate in it are hackers and a good number of them don't work for any governments. Some truly are for the common people and care about a free humanity banishing oppression and enslavement. Yes there are drug sites and po-rn sites on the deep web but those are a very small percentage. The deep web is a very very big place. It is best you have an idea of what you are looking for and how to find it, lest you see things you wished you hadn't...

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Tue Mar 15, 2016 8:28 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
Anonymous - VOTE ANONYMOUS 2016

https://m.youtube.com/watch?v=FI4HagtgT ... aXzLY-F7DR

What is needed is not supporting a Constitution not made for these times and was so flawed that it allowed the debacle we see in the world of corporate power, greed and war today. What is needed is a new Constitution that truly advocates and upholds equality. This is a very good step in the right direction the kind of globalism I am interested in.

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Tue Mar 15, 2016 8:38 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
Anonymous Hack Trump's Voicemail and Reveal MSNBC Calls and Donations

https://m.youtube.com/watch?v=ReFAp568GWI

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Tue Mar 15, 2016 8:47 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
A Message From Anonymous for TRUMP and CRUZ - JUSTICE IS COMING (2016)

https://m.youtube.com/watch?v=XprUlzAi1Y0

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

 Post subject: Re: INTERNET FREEDOM FREEDOM PERIOD.
PostPosted: Tue Mar 15, 2016 9:08 pm 
Offline
Posting Freak
User avatar
 Profile

Joined: Tue May 03, 2005 7:31 pm
Posts: 18411
Location: QUANTUSUM
Anonymous A Message To Hillary Clinton


https://m.youtube.com/watch?v=SJvDpEijn00

_________________
The SI IS.

"Oneness, Truthfulness and Equality"


Cathedral - CS&N
https://www.youtube.com/watch?v=7MaSU0ABrnY


Top
 

Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 316 posts ]  Go to page Previous  1 ... 8, 9, 10, 11, 12, 13  Next

All times are UTC - 5 hours


Who is online

Users browsing this forum: No registered users and 1 guest


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
cron
Copyright © 2005-2012 WingMakers.co.uk