A Primer on Wikileaks Espionage on Tor Exit Nodes

A Primer on Wikileaks Espionage on Tor Exit Nodes

A Primer on Wikileaks Espionage on Tor Exit Nodes


Note* Anon walks us through the bluster, and demonstrates just how Assange and Wikileaks compromised the TOR network. (AT)

In 2007, Dan Egerstad, Swedish security researcher, exposed how the
Tor network could easily be used for intelligence gathering: [1]

“Dan Egerstad is a Swedish security researcher; he ran five Tor
nodes. Last month, he posted a list of 100 e-mail credentials —
server IP addresses, e-mail accounts and the corresponding
passwords — for embassies and government ministries around the
globe, all obtained by sniffing exit traffic for usernames and
passwords of e-mail servers.”

Note that this was not a case of embassy staff using Tor to access
their own email accounts, which is absurd. This was a case of
blackhat hackers (or intelligence) using Tor to anonymously access
the compromised accounts. In fact, Egerstad states that the Iranian
government contacted him to thank him for having uncovered the
otherwise unknown compromise.

Also in 2007, a group of Canadian security researchers uncovered
`GhostNet,’ a vast spy network targetting Taiwanese, Vietnamese, and
American political figures, among others — including most notably
the Dalai Lama: [2][3]

“A vast electronic spying operation has infiltrated computers and
has stolen documents from hundreds of government and private
offices around the world, including those of the Dalai Lama,
Canadian researchers have concluded.”

China is strongly suspected of being behind GhostNet. [4] It’s
important to note the method by which the researchers were able to
uncover GhostNet: by monitoring the traffic of networks where data
was being exfiltrated — an unprecedented “electronic spy game.”
The researchers have not publicly stated which networks were being
monitored, but Egerstad and Kim Zetter of Wired magazine both
conclude that it was most likely Tor. [5]

In both these cases — that of lone researcher Egerstad, and that of
the University of Toronto research group — information was being
exfiltrated from compromised networks by hackers. The exfiltration
was then uncovered via network monitoring, aka `sniffing.’ In other
words, whitehat spies spied on blackhat spies.

In fact, Tor was admitedly designed for intelligence gathering
purposes by the Information Technology Division of the Naval
Research Laboratory of the United States Navy: [6]

“The purpose was for DoD / Intelligence usage (open source
intelligence gathering, covering of forward deployed assets,
whatever).”

But what does all this have to do with Wikileaks?

In January 2007, in a message sent to the then-secret Wikileaks
internal mailing list, Assange stated: [7]

“Hackers monitor chinese and other intel as they burrow into their
targets, when they pull, so do we. […] We have all of pre 2005
afghanistan. Almost all of india fed. Half a dozen foreign
ministries. […] We’re drowing. We don’t even know a tenth of
what we have or who it belongs to. We stopped storing it at 1Tb.”

What does “pull” mean, exactly? Who are these Chinese intelligence
sources, and how are “hackers” monitoring them? And what does
Assange mean by “when they pull, so do we?”

Given the trend documented above — i.e. whitehat spies spying on
blackhat spies — it is clear that “pull” refers to (Chinese)
blackhat exfiltration of data from compromised networks; and the
“so do we” refers to Wikileaks monitoring those exfiltration paths
(likely the Tor network) for any passing documents. In other words,
it could be construed that Wikileaks’ initial trove of documents were
not obtained from whistleblowers, but from spying on spies who were
using the Tor network to stay anonymous. This accusation has, indeed,
been leveled against the organization. [8] But is this really the
correct conclusion? Could it be a misunderstanding?

