Josh Kilbourn: VIDEO from Hong Kong — Edward Snowden: the whistleblower behind revelations of NSA surveillance — REACTIONS + New Details

Civil Society, Ethics
Josh Kilbourn
Josh Kilbourn

Edward Snowden: the whistleblower behind the NSA surveillance revelations

The 29-year-old source behind the biggest intelligence leak in the NSA's history explains his motives, his uncertain future and why he never intended on hiding in the shadows

Q&A with NSA whistleblower Edward Snowden: ‘I do not expect to see home again'

VIDEO 12:36

Edward Snowden
Edward Snowden

The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. Snowden has been working at the National Security Agency for the last four years as an employee of various outside contractors, including Booz Allen and Dell.

The Guardian, after several days of interviews, is revealing his identity at his request. From the moment he decided to disclose numerous top-secret documents to the public, he was determined not to opt for the protection of anonymity. “I have no intention of hiding who I am because I know I have done nothing wrong,” he said.

Snowden will go down in history as one of America's most consequential whistleblowers, alongside Daniel Ellsberg and Bradley Manning. He is responsible for handing over material from one of the world's most secretive organisations – the NSA.

In a note accompanying the first set of documents he provided, he wrote: “I understand that I will be made to suffer for my actions,” but “I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant.”

Continue reading “Josh Kilbourn: VIDEO from Hong Kong — Edward Snowden: the whistleblower behind revelations of NSA surveillance — REACTIONS + New Details”

Graphic: The Smart Grid — Is This Also the New Spy Grid?

IO Impotency
Click on Image to Enlarge
Click on Image to Enlarge

Source

Phi Beta Iota:  All of this stuff can be hacked.  Until the governments of the world get honest and real about code-level open source security, every single one of these is — to honor Ralph Nader's earlier dictum, “unsafe at any speed.”  Nader's fight was not about automobile safety, it was about corporate accountability and responsibility.  What is being done today in the cyber world is largely well-intentioned — and alse generally irresponsible.

See Also:

2010: OPINION–America’s Cyber Scam

Owl: Is DHS Using NSA to Create a Domestic “Red List”? + DHS RECAP

Ethics, Government, Law Enforcement, Military

Who?  Who?
Who? Who?

This writer claims a “threat matrix” has been secretly developed in anticipation of a martial law declaration in the possibly near future. It will be for readers here to decide whether this is plausible or not, but it offers some interesting details on how the “threat score” will work that gives it some air of plausibility:

If you are in the alternative media, you are at the top of the list. When the DHS goon squads arrive at our homes at 3AM, we in the alternative media will not be going to a FEMA Camp. We are on the “red list” and will be summarily executed along with our families.  In order to get the goon squads to go along with this holocaust, all law enforcement and military will be required to send their families “for protection” to a centralized area. In actuality, if these “safe areas” are hostage centers to enforce compliance on all law enforcements. Sorry, no Oathkeepers allowed.

Continue reading “Owl: Is DHS Using NSA to Create a Domestic “Red List”? + DHS RECAP”

Jon Rappoport: NSA as Front for Two Israeli Companies, Narus and Verint, Specializing in Mass Surveillance & Getting Zionist Copy of Everything

08 Wild Cards, Corruption, Government, Idiocy, Ineptitude, IO Deeds of War, IO Impotency, Military
Jon Rappoport
Jon Rappoport

NSA, the secret AT&T spy room, and 2 Israeli companies

Boom. Explosive revelations. The NSA is using telecom giants to spy on anybody and everybody, in a program called PRISM.

But the information is not new.

Three books have been written about the super-secret NSA, and James Bamford has written them all .

In 2008, Amy Goodman of Democracy Now interviewed Bamford as his latest book, The Shadow Factory: The NSA from 9/11 to the Eavesdropping on America, was being released.

Bamford explained that, in the 1990s, everything changed for NSA. Previously, they'd been able to intercept electronic communications by using big dishes to capture what was coming down to Earth from telecom satellites.

But with the shift to fiber-optic cables, NSA was shut out. So they devised new methods.

For example, they set up a secret spy room at an AT&T office in San Francisco. NSA installed new equipment that enabled them to tap into the fiber-optic cables and suck up all traffic.

How Bamford describes this, in 2008, tells you exactly where the PRISM program came from:

Continue reading “Jon Rappoport: NSA as Front for Two Israeli Companies, Narus and Verint, Specializing in Mass Surveillance & Getting Zionist Copy of Everything”

Rickard Falkvinge: Further Analysis of NSA PRISM, Limited Liability of Service Providers

Commerce, Corruption, Government, Ineptitude, Law Enforcement, Military
Rickard Falkvinge
Rickard Falkvinge

So Just Exactly What Is NSA’s Prism, More Than Reprehensibly Evil?

Privacy: The US NSA’s PRISM program appears to be a set of specialized deep-packet inspection filters combined with pre-existing wiretapping points at high-level Internet carriers in the United States. Since the program’s revelation the day before yesterday, speculations have ranged far and wide about who does what to make this surveillance state nightmare possible. Adding it all together, it would appear that the social tech companies did not, repeat not, supply bulk data about their users at the US Government’s will – but that the situation for you as an end user remains just as if they had.

The day before yesterday, news broke – no, detonated – that the NSA named nine social communications companies as “providers” for spy data. Among them were Microsoft, Hotmail, Skype, Apple, and Facebook – no surprises there, activists in repressive countries say “Use once, die once” about Skype – but also companies like Google and Gmail. This raised a lot of eyebrows, not to say fury.

The idea that the companies you trust with your most private data were handing that data wholesale to today’s Stasi equivalents was mind-bogglingly evil and cynical. As the news of this broke, the companies would have been a lot better off if they had just been found out doing something like eating live children.

The impression that companies were playing an active part in providing private data to the NSA was strengthened by the precision of the presentation – that there were dates when each company had, as it seemed, voluntarily joined the surveillance program.

Seeing the companies in question scramble to deny the allegations of the NSA deck – first from on-duty spokespeople with their polished façade, then from CEOs – was the inevitable next step. But this is where things became interesting. While the initial polished façade was barely credible, the response from the CEOs came across as surprised, open, and candid.

So far, there are three parties to this story: the NSA with its leaked slide deck naming the nine companies as data providers, the media who reported on it, and the companies denying any active part in NSA spy activities. The first reaction is that at least one of them must be lying. But I don’t think any of them are. I think the leaked deck from the NSA is genuine, I think the Washington Post and Guardian didn’t conspire to make shit like this up, and I have come to believe the response from the companies. How could this be possible?

At this point, there are three possibilities of what PRISM is:

Read full story and see specific PRISM slide showing traffic flow.

Continue reading “Rickard Falkvinge: Further Analysis of NSA PRISM, Limited Liability of Service Providers”

noble gold