forum Politics and Society ›› the right to privacy ›› new reply Post Reply
white trash dirt bag
pass the whore
2,167 Posts

offline   (6)
December 16 2013 4:18 PM   QuickQuote Quote  
Judge Says NSA Phone Spying Program Is 'Almost Certainly' Unconstitutional

Dec. 16, 2013 4:05 p.m.

WASHINGTON—A federal judge on Monday ruled against the National Security Agency's collection of phone records, saying the program "almost certainly does violate" the Constitution.

U.S. District Judge Richard Leon, who was nominated to the Washington, D.C., bench by former President George W. Bush, issued a 68-page ruling in favor of Larry Klayman, a conservative activist and lawyer.

Mr. Klayman filed suit in June, claiming that the program violated his Fourth Amendment right against unreasonable search.

On a daily basis, the NSA collects records of nearly every call made in the U.S. and enters them into a database in order to search for possible contacts among terrorism suspects. The scope of the program was revealed when former NSA contractor Edward Snowden leaked documents describing the program this spring.

The ruling came on Mr. Klayman's request for an injunction barring the government from collecting any telephone records associated with Mr. Klayman and another plaintiff. In the ruling, Judge Leon ordered the government to destroy any such records it currently has.

In issuing his ruling, the judge disagreed with a central premise of the program's defenders—that a 1979 Supreme Court ruling allowing investigators to look at the phone records of a Maryland robbery suspect gave them the authority to collect phone records of nearly every American.

Judge Leon ruled that the technology of both phones and phone surveillance has changed so much in the intervening years that the Smith decision is of little value in assessing the NSA program.

"The almost-Orwellian technology that enables the government to store and analyze the phone metadata of every telephone user in the United States is unlike anything that could have been conceived in 1979,' the judge wrote, adding: "I believe that bulk telephony metadata collection and analysis almost certainly does violate a reasonable expectation of privacy.'

A spokesman for the Justice Department said lawyers there were reviewing the decision and declined to comment further.

The ruling gives more ammunition to those in Congress who have argued for an overhaul of the laws authorizing government surveillance.

Senate Judiciary Committee Chairman Patrick Leahy (D., Vt.) welcomed the ruling, saying: "Americans deserve an open and transparent debate about the constitutionality, efficacy, and appropriateness of the government's dragnet collection programs.'

The phone surveillance program has been attacked by legal activists on both the right and the left. A similar case is pending in federal court in New York, after the American Civil Liberties Union filed a lawsuit in the wake of the Snowden revelations. The judge in that case has yet to make a decision.

Judge Leon's decision uses strong language, and even occasional exclamation points, to question the candor of the government lawyers who argued against Mr. Klayman and to knock down various arguments made on behalf of the phone surveillance program—particularly the legal basis of the 1979 decision.

"It's one thing to say that people expect phone companies to occasionally provide information to law enforcement; it is quite another to suggest that our citizens expect all phone companies to operate what is effectively a joint intelligence-gathering operation with the government,' the judge wrote.

He added: "There is the very real prospect that the program will go on for as long as America is combating terrorism, which realistically could be forever'.
white trash dirt bag
pass the whore
2,167 Posts

offline   (6)
January 15 2014 6:36 AM   QuickQuote Quote  
N.S.A. Devises Radio Pathway Into Computers

JAN. 14, 2014

WASHINGTON — The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks. While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.

The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.

The N.S.A. calls its efforts more an act of “active defense” against foreign cyberattacks than a tool to go on the offensive. But when Chinese attackers place similar software on the computer systems of American companies or government agencies, American officials have protested, often at the presidential level.

The program, code-named Quantum, has also been successful in inserting software into Russian military networks and systems used by the Mexican police and drug cartels, trade institutions inside the European Union, and sometime partners against terrorism like Saudi Arabia, India and Pakistan, according to officials and an N.S.A. map that indicates sites of what the agency calls “computer network exploitation.”

“What’s new here is the scale and the sophistication of the intelligence agency’s ability to get into computers and networks to which no one has ever had access before,” said James Andrew Lewis, the cybersecurity expert at the Center for Strategic and International Studies in Washington. “Some of these capabilities have been around for a while, but the combination of learning how to penetrate systems to insert software and learning how to do that using radio frequencies has given the U.S. a window it’s never had before.”

In a catalog produced by the agency that was part of the Snowden documents released in Europe, there are page after page of devices using this technology.

One, called Cottonmouth I, looks like a normal USB plug but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer “through a covert channel” that allows “data infiltration and exfiltration.” Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer — either in the field or when they are shipped from manufacturers — so that the computer is broadcasting to the N.S.A. even while the computer’s user enjoys the false confidence that being walled off from the Internet constitutes real protection.

The relay station it communicates with, called Nightstand, fits in an oversize briefcase, and the system can attack a computer “from as far away as eight miles under ideal environmental conditions.” It can also insert packets of data in milliseconds, meaning that a false message or piece of programming can outrace a real one to a target computer. Similar stations create a link between the target computers and the N.S.A., even if the machines are isolated from the Internet.

Computers are not the only targets. Dropoutjeep attacks iPhones. Other hardware and software are designed to infect large network servers, including those made by the Chinese.

Most of those code names and products are now at least five years old, and they have been updated, some experts say, to make the United States less dependent on physically getting hardware into adversaries’ computer systems.

The N.S.A. refused to talk about the documents that contained these descriptions, even after they were published in Europe.
white trash dirt bag
pass the whore
2,167 Posts

offline   (6)
March 12 2014 8:08 AM   QuickQuote Quote  

Senators rally around Feinstein, demand answers from CIA
March 12 2014

In an impassioned Senate floor speech yesterday, the California Democrat accused the CIA of criminal activity for allegedly searching computers used by Senate staffers. The CIA set up the computers at a secure location in northern Virginia so Senate Intelligence Committee staff could access classified documents pertaining to the CIA’s detainee program. When some of them found an incriminating document the CIA hadn’t intended to release, the CIA started poking around.

“The CIA’s search may also have violated the Fourth Amendment, the Computer Fraud and Abuse Act, as well as Executive Order 12333, which prohibits the CIA from conducting domestic searches or surveillance,” Feinstein said during her speech. Sen. Patrick Leahy (D-Vermont), head of the Judiciary Committee, immediately followed up with, “I cannot think of any speech by any member by either party as important as the one the senator from California just gave.”

He called it “likely criminal conduct” on the intelligence agency’s part. And, like Feinstein, he suggested it was a breach of the separation of powers doctrine.

Feinstein’s statements criticizing the CIA have particular significance because she is perhaps the biggest senatorial cheerleader for domestic surveillance, including the telephone snooping program in which metadata from calls to, from and within the United States is forwarded in bulk to the National Security Agency without probable cause warrants. A federal judge declared such snooping unlawful last year but stayed the decision pending appeal. The case is before the U.S. Supreme Court.

Feinstein told NBC’s Meet the Press in January that “A lot of the privacy people, perhaps, don’t understand that we still occupy the role of the Great Satan,” Feinstein told NBC. “New bombs are being devised. New terrorists are emerging, new groups, actually, a new level of viciousness.”

For Alex Abdo, a staff attorney with the ACLU, Feinstein appears to be talking out of both sides of her mouth now that the tables appear to have turned.

“The particular irony is that one of the NSA’s staunchest defenders appears now to recognize the cost of unlawful surveillance.,” Abdo says.

Mark Jaycox, a staff attorney with the Electric Frontier Foundation, agrees. He also said the allegations by Feinstein “should serve as a catalyst for the senator to be concerned with the NSA’s spying on innocent Americans.”

Such spying was “wrong” and “so is spying on innocent Americans. The senator should take notice,” he writes in an e-mail.

Many, including Human Rights Watch, are using the flap to demand Congress declassify the results of the Senate’s torture investigation. And if the whole affair makes Feinstein a little more sympathetic to other targets of domestic intelligence spying, that wouldn’t be so bad, either.

NSA intercepts mostly were of Average Joes

By Barton Gellman, Julie Tate & Ashkan Soltani of THE WASHINGTON POST

Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post.

Nine of 10 account holders found in a large cache of intercepted conversations, which former NSA contractor Edward Snowden provided to the Post, were caught in a net the agency had cast for somebody else.

Nearly half of the surveillance files contained names, e-mail addresses or other details that the NSA marked as belonging to U.S. citizens or residents. NSA analysts masked, or “minimized,” more than 65,000 such references to protect Americans’ privacy, but the Post found nearly 900 additional e-mail addresses, unmasked in the files, that could be strongly linked to U.S. citizens or residents.

There are discoveries of considerable intelligence value in the intercepted messages — and collateral harm to privacy.

Among the most valuable contents are fresh revelations about a secret overseas nuclear project, double-dealing by an ostensible ally, a military calamity that befell an unfriendly power, and the identities of aggressive intruders into U.S. computer networks.

For example, months of tracking communications across more than 50 alias accounts led directly to the 2011 capture in Abbottabad of Muhammad Tahir Shahzad, a Pakistan-based bomb builder, and Umar Patek, a suspect in a 2002 terrorist bombing on the Indonesian island of Bali.

Many other files, described as useless by the analysts but nonetheless retained, have a startlingly intimate, even voyeuristic quality. They tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded.

The cache Snowden provided came from domestic NSA operations under broad authority granted by Congress.

The Post reviewed roughly 160,000 intercepted e-mail and instant-message conversations, some of them hundreds of pages long, and 7,900 documents taken from more than 11,000 online accounts.


Facebook’s Plan to Monopolize The Internet In India Should Be Defeated

Posted yesterday by Karl Mehta (@karlmehta)

Despite rebranding its free ‘walled garden’ of apps plan in India under the new name of “Free Basics,” Facebook remains in direct violation of an open Internet. Facebook’s first attempt with Indian carrier Airtel was rolled-back soon after its release in April thanks to huge public outrage on social media, ironically.

India’s prolific tech entrepreneur Vishal Gondal has posted his thoughts and has rightfully called it evil.

Facebook thinks that by adopting a seemingly innocuous name such as “Free Basics” and launching a massive advertisement campaign all over India (including daily full-page ads in newspapers and countless billboards), it can advance its Internet-splitting plan in the days leading up to the final decision from the Telecom Regulatory Authority of India (TRAI).

Furthermore, Mark Zuckerberg has resorted to deceptive narratives to promote his efforts.

In this September 25th post, he presents how rural- and development friendly and Free Basics are and suggesting the farmer couldn’t have benefited without their program.

However, the farmer in question has been on Facebook and the full Internet for at least 2 years before was launched, where he could access a million times more information.

Here’s his page — active since 2013.

Facebook has never even advertised its own core product in India this heavily. Why would it spend this much cash on a “charity endeavor,” as they’re misleadingly framing it?

The primary mobile apps Facebook is pushing through “Free Basics” are their own, and all other apps, as innovative and helpful as they might be, would be subject to guidelines and an approval process created by Facebook.

In such a digitally emerging country like India, Facebook would essentially play gatekeeper, as millions of first-time Internet users on mobile would only experience a “Facebook version of the Internet.”

The competitive advantages for Facebook’s own apps and others it allows into “Free Basics” are so drastic that even Indian startups that Facebook has approached to bring onboard — and that would obviously benefit significantly from doing so — have declined in order to remain ethical and support a fair ecosystem, as Quartz has reported.

I’ve seen this “charity-with-hidden-agenda” model before in India, Africa, and other developing countries where politicians and international companies using non-profits as fronts to their commercial and political agenda to exploit the poor in the name of free goods and subsidies.

As Naveen Patnaik, Chief Minister of the Indian state Odisha, said: “If you dictate what the poor should get, you take away their rights to choose what they think is best for them.”

Let India’s poor choose what they want to use. Either open up “Free Basics” to every app and enforce a data cap, or just let the poor pay for the services themselves. Free market guru C.K. Prahalad showed the world in his seminal Gates-recommended book TheFortune at the Bottom of the Pyramid that the poor are viable customers.

My recent book, co-authored with Carol Realini, Financial Inclusion at theBottom of the Pyramid also contains dozens of examples of great innovations brought to the bottom of the pyramid at “radical affordability” without any need for preferential treatment given to one service over another.

And definitely not to the extent that one vendor dominates an entire region, thwarts innovation, and restricts consumer choice. Facebook is in critical need for its next one billion as its growth slows down in the United States, but stooping down to such desperate measures to gain market-share is unacceptable.

In Zuckerberg’s recent op-ed in Times of India, he asks, “who could possibly be against this?”

Nearly every Indian startup is against it including the very companies he is trying to recruit for “Free Basics,” dozens of Indian elected officials, the founder of the Internet Sir Tim Berners-Lee, and countless others in India and abroad in support of net neutrality have all voiced their concern against’s walled-garden.
sees air
15,543 Posts

offline   (18)
March 12 2014 9:41 AM   QuickQuote Quote  
it's okay to spy on the peasants, but don't you dare spy on me
the cat
7,463 Posts

offline   (5)
March 12 2014 2:18 PM   QuickQuote Quote  
Originally posted by: deadlift

it's okay to spy on the peasants, but don't you dare spy on me

This x 1000

Next up... torture
Man is Truth
sleeps on hills
5,530 Posts

offline   (11)
April 8 2014 4:09 PM   QuickQuote Quote  
It makes me very sad, because in previous generations, normally adjusted, perfectly reasonable people often turned to crime, and these behaviors existed in an entire culture that compensated them one way or another for lobbing a few arrows or bullets toward the ruling class.

Now, suppose you had a perfectly legitimate grievance with some petty official, or some crooked motherfucker rich businessman, and a proper tar-and-feathering is what the recipe calls for.

Your impulse toward it is checked by awareness of many things:

1) your basic personality, vital statistics, employment history, school performance, family connections and background, (and with social media, friends circle and political sympathies) are all documented and archived from before you were even old enough to know to object. Very likely some kind of physical evidence of your own body is archived somewhere, like fingerprints or DNA.

2) everywhere is covered in surveillance- even if you could corner the targeted motherfucker that has it coming, and expeditiously dispose of him without witnesses or surveillance, it still does not take much to get on some computers, invoke some clearance, and compile all kinds of other retroactive surveillance and backtrack until you find the perpetrator leaving his home on video somewhere.

I think it's a development whose consequences are entirely neglected; society at large and how power relationships are challenged and altered is radically different and unlike any other model ever in human history.
Fuck Nazis.
24,526 Posts

offline   (9)
April 8 2014 9:04 PM   QuickQuote Quote  
"Now, suppose you had a perfectly legitimate grievance with some petty official, or some crooked motherfucker rich businessman, and a proper tar-and-feathering is what the recipe calls for.

Your impulse toward it is checked by awareness of many things:"

Such as the fact that you live in a moderately civilized society where vigilante assault is rightly illegal and punished by law.

" think it's a development whose consequences are entirely neglected; society at large and how power relationships are challenged and altered is radically different and unlike any other model ever in human history."

Are you fucking kidding me? Yes, dipshit, the kind of thing you are talking about was pretty much always considered illegal in every culture with laws. Hell, you could be killed at one time in Britain simply for breaking a loom or any weaving equipment that wasn't your own.

Why do I get the feeling your grasp of actual history is tenuous at best?
Bashar al-Asad
In sha'Allah
38,046 Posts

offline   (11)
July 7 2014 2:49 AM   QuickQuote Quote  
the cat
7,463 Posts

offline   (5)
July 7 2014 7:22 AM   QuickQuote Quote  
We'd like to interrupt this program to bring you a special report:

the j is 4 jongler
5,640 Posts

offline   (2)
July 7 2014 7:28 AM   QuickQuote Quote  
i fucking hate my country.
the j is 4 jongler
5,640 Posts

offline   (2)
July 7 2014 7:29 AM   QuickQuote Quote  
i hope porn and pancakes offers a delicious cum syrup.
planet of the apes
3,948 Posts

offline   (6)
May 24 2015 11:22 AM   QuickQuote Quote  
planet of the apes
3,948 Posts

offline   (6)
May 24 2015 11:26 AM   QuickQuote Quote  
Google patents the use of internet toys to remotely run appliances/spy on users 22 May 2015

Google's R&D team has looked into making internet-connected toys that control smart home appliances.

The firm has published a patent that describes devices that would turn their heads towards users and listen to what they were saying, before sending commands to remote computer servers.

The three-year old patent was spotted recently by the legal technology firm SmartUp.

It described the proposal as "one of Google's creepiest patents yet".

click here for link

bearded brooklyn douche
66 Posts

offline   (1)
December 31 2015 6:40 PM   QuickQuote Quote  
Originally posted by: the cat

We'd like to interrupt this program to bring you a special report:

The Porn and Pancakes breakfast will be hosted on Saturday at the Tulsa location at 925 South Hudson

Originally posted by: the j is 4 jongler

i hope porn and pancakes offers a delicious cum syrup.
white trash dirt bag
pass the whore
2,167 Posts

offline   (6)
October 12 2016 6:03 AM   QuickQuote Quote  
Facebook, Twitter and Instagram sent feeds that helped police track minorities


A powerful surveillance program that police used for tracking racially charged protests in Baltimore and Ferguson, Mo., relied on special feeds of user data provided by Twitter, Facebook and Instagram, according to an ACLU report Tuesday.

The companies provided the data — often including the locations, photos and other information posted publicly by users — to Geofeedia, a Chicago-based company that says it analyzes social media posts to deliver real-time surveillance information to help 500 law enforcement agencies track and respond to crime.

click here for link
forum Politics and Society ›› the right to privacy ›› new reply Post Reply

Quick Reply - RE: the right to privacy

Connect with Facebook to comment: Login w/FB

or Sign up free! - or login:


wrap selection with italics
wrap selection with bold
insert less than symbol
insert greater than symbol

google image Insert Google Images
Share a Band

Your ad here?