TOKYO MASTER BANNER

MINISTRY OF TOKYO
US-ANGLO CAPITALISMEU-NATO IMPERIALISM
Illegitimate Transfer of Inalienable European Rights via Convention(s) & Supranational Bodies
Establishment of Sovereignty-Usurping Supranational Body Dictatorships
Enduring Program of DEMOGRAPHICS WAR on Europeans
Enduring Program of PSYCHOLOGICAL WAR on Europeans
Enduring Program of European Displacement, Dismemberment, Dispossession, & Dissolution
No wars or conditions abroad (& no domestic or global economic pretexts) justify government policy facilitating the invasion of ancestral European homelands, the rape of European women, the destruction of European societies, & the genocide of Europeans.
U.S. RULING OLIGARCHY WAGES HYBRID WAR TO SALVAGE HEGEMONY
[LINK | Article]

*U.S. OLIGARCHY WAGES HYBRID WAR* | U.S. Empire's Casino Unsustainable | Destabilised U.S. Monetary & Financial System | U.S. Defaults Twice A Year | Causes for Global Financial Crisis of 2008 Remain | Financial Pyramids Composed of Derivatives & National Debt Are Growing | *U.S. OLIGARCHY WAGES HYBRID WAR* | U.S. Empire's Casino Unsustainable | Destabilised U.S. Monetary & Financial System | U.S. Defaults Twice A Year | Causes for Global Financial Crisis of 2008 Remain | Financial Pyramids Composed of Derivatives & National Debt Are Growing | *U.S. OLIGARCHY WAGES HYBRID WAR*

Who's preaching world democracy, democracy, democracy? —Who wants to make free people free?
[info from Craig Murray video appearance, follows]  US-Anglo Alliance DELIBERATELY STOKING ANTI-RUSSIAN FEELING & RAMPING UP TENSION BETWEEN EASTERN EUROPE & RUSSIA.  British military/government feeding media PROPAGANDA.  Media choosing to PUBLISH government PROPAGANDA.  US naval aggression against Russia:  Baltic Sea — US naval aggression against China:  South China Sea.  Continued NATO pressure on Russia:  US missile systems moving into Eastern Europe.     [info from John Pilger interview follows]  War Hawk:  Hillary Clinton — embodiment of seamless aggressive American imperialist post-WWII system.  USA in frenzy of preparation for a conflict.  Greatest US-led build-up of forces since WWII gathered in Eastern Europe and in Baltic states.  US expansion & military preparation HAS NOT BEEN REPORTED IN THE WEST.  Since US paid for & controlled US coup, UKRAINE has become an American preserve and CIA Theme Park, on Russia's borderland, through which Germans invaded in the 1940s, costing 27 million Russian lives.  Imagine equivalent occurring on US borders in Canada or Mexico.  US military preparations against RUSSIA and against CHINA have NOT been reported by MEDIA.  US has sent guided missile ships to diputed zone in South China Sea.  DANGER OF US PRE-EMPTIVE NUCLEAR STRIKES.  China is on HIGH NUCLEAR ALERT.  US spy plane intercepted by Chinese fighter jets.  Public is primed to accept so-called 'aggressive' moves by China, when these are in fact defensive moves:  US 400 major bases encircling China; Okinawa has 32 American military installations; Japan has 130 American military bases in all.  WARNING PENTAGON MILITARY THINKING DOMINATES WASHINGTON. ⟴  
Showing posts with label Anonymous. Show all posts
Showing posts with label Anonymous. Show all posts

March 24, 2016

Anonymous v. Islamic Cyber Army


Article
SOURCE




Anonymous v. Islamic Cyber Army



Daily Mail - Extract(s)

Anonymous v. Islamic Cyber Army


http://www.dailymail.co.uk/news/article-3506345/Anonymous-issues-threat-ISIS-Belgium-terror-attacks.html#comments

...  ISIS's online unit, the Islamic Cyber Army, hit back, branding the group 'idiots' and declaring: 'What they gonna hack…all they can do is hacking twitter accounts, emails, etc.'

ISIS militants use a number of encrypted messaging services, email providers, and GPS blockers to communicate under the radar.

The list of apps used by the jihadists was revealed last year after a 34-page ISIS fighter handbook was obtained by independent military research group Combating Terrorism Center (CTC), and published on Scribd by Yahoo.





Combating Terrorism Centre
academic institution
at:  US Military Academy (USMA) West Point, New York
speciality:  counter-terrorism, domestic security etc
est. 2003  - subordinate to:  Dept. of Social Sciences

https://en.wikipedia.org/wiki/Combating_Terrorism_Center


United States Military Academy at West Point (USMA)
aka
West Point
Army
The Academy
The Point
4-year co-educational federal military service academy
-- campus a NATIONAL LANDMARK
-- Norman style buildings, grey & black granite
-- tourist destination

-- 1778 - West Point, NY - first occupied by:   Continental Army
-- Polish engineer / military figure constructs garrison defences 1778-1780
-- Continental Army  created by Second Continental Congress
-- on outbreak of 'American Revolutionary War'
-- est. by x13 colonies -- later, USA
-- resolution passed to coordinate military of 13 colonies
-- versus rule of Great Britain
-- Continental Army backed up by local militias
-- under control of colonies or independent
-- Gen. George Washington commander-in-chief throughout rebellion
-- disbanded in 1783 after the Treaty of Paris

West Point's Cadet Honour Code:

 'A cadet will not lie, cheat, steal, or tolerate those who do.'




---------------------- ----------------------

COMMENT

I thought this was interesting, as I don't know anything about what I like to call the 'Cyber Caliphate' (lol ... I never get sick of giggling at that term, since seeing it somewhere).   I guess (from the above name) they don't call themselves that, so I'm not sure where that CC term came from. 

For some reason, 'Cyber Caliphate' doesn't sound at all scary.  It's sort of funny, unreal and completely detached from real life.  
The entire thing is surreal.  There's guys out there that must have high-tech know-how (which is a hell of a lot more advanced than I'll ever be), but it's like they're stuck in history and in their traditions from hundreds of years ago, which is really incongruous.
I'm finding myself not liking the current times much (the liberal left, Marxist, preachy, utopian crap, the controlled media propaganda,  the indoctrinated cut-out politicians that are paying lip service to the same lunacy with a straight face, and the dedication of key state institutions to models & indoctrinators of more of same, is very disturbing, once you are aware.

Imagine what it would be like for someone from an entirely alien culture that is hundreds of years out of alignment, trying to adjust to the funny farm.

Not that this is an issue for the the committed religious fundamentalists like these guys must be:  assimilation isn't even on their radar.   Their issue is political, but sort of amped up and even more dangerous because it's also backed by and maybe even driven to a degree by what are their religious convictions.  I think.
I don't know.  I'm just imagining.
Anyway, I sort of find the war between Anonymous and the Islamic Cyber Army funny.

Some of the comments in the Daily Mail article are hysterical ... or I'm easily amused.



July 23, 2015

Israel Cybersec | Hacker News





http://itbusinessnet.com/article/Nonstop-Cyber-Attacks-Drive-Israel-to-Build-Hack-Proof-Defense-3986848
Nonstop Cyber Attacks Drive Israel to Build Hack-Proof Defense
By Bloomberg News
(Gwen Ackerman)-

(Bloomberg) -- In 2013, Israel Electric Corp. registered several hundred potential hacks on its grid each hour.

Last year, the figure grew -- to 20,000.

None succeeded. Israel Electric, which controls more than 80 percent of the countrys power production, has dramatically increased its cyber personnel, developed new defense tools and enhanced employee training, said Yosi Shneck, senior vice president of information and communications. The new protections reflect a nationwide effort to make Israel one of the most hack- proof countries in the world.

This year alone, the government established a national authority to help oversee protection of critical civilian systems, the military announced a reorganization of all its anti-hacking units into one command and the central bank became what may be the first in the world to define mandatory cyber- defense steps for financial institutions.

If I ranked the existential threats, cyber would come right behind nuclear weapons, said Carmi Gillon, former head of the Shin Bet domestic security service and chairman of Cytegic, a company that has developed a digital dashboard and tools to help keep companies protected.

Israel and the U.S. face some of the most serious cyber assailants in the world, said Daniel Garrie, executive managing partner of cyber-consulting firm Law & Forensics in New York. That forces them to be light years ahead in prevention.

While attempted hack attacks on Israel reached 2 million a day during last years fighting in Gaza, the country has yet to report destructive events such as the theft of data from about 22 million people at the U.S. Office of Personnel Management.

Hacking Call

The threat is growing. Anonymous, a loosely connected global hacker collective, called in April for a hacking onslaught on the country. The Jewish state was the second-most- hit in the world after the U.S. that month, according to monitoring website Hackmageddon.

The attacks did little more than deface websites. Anonymous claimed Facebook credentials and phone numbers of hundreds of Israelis were posted online.

In March, Check Point Software Technologies Ltd., a cybersecurity company, detected malware that it suspected came from Lebanon. The alleged targets were defense contractors as well as telecommunications and media companies in 10 countries, including Israel. No further details were given.

Two Cables

Only two cables link Israels Internet network to the world, giving its companies an advantage on the digital battlefield, said Yaron Blachman, director of cyber and technology consulting at PricewaterhouseCoopers Israel. They can just turn to their Internet service provider and disconnect, he said.

Israel started building up its defenses more than a decade ago. In 2002, the government created the National Information Security Authority to protect critical infrastructure. In 2012 it established the National Cyber Bureau, an agency within the office of Prime Minister Benjamin Netanyahu that coordinates and advises on policy. The authority established this year will be responsible for protecting civilian entities such as banks, said Yitzhak Ben-Israel, who helped found it.

It isnt enough just to have sophisticated defenses, said Amos Yadlin, a former military intelligence chief who now heads Tel Aviv Universitys Institute for National Security Studies.

You cant be a good defender unless you understand the offense, he said. Therefore, defensive efforts must overlap to some degree with offensive efforts, including those of intelligence collection.

Flame Virus

For instance, Iran says Israel tried to sabotage its nuclear program with the Stuxnet virus. It also attributed the Flame virus, which wreaked havoc on Iranian computer systems in the energy sector, to illegitimate regimes. Israeli officials have declined to confirm or deny whether the country was involved.

Learning to fend off attacks can be profitable. Israel Electric formed a unit called CyberGym with security consulting firm CyberControl to offer companies around the world a simulated control center to practice protecting their networks.

And the new Israeli focus is leading to acquisitions and investments. Elbit Systems Ltd., Israels biggest publicly traded defense company, in May bought a cybersecurity division from Nice Systems Ltd. for $158 million. Two months before that, Alibaba Group Holding Ltd. invested in Jerusalem Venture Partners to work with Israeli cybersecurity startups and protect its own operations.

Cytegic chief executive officer Shay Zandani, who established the information-security department in the Israeli Air Force in the 1990s, says many Israeli corporations arent protected against the kind of threats they face. In 2014, one in 10 cyber breaches was in the banking industry, according to a report by FireEye Inc.

Bank Protections

Attacks and attackers targeting the Israeli financial sector have increased and become more sophisticated, according to a May report by Cytegic and cyber consulting firm Konfidas. Lenders have largely been unsuccessful in reining them in, it said. The industry targeted most by hack attacks: information technology.

The Bank of Israel says it appears to be the first central bank in the world to define mandatory steps for cyber defense. Its regulations, issued in March, put pressure on the board of directors and senior management to insure lenders are safe.

Israel is a geopolitical target and attacking the banking sector can damage our economy, said Rachel Jacoby, head of the OpRisks management unit for technology and cyber at the central bank.

To contact the reporter on this story: Gwen Ackerman in Jerusalem at gackerman@bloomberg.net To contact the editors responsible for this story: Riad Hamade at rhamade@bloomberg.net Anne Swardson, James Hertling

http://itbusinessnet.com/article/Nonstop-Cyber-Attacks-Drive-Israel-to-Build-Hack-Proof-Defense-3986848
---------------------
HACKER NEWS

#Hacker
Identity theft
cemeteries, online obituaries > ID 4 fraudulent a/c
Sth Africa topping recycled deceased ID
prob:  loan providers conducting transactions
over phone, often only requiring 3 questions as ID verification

South Africa
also big on phishing attacks (eg fake SA Revenue Service link)

http://www.techcentral.co.za/how-crooks-steal-your-id/58397/

FBI wanted:
cybercrim - Evgeniy Mikhailovich Bogachev
/Computer Fraud & Abuse Act
/Identity Theft & Assumption Deterrence Act
US$3m reward
Evgeniy Bogachev
= responsible for Zeus malware / banking log-on info capture
source: http://www.techcentral.co.za/how-crooks-steal-your-id/58397/

Unauthorised apps & app stores
contributing to a spike in mobile fraud
 400% spike 2014

Access prevention needed on mobile devices
*back-up
*remote wipe system
*password protection
*GPS tracking services

http://www.timeslive.co.za/thetimes/2015/07/22/Beware-muggers-in-those-dodgy-apps

---------------------

COMMENT

Just some of the stuff I looked at recently.


Doubt I'll remember much of the Israeli cybersecurity article, but I thought it was interesting.


Evgeniy Bogachev's got a $3-million FBI reward on his head.
That's a massive amount.
Bogachev better not go to Thailand.  Thais love handing ppl over to the Yanks.




April 30, 2015

Anonymous - CloudFlare - ISIS - Internet Censorship





Posted: April 29, 2015
Anonymous Charge CloudFlare: Justice or Hypocrisy?
Activists Protest ACTA Proposal
Anonymous — the group of hacktivists — has launched a campaign called Operation Isis several months ago. The members of the group did not just identify and attack websites that are somehow connected with the Islamic State, they also searched for the companies in U.S. and in U.K. that host such websites and published their lists on the Internet. The cause for such attention from Anonymous is terrorism promotion.

Recently, Anonymous focused on CloudFlare, which is not even a proper hosting company, because it protects over 50 Isis related websites against DDoS attacks. The hacktivists launched a petition to the U.S. government so that the company would be criminally charged for supporting terrorism.

According to the comment, given to the International Business Times by company’s CEO Matthew Prince, CloudFlare is not going to fulfill Anonymous’ request and block its services to the Isis websites, because, firstly, it would not make a difference anyways, for the content would not be removed, and secondly, such actions could be evaluated as censorship.

    “We’re the plumbers of the internetWe make the pipes work but it’s not right for us to inspect what is or isn’t going through the pipes. If companies like ours or ISPs (internet service providers) start censoring there would be an uproar. It would lead us down a path of internet censors and controls akin to a country like China.”

Discrimination and censorship is something CloudFlare couldn’t be blamed for — just a few weeks ago, while analyzing the causes of Pirate Bay going down, the Inquisitr mentioned that this website also uses CloudFlare’s services.

    “It is quite possible, and what is worse is that Pirate Bay’s CloudFlare service is not working, either.

    CloudFlare is the website caching service Pirate Bay uses to keep visitors on their site even when it experiences downtime.”

Basically, the fact that CloudFlare provides services to such controversial websites, as Pirate Bay is, should have been sufficient to certify that the company is not going to deny any of its customers.

The petition, however, is unlikely to be a success — till the present moment, it got 185 signatures and needs to get 99 815 more before May 25 to actually make the government take action against the company.

And perhaps it is for the best, because in this case hacktivists seem to act hypocritically. After all, it was Anonymous who waged a huge Operation Payback campaign against PayPal and Amazon for cutting off services to Wikileaks without a legal decision — and that’s exactly what they request from CloudFlare.

http://www.inquisitr.com/2053153/anonymous-charge-cloudflare-justice-or-hypocrisy/
COMMENT

Censorship always freaks me out, so this caught my attention.  Censorship of ISIS doesn't freak me out as much the implications for everyone else.  If censorship of one group can lead to a 'path' of censorship by providers of internet 'pipes' or whatever, it doesn't sound too good overall.

Not sure why material that various groups broadcast on the internet is seen as such a threat that it cannot be countered by alternate broadcasts (ie alternate ideas, arguments, ridicule, other responses etc), rather than by censorship that eliminates the opposing/undesirable message in its entirety.

Anyway, this is just something I found interesting. 


March 18, 2015

Matt DeHart: ex US Air National Guard / Persecuted for his Connections to WikiLeaks & Anonymous



MATT DeHART

#freemattdehart
Legal defence fund:  https://fundrazr.com/campaigns/drgc5/ab/c40Ci5
TWITTER:  @FreeMattDehart
Lawyer:  Tor Ekeland
Lawyer Website: https://torekeland.com/
Lawyer e-mail:   tor*at*torekeland.com


COPYRIGHT DISCLAIMER
Copyright Disclaimer under section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education and research. 
MATT DeHART - IV DRUGGED AGAINST HIS WILL BY FBI, TORTURED & DENIED ACCESS TO LAWYER BY FBI
February 11, 2015 by freemattdehart | Media
Denial of Refugee Protection For Matt DeHart

NEWS RELEASE: WEDNESDAY, FEBRUARY 11TH, 2015

CANADIAN IMMIGRATION AND REFUGEE BOARD, REFUGEE DIVISION’S DENIAL OF REFUGEE PROTECTION FOR MATT DEHART

On Monday, February 9th, Matt DeHart’s parents, Paul and Leann, received notice by mail from the Refugee Protection Division of Canada’s Immigration and Refugee Board that the family’s claim for Refugee Protection had been denied. The family fled the United States after Matt was interrogated and tortured during an FBI espionage investigation in which child pornography charges were hastily filed after Matt was detained at the Canadian border, an action which was triggered by an espionage alert.

The Refugee Protection Division determined that because they found no “credible and trustworthy evidence” to support the US government’s child pornography charges against Matt, the DeHarts weren’t excluded from refugee protection on the basis of those criminal charges. However, the determinative issue for the board was whether they considered the DeHarts would be afforded adequate protections by the United Sates.

Since the Board found the US to be a “democratic country with a system of checks and balances” and that Matt had the “ability to access and retain counsel for the purposes of defending himself” the Board ultimately ruled the DeHarts were not persons in need of protection at this time.

The DeHarts’ Refugee Protection process was frustrated by the fact that there was “no indictment or prosecution with regards to the National Security issue at the present time in the US.” But this has never been a case about child pornography; In this context the child porn charges appear to be nothing more than a pretext to discredit and silence a whistleblower who came across information implicating criminal activity against United States citizens by their own government.

As noted in the ruling, after FBI Agents detained Matt at the Canadian border, the “first notations in documents regarding his detention by the US authorities in August 2010 were made with respect to espionage” — not child pornography. During his detention by the FBI at this time, as also noted in the ruling, Matt was drugged against his will, tortured, and denied access to a lawyer. The criminal complaint and arrest warrant for Matt came later in the day after he was detained at the border on the espionage alert — a timeframe that speaks volumes given that the alleged crimes occurred in 2008 and, despite an investigation, no previous charges had been filed.

Matt brought two thumb drives of data implicating United States government agencies in criminal activity to Canada, which supported his claim for refugee protection. He gave them to the Canada Border Services Agency for use at his refugee hearing. The thumb drives were then retained by the CBSA, who refused to give Matt’s attorneys access to them. Therefore, a significant portion of evidence was not considered by those making the refugee decision

READ FURTHER AT SOURCE - here.

WHO IS MATT DEHART?

Matt DeHart is a 30 year old U.S. Citizen and former US airman with Top Secret clearance who the US government detained at the US Canadian border on an alleged “espionage matter.” While detained he was drugged via an I.V. without his consent and repeatedly interrogated about Anonymous, Wikileaks, and a file allegedly detailing an FBI investigation of post-9/11 domestic criminal activity by a US intelligence agency that appeared on a server he was an admin on. Later that day the government hastily drafted and filed a criminal complaint, in what looks like a smear campaign, charging Matt with the solicitation of child pornography based on two-year-old allegations it had previously investigated but never filed charges on.

Wiped

The child pornography investigation began after an irate mother reported Matt following a prank involving the toilet papering of a house. At the time of the incident, no child pornography accusations were made. No child pornography has been found on any of Matt’s devices, and he vehemently denies the allegations. Following his detention at the Canadian border, the FBI interrogated Matt in Maine without a lawyer for over a week, even after one was appointed for him at his federal detention hearing, and never questioned him about matters relating to the child pornography allegations.

Evidence III

Matt’s parents, Paul and Leann DeHart, are active in Christian ministry, and both had Top Secret clearance while they worked for the US Military as linguists analyzing signals intelligence. After the FBI interrogation and nearly three years of trying to work through the US legal system the whole family fled to Canada to seek asylum under the UN Convention Against Torture.

READ FURTHER AT SOURCE - here.
-------------------------------------------------------------------------
COMMENT

How creepy is what's happened to Matt DeHart?
This shouldn't be happening in a proper democracy.









March 10, 2015

Adam Bennett / Lorax - Good Luck With the Defence, Under Brave New Australian Totalitarianism




Australian Government Prosecuting Anonymous Member Who Allegedly Exposed The Major Flaw In Its Data Retention Demands

from the prison-is-for-useful-people dept

Find a security flaw, go to jail. That's the general attitude of government entities around the world. Over in Australia, an Anonymous member and fundraising manager for a cancer support group is facing an ever-shifting number of charges for finding and testing security holes.

Adam John Bennett is a rather un-anonymous member of Anonymous. He also acts as an unofficial mouthpiece for Anonymous via his LoraxLive online radio show. His supposed participation in a large-scale hack saw him raided by Australian Federal Police in May of 2014. Since then, he's been awaiting prosecution for a variety of charges -- charges government prosecutors seem unable to pin down.

The data breach leading to Bennett's arrest involved a target of Australia's controversial data retention law, which requires ISPs to hold onto subscribers' internet activity (including social network use and emails) for two years and grant extensive access to a variety of government agencies.

AAPT confirmed it was breached in July 2012, following claims by an Australian sect of Anonymous that it snatched 40GB of data from the major Australian internet service provider (ISP).

After stripping out personally identifiable information from the data (which included members of the Australian government), Anonymous released the data to raise awareness around expectations of data security: To demonstrate that if an ISP as large and trusted as AAPT can't keep its own data secure, it will be unable to keep Australians' data safe under the proposed laws.

Rather than consider this a point well taken, the government went after Bennett. As for the prosecution itself, it's been a complete shambles.

On March 11, Adam Bennett -- known by most as the radio voice of Anonymous, LoraxLive, who was arrested last year for alleged computer crimes -- will finally learn what he's being charged with.

This had been expected to happen this week. Instead, at the last minute, Australian Commonwealth prosecutors -- for the third time since the case began 10 months ago -- requested another delay to change its lineup of accusations against him.

Maddeningly, the prosecution also indicated it will be dropping its initial charges against Bennett, and adding a slew of new ones.

Not only can't the government decide what to charge Bennett with, but it's also been instrumental in hamstringing his defense counsel. It's hard enough to structure a defense when charges remain largely unknown. It's even harder when the prosecution shows up late on the Friday before the next court date and dumps 20 GB of "evidence" into the defense's lap.

Even more irritating is the fact that the prosecution apparently hopes to add Bennett's vulnerability testing of his own employer to list of charges.

One of the charges Bennett's counsel expect to be in the final lineup is "Heartbleed Vulnerability Testing for Cancer Support W.A. 2014." This is in regard to a Heartbleed vulnerability test created by Bennett to test his employer's servers (Cancer Support W.A.) for Heartbleed vulns, which would have put the CRM that Bennett was involved in building for the organization at significant risk.

This addition of complete BS suggests the prosecution can't find much about the Anonymous ISP hack it can wrap charges around. Instead, it seems to be operating purely on bluster. Constant delays followed by last-minute data dumps aren't the sort of actions that indicate prosecutorial confidence. Instead, it gives the impression that the government hopes to obfuscate its way into a guilty verdict.

Meanwhile, Bennett is still living under restrictive bail conditions that prevent him from using the internet for anything other than banking, employment (he lost his job at the cancer support group after his arrest) or legal advice.

While the government may be right to complain about the unauthorized use of an ISP's data, it seems to be more concerned with making an example out of someone who may have had something to do with providing a practical demonstration of the stupidity of data retention laws. The fact that it's going after him for testing his own employer's defense against vulnerabilities suggests there will be some prosecutorial "piling on" when it finally gets around to enumerating its criminal charges -- presumably in hopes of deterring future exposures of flaws in its lawmaking logic.

This is what happens when governments try to "protect" citizens with little more than expansions of surveillance and law enforcement powers. Retained data is just as apt to be misused by cybercriminals as it is by law enforcement/security agencies. Any time you ask a third party to hold onto data it normally doesn't, it increases the risk of serious breaches involving plenty of normally private information. There are no exceptions. Anonymous exposed the short-sightedness of data retention laws. In response, the government has decided to shoot as many messengers as it can get its hands on.


COMMENT

Anyone who points the finger at Russian tyranny ought to look at the insane State intrusions:  data retention, mass surveillance, laws that erode civil liberties rushed through, secret courts, trials etc, and other violations that take place under Western democracies.

Being the subject of State scrutiny, and control of the surveillance and data retention kind, is rather like being a lab rat under glass.  It's disgusting and it should be unlawful to subject the public to this level of State control.

Authorities should not be permitted to make charges without presenting a case to answer then and there.  What's with dragging it out and eventually swapping charges, over almost a stretch of a year, while the accused remains under restrictive 'bail conditions'?

While I'm sure it is lawful, it just doesn't sound right and just.

I don't fancy Bennett's chances of a fair go under totalitarianism.








September 16, 2014

Summary



Summary
IT
  
Payload (computing) = component of a computer virus that executes a malicious activity techopedia.com/definition/538


#IT>>"Kaspersky Lab does not have political ties to any governments; it openly shares its knowledge & technical findings ..." [telecomasia]

.........................  ........................
#hacktevists - Anonymous - Payback 6 - on.rt.com/yb7yz9 - TRIAL Tue, 7 Oct @ 9am EDT - goo.gl/i9xhoo -- #Virginia #USA #law
CHARGED:  “... anti-copyright campaign that targeted government and corporation websites in 2010 and 2011
US Copyright Office, major credit card companies and international law firms &  trade groups”
Actions allegedly post 2010 take-down of:  file-sharing site The Pirate Bay.

Targets:

·       Recording Industry Association of America (RIAA)
·       Motion Picture Association of America (MPAA)
·       US Copyright Office of the Library of Congress
·       Visa
·       MasterCard
·       Bank of America

Entities outside of United States:

·       Davenport Lyons (UK intellectual property rights firm)
·       British Phonographic Institute (BPI) - UK trade group
that served as the across-the-pond equivalent of the MPAA.
 .........................  ........................
New South Wales
#Hacker #Surveillance - Aust/NSW police used German Gamma Intl hacker s/ware FinSpy - key log + more goo.gl/LCkBJB - #auspol


#WikiLeaks docs published - #surveillance by covert sch warr / > *worldwide* target range > Secret Gamma deal? No records.


Does #Surveillance, lack transparency & lack accountability - state/govt serve the people, or does it monitor & imprison people it reps?


#surveillance >Gamma International + Trovicor >goo.gl/jqTv1k >#humanrights abuse complaints lodged w/ OECD #Bahrain - heaps info!!

NOTE:  Loads of PDF info links – case report, press release, complaint + more


"Julian Assange, WikiLeaks Editor in Chief said, "FinFisher continues to operate brazenly from Germany selling weaponized surveillance malware to some of the most abusive regimes in the world.
“The Merkel government pretends to be concerned about privacy, but its actions speak otherwise. Why does the Merkel government continue to protect FinFisher? This full data release will help the technical community build tools to protect people from FinFisher including by tracking down its command and control centers.” "
European Centre for Constitutional & Human Rights (ECCH) >> website WEALTH OF INFO. >> ecchr.de/accountability >> #humanrights #law




#Snowden on mass surveillance - Five Eyes (US, UK, CA, AU, NZ) >>goo.gl/xg5NW7 >>XKEYSCORE NSA/USA > #auspol - UR being watched 



.........................  ........................

Moment of Truth
Monday, 15 September 2014  / Auckland, New Zealand >>>>>>>>  @7pm >>Auckland Town Hall #MoT - Internet Mana Party - #nzpol


Wound up watching this.  Interesting: it's a one of a kind development in relation to politics.  Doubt that I'll be as enthusiastic about run of the mill political events.
.........................  ........................

Sweden

#Sweden>>Social Dem/ Leader Stefan Lofven defeated incumbent PM Fredrik Reinfeldt >>>goo.gl/zxMr38>>@ 31.1% / Mods slumped [WSJ]

Blow to conservative leaders w/in #EU 'free market' pushers - #DavidCameron #AngelaMerkel >> Bye #CarlBildt [wsj]

Graph of Sweden election results:


#Sweden - Social Dems & Green Party coalition anticipated (w/ Left Party providing Parliamentary support) .. Feminist Initiative dipped out

Scandals did govt no favour / schools, nurseries, care homes ... online.wsj.com/articles/swede + immigration >

.........................  ........................


US Govt Intervention
“We R under no illusions that USG [US govt] efforts alone will shape ..direction of .. new government .."> #Ecuador > goo.gl/fKfYM1


.........................  ........................
Finland

Greens to quit #Finnish govt if approves new nuclear reactors Fennovoima plant in Pyhäjoki goo.gl/jDLbMU - Thus = approval D-Day

#Russia project - if quit Nat. coalition majority 'razor thin' - Green coalition understanding was NO expansion nuclear

.........................  ........................

Above is *some* of what I looked at today.  

Random things that popped up online.  





August 10, 2014

ANONYMOUS - Internet Security Information

TWITTER


ANONYMOUS

Subject:   Internet Security


Link below for protection information




........................


Americans

Know your digital rights
Electronic Frontier Foundation - here.