Rickard Falkvinge: NSA Asked GNU/Linux Founder to Subvert His Network with Covert Backdoors

NSA Asked Linus Torvalds To Install Backdoors Into GNU/Linux Posted: 17 Nov 2013 04:59 AM PST Infopolicy – Christian Engström:  The NSA has asked Linus Torvalds to inject covert backdoors into the free and open operating system GNU/Linux. This was revealed in this week’s hearing on mass surveillance in the European Parliament. Chalk another one …

Pedophilia & Empire: Satan, Sodomy, and the Deep State: Chapter 30 North Wales Masonic Sex Abuse Epidemic: Elite Pushback – Lies of Denial and Murder

Pedophilia & Empire: Satan, Sodomy, & The Deep State [Click to Return to TOC] Chapter 30: North Wales Masonic Sex Abuse Epidemic: Elite Pushback – Lies of Denial and Murder Joachim Hagopian Cover Credit: Nora Maccoby with permission http://www.noramaccoby.com/ DOC (71 Pages): Chapter 30 Masonic North Wales Child Sex Abuse Epidemic Full text free online …

Berto Jongman: Allies Don’t Trust NSA, Force Backdown on Encryption Standards

Distrustful U.S. allies force spy agency to back down in encryption fight In interviews and emails seen by Reuters, academic and industry experts from countries including Germany, Japan and Israel worried that the U.S. electronic spy agency was pushing the new techniques not because they were good encryption tools, but because it knew how to …

Mini-Me: NSA Gutting of US Communications and Computing Likely to Cost US Tech Companies Way More Than $35 Billion

NSA Surveillance May Cost U.S. Tech Companies More than $35 Billion Two years ago, when Edward Snowden exposed the NSA’s massive surveillance machine it didn’t just make Americans distrust the U.S. government—it also impelled foreigners to shy away from U.S.-made technologies. The result appears to be costly. In fact, a new report from the Information …

Berto Jongman: Catalog of Snowden Revelations About NSA (Brookings)

Catalog of the Snowden Revelations About NSA This page catalogs various revelations by Edward Snowden, regarding the United States’ surveillance activities. Each disclosure is assigned to one of the following categories: tools and methods, overseas USG locations from which operations are undertaken, foreign officials and systems that NSA has targeted, encryption that NSA has broken, ISPs or platforms that NSA …

Reflections on Specific Intelligence Reforms (Including Alarm on NSA from 1994 Onwards)

The US IC has spent 1.2 trillion dollars since 1992 — and failed to provide ethical evidence-based decision-support capable of influencing tens of trillions more. This waste has to be understood in the context of a leadership (both intelligence and political)  focused moving money, not actually in the business of producing decision-support or making decisions …

SchwartzReport: NSA Is Making Us All Less Safe

People who are truly knowledgeable about IT are appalled about what the NSA is doing and, as this report shows, they are speaking out. Open Letter From Top U.S. Computer Security Experts Slams NSA Spying As Destroying Security WashingtonsBlog The NSA Is Making Us All Less Safe An open letter today from a large group …

Berto Jongman: West Point Software for Mapping Organized (Street) Crime — Made in Israel, Another Back Door to US Data?

Unmasking organised crime networks with data Military software engineers have developed a program that can predict the social structures of street gangs. Philip Ball explains how it could help fight crime. One of the big challenges in fighting organised crime is precisely that it is organised. It is run a bit like a business, with …

Eagle: Jon Rappoport: Congress, Not Monsanto, Is Our Center of Gravity

Monsanto proves that corporations don’t run the government by Jon Rappoport March 27, 2013 Collectivists have a favorite target. Big bad corporations. This is a complete scam. Why did Goldman Sachs turn out to be the biggest funder of Obama’s 2008 election bid? Why weren’t the corporate banksters who demanded and received those enormous bailouts, …

Owl: China Swamps US Across the Board – Made in China Computer Chips Have Back Doors, 45 Other “Ways & Means” Sucking Blood from US

Two Ways the Chinese May Take Over the World and the US: 1) Chinese Stuxnet for the Rest of the World If what this analyst says is true, it paints a truly astonishing in implication and very, very ugly picture of the national security situation in store for most governments – especially in the US: …