Consider the June 2010 profile on Assange and Wikileaks in The New
Yorker by Raffi Khatchadourian: [9]

“Before launching the site, Assange needed to show potential
contributors that it was viable. One of the WikiLeaks activists
owned a server that was being used as a node for the Tor network.
Millions of secret transmissions passed through it. The activist
noticed that hackers from China were using the network to gather
foreign governments’ information, and began to record this
traffic. Only a small fraction has ever been posted on WikiLeaks,
but the initial tranche served as the site’s foundation, and
Assange was able to say, `We have received over one million
documents from thirteen countries.’ ”

This seems to corroborate the statement by Assange on the Wikileaks
mailing list in 2007. However, could it have been a misquote? In June
2010, John Leyden of The Register begged Assange to clarify. [10]
Assange did not deny the statement he made to the Wikileaks mailing
list in 2007, nor the facts in The New Yorker article, only calling
the latter “misleading:”

“The imputation is incorrect. The facts concern a 2006
investigation into Chinese espionage one of our contacts were
involved in. Somewhere between none and handful of those
documents were ever released on WikiLeaks.”

That is, Assange dadmits a “handful” of documents obtained by
sniffing the Tor network were published by Wikileaks. What Assange
labels misleading is not the fact that Wikileaks published material
sniffed from the Tor network, but that Wikileaks was directly
involved in the espionage.

In sum, we have three distinct instances where Assange himself admits
that material obtained via espionage (sniffing the Tor network) was
published to Wikileaks. When pressed further, Assange replies —
“Get a life.” [11] — brushing aside the fact that the vast
majority of people, including his supporters, see serious ethical
issues in this type of behaviour. [12] In January 2011, an American
private security firm, Tiversa, stated that it had evidence that
Wikileaks had published sensitive documents obtained via espionage
on peer-to-peer networks. [13] The accusation is not new, nor unique.

Unfortunately, from all evidence, it seems espionage is the modus
operandi for Wikileaks.

[1] http://www.schneier.com/blog/archives/2 … d_t_1.html
[2] http://www.nytimes.com/2009/03/29/technology/29spy.html
[3] http://www.f-secure.com/weblog/archives/00001637.html
[4] http://news.bbc.co.uk/2/hi/7970471.stm
[5] http://www.wired.com/threatlevel/2009/0 … stem-focu/
[6] http://cryptome.org/0003/tor-spy.htm
[7] http://cryptome.org/wikileaks/wikileaks-leak2.htm
[8] http://www.wired.com/threatlevel/2010/0 … documents/
[9] http://www.newyorker.com/reporting/2010 … ntPage=all
[10] http://www.theregister.co.uk/2010/06/02 … ng_denial/
[11] http://motherjones.com/mojo/2010/06/wik … new-yorker
[12] http://ryansholin.com/2010/05/31/wikile … al-system/
[13] http://www.bloomberg.com/news/2011-01-2 … -data.html

 

http://pgpboard.com/viewtopic.php?f=2&t=458

Know Your Rights! Quiz

Know Your Rights! Quiz

Do you know what to do when the police try to seize your server, computer, or phone? Take our quiz to see how well you know your rights when law enforcement threatens your digital data.

1) The cops have a warrant to search my computer. They’re demanding my encryption key. Do I have to give it to them?
No, there are no circumstances under which you can be forced to give up an encryption key because it violates your constitutional right to due process.
No, you don’t have to give the encryption key to the police as they seize the computer, but it’s possible a court could make you do it later.
Yes, if the police have a warrant for your computer, it includes your encryption key. If you don’t tell them, you could be charged with obstructing justice.
Yes, in fact you should always give your encryption key to the police, even if they don’t have a warrant. It could help them in an investigation.

Federal Government Indicts Former Demand Progress Executive Director For Downloading Too Many Journal Articles

Cambridge, MA –  Moments ago, Aaron Swartz, former executive director and founder of Demand Progress, was indicted by the US government. As best as we can tell, he is being charged with allegedly downloading too many scholarly journal articles from the Web. The government contends that downloading said articles is actually felony computer hacking and should be punished with time in prison.

“This makes no sense,” said Demand Progress Executive Director David Segal; “it’s like trying to put someone in jail for allegedly checking too many books out of the library.”

“It’s even more strange because JSTOR has settled any claims against Aaron, explained they’ve suffered no loss or damage, and asked the government not to prosecute,” Segal added.

James Jacobs, the Government Documents Librarian at Stanford University, also denounced the arrest: “Aaron’s prosecution undermines academic inquiry and democratic principles,” Jacobs said. “It’s incredible that the government would try to lock someone up for allegedly looking up articles at a library.”

 

Demand Progress is collecting statements of support for Aaron on its website: http://act.demandprogress.org/sign/support_aaron/

“Aaron’s career has focused on serving the public interest by promoting ethics, open government, and democratic politics,” Segal said. “We hope to soon see him cleared of these bizarre charges.”

About Aaron

Aaron Swartz is a former executive director and founder of Demand Progress, a nonprofit political action group with more than 500,000 members.

He is the author of numerous articles on a variety of topics, especially the corrupting influence of big money on institutions including nonprofits, the media, politics, and public opinion. In conjunction with Shireen Barday, he downloaded and analyzed 441,170 law review articles to determine the source of their funding; the results were published in the Stanford Law Review. From 2010-11, he researched these topics as a Fellow at the Harvard Ethics Center Lab on Institutional Corruption.

He has also assisted many other researchers in collecting and analyzing large data sets with theinfo.org. His landmark analysis of Wikipedia, Who Writes Wikipedia?, has been widely cited. He helped develop standards and tutorials for Linked Open Data while serving on the W3C’s RDF Core Working Group and helped popularize them as Metadata Advisor to the nonprofit Creative Commons and coauthor of the RSS 1.0 specification.

In 2008, he created the nonprofit site watchdog.net, making it easier for people to find and access government data. He also served on the board of Change Congress, a good government nonprofit.

In 2007, he led the development of the nonprofit Open Library, an ambitious project to collect information about every book ever published. He also co-founded the online news site Reddit, where he released as free software the web framework he developed, web.py.

Press inquiries can be directed to [email protected] or 571-336-2637 begin_of_the_skype_highlighting            571-336-2637      end_of_the_skype_highlighting.

 

http://demandprogress.org/aaron

Member of Hacking Group LulzSec Arrested for June 2011 Intrusion of Sony Pictures Computer Systems

LOS ANGELES—A member of the LulzSec hacking group was arrested this morning for his role in an extensive computer attack against the computer systems of Sony Pictures Entertainment, announced André Birotte Jr., the United States Attorney in Los Angeles; and Steven Martinez, Assistant Director in Charge of the FBI’s Los Angeles Field Office.

Cody Kretsinger, 23, of Phoenix, Arizona, was arrested this morning by FBI agents without incident. On September 2, 2011, a federal grand jury returned an indictment filed under seal in U.S. District Court in Los Angeles charging Kretsinger with conspiracy and the unauthorized impairment of a protected computer. The federal indictment was unsealed this morning upon Kretsinger’s arrest.

From approximately May 27, 2011, through June 2, 2011, the computer systems of Sony Pictures Entertainment were compromised by a group known as “LulzSec,” or “Lulz Security,” whose members anonymously claimed responsibility on LulzSec’s website. Kretsinger, also known by the moniker “recursion,” is believed to be a current or former member of LulzSec. The extent of damage caused by the compromise at Sony Pictures is under investigation.

According to the indictment, Kretsinger resided in Tempe, Arizona at the time the alleged criminal activity took place. In order to carry out the attack, Kretsinger allegedly sed a proxy server in an attempt to mask or hide his Internet Protocol (IP) address. The indictment alleges that Kretsinger and other coconspirators obtained confidential information from Sony Pictures’ computer systems using an “SQL injection” attack against its website, a technique commonly used by hackers to exploit vulnerabilities and steal information.

The indictment alleges that Kretsinger and his co-conspirators distributed the stolen information, including by posting the information on LulzSec’s website, and then announced the attack via its Twitter account. The indictment further alleges that, in order to avoid detection by law enforcement, Kretsinger permanently erased the hard drive of the computer he used to conduct the attack on Sony Pictures.

LulzSec is known for its affiliation with the international group of hackers known as “Anonymous.” Anonymous, according to the indictment, is a collective of computer hackers and other individuals located throughout the world that conduct cyber attacks, including the dissemination of confidential information stolen from victims’ computers, against individuals and entities they perceive to be hostile to its interests.

In the recent past, LulzSec has been linked to the hacking or attempted hacking of numerous targets, including various websites that represent governmental or business entities, among others.

Kretsinger will make an initial appearance before a federal magistrate in U.S. District Court in Phoenix today. The government will request that Kretsinger be removed to Los Angeles, the district in which he was charged, to face prosecution. If convicted, Kretsinger faces a statutory maximum sentence of 15 years in prison. This investigation was conducted by the Electronic Crimes Task Force (ECTF) in Los Angeles. The ECTF is comprised of agents and officers from the FBI, United States Secret Service, Los Angeles Police Department, Los Angeles County Sheriff’s Department, United States Attorney’s Office, Los Angeles County District Attorney’s Office, and the California Highway Patrol.

This case is being prosecuted by the United States Attorney’s Office in Los Angeles.

An indictment merely contains allegations that a defendant has committed a crime. Every defendant is presumed innocent unless and until proven guilty at trial.

Media Contact:
FBI Media Relations: 310 996-3343

 

http://www.fbi.gov/losangeles/press-releases/2011/member-of-hacking-group-lulzsec-arrested-for-june-2011-intrusion-of-sony-pictures-computer-systems

How Google ‘Android’ Killed Net Neutrality

How Google ‘Android’ Killed Net Neutrality

“Why I Hate Android”

 

Why do I hate Android? It’s definitely one of the questions I get asked most often these days. And most of those that don’t ask probably assume it’s because I’m an iPhone guy. People see negative take after negative take about the operating system and label me as “unreasonable” or “biased” or worse.

I should probably explain.

Believe it or not, I actually don’t hate Android. That is to say, I don’t hate the concept of Android — in fact, at one point, I loved it. What I hate is what Android has become. And more specifically, what Google has done with Android.

Let’s turn back the clock. In 2006, the mobile landscape in the United States was almost unfathomably shitty. Motorola’s RAZR had been the top-selling device for something ridiculous like five straight years — and the only thing that didn’t suck about it was its physical size. The carriers completely controlled the industry. This cannot be overstated.

Then on January 9, 2007 — exactly 5 years ago today — Steve Jobs took the stage at Macworld to unveil the iPhone. Six months later it was released. While some laughed it off at the time, the mobile landscape completely changed.

Apple and Google were great allies at the time. They united over a common enemy: Microsoft. Then-Google CEO Eric Schmidt was even on Apple’s board of directors. Google was a huge part of original iPhone OS (before it was called iOS): Google Maps, YouTube, Google Search, etc. Apple could have launched the iPhone without Google, but it wouldn’t have been as good. And if they had to do something like build their own maps from scratch, it would have taken longer.

A few months later, on November 5, 2007, Google teamed up with many of the big players in the mobile/telecom space to announce the Open Handset Alliance. At the time it sounded promising, but perhaps it should have been the first warning sign. The first product of this partnership: Android. A beta was released, but it would take almost another year before the software was actually ready to go.

The initial Android prototypes looked a lot like BlackBerry devices (both in hardware and software). But the first device (the G1) and OS actually released was more of a cross between a T-Mobile Sidekick (which Android head Andy Rubin helped create while still a co-founder at Danger) and the iPhone OS.

In hindsight, Steve Jobs was clearly not happy about this and the subsequent iPhone-ification of Android. But great artists steal, etc, etc. The only thing I didn’t like about Android at the time was that it was a shitty copy of the iPhone. It was something you couldn’t pay me to use. And most people seemed to feel the same way.

Jobs probably didn’t say much at the time because he didn’t have to. The market was saying it.

Time went on and it was pretty clear that despite the major players involved in the OHA, Android wasn’t getting a lot of traction. Meanwhile, the iPhone, after a price-cut and addition of 3G technology, was soaring. So Google did the logical thing, they went to see Verizon, the largest U.S. carrier, and struck a deal.

Remember, Apple still had an agreement with AT&T for exclusive iPhone rights in the U.S. at the time. Verizon and Google needed each other. But Google clearly needed Verizon more. This was the first real problem. A deal with the devil was struck.

Let’s back up for a second.

Even before Android’s launch, Google clearly had big dreams for the mobile space. “Your mobile phone should be free,” Eric Schmidt told Reuters in late 2006. He envisioned a world in which consumers didn’t have to pay for their mobile phones — advertising (served by Google, naturally) would subsidize the cost. And we’re not talking “free” with a two-year carrier contract. We’re talking free free.

In the pre-iPhone world this may have sounded like crazy-talk. But remember, as an Apple board member and having purchased Android for Google in 2005, Schmidt knew what was coming down the pipe. He absolutely intended to disrupt the mobile market.

But again, the initial releases of Android simply didn’t have the traction needed to come close to fulfilling Schmidt’s (and Google’s) dream. So deals with the carriers had to be made.

Still, Google hung on to the hope of a free phone. That phone was called the Nexus One.

At an event in January of 2010, Google unveiled their plan for Nexus One — the first real “Google Phone” as it were. While they were cautious and cagey with some details, the goal seemed clear: Google intended to blow up the carrier market (in the U.S. first) by moving phone distribution online, flattening it in the process. The idea was that you’d go to a website and pick the phone you wanted, then pick the carrier you wanted, pay, and you’d be done.

Think about this for a second. Instead of going to the store of a single carrier and having a dozen shitty phones shoved in your face by salespeople that made commission, you’d be in total control of the process. The end result of consumers getting to choose their carriers (and phones and plans) was clear: major competition and subsequently a rush of better deals from said carriers to ensure customer activation and retention.

Or, you could buy whatever phone you wanted unlocked. Eventually, pay-as-you-go SIM cards would pop up in the U.S. as a result.

This was to be the dawn of the golden age of mobile in this country. As I wrote at the time: Apple And Google Just Tag Teamed The U.S. Carriers. I loved it.

But it was never meant to be.

What should have been obvious at the time but for whatever reason wasn’t (maybe because carrier representatives were at the event), the carriers hated this plan. And for good reason — it was going to turn them into dumb pipes that competed on price. There was no way they were going to let this fly, and they didn’t. Within a few months, citing weak sales of the Nexus One, Google scrapped their ambitious website and instead got fully in bed with the carriers.

But there was more.

What no one knew at the time, and I only heard months later, was Google’s original vision for the Nexus One. Google intended to sell it for $99 without a contract and unlocked. Yes, a $99 unlocked phone, subsidized by Google ads.

But the plan had one little problem: Google didn’t operate their own cellular network. They needed Verizon or AT&T or Sprint or T-Mobile to help them out. Google probably thought their open spectrum deal “win” in early 2008 gave them the leverage they needed here. Sadly, it did not.

All of the carriers laughed in Google’s face when presented with the ambitious Nexus One plan. And given that Google had just signed the all-important deal with Verizon, it was never going to happen.

So instead, at the Nexus One launch we got a website where you could indeed buy an unlocked Android phone — for $529. Nonstarter.

Better yet, while they said they were committed at the time, Verizon and Sprint never even got around to supporting the Nexus One at all. That’s how much they were behind the project.

To complicate matters further, behind the scenes, Verizon and Google were arguing over Net Neutrality rules. Verizon was opposed, Google was in favor. Then a funny thing happened. Google started supporting Verizon’s viewpoint on the matter! If you’re looking for the first post where I’m really, truly, pissed off at Google, look no further.

It. Was. Total. Fucking. Bullshit.

A few months later, guess what happened? Thanks to the Google/Verizon alliance on the matter, the FCC decided the compromised vision of Net Neutrality was just fine also. To be clear: Net Neutrality was thrown out in the wireless space because Google sided with Verizon’s ridiculous and horribly conflicted stance on the matter.

The open spectrum enemy, turned Net Neutrality enemy, became Google’s bedmate thanks to a business deal. Straight up. Greed, for lack of a better word, is good.

We got all of this thanks to Google’s desire for Android to take over the world. I commented earlier that they signed a deal with the devil — I wasn’t being facetious. They actually did! And they got away with it!

I think about these things everyday that I see positive news about Android. It’s so wonderful that the platform which helped cripple Net Neutrality and is keeping the evil carriers in control is taking off. Make no mistake: Android is now the carriers’ best friend.

Because Google sloppily decided to do the Motorola deal (driven by the full-on patent war, for which Apple and Microsoft, and not Google, are largely to blame), and because the model isn’t great for all but the biggest player, now the OEMs may be our best hope against the carrier/Android alliance.

Eventually, many of them will try to do their own thing (perhaps even using Android as a base) because they’re not idiots, they see where the real money is: controlling the entire experience. Like Apple.

All of this backstory knowledge fuels my rage. When I see Google talk about how “open” the platform is, setting it up as the foil to the “closed” (and framed as “evil”) iPhone, I want to scream and rip someone’s head off. It’s not only the most extreme example of being disingenuous that I can ever recall seeing — it’s nuclear bullshit.

Apple, for all the shit they get for being “closed” and “evil”, has actually done far more to wrestle control back from the carriers and put it into the hands of consumers. Google set off to help in this goal, then stabbed us all in the back and went the complete other way, to the side of the carriers. And because they smiled the entire time they were doing it and fed us this “open” bullshit, we thanked them for it. We’re still thanking them for it!

When you think about it in the context of this election season we’re entering, it’s a brilliant political maneuver that Google has pulled off with Android. They’ve taken something they’ve done that’s actually bad for us and spun it in such a way that most people actually buy into it being good for us.

And for the carriers, Android is the best thing ever because it’s the new “opiate for the masses”. Everything shitty they’re doing is great because they’re doing it with Android — at least it’s not iOS. What a load of horseshit.

I realize that the Android team at Google has a lot of good people doing great work. I know some of them. I respect them. But I cannot respect their decision to continue to work on this platform that perpetuates our imprisonment. I have to believe most simply chose not to think about these things. But they should. They really should.

There’s no denying that there are upsides to open — a lot of them. But in the case of Android, “open” has been hijacked and wildly contorted so as to mask the shady side of what’s really been going on. And it’s working.

So that, ladies and gentleman, is why I hate Android. It has nothing to do with the actual product (which continues to improve every year and is quite good now). It has to do with a promise that was broken and swept under the rug.

As crazy as it may sound to some of you, beyond a full OEM revolt (which could ultimately benefit the carriers as well), our hope now lies with Apple and Microsoft.

Apple, because they put the consumer first and have proven time and time again that they will not bend to carrier bullshit and will often work against them behind the scenes. And they control the all-important Apple stores for distribution (and, of course, the App Store).

Microsoft, because they have a model (many handsets on all carriers) that can potentially scale better than Apple’s can while still giving control (mostly) to the users. And they have Nokia on board with their plan. And they have intersections with products like Xbox. (Though it may be too late in the U.S.)

Perhaps more people will relate to this: I hate Android for the same reason that Severus Snape hates Harry Potter — the very sight reminds me of something so beautiful, that was taken. Except it’s worse. It’s as if Harry Potter has grown up to become Voldemort.

Security Protocols of Instant Messaging Applications

Security Protocols of Instant Messaging Applications

How safe is instant messaging? A security and privacy survey

The number of interested parties eager to listen in on your online conversations, including what you type through instant messaging, has never been higher.

It’s trivial to monitor unencrypted wireless networks and snatch IM passwords as they flow through the ether. Broadband providers and their business partners are enthusiastically peeking into their customers’ conversations. A bipartisan majority in Congress has handed the FBI and shadowy government agencies greater surveillance authority than ever before.

The need, in other words, for secure IM communication has never been greater. But not all IM networks offer the same privacy and security. To chart the differences, CNET News.com surveyed companies providing popular IM services and asked them to answer the same 10 questions.

One focus was how secure the IM service was–in other words, does it protect users against eavesdropping? It’s been 12 years since the introduction of ICQ in 1996, and 20 years since the Usenix paper (PDF) describing the Zephyr IM protocol that spread to MIT and Carnegie Mellon University. By now, encryption should be commonplace.

We found that only half of the services provide complete encryption: AOL Instant Messenger, Google Talk, IBM’s Lotus Sametime, and Skype do. To their credit, not one service says it keeps logs of the content of users’ communications (a certain lure for federal investigators or snoopy divorce attorneys). For connection logs, Microsoft alone said it keeps none at all–though Google and Skype said their logs were deleted after a short time.

Encryption is important. If you’re using an open wireless connection, anyone who downloads free software like dSniff can intercept unencrypted IM communications streams. WildPackets sells to police an EtherPeek plug-in it says can intercept and decode unencrypted IM conversations in wiretap situations (plus Web-based e-mail, VoIP calls, and so on).

All surveys have limitations, including ours. The fact that IM encryption is used is insufficient; it could always be a poor choice of an algorithm or there could be implementation errors that allow it to be bypassed in practice. Our survey will not be the final word in this area.

Jabber is worth a special note. While nearly all of our survey respondents use proprietary, closed systems, Jabber is based on open standards set by the Internet Engineering Task Force. Formally called XMPP, Jabber lets organizations run their own servers and tends to be more flexible.

Google adopted it for Google Talk, and other clients that support Jabber include Apple’s iChat, Adium (OS X), Trillian Pro (with a plug-in), and Psi. Jabber uses encryption both to log on and to protect conversations once a connection is established. We didn’t formally include it in our survey because anyone can set up their own Jabber server with their own configuration.

Facebook Chat is the least secure and privacy-protective of the lot. As far as we can determine, it fails to use encryption to protect logging in (thus passwords can be gleaned) and fails to secure the conversations, too. We’d like to tell you more about Facebook Chat, but the company sent us a one-line e-mail message saying it was refusing to answer the same questions that its competitors did with little fuss.

We intentionally left out Apple because its iChat software uses the AOL Instant Messenger network. Macintosh users who have purchased a .Mac membership can activate encryption for IM, audio and video chats, and file transfers.

 

Secure logging-in Secure conversations Logs kept of user logins Logs kept of message content For how long Government wiretapping
AOL AIM Yes Yes Yes No Won’t say Won’t say
AOL ICQ Yes No Yes No Won’t say Won’t say
Facebook Chat[1] No No Refused to answer Refused to answer[2] Refused to answer Refused to answer
Google Talk Yes Yes[3] Yes No[4] Four weeks Won’t say
IBM Lotus Sametime Yes Yes Yes Configurable Configurable N/A
Microsoft’s Windows Live Messenger Yes No[5] No No N/A Won’t say
Skype Yes Yes Yes No “A short time” Cannot comply with wiretaps[6]
Yahoo Messenger Yes No Yes No As long as “necessary” Won’t say

[1] Over the course of a week, Facebook refused to reply to questions.
[2] Facebook has said both that chat history “is not logged permanently” and that it is archived for 90 days.
[3] Encryption is on by default for the downloadable client, off by default for the Web, and not supported with the Google Talk Gadget.
[4] Configurable: users can choose to log conversations in their Gmail chat archives if they wish.
[5] Conversations are unencrypted, but files exchanged via Windows Live Messenger are encrypted.
[6] Skype was the only IM company that said it could not perform a live interception if presented with a wiretap request: “Because of Skype’s peer-to-peer architecture and encryption techniques, Skