Why Every Person Should Ditch Their iPhone


By Thomas Dishaw, Govtslaves

As Apple slave goods continue to dominate every corner of the technological market, there are more and more reasons surfacing as to why consumers should not support this company.

Before you decide to spend another hard-earned dollar on Apple products, you should take the time to review their ridiculous privacy policy that entitles them to every confidential piece of information you compile while using your iPhone.

If that doesn’t stop you right there, perhaps you should take a look at the inhumane working conditions inside their Chinese factories that now come equipped with suicide nets to prevent workers from jumping to their death.

I could go on and on about all the terrible practices Apple institutes on both sides of the coin, but the one that is most disturbing is Apple’s assault on basic human rights. I would categorize the ability to use my phone’s camera for pictures and video recording as a basic human right.

This will be drastically regulated in the near future with the institution of U.S. Patent No. 8,254,902 better known as “apparatus and methods for enforcement of policies upon a wireless device.” The patent granted in August 2012 gives Governments, businesses, and network owners the right to disable your camera, wi-fi and video capabilities on an iPhone for any reason, at any time. Apple, being the sneaky innovators they are, will pre-package this application into the phones and most likely all other mobile products in the future.

Continue reading

France : la totalité de nos communications espionnées par la DGSE


Par Jacques Follorou et Franck Johannès, LeMonde.fr

Si les révélations sur le programme d’espionnage américain Prism ont provoqué un concert d’indignation en Europe, la France, elle, n’a que faiblement protesté. Pour deux excellentes raisons : Paris était déjà au courant. Et fait la même chose.

Le Monde est en mesure de révéler que la Direction générale de la sécurité extérieure (DGSE, les services spéciaux) collecte systématiquement les signaux électromagnétiques émis par les ordinateurs ou les téléphones en France, tout comme les flux entre les Français et l’étranger : la totalité de nos communications sont espionnées. L’ensemble des mails, des SMS, des relevés d’appels téléphoniques, des accès à Facebook, Twitter, sont ensuite stockés pendant des années.

Si cette immense base de données n’était utilisée que par la DGSE qui n’officie que hors des frontières françaises, l’affaire serait déjà illégale. Mais les six autres services de renseignement, dont la Direction centrale du renseignement intérieur (DCRI), les douanes ou Tracfin, le service de lutte contre le blanchiment, y puisent quotidiennement les données qui les intéressent. En toute discrétion, en marge de la légalité et hors de tout contrôle sérieux. Les politiques le savent parfaitement, mais le secret est la règle.


Un dispositif clandestin

Ce Big Brother français, petit frère des services américains, est clandestin. Pourtant, son existence figure discrètement dans des documents parlementaires. Les huit députés et sénateurs de la délégation parlementaire au renseignement rappellent, dans leur rapport du 30 avril, que “depuis 2008, des progrès ont été réalisés en matière de mutualisation des capacités, notamment en ce qui concerne le renseignement d’origine électromagnétique, opéré par la DGSE au profit de l’ensemble de la communauté du renseignement”.

Continue reading

How NSA access was built into Windows


[EDITOR’S NOTE: This article was originally published in 1999. It created a big controversy at the time and despite Microsoft denials, they never came clean on the subject. At the end the Presstitutes and the Puppy Press presented it as another “Conspiracy Theory”. And today it seems that nobody cares to continue using Bill Gates’s Operating System: Microsoft Windows.]

Careless mistake reveals subversion of Windows by NSA.

By Duncan Campbell, TELEPOLIS

The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.

Computer security specialists have been aware for two years that unusual features are contained inside a standard Windows software “driver” used for security and encryption functions. The driver, called ADVAPI.DLL, enables and controls a range of security functions. If you use Windows, you will find it in the C:\Windows\system directory of your computer.

ADVAPI.DLL works closely with Microsoft Internet Explorer, but will only run cryptographic functions that the US governments allows Microsoft to export. That information is bad enough news, from a European point of view. Now, it turns out that ADVAPI will run special programmes inserted and controlled by NSA. As yet, no-one knows what these programmes are, or what they do.

Dr Nicko van Someren reported at last year’s Crypto 98 conference that he had disassembled the ADVADPI driver. He found it contained two different keys. One was used by Microsoft to control the cryptographic functions enabled in Windows, in compliance with US export regulations. But the reason for building in a second key, or who owned it, remained a mystery.

A second key

Two weeks ago, a US security company came up with conclusive evidence that the second key belongs to NSA. Like Dr van Someren, Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. Then he checked the latest Service Pack release for Windows NT4, Service Pack 5. He found that Microsoft’s developers had failed to remove or “strip” the debugging symbols used to test this software before they released it. Inside the code were the labels for the two keys. One was called “KEY”. The other was called “NSAKEY”.

Fernandes reported his re-discovery of the two CAPI keys, and their secret meaning, to “Advances in Cryptology, Crypto’99” conference held in Santa Barbara. According to those present at the conference, Windows developers attending the conference did not deny that the “NSA” key was built into their software. But they refused to talk about what the key did, or why it had been put there without users’ knowledge.

A third key?!

But according to two witnesses attending the conference, even Microsoft’s top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys.

Continue reading

27 Edward Snowden Quotes About U.S. Government Spying That Should Send A Chill Up Your Spine


By Michael Snyder, the economic collapse

Would you be willing to give up what Edward Snowden has given up? He has given up his high paying job, his home, his girlfriend, his family, his future and his freedom just to expose the monolithic spy machinery that the U.S. government has been secretly building to the world. He says that he does not want to live in a world where there isn’t any privacy. He says that he does not want to live in a world where everything that he says and does is recorded. Thanks to Snowden, we now know that the U.S. government has been spying on us to a degree that most people would have never even dared to imagine. Up until now, the general public has known very little about the U.S. government spy grid that knows almost everything about us.

But making this information public is going to cost Edward Snowden everything. Essentially, his previous life is now totally over. And if the U.S. government gets their hands on him, he will be very fortunate if he only has to spend the next several decades rotting in some horrible prison somewhere. There is a reason why government whistleblowers are so rare. And most Americans are so apathetic that they wouldn’t even give up watching their favorite television show for a single evening to do something good for society. Most Americans never even try to make a difference because they do not believe that it will benefit them personally. Meanwhile, our society continues to fall apart all around us. Hopefully the great sacrifice that Edward Snowden has made will not be in vain. Hopefully people will carefully consider what he has tried to share with the world. The following are 27 quotes from Edward Snowden about U.S. government spying that should send a chill up your spine…

#1 “The majority of people in developed countries spend at least some time interacting with the Internet, and Governments are abusing that necessity in secret to extend their powers beyond what is necessary and appropriate.”

#2 “…I believe that at this point in history, the greatest danger to our freedom and way of life comes from the reasonable fear of omniscient State powers kept in check by nothing more than policy documents.”

#3 “The government has granted itself power it is not entitled to. There is no public oversight. The result is people like myself have the latitude to go further than they are allowed to.”

#4 “…I can’t in good conscience allow the US government to destroy privacy, internet freedom and basic liberties for people around the world with this massive surveillance machine they’re secretly building.”

#5 “The NSA has built an infrastructure that allows it to intercept almost everything.”

#6 “With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your e-mails or your wife’s phone, all I have to do is use intercepts. I can get your e-mails, passwords, phone records, credit cards.”

#7 “Any analyst at any time can target anyone. Any selector, anywhere… I, sitting at my desk, certainly had the authorities to wiretap anyone, from you or your accountant, to a federal judge, to even the President…”

#8 “To do that, the NSA specifically targets the communications of everyone. It ingests them by default. It collects them in its system and it filters them and it analyzes them and it measures them and it stores them for periods of time simply because that’s the easiest, most efficient and most valuable way to achieve these ends. So while they may be intending to target someone associated with a foreign government, or someone that they suspect of terrorism, they are collecting YOUR communications to do so.”

Continue reading

Fliqués par Internet… et contents de l’être !


Par Marie Delarue, Boulevard Voltaire

Changement d’époque, changement de paradigmes, tiraillements entre désirs et nécessités, revendications libertaires et désir fou de protection tous azimuts. Chacun se « facebookise », se met en scène, « tweete » à tout va. Croit se planquer derrière des pseudos pour balancer sur la Toile tout ce qui lui passe par la tête, ses coups de cœur comme ses humeurs. Il y a là-dedans du plaisant et du déplaisant, du zélateur et de la délation, de l’info et de la désinfo…

On s’angoisse parce que la Toile, comme celle de l’araignée – son modèle -, est une extraordinaire machine à piéger. Plus efficace encore, elle ne se contente pas de retenir dans ses rets ceux qui s’y précipitent, mais elle remonte le fil jusqu’à sa source. Nous tenons là, sans même souvent en avoir conscience, la véritable machine à remonter le temps.

Les États-Unis excellent en cette matière. Piégeurs en chef, on sait qu’ils sont désormais planqués à l’entrée et à la sortie de tous les réseaux, avec leurs gigantesques oreilles intergalactiques et leurs filets à papillons intersidéraux. Le jeune informaticien qui, la semaine dernière, a révélé au monde les dessous du programme PRISM autorisant la NSA et la CIA à fliquer toutes nos connections, vient de révéler son identité au Guardian. Il s’appelle Edward Snowden, a 29 ans, et est parti se réfugier à Hong Kong. Petit frère du soldat Bradley Manning, le fournisseur des données à WikiLeaks dont le procès se tient actuellement, Snowden pense lui aussi avoir rendu service à la planète. Il avoue : « Je n’ai aucune idée de ce que sera mon avenir”, espérant simplement ne pas être extradé vers les États-Unis. Nul doute que pour avoir dénoncé la surveillance, ses faits et gestes seront les premiers surveillés. Il va être – il est déjà – l’homme le plus traqué, physiquement et virtuellement. Au nom de la sûreté nationale, il sera attrapé, même si, comme il le dit, il envisage de demander l’asile à l’Islande. Mais à quel titre, au fait ? Réfugié politique ? Réfugié numérique ?

Continue reading



By Soren Dreier, Zen Haven

The National Security Agency h as obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian.

The NSA access is part of a previously undisclosed program called PRISM, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.

The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation – classified as top secret with no distribution to foreign allies – which was apparently used to train intelligence operatives on the capabilities of the program. The document claims “collection directly from the servers” of major US service providers.

Although the presentation claims the program is run with the assistance of the companies, all those who responded to a Guardian request for comment on Thursday denied knowledge of any such program.

In a statement, Google said:
“Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a back door for the government to access private user data.”

Several senior tech executives insisted that they had no knowledge of PRISM or of any similar scheme. They said they would never have been involved in such a program. “If they are doing this, they are doing it without our knowledge,” one said.

An Apple spokesman said it had “never heard” of PRISM.

The NSA access was enabled by changes to US surveillance law introduced under President Bush and renewed under Obama in December 2012.

The program facilitates extensive, in-depth surveillance on live communications and stored information. The law allows for the targeting of any customers of participating firms who live outside the US, or those Americans whose communications include people outside the US.

It also opens the possibility of communications made entirely within the US being collected without warrants.

Disclosure of the PRISM program follows a leak to the Guardian on Wednesday of a top-secret court order compelling telecoms provider Verizon to turn over the telephone records of millions of US customers.

The participation of the internet companies in PRISM will add to the debate, ignited by the Verizon revelation, about the scale of surveillance by the intelligence services. Unlike the collection of those call records, this surveillance can include the content of communications and not just the metadata.

Some of the world’s largest internet brands are claimed to be part of the information-sharing program since its introduction in 2007. Microsoft – which is currently running an advertising campaign with the slogan “Your privacy is our priority” – was the first, with collection beginning in December 2007.

It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009; YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined the program in 2012. The program is continuing to expand, with other providers due to come online.

Collectively, the companies cover the vast majority of online email, search, video and communications networks.

Read more Here



By James HALL


The data mining technology that is integral to the Google AdWords experience is a power tool in creating an individual profile for anyone who surfs the web. The amazing capacity to target specific ads to personal search topics, geographic locations and web history is the harbinger of a total recall on your personality. If the benefits of getting relevant advertisement that maximize sales opportunities were the only purpose of the process, the relatively benign intrusion of a materialistic message might be tolerable to most internet users. However, the bull in the china shop is not merely in the business of making a commercial profit. Google is a wonder creation of the calculate surveillance society.

Research at Google acknowledges:

“When data mining systems are placed at the core of interactive services in a rapidly changing and sometimes adversarial environment, statistical models need to be combined with ideas from control and game theory; for example, when using learning in auction algorithms.

Research at Google is at the forefront of innovation in machine learning and data mining – we have one of the most active groups working on virtually all aspects of data mining.”

OK, so the dominant internet technology company is in business to harvest information on the inner recesses of each unique login. Should a cyber sleuth be concerned? Well, according to the scholarly paper, The Google-NSA Alliance: Developing Cybersecurity Policy at Internet Speed by Stephanie A. DeVos:

“On February 4, 2010, the Washington Post reported that Google and the National Security Agency had partnered to analyze the cyberattacks, with the objective of better defending Google and its users from future attack. Though neither organization commented on the partnership, sources told the Washington Post that the alliance allows for the sharing of critical information without violating Google’s policies or laws that protect Americans’ privacy of online communications. Under the terms of the alliance, Google will not be sharing proprietary data and the NSA will not be viewing users’ searches or e-mail accounts. The article stated that Google approached the NSA shortly after the attacks, but due to the sensitivity of the alliance, the deal took time to be formulated. Any agreement would be the first instance where Google had entered a “formal information-sharing relationship” with the NSA.”

PC World in the article, The Google-NSA Alliance Questions and Answers: lists the following concerns and would have you believe there is nothing ominous behind any alleged relationship.

1) Is the Google-NSA alliance really happening?

2) What would be the point of a Google-NSA partnership?

3) Would the government gain access to my personal information?

4) Why would Google work with the NSA instead of the Department of Homeland Security?

5) Has the NSA worked with Google before?

Continue reading

Americans Are The Most Spied On People In World History

More Spying On Citizens than in Stasi East Germany

By Washington’s Blog

TechDirt notes:

In a radio interview, Wall Street Journal reporter Julia Angwin (who’s been one of the best at covering the surveillance state in the US) made a simple observation that puts much of this into context: the US surveillance regime has more data on the average American than the Stasi ever did on East Germans.

Indeed, the American government has more information on the average American than Stalin had on Russians, Hitler had on German citizens, or any other government has ever had on its people.

The American government is collecting and storing virtually every phone call, purchases, email, text message, internet searches, social media communications, health information, employment history, travel and student records, and virtually all other information of every American.

Some also claim that the government is also using facial recognition software and surveillance cameras to track where everyone is going . Moreover, cell towers track where your phone is at any moment, and the major cell carriers, including Verizon and AT&T, responded to at least 1.3 million law enforcement requests for cell phone locations and other data in 2011. (And – given that your smartphone routinely sends your location information back to Apple or Google – it would be child’s play for the government to track your location that way.) Your iPhone, or other brand of smartphone is spying on virtually everything you do (ProPublica notes: “That’s No Phone. That’s My Tracker“).

Continue reading


Former National Security Agency (NSA) analyst William Binney

By Activist Post

Former top NSA mathematician and code breaker, William Binney, has gone on record to publicly reveal the scope of a top-secret surveillance program called Stellar Wind which led to his resignation in 2001. It is a program that has directly targeted everyday Americans following 9/11.

Binney has endured harassment by his own government, as many other whistleblowers have when trying to reveal illegal activities and corruption. Binney has stated that the scope of the data collection conducted by the NSA forms a map that can “show your entire life over time.”

In a new video interview with Russia Today posted below, Binney goes on to provide more details in light of the Petraeus/Allen scandal, and discusses Narus devices which can be accessed by agencies like the FBI that can in Binney’s words, “collect on the order over one hundred billion one thousand character e-mails a day. One device.”

Continue reading