Tom Atlee: Nothing to Hide? NSA Can Still Strip Search You Electronically…

Cultural Intelligence
Tom Atlee
Tom Atlee

Navigating a Web where “nothing to hide” doesn’t help you or democracy be safe

Having nothing to hide is no guarantee of avoiding trouble due to NSA surveillance, which can create an environment of fear, a suppression of cultural creativity, and opportunities for politically targeted suppression, generally degrading democracy.  The erosion of privacy can be addressed in a number of ways, including turning the tables on power centers and changing our online behavior.  Enforcing openness in government and corporations and using search engines that are more immune to surveillance not only strengthen democracy but reduce social fragmentation.  Guidelines for online privacy and alternative search engines are included here.

======

A common response to complaints about the erosion of privacy – especially the NSA’s growing surveillance – is that people shouldn’t worry if they have nothing to hide. This might be more true if governments, corporations, and ordinary people always acted in the best interests of everyone else. But often they don’t – and they can cause real damage to innocent people, to whole communities, and even to the earth – like when governments and corporations claim activists who are trying to stop climate change are “terrorists”. Given the scope, complexity, and obscurity of the law, it can be used by unscrupulous people for surprise attacks that overwhelm individuals and silence societies, as delineated in this excellent WIRED article.

The rapid rise of technologies of communication, sharing, networking, and commerce has made privacy increasingly dubious. The increasing customization and convenience of those technologies has made them very seductive, speeding their adoption and their growing potential for abuse. More and more people are voluntarily submitting more and more personal information to hard drives in corporate enclaves and “the cloud”. It is almost like spending money using your credit card: It is much easier to do without thinking – and to spend too much – than when you pay with bills and coins. These are booby traps most people have stumbled into willingly – even eagerly – albeit obliviously.

Loss of privacy evolves from a minor risk and inconvenience into a legitimate public concern when power is involved – power that can wreck people’s lives, manipulate populations, suppress dissent, and control governments. Even when that capability is not being used – and we don’t yet know for sure how much it is being used – creating it leaves tremendous power in the hands of future abusers. History gives us abundant examples of collective insanity, corrupt power elites, shifting political winds, and other conditions that make abuse almost inevitable.

Continue reading “Tom Atlee: Nothing to Hide? NSA Can Still Strip Search You Electronically…”

David Swanson: US Government Abuse of “Orders of Protection” to Detain, Interrogate, and Disarm wihtout Due Process Any Peace Activists

Corruption, Government, Law Enforcement
David Swanson
David Swanson

Anti-Drone Activists Stopped at U.S. Canadian Border due to “Orders of Protection” given by court to Commander of Drone Base

By Charley Bowman

In mid-June, 2013, Western New York Peace Center board member Valerie Niederhoffer was stopped and interrogated for several hours at the U.S.-Canadian border when returning to the US from an afternoon doing Tai Chi in Canada with friendsi.

The U.S. immigration and customs officer entered Val's name into his computer system and discovered Val had an Order of Protection. He then asked her to pull over for an extended interview.

Orders of Protection (restraining orders) are generally given for spousal abuse, but this unique Order of Protection has been given to activists who have been arrested for challenging the U.S. assassin drone policies.

Continue reading “David Swanson: US Government Abuse of “Orders of Protection” to Detain, Interrogate, and Disarm wihtout Due Process Any Peace Activists”

NIGHTWATCH: China Manages North Korea

02 China, 08 Wild Cards, Ethics, Government, IO Deeds of Peace, Peace Intelligence
Click on Image to Enlarge
Click on Image to Enlarge

North Korea-China: Xinhua published remarks of Chinese State Councilor and former Foreign Minister Yang Jiechi and North Korean First Vice Foreign Minister Kim Kye Gwan, who held discussions today, 21 June.

Yang said: Positive results have been achieved in the strategic dialogue between foreign affairs departments of the two countries. China is willing to work with the Democratic People's Republic of Korea (DPRK) to promote the sound and stable development of relations between the two countries. China insists on actualizing non-nuclearization of the Korean Peninsula, insists on maintaining peace and stability on the peninsula, and insists on resolving issues through dialogue and consultation. Currently, an easing momentum has emerged in the situation on the peninsula, which is nevertheless still complex and sensitive. It is hoped that all parties will actively engage in dialogue and contact, push for the situation to continue to turn better, and seek an early resumption of the six-party talks.”

Kim said: Friendship between the DPRK and China has a long history. It is hoped that the two sides will inherit it and carry it forward. Non-nuclearization of the peninsula is the instruction left behind by President Kim Il-song and General Secretary Kim Chong-il. The DPRK hopes the situation on the peninsula will ease, insists on resolving issues through dialogue, and is willing to take part in various forms of dialogue including the six-party talks.”

Continue reading “NIGHTWATCH: China Manages North Korea”

Mini-Me: Cyber-Hacking a Car — Can Do Easy

07 Other Atrocities
Who?  Mini-Me?
Who? Mini-Me?

Huh?

Researchers Show How a Car’s Electronics Can Be Taken Over Remotely

With a modest amount of expertise, computer hackers could gain remote access to someone’s car — just as they do to people’s personal computers — and take over the vehicle’s basic functions, including control of its engine, according to a report by computer scientists from the University of California, San Diego and the University of Washington.

Hijack a Car?

Click on Image to Enlarge
Click on Image to Enlarge

Hijacking a car has been around forever, but with advanced technology your car is slightly safer or is it? Researchers at the University of California and Washington have been testing vehicles vulnerabilities to see just how safe a vehicles electronic controls really are. In one test they added some code to an MP3 and played it in the radio. When it was played the embedded code was capable of altering the vehicles firmware. This can give a hacker access to things such as: unlocking the doors, tracking your vehicles location, and they can even disable your breaks. Pretty crazy don't you think?

Car-hacking: Remote access and other security issues

Click on Image to Enlarge
Click on Image to Enlarge

It's not time for full-on panic, but researchers have already successfully applied brakes remotely, listened into conversations and more.

A 2011 report (PDF) by researchers at the University of California, San Diego and others site numerous “attack vectors,” including mechanics' tools, CD players, Bluetooth and cellular radio as among the potential problems in today's computerized cars.

Continue reading “Mini-Me: Cyber-Hacking a Car — Can Do Easy”

Berto Jongman: Who Murdered Michael Hastings? Why? How?

Corruption, Government
Berto Jongman
Berto Jongman

None of this can be validated.

Email Sent by Michael Hastings Hours Before His Death Mentions ‘Big Story’ and a Need to ‘Go Off the Radar’ (The Blaze)

Is Journalist Michael Hastings a Victim of Obama’s Assassination Policy? (InfoWars)

Michael Hastings researching Jill Kelley case before death (LA Times)

Michael Hastings, the FBI, and WikiLeaks: Death of Journalist Sparks Conspiracy Theories (New York Magazine)

Click on Image to Enlarge
Click on Image to Enlarge

Photos and video from the aftermath show extreme wreckage, and as of yesterday, the coroner had not officially identified the body because it was too badly burned.

But an automotive writer also fed the doubters:

I’m here to state that I’ve seen dozens of cars hit walls and stuff at high speeds and the number of them that I have observed to eject their powertrains and immediately catch massive fire is, um, ah, zero. Modern cars are very good at not catching fire in accidents. The Mercedes-Benz C-Class, which is an evolutionary design from a company known for sweating the safety details over and above the Euro NCAP requirements, should be leading the pack in the not-catching-on-fire category. Nor is the C-Class known for sudden veering out of control into trees and whatnot.

Questions surround death of journalist Michael Hastings (World Socialist Web Site)

Top US Journalist Attempting To Reach Israeli Consulate Assassinated (Sorhca Faal)

Continue reading “Berto Jongman: Who Murdered Michael Hastings? Why? How?”

Berto Jongman: US Security Clearance System — Wildly Dysfunctional

Government, Ineptitude
Berto Jongman
Berto Jongman

Here’s How Edward Snowden Got ‘Top Secret’ Clearance

June 21, 2013

A Senate Homeland Security Subcommittee met Thursday afternoon to examine the government’s process for granting security clearance.

The purpose of the meeting was to figure out how someone like Edward Snowden, the NSA leaker, could get access to some of the most secret information in the country.

The subcommittee failed in that regard: Merton Miller, associate director of investigations at the Office of Personnel, said he had no information on Snowden’s specific case. OPM Inspector General Patrick McFarland said he did have information on Snowden, but couldn’t reveal it to the committee just yet.

That’s not to say that the committee lacked revelation. Six witnesses and three lawmakers revealed a security clearance system so broken that it would be comical if a 29-year-old wasn’t hiding in Hong Kong and leaking American secrets to the press.

That’s not to say that the committee lacked revelation. Six witnesses and three lawmakers revealed a security clearance system so broken that it would be comical if a 29-year-old wasn’t hiding in Hong Kong and to the press.

They include:

Continue reading “Berto Jongman: US Security Clearance System — Wildly Dysfunctional”