Trump’s Big Bother anti-immigrant witch-hunt


This video from the USA says about itself:

ICE Teams Up With Big Brother

7 June 2018

ICE is watching you. Ana Kasparian, Kim Horcher, and Mark Thompson, hosts of The Young Turks, break it down.

“The U.S. Immigration and Customs Enforcement (ICE) agency has signed a $2.4 million contract with a little-known surveillance company that mines communications data and provides “real-time” tracking.

Data published on the U.S. government’s spending website shows the Department of Homeland Security contracted Pen-Link Ltd. (PenLink), a software company that develops communications surveillance collection systems, on June 4 with ICE listed as the contracting subagency.

PenLink provides software that allows enforcement bodies to collect and analyze “massive amounts of social media and internet communications data”, as well as collect wiretap intercepts “in real-time” for “tracking” and “live monitoring”, according to its website.

Julian Sanchez, a privacy and surveillance expert with the Cato Institute, said the company appears to specialize in telephone data analysis and geolocation data mining and tracking that could potentially determine where people are “within a block” of a cell tower.”

Read more here.

On Tuesday, some 200 agents from US Immigration and Customs Enforcement (ICE) and Customs and Border Protection (CBP) carried out Gestapo-style raids on two workplaces in northern Ohio. The heavily armed border agents arrested 114 people, including children and US citizens. Shocked and outraged co-workers shouted at the border police to let the arrested workers go, to no avail. By a single act of mass terror, the US government shattered the lives of hundreds of parents, children, spouses and siblings: here.

Advertisements

Trump administration, more NSA spying


This video from the USA says about itself:

Trump Admin Puts Warrantless NSA Spying On Steroids

8 May 2018

The National Security Agency collected more than 530 million U.S. call records in 2017, representing a dramatic increase over the previous year.

According to an annual transparency report released Friday, the spy agency collected 534 million call records in 2017, more than three times the 151 million collected in 2016. The new statistics were first reported by Reuters.

The report, released Friday by the Office of the Director of National Intelligence, is mandated by the USA Freedom Act passed by Congress in 2015 that aimed to restrict and boost oversight of the spy agency’s surveillance program.

Read more here.

New Facebook privacy scandal


This video says about itself:

Snowden’s Message on Facebook’s data leak scandal with Cambridge Analytica

23 March 2018

Whistleblower Edward Snowden speaks on Facebook’s data leak scandal with Cambridge Analytica within his recent interview on March 11, 2018. Snowden gives realistic understanding on the format of using user’s data by social networks, such as Facebook. So Snowden technically joined the #DELETEFACEBOOK movement.

From daily The Morning Star in Britain:

Tuesday, March 27, 2018

United States Facebook accused of harvesting Android users’ data

FACEBOOK faced new questions today about collecting phone numbers and text messages from Android devices.

The revelations are embarrassing following the US-based internet giant’s apologies in US and British newspapers for exposing users’ data to Cambridge Analytica, a consultancy firm which worked with the Donald Trump campaign in the US …

The website Ars Technica reports that Android users who checked data gathered by Facebook on them found that it had years of contact names, numbers, call lengths and text recipients.

Messages were left on Sunday seeking comment about security from Google officials, who make the Android operating system.

Reports of the data collection came as Facebook CEO Mark Zuckerberg took out ads in multiple US and British Sunday newspapers to apologise for the Cambridge Analytica scandal.

The ads say the social media platform doesn’t deserve to hold personal information if it can’t protect it.

According to the ads, a quiz app built by a Cambridge University researcher leaked Facebook data of millions of people four years ago.

Cambridge Analytica got the data from a researcher who paid 270,000 Facebook users to complete a psychological profile quiz in 2014. But the quiz gathered information on their friends as well, bringing the total number of people affected to about 50 million.

The Trump campaign paid the firm $6 million (£4.2m) during the 2016 election.

Why Facebook’s scandals won’t go away.

Why people are staying on Facebook despite it’s obvious awfulness.

Britain: Police ‘hoovering up’ personal data from innocent’s mobile phones: here.

Young people don’t want to become spies


This video says about itself:

Welcome to Haven: Snowden launches spy-blocking smart phone app

26 December 2017

A new app developed by NSA whistleblower Edward Snowden promises to harness the surveillance power of your smart phone and turn it into a tiny security system to physically guard your data. Read more here.

Translated from Dutch NOS radio today:

For the British intelligence service GCHQ finds it more and more difficult to recruit staff, because well-trained cyberspecialists more often opt for better paid jobs at tech giants like Facebook and Google. They pay up to five times more than the government, according to a study by a British parliamentary committee.

The GCHQ (Government Communications Headquarters) says they need more and more staff …

The staff shortage among cyberspecialists at the GHCQ is around 20 percent. In 2016, 51 experts worked at the service and by 2018, according to the service, they should be 110. …

The intelligence services in the Netherlands also find it difficult to find staff. The military spying service MIVD also said early this year that a lot of young talent chooses to work in business.

“After all the revelations by, for example, Snowden, which exposed secret spying activities of the American intelligence service NSA, many cyberspecialists in training have their reservations about being hired by national intelligence services. Do I really want to work for such an organization? they think”, says [Delft university cybersecurity professor] Van Eeten in the NOS Radio 1 news.

British, Dutch governments spying on citizens


This 2014 video is called NSA whistleblower Edward Snowden says UK surveillance law “defies belief” | Guardian Interview.

By Julian Vigo in Britain:

British and Dutch states challenged on snooping

Thursday 23rd November 2017

As Liberty in the UK and Sleepwet in the Netherlands challenge the extent of state surveillance, JULIAN VIGO calls for public advocacy and local activism to protect the rights of privacy

The UK’s new web spying rules are taking shape despite the legislation governing it, the Investigatory Powers Act (IPA), having become law late last year. There is so much left unresolved about what this Act represents.

For instance, the IPA, also known as the “snoopers’ charter”, represents a massive extension of the surveillance power of the state. It requires internet companies to keep customers’ web traffic history for 12 months.

It also gives spying agencies and police powers the ability to conduct the mass hacking of IT infrastructures, personal computers, smartphones and any electronic device.

Just a year ago, National Security Agency (NSA) whistleblower Edward Snowden labelled this as “the most extreme surveillance in the history of Western democracy. It goes further than many autocracies.”

So why are the British not reacting?

The Dutch are set to have a national referendum about similar mass-surveillance after opponents of this “dragnet law,” or Sleepwet, gained enough signatures to demand a public vote.

According to Dutch law the government must hold a non-binding referendum on any issue if the country’s voting commission receives 300,000 signatures in request of such a vote. The campaigners of Sleepwet got over 417,000 signatures of which, the commission said, 384,126 were valid.

The regulator recommended in October that the referendum should take place on March 21 in order to coincide with municipal elections.

In July of this year, the Dutch senate cleared the Intelligence and Security Agencies Act which is quite similar to the UK’s Investigatory Powers Act.

It expands the governments’ powers to monitor all the data which moves through the country’s internet infrastructure.

Like the IPA, this law would also grant the government broad device-hacking powers, which means, practically speaking, that the government would have the legal authority to hack an entire town if it so chooses.

The organisers of Sleepwet claim that they are not trying to abolish the law, but they insist that there needs to be a legal basis for any targeted surveillance and they worry about the infringement of the basic rights to privacy and security.

As in the UK, one of the major concerns is the “untargeted interception of cable traffic and automated analysis of that data, which is basically mass surveillance,” according to Nina Boelsums, one of the five university students who initiated the call for a referendum.

Boelsums also calls into the question the hacking of third parties which she calls “an incentive for the intelligence agencies to collect zero-day vulnerabilities,” adding, “security experts are worried that that will actually make us less secure.”

What this also means is that data from all personal social media accounts, banking details, online purchases, social media, and personal information (ie sexual preferences, where your children go to school, etc) will be accessible to the government.

Like Sleepwet in the Netherlands, Liberty in the United Kingdom received more than 200,000 signatures on a petition calling for the repeal of the IPA after it became law last year.

Liberty has launched a legal challenge against the British government and this summer received the go-ahead from the High Court to challenge part of the government’s extreme mass surveillance regime with a judicial review of the IPA.

While groups like Amnesty International have called for an end to such legislation in the UK, they have been equally active in the Netherlands where the referendum was welcomed as a victory, albeit temporary, over the mass surveillance of people who pose no threat to national security.

The outcomes of Liberty’s lawsuit in the UK and Sleepwet’s referendum in the Netherlands are yet to be seen. But it will take public advocacy and local activism if we are to protect the basic rights of privacy and freedom from surveillance.

Britain: Liberty battles to stop ‘illegal’ state snooping. Human Rights Group heads to High Court for landmark bid to halt ‘intrusive’ Investigatory Power Act: here.

Britain: The dangers of data collection. JULIAN VIGO assesses the importance of Liberty’s challenge to the government’s Investigatory Powers Act.

United States NSA-derived malware damaging Internet again


This video says about itself:

28 June 2017

The latest cyberattack has spread rapidly across the world, affecting banks, retailers and major energy firms. Experts say ransomware known as Petya appears to be behind the computer meltdown. And whistleblower Edward Snowden says the US government [the NSA] developed the sophisticated hacking tools that are being used in this attack. Sara Firth reports.

By Kevin Reed:

Petya ransomware attack shuts down computers in 65 countries

29 June 2017

In the second massive cyberattack in 44 days, both originating from malicious software developed by the US National Security Agency, personal computers in at least 65 countries were shut down Tuesday by an epidemic of ransomware known as Petya.

The attack had its greatest impact and first manifestation in Ukraine, where an estimated 12,500 computer systems were infected. Initial reports of the malware came when Ukrainian computer users attempted to update their copies of the tax and accounting software MeDoc. From there, the ransomware spread quickly all over the world, with major outages reported in Belgium, Brazil, Germany, Russia and the United States.

Among the corporations hit by the attack were the American pharmaceutical giant Merck, the British advertising agency WPP, the French multinational Saint-Gobain, the Russian steel and mining company Evraz and the Australian factory of the chocolate company Cadbury. In Ukraine, government ministries, ATMs and transit and airports systems were paralyzed and workers at the Chernobyl nuclear disaster site were forced to monitor radiation levels manually because their computers became inoperable.

In the US, Heritage Valley Health Systems, a Pennsylvania health care provider, was forced to cancel operations at its hospitals in Beaver and Sewickley due to the computer outage caused by Petya. According to some security experts, the latest ransomware attack represents a more sophisticated and lethal application of the malware than previously encountered.

The Petya ransomware causes computers to stop functioning and brings up a red screen with white letters that says the hard disks on the system have been encrypted with “military grade encryption.” The files on the system will be restored, the message explains, only in exchange for a payment of $300 in bitcoin electronic currency to a specified email address. It is not clear if making the ransom payment leads to the restoration of file access.

Once cybersecurity experts identified the email account, it was shut down.

The virus attacks Windows-based computers by taking advantage of the EternalBlue vulnerability. EternalBlue is known as an “exploit” or “bug” in the Windows operating system that can be used to cause unexpected behavior. Although Microsoft had released security updates to address the EternalBlue issue when they became aware of the problem last March, the latest attack is a “new variant” of Petya that can circumvent previous software patches.

Once a single system has been infected, the ransomware has the ability to move from computer to computer on a network without users doing anything. The Petya virus also has the ability to utilize unprotected machines to access networking features and infect machines that have been previously protected. Because of these innovations, some security experts are referring to the new ransomware as GoldenEye.

It is well known that the EternalBlue exploit was developed by the NSA as part of its arsenal of cyberwarfare weaponry for use against the rivals of US imperialism. Due to a combination of recklessness and stupidity, however, the NSA’s arsenal servers were hacked earlier this year and the tools were stolen by as-of-yet unidentified hackers.

In April, an Internet group known as Shadow Brokers published information about the NSA arsenal, including details about exploits that take advantage of vulnerabilities in enterprise firewalls, anti-virus products and Microsoft software.

The Petya attack comes less than two months after the outbreak in early May of the WannaCry ransomware, which spread around the world in a similar manner. In that instance, the malware shut down hundreds of thousands of computers in more than 150 countries.

So far, the NSA has not acknowledged any responsibility for the malware code that has now disrupted the economy in countless countries and endangered the lives of millions of people on two separate occasions. Computer security experts are coming forward in increasing numbers to demand that the NSA work with specialists to help defend computer systems from the destructive mayhem that the agency has unleashed upon society.

Mexican government uses malware to spy on journalists and political opponents: here.

WannaCry ransomware, ‘thank you’, NSA!


This 15 May 2017 video is about WannaCry ransomware and NSA whistleblower Edward Snowden.

By Andre Damon in the USA:

The global ransomware attack and the crimes of the US spy agencies

16 May 2017

Over the past four days, some 350,000 computers have been infected by the so-called “WannaCry” malware, including 70,000 devices such as MRI scanners, blood storage refrigerators and operating equipment used by Britain’s National Health Service. As a result of the attack, the NHS was forced to turn away emergency room patients and divert ambulances, potentially resulting in serious illnesses and even fatalities.

The worm is a piece of “ransomware” that encrypts users’ data until the creators receive a payment. It uses “exploits” developed by the US National Security Agency as just a small part of the NSA’s catalog of hacking tools.

When NSA researchers discovered the vulnerability in the Windows operating system targeted by “WannaCry,” they refused to inform Microsoft. The company found out about the existence of the vulnerability only shortly before the general public, when it was leaked by the Shadow Brokers hacker group on April 14 of this year.

On Saturday, Microsoft President Brad Smith, in a tersely worded blog post, faulted the NSA for failing to share its knowledge of the exploit. “This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem,” he wrote, adding that “this most recent attack represents a completely unintended but disconcerting link between the two most serious forms of cybersecurity threats in the world today—nation-state action and organized criminal action.”

He concluded, “We need governments to consider the damage to civilians that comes from hoarding these vulnerabilities and the use of these exploits.”

Microsoft is far from blameless when it comes to the NSA’s operations. It has established a standing practice of reporting bugs to the US government before they are repaired and publicly acknowledged, allowing the NSA to use these vulnerabilities to break into systems.

Regardless, Smith’s statement represents a stinging indictment of the operations of the US intelligence apparatus, implying that its actions are only once removed from those of criminals.

The hacking tools used in the “WannaCry” malware serve an even more malevolent purpose than any ransomware: illegal spying on the population of the whole world as part of a systematic practice of subversion and cyber aggression.

In May 2013, NSA contractor Edward Snowden revealed that the US intelligence apparatus collects, processes, reads and catalogs a vast quantity of private communications, both in the United States and internationally. Snowden explained that the stated aim of the NSA, the “signals intelligence” arm of the US intelligence apparatus, is unfettered access to all private information. Its mottos are, according to a leaked internal presentation, “Collect it All,” “Process it All,” “Exploit it All, “Sniff it All” and “Know it All.”

Illegal domestic surveillance operations authorized by the Bush administration after 9/11 resulted in the vastly expanded scale of government spying that was exposed by Snowden. With the collaboration, both voluntary and coerced, of the major telecommunications companies, the US government was able to vacuum up nearly all phone conversations, email and chat messages exchanged on digital devices.

In subsequent years, common communications platforms substantially improved their security capabilities, with nearly all Internet communication systems enabling encryption by default. These developments prompted US intelligence officials to complain of the Internet “going dark” to the NSA and CIA, prompting repeated calls by politicians, including Democratic presidential candidate Hillary Clinton, to criminalize the use of encryption.

The NSA responded by vastly expanding its use of “Tailored Access Operations,” the arm of the NSA devoted to “computer network exploitation,” commonly known as hacking. The agency adopted the slogan, “Your data is our data, your equipment is our equipment—anytime, any place.”

The NSA worked to build up a catalog of cyber weapons, known as “exploits,” which allow it to easily break into almost any Internet-connected device. One internal NSA document from 2012 claimed that the NSA worked with the largest telecommunications and technology companies in the world to “insert vulnerabilities into commercial encryption systems, IT systems, networks and endpoint communications devices used by targets.”

The NSA’s massive team of security researchers—the largest in the world—also worked to discover and exploit vulnerabilities within existing products, keeping these bugs a secret from manufacturers in order to allow the NSA to exploit them to gain access to computers, networks and Internet-connected devices before other researchers could discover them and recommend fixes to manufacturers.

In addition to using these tools to carry out mass surveillance, the NSA weaponized them in order to carry out cyberattacks against Washington’s geopolitical adversaries. The most notorious of these efforts was the release of the Stuxnet worm in 2010, which ruined some 1,000 Iranian nuclear centrifuges. The cyberattack was coordinated with a series of car bomb murders, attributed by the media to the US and Israel, which killed at least three Iranian nuclear physicists.

The fact that over 70 percent of the initially reported “WannaCry” infections took place in Russia raises the very real possibility that the current disaster is the result of a Stuxnet-like cyberattack by the United States. The other country disproportionately affected was China.

Speaking in Beijing on Monday, Russian President Vladimir Putin said, “As for the source of these threats, Microsoft’s leadership stated this directly. They said the source of the virus was the special services of the United States.”

White House Homeland Security adviser Tom Bossert declared that finding those responsible for cyberattacks is “something that sometimes eludes us. Attribution can be difficult here.”

Bossert’s statement contrasts sharply with the declaration by the director of national intelligence in October 2016 that the US spy agencies were “confident that the Russian Government directed… recent compromises” of emails related to the Clinton campaign.

That declaration was part of a vast campaign by the Democratic Party, the media and much of the political establishment aimed at demonizing Russia by claiming it had “hacked” the 2016 US elections. As part of that campaign, media outlets, led by the New York Times, sought to present Russia as a global hacking powerhouse, subverting the spotless US electoral system.

One can only imagine what would have happened if, instead of the current malware attack mainly affecting Russia and largely bypassing the US in its initial stages, the situation had been reversed. The media would be up in arms about Russian “hackers,” with demands that the Trump administration retaliate with sanctions, cyberattacks and more menacing military moves. The Democrats would be in the forefront of calls for new war-mongering resolutions in Congress.

An examination of the facts exposed by the “WannaCry” attack, however, show that the world’s biggest band of cyber criminals by far is headquartered in Washington, D.C.

The cyberattack that hit some 200,000 computers around the world last Friday, apparently using malicious software developed by the US National Security Agency, is only expected to escalate and spread with the start of the new workweek: here.

What accounts for the success of the WannaCrypt ransomware attack on Britain’s National Health Service? Here.