TOKYO MASTER BANNER

MINISTRY OF TOKYO
US-ANGLO CAPITALISMEU-NATO IMPERIALISM
Illegitimate Transfer of Inalienable European Rights via Convention(s) & Supranational Bodies
Establishment of Sovereignty-Usurping Supranational Body Dictatorships
Enduring Program of DEMOGRAPHICS WAR on Europeans
Enduring Program of PSYCHOLOGICAL WAR on Europeans
Enduring Program of European Displacement, Dismemberment, Dispossession, & Dissolution
No wars or conditions abroad (& no domestic or global economic pretexts) justify government policy facilitating the invasion of ancestral European homelands, the rape of European women, the destruction of European societies, & the genocide of Europeans.
U.S. RULING OLIGARCHY WAGES HYBRID WAR TO SALVAGE HEGEMONY
[LINK | Article]

*U.S. OLIGARCHY WAGES HYBRID WAR* | U.S. Empire's Casino Unsustainable | Destabilised U.S. Monetary & Financial System | U.S. Defaults Twice A Year | Causes for Global Financial Crisis of 2008 Remain | Financial Pyramids Composed of Derivatives & National Debt Are Growing | *U.S. OLIGARCHY WAGES HYBRID WAR* | U.S. Empire's Casino Unsustainable | Destabilised U.S. Monetary & Financial System | U.S. Defaults Twice A Year | Causes for Global Financial Crisis of 2008 Remain | Financial Pyramids Composed of Derivatives & National Debt Are Growing | *U.S. OLIGARCHY WAGES HYBRID WAR*

Who's preaching world democracy, democracy, democracy? —Who wants to make free people free?
[info from Craig Murray video appearance, follows]  US-Anglo Alliance DELIBERATELY STOKING ANTI-RUSSIAN FEELING & RAMPING UP TENSION BETWEEN EASTERN EUROPE & RUSSIA.  British military/government feeding media PROPAGANDA.  Media choosing to PUBLISH government PROPAGANDA.  US naval aggression against Russia:  Baltic Sea — US naval aggression against China:  South China Sea.  Continued NATO pressure on Russia:  US missile systems moving into Eastern Europe.     [info from John Pilger interview follows]  War Hawk:  Hillary Clinton — embodiment of seamless aggressive American imperialist post-WWII system.  USA in frenzy of preparation for a conflict.  Greatest US-led build-up of forces since WWII gathered in Eastern Europe and in Baltic states.  US expansion & military preparation HAS NOT BEEN REPORTED IN THE WEST.  Since US paid for & controlled US coup, UKRAINE has become an American preserve and CIA Theme Park, on Russia's borderland, through which Germans invaded in the 1940s, costing 27 million Russian lives.  Imagine equivalent occurring on US borders in Canada or Mexico.  US military preparations against RUSSIA and against CHINA have NOT been reported by MEDIA.  US has sent guided missile ships to diputed zone in South China Sea.  DANGER OF US PRE-EMPTIVE NUCLEAR STRIKES.  China is on HIGH NUCLEAR ALERT.  US spy plane intercepted by Chinese fighter jets.  Public is primed to accept so-called 'aggressive' moves by China, when these are in fact defensive moves:  US 400 major bases encircling China; Okinawa has 32 American military installations; Japan has 130 American military bases in all.  WARNING PENTAGON MILITARY THINKING DOMINATES WASHINGTON. ⟴  
Showing posts with label Privacy. Show all posts
Showing posts with label Privacy. Show all posts

June 29, 2016

Freebie VPN



Freebie VPN
Internet Privacy
It looks beautiful in Japan
Mt Tsukuba
Tsukub Rinrin Road, (user-masao)


Bored.  Really tired, but bored.

Checking out VPN Gate.

VPN Gate is a University of Tsukuba, Japan, project involving public Virtual Private Network servers.

I'm not too clear on how any of this works and I really don't care.  

What interests me is the anonymity factor for 'everyday browsing' (ie where your ID's masked, even though you ultimately remain traceable).  I think.  I have no technical knowledge.  That's just my understanding.

Not sure if this is worth the bother.  Right now, I feel like I'm over information.  I think I'm over it.  Either that, or I'm just tired and depressed.

I've already hit a hurdle with the VPN Gate.  It doesn't look like Linux OS is supported.

Went to VPN Gate's forum.  Forum user has posted link to VPN services.  

The first service I looked at looks sh*t.   Paid service, I'd say, as it wants all your details.

NordVPN sounds better:
NordVPN is based in Panama, one of the small list of countries that has no data retention laws. This means the government cannot legally ask services on the Internet to hand over information on their users, allowing the VPN service to have a no-logging policy.
But it's a paid service and I think I let my bank account lapse a while back, so I think I'll keep looking.  

Malaysia is somewhere else where they don't have demands for VPN user data:

"... based in Malaysia, simply because the government does not have any laws that allow them to take information from VPN users." [source]
UK, US and Germany do not allow file sharing on P2P (peer to peer) servers ... whatever they are.  

P2P make a portion of PC resources available to others in peer-to-peer network of 'nodes', says Wikipedia.  Nodes are devices (PC or other) in a larger network of what looks like information hook-ups. 

It looks like you just use different servers to bypass the restrictions:

P2P/Torrent

P2P is available on most Hide.me servers, although the UK, Germany and US servers do not allow filesharing applications. Users will be able to move between servers to get onto P2P and there is servers in Canada for US users and plenty of servers in Europe, most of them offering P2P services. [source]

I really don't care about that, as I'm not planning on sharing anything. LOL ... I'm not good at sharing anything.

That's another paid service.

ibVPN offers 6 hour free sign-up.  I'm bored, but not that bored.

Windscribe have got a freebie service.  Wonder there's some catch like going through all the hassle of signing up, only to get hit with having to upgrade?


"... increased global surveillance of ordinary citizens makes it an indispensable product for today's Internet user"  [source]

They've got some scheme going, where you get paid in bitcoin if you get ppl to sign up.  I don't even have a bank account any longer, so I think I'd have a problem there.  LOL

There is a freebie component with a 10 gig limit, which would probably do me. 

Sounds OK so far:
"What are these tools?

There are 2 components: desktop VPN application, and browser extension. You can use them on their own, but for much greater protection, you should use both.

How much does Windscribe cost?

If you are a light user, you can use Windscribe for free. You get up to 10GB of data per month, and you can use all of the tools we offer.

What does the desktop application do?

The desktop application is a Virtual Private Network (VPN) client. It creates an encrypted tunnel from your computer to our servers, and all your activity is sent through the tunnel. This has 2 advantages:

1. Your Internet Service Provider (ISP) IP address is masked ...

2.  Your Internet Service Provider cannot see what you do online. This is much more important than you think.

browser extension provides a "Lite" VPN client, which does the same thing as the desktop one, but only in your browser. Any other applications you may be using on your computer will utilize your ISP provided IP address." [source]
They're making me nervous.  I don't like the sound of the 'much more important than you think' part.

It's a Canada-based company and you stand to gain 90% anonymity.  Which is better than none.  But Canada's just another Western totalitarian state.  Even so, it sounds good ... so far.

Other freebie VPN services are here.  I've not check them out.

Looking at real time Twitter feed, someone's asking for instructions on OpenVPN.  

OpenVPN is open source software:
"OpenVPN is available in repositories of most open source operating systems  .."
A bonus, as it should be more secure.  Not sure where this fits in.  

Algeria blocked social media on the 19th of June.

Reddit has VPN discussion topic.  LOL ... it looks like some VPNs might be run by the FBI.

Think I've had enough of this for now. 



This is lovely ....

January 12, 2016

SURVEILLANCE - Blackberry 9720 - Messages Decrypted by Netherlands Criminologists - Netherlands Forensic Institute (NFI) Technique (works on Smartphones & some PGP)

Article
SOURCE
(via VK)
https://xakep.ru/2016/01/12/cops-hjacked-pgp-blackberry/


SURVEILLANCE - Blackberry 9720 - Messages Decrypted by Netherlands Criminologists - Netherlands Forensic Institute (NFI) Technique (works on Smartphones & some PGP)

Google Translation
Russian to English

Dutch police said that cracked the encryption Blackberry

Maria Nefedova

https://xakep.ru/2016/01/12/cops-hjacked-pgp-blackberry/


In December 2015 the Dutch blog misdaadnieuws.com (Crime News) published in its pages the document, according to which law enforcement authorities of the Netherlands have found a way to recover deleted messages and read emails and encryption on devices BlackBerry.

Historically, the company BlackBerry stake on the security of their devices. Smartphones companies have traditionally come with a built-PGP-encrypted, which, in particular, used for e-mail client. Protecting BlackBerry devices considered to be very reliable, so misdaadnieuws.com published in the pages of the report of the Dutch Institute of Criminology (Netherlands Forensic Institute, NFI) has caused considerable surprise among experts and journalists.

Publication Vice Motherboard contacted representatives of NFI, to confirm or refute the information published in the blog. January 11, 2016 criminologists finally answered and said that they do often have to assist the police in the investigation of criminal offenses, but it needs to recover and extract data from a variety of devices. NFI staff confirmed that a private company using the software Cellebrite, they have found a way to recover deleted messages and read emails on smartphones BlackBerry, PGP-protected encryption.

According to a report published misdaadnieuws.com, when working with the BlackBerry 9720 criminologists were able to recover 325 encrypted messages, but were able to decipher only 279 of them.

Which techniques are used to circumvent the encryption criminologists tell refused. Probably, they were able to guess the password, based on memory dump, but for the application of this technique usually requires removal of the chip from the motherboard, which is unacceptable when dealing with evidence.

However, it is reported that the Dutch forensic technique it requires physical access to a device that can serve as some consolation for the owners of protected devices. In addition, NFI imperfect technique: it works not with all models of smartphones and implementations of PGP, for example, has no effect on GhostPGP.

 

Source | English Translation


---------------------- ꕤ ----------------------
COMMENT

Encryption sounds crap if it can readily be decrypted.

The 297 out of 325 encrypted messages broken success rate is massive.

Blackberry might need to work on their security?

It sounds like GhostPGP is the only way to go ... unless it's a double-cross.  lol

I don't have to worry about any of it, because I have no fancy devices.

The most excitement I get is the text reminder to recharge the old fashioned prepaid mobile.



January 09, 2016

TWITTER - C*CKSUCKERS!!!

TWITTER CENSORSHIP
BLOCKED

BY TWITTER TWATS

POLITICAL OPPRESSION

[CLICK image for enlargement / clarity]
[CLICK image for enlargement / clarity]

TWITTER TWATS

TWITTER ACCOUNT LOCKED mid posting these:
[CLICK image for enlargement / clarity]

---------------------- ꕤ ----------------------

TWITTER TWATS


Twitter C*cksuckers! have shut down my account because I'm POSTING messages on their effing service -- which is what it's for.  WTF?

C*cksuckers!

No idea whether I'll ever be able to access this account again without submitting to Twitter RAPE OF MY PRIVACY!


C*cksuckers!

---------------------- ꕤ ----------------------
C*cksuckers!
TWITTER STASI 'RULES'
'Automation rules and best practices'
LINK | here

None of that 'automated' Twitter bullsh*t is even applicable.

I'm not a program:
I'm a person exercising political expression.

DUMB Twitter programmers
couldn't even factor in a pop-up notice that forewarns Twitter customers that their account is about to be taken for an automated posting programmed spam-job, the STUPID F*CKING ASSH*LES.

DUMB Twitter programmers
couldn't (or wouldn't) even factor in an e-mail verification option for customers who opt to retain their privacy, by choosing NOT to register their f*cking telephone numbers with the
STUPID ASSH*LE TWITTER PLATFORM.

May the CyberCaliphate
have their day in cyberspace, ASSH*LES AT TWITTER. 

F*ck you, TWITTER !!!!

TWITTER TWATS
C*cksuckers!

---------------------- ꕤ ----------------------

I consider Twitter demands for telephone verification a form of 'ransomware' programming and PRIVACY RAPE.


Access to the account has not been restored by Twitter support, despite repeat messaging to Twitter, via their handle on the service.

[CLICK image for enlargement / clarity]
[CLICK image for enlargement / clarity]
ATTEMPT TO RESET PASSWORD, RETURNS E-MAIL RESPONSE DEMAND FOR PHONE NUMBER:
[CLICK image for enlargement / clarity]
[CLICK image for enlargement / clarity]

Temporary / Alternate Twitter Account
TWITTER TWATS
C*cksuckers!
BLOCKED BY TWITTER
LINK | here

[CLICK image for enlargement / clarity]
[CLICK image for enlargement / clarity]

C*cksuckers!

TWITTER has now blocked my alternate account as well, after being notified of the rape of my privacy by ransomware-programming & by ongoing demand for telephone particulars, following password resetting.

Also mentioned that their service sucks balls.

And it does, big time:  the c*cksucking Twitter Stasi have subsequently blocked my alternate account. 
TWITTER TWATS
C*cksuckers!
I am therefore vindicated
Twitter Stasi CENSOR and RAPE customers' privacy, & 'off' them if they complain.

[CLICK image for enlargement / clarity]
[CLICK image for enlargement / clarity]
NOTE:  'automated behaviour' TWITTER refers to did not EXIST -- as in, a series of like posts were NOT made on this alternate account. 
TWITTER are therefore dirty f*cking LIARS, as well as ball-sucking Stasi privacy-rapists & political oppressors of the PUBLIC VOICE.

I HAVE THEREFORE JUST BEEN RAPED BY TWITTER

This is TWITTER CENSORSHIP & POLITICAL OPPRESSION without a doubt.
TWITTER TWATS

[CLICK image for enlargement / clarity]
[CLICK image for enlargement / clarity]
C*cksuckers!

RELATED ARTICLES

TWITTER STASI - CENSORSHIP RAPE
'Twitter Unverifies Writer Amid Speech Wars' 
& CIA, TWITTER, BUZZFEED
WIDER WAR ON FREEDOM OF SPEECH
LINK | Post





December 18, 2015

Juniper Networks ScreenOS / Netscreen Firewalls - VPN Traffic Decryption - NSA Backdoor?

Article
SOURCE


Extracts Ars Technica
“Unauthorized code” in Juniper firewalls decrypts encrypted VPN traffic
Backdoor in NetScreen firewalls gives attackers admin access, VPN decrypt ability.

by Dan Goodin - Dec 18, 2015 10:50am AEDT

An operating system used to manage firewalls sold by Juniper Networks contains unauthorized code that surreptitiously decrypts traffic sent through virtual private networks, officials from the company warned Thursday.

...  Release notes published by Juniper suggest the earliest vulnerable versions date back to at least 2012 and possibly earlier. There's no evidence right now that the backdoor was put in other Juniper OSes or devices.

"... Juniper discovered unauthorized code in ScreenOS ... administrative access to NetScreen devices and to decrypt VPN connections," Juniper Chief Information officer Bob Worrall wrote.

A separate advisory from Juniper says there are two separate vulnerabilities, but stops short of describing either as "unauthorized code." The first flaw allows unauthorized remote administrative access to an affected device over SSH or telnet. Exploits can lead to complete compromise. "The second issue may allow a knowledgeable attacker who can monitor VPN traffic to decrypt that traffic," the advisory said.

Whodunit?

Word that the VPN-breaking code was the result of unauthorized code, as opposed to an inadvertent programming flaw, touched off immediate concern that ScreenOS had been deliberately tampered with. The most likely culprit for such tampering would be the NSA or one of its many counterparts around the world. Classified documents leaked by former NSA subcontractor Edward Snowden showed NSA agents intercepting network gear from Cisco Systems as it was being shipped to a customer. They installed covert implant firmware onto the device before sending it to its final destination.

As involved as that process was, getting unauthorized code covertly installed into an official operating system and keeping it there for years would appear to be an even more complicated—and brazen—undertaking. This 2013 article published by Der Spiegel reported that an NSA operation known as FEEDTHROUGH
worked against Juniper firewalls and gave the agency persistent backdoor access.

"This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers," the article reported. "Thanks to FEEDTROUGH, these implants can, by design, even survive 'across reboots and software upgrades.' In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH 'has been deployed on many target platforms.'"

Of course, it's also possible the backdoor was installed some other way. Juniper's advisory makes no mention who it suspects is behind the move or what steps it's taking to find out. Ars has asked Juniper for more details and will update this post as warranted.
ScreenOS
-- operating system for NetScreen firewalls




Juniper Networks
Juniper Networks
multinational corporation
HQ, Sunnyvale, California

develops and markets networking products

  • routers
  • switches
  • network management software
  • network security products
  • software-defined networking tech
-- efforts to establish an ecosystem of technologies, software & applications
Juniper Networks - Market Share
-- 2001 - 37% share of core routers market
-- challenging Cisco, who previously dominated market
-- 2014 - USD$419.7 BILLION revenue
Pradeep Sindhu
Indian-American entrepreneur
VP, Board Directors
co-founded Juniper in 1996
B.Tech. in Electrical Engineering (1974)
Indian Institute of Technology, Kanpur
M.S. in Electrical Engineering (1976)
University of Hawaii
Ph.D (1982) in Computer Science
Carnegie Mellon University
Studied under Bob Sproull
Sproull
Oracle Corp
was Associate Prof of Computer Science
Carnegie Mellon
est. consulting firm
consulting firm bought by
Sun Microsystems 1990
--> creation Sun Microsystems labs
Sproull worked on design & director
2010 Sun bought by Oracle
--> bcm Oracle Labs
Pradeep Sindhu
-- scientist with Xerox Paolo Alto Research Centre
-- f. Juniper Networks 1996
Routers
-- early routers for internet traffic
-- intended for phone calls
-- dedicated circuits for each caller
-- Sindhu envisaged packet-based routers
-- optimised for internet traffic
-- joined by Sun Microsystems & MCI Communications engineers
-- $2-million SEED FUNDING
-- $12-million FUNDING in first year of ops
Funding - $40-Million (1997)
-- from a group of OEMs and service providers
-- OEMs - 'original equipment manufacturers' -- are in fact re-sellers of another company's product under own name

Contributors to 1997 funding:

  • Northern Telecom
  • 3Com
  • Ericsson's Infocom Systems group
  • Siemens/Newbridge Networks alliance
  • WorldCom's UUNet Technologies subsidiary
https://business.highbeam.com/3094/article-1G1-19746999/startup-snags-40m-bid-redefine-routers

Spreading Control / Influence

2010 - Junos Innovation Fund
Juniper Networks Establishes $50 Million Venture Fund
will invest in companies 2010 - 2012
focusing on:

  • networking tech
  • applications
  • security infrastructure services
  • mobility services
  • video solutions
  • virtualisation
  • network automation
  • optical tech
  • green networking
investment as at 2010 article, in x11 companies - incl:
  • Ankeena Networks
  • Blade Network Technologies
  • Cyan Optics
  • FireEye
  • Packet Design
Vulture Fund - 'Activist Investor'
Elliot Management Corporation hedge fund
{billionaire Paul E. Singer}
Dec. 2014 - Elliot owns 10% stake Juniper Networks
x2 hedge fund directors appointed to Juniper board
hedge fund guru Singer
wants to cut this and that & increase share price
-- eg operating costs & potential stock buy-backs in the billion
--> basically wants to tell a successful, enormous tech company how to operate
* I think the hedge fund may operate as a take-over merchant

ACTIVIST INVESTORS
-- include:
    -- hedge funds
    -- private equity firms
    -- wealthy individuals

well-known activist investors:

Carl Icahn

-- targets:  Yahoo, Blockbuster, Time Warner, RJR Nabisco & other

NOTE
  Company filing of SEC Form 13D
-- investor purchases 5% or more shares notification
-- indicative of possible 'activist investor' target


'activist hedge funds'
-- term to describe hedge funds that:

-- buy large public company shares
-- seek to obtain seats on company's board
-- aim to effect major changes in company
-- attracted to companies that are:
-- mismanaged
-- have excessive costs
-- could be run ore profitably as private company
-- or other problem seen as fixable, to add value
 

'ACTIVIST INVESTORS' 
TAKE-OVER MERCHANTS
  • Paul Singer
  • Carl Icahn
  • Kirk Kerkorian
  • Bill Ackman
  • Eddie Lampert
  • Nelson Peltz
============
1 -- https://en.wikipedia.org/wiki/Juniper_Networks
2 -- http://techcrunch.com/2010/02/23/juniper-networks-fund/

3 -- http://www.investopedia.com/terms/a/activist-investor.asp
5 --  Juniper Networks Reaches Pact With 'Activist' Hedge Fund
http://www.nytimes.com/2015/02/25/business/dealbook/juniper-networks-reaches-pact-with-activist-hedge-fund.html?_r=0



Mainframe
aka  'big iron'
-- high-performance computer
-- large-scale computing
-- large orgs for critical apps
-- bulk data processing
-- defined by high availability
-- (ie higher than norm performance for higher than normal period)
-- typically used in apps where downtime costly or catastrophic
-- RAS (reliability, availability & serviceability) characteristic
-- can run multiple operating systems
-- pioneered virtualisation
-- virtual machine mode (OS's running as if distinct computers)
-- single mainframe eliminates conventional servers {I think}
-- designed to handle very high volume input / output (I/O)
-- emphasis on:  throughput computing
-- subsidiary hardware (channels, periphery processors) - manage I/O devices
-- CPU freed for high-speed memory

MARKET SHARE - MAINFRAMES
-- IBM mainframes:  90% market share
-- software apps to manage performance
-- 2010:  mainframe technology = less than 3% of IBM's revenues

MARKET SHARE - MAINFRAMES SOFTWARE
-- IBM - USA multinational, Revenue:  US$92.793 billion (2014)
-- BMC - USA, Revenue:  US$2.172 billion (FY 2012)
-- Computware  - USA, Revenue: private company
-- CA Technologies - USA, multinational, Revenue: US$4.515 billion (2014)
-- early models:
-- punched cards, tape, magnetic tape
-- batch mode operations (eg billing)
-- 1970s  acquired interactive user interfaces
-- operated as time-sharing computers
-- able to then run batch processing + support of users
-- early user access by special terminals
-- later, from personal computers

FURTHER HISTORY

-- early manufacturers - IBM & the Seven Dwarfs

  •     Burroughs
  •     UNIVAC
  •     NCR
  •     Conctrol Data
  •     Honeywell
  •     General Electric
  •     RCA
-- Notable non-USA manufacturers
Germany:
  • Siemens
  • Telefunken
Britain:
  • ICL
Italy:
  • Olivetti
Japan:
  • Fujitsu
  • Hitachi
  • Oki
  • NEC
Soviet Union
-- close copies of IBM mainframes

-- examples:
    • BESM series
      • Strela (ie 'arrow')
        1980s, minicomputer-based systems
        -- more sophisticated
        -- displaced lower-end mainframes
        -- lower ends (aka 'departmental computers') - eg DEC VAX
        1990s, servers based on microcomputer designs
        -- cheaper
        -- greater control
        -- interface terminals re mainframes eventually replaced by PCs

        Emerging Markets
        -- esp. People's Republic of China
        -- spurring innovation
        -- eg unified high volume transaction processing database / multiple industry access
        -- (eg banking, insurance, credit reporting, govt)

        2012, NASA (space) powered down its last mainframe (IBM System z9)

        Supercomputers
        -- measured in - floating point operations per second (FLOPS)
        -- measured in (more recently) - traversed edges per second or TEPS
        -- frontline of current processing capacity
        -- esp. speed of calculation
        -- scientific & engineering probs (high-performance computing)
        versus
        Mainframes
        -- measured in millions of instructions per second (MIPS)
        -- data crunching & number crunching
        -- transaction processing
        -- {microprocessor-based servers & online networks also transaction process}

        HYBRID 
        Gameframe - 2007
        -- hybrid computer system
        -- first used online video games industry
        -- blend of technologies & architectures for supercomputers & mainframes
        -- high computing power & high throughput
        -- Hoplon (Brazilian, multiplayer online games) & IBM joint project 2007
        -- game server system
        -- offload of computation-intensive tasks from expensive CPU cycles of System z
        -- to economical 'Cell blades' (PowerXCell multicore processors)
        -- https://en.wikipedia.org/wiki/Gameframe
        Mainframe info source
        https://en.wikipedia.org/wiki/Mainframe_computer
        System z
        --  ie - IBM z Systems
        -- family name used by IBM for all of its mainframe computers
        throughput
        -- rate of production of processing
        https://en.wikipedia.org/wiki/Throughput

         {I'm stopping here, or the look-ups could go on forever ... lol}






        ---------------------- ꕤ ----------------------

        COMMENT

        Wow, who's responsible?
        I'm going with NSA, even though I don't know what I'm talking about.  lol
        But if past history is anything to go by, it's likely an NSA infiltration, I think.





        December 16, 2015

        Video - Julian Assange - 'The End of Democracy' - Angela Richter & Srećko Horvat


        ASSANGE
        VIDEO

        The End of Democracy
        Julian Assange (via video)
        in conversation with Angela Richter & Srećko Horvat







        Das Ende der Demokratie
        Julian Assange (per Video)
        im Gespräch mit Angela Richter und Srećko Horvat
        from Volksbühne Berlin

        The end of democracy
        Julian Assange (via video)
        in conversation with
        Angela Richter & Srećko Horvat
        from Volksbühne Berlin




        Introduction
        Sebastian Kaiser
        Volksbühne at the Rosa-Luxemburg-Platz

        Written intro along the lines that:
        the ideal of 'democracy' has figured prominently in the post WWII West.

        However, the reality is that "powerful corporations act like states" and wars are waged in the name of freedom, while "our digital activities are tapped and recorded almost entirely".

        WikiLeaks

        "taking the promise of democracy seriously under advanced technological conditions"
        -- transparency
        -- exposure of secret data flows
        -- platform for whistleblower information
        -- redeeming internet freedom
        -- online and active
        Assange
        -- hailed as a hero and cypherpunk genius by many
        -- denounced as high-tech terrorist
        -- exposed to public death threats
        -- persecuted by governments and intelligence services
        -- for 'damages' allegedly suffered
        ---------------------- ꕤ ----------------------

        Assange

        9 December 2015 discussion

        -- Volksbühne via live stream from Ecuador embassy
        -- theatre director Angela Richter
        -- Croatian philosopher Srećko Horvat

        Discussion
        -- Transatlantic Trade & Investment Partnership (TTIP)
        -- geopolitical implications
        -- of  huge influx of refugees into Europe
        -- reflecting on democracy’s criminal history
        -- potentially opening an alternative view on Europe

        --------------------- ꕤ ----------------------




        COMMENT

        About to watch/listen to this latest video (link at top page). 

        Sounds an interesting talk.

        ---------------------- ꕤ ----------------------



        Julian Assange 



        WikiLeaks Website
        https://wikileaks.org/index.en.html 

        Latest Book
        'The WikiLeaks Files'
        http://www.versobooks.com/books/1931-the-wikileaks-files




        December 11, 2015

        Video - Assange - Security or Surveillance: Privacy vs Anti-Terror Security in Digital Age - RT10


        Security or Surveillance: Privacy vs anti-terror security in digital age (#RT10 Panel Discussion)




        Published 10 Dec 2015
        RT News
        https://www.youtube.com/watch?v=k3rFNQ8ytnE&feature=youtu.be

        ---------------------- ꕤ ----------------------
        Security or Surveillance:
        Privacy vs anti-terror security in digital age
        (#RT10 Panel Discussion  /  Celebrating RT's 10-Year Anniversary)

        Moderator, Raymond Snoddy introduces:

        Philip Giraldi
        -- former CIA counter-terrorism specialist
        -- former military intelligence officer
        -- served 19 years abroad:  Turkey, Italy, Germany, Spain
        -- CIA chief of base, Barcelona Olympics, 1992
        -- one of first Americans to enter Afghanistan, 2001
        -- Exec. Dir. Council for National Interests (CNI)
        -- CNI - WA-based - to promote US foreign policy in Middle East
        -- based on 'American values & interests'

        Ray McGovern
        -- former US army intelligence officer
        -- joined Analysis Division of CIA & served
        -- from Kennedy Admin to G.W. Bush Admin.
        -- chief of CIA's Soviet foreign policy branch, 1970s
        -- chaired national intelligence estimates
        -- prepared Presidential daily briefing
        -- for Reagan senior national security advisers
        -- 2003 - co-est. Veteran Intelligence Professionals for Sanity (VIPS)
        -- to expose: intelligence fraud to justify 2003 US invasion of Iraq
        -- protested CIA involvement in torture activities
        -- publicly questioned Defence Secretary Donald Rumsfeld
        -- re misleading American public in run-up to war (Invasion of Iraq, 2003)

        Gregory R. Copley
        -- Australian-born
        -- President of Strategic International Studies Association, WA-DC
        -- serves as adviser on strategic studies to a number of govts & leaders [40 years]
        -- authored / co-authored 32 books on strategic & geopolitical issues,
        -- history, energy, aviation & defence, incl:
            -- 'Un-Civilization: Urban Geopolitics in a Time of Chaos (2013)'
            -- 'The Art of Victory (2006)'

            [ Yikes!  see:   http://www.brusselsjournal.com/node/5132  ]

        ---------------------- ꕤ ----------------------

        Issue:
        Security or Surveillance
        Can right to privacy & effective anti-terror security co-exist in the digital age?
        ---------------------- ꕤ ----------------------

        Julian Assange
        -- arguably one of the most influential people in world
        -- on bringing forward these specific issues

        Moderator
        -- seeks Assange thoughts on right of privacy
        -- how that is defined around world
        -- anti-terror security definition
        -- what the relationship of these two factors are to each other
        -- and the relationship to this new digital world in which we live

        Assange:  mass-surveillance is here to stay
        & privacy is gone for normal population
        (not for experts, incl. terrorists (who are experts))
         underlying costs of surveillance - rapidly decreasing

        Five-Eyes (FVEY) - surveillance pervasive

        ---------------------- ꕤ ----------------------


        COMMENT

        About to watch --  or listen to -- this ...
        (depending on whether I also plan to get around to doing anything practical as I listen ... like maybe the dishes or some grooming or something practical (for a change) ... lol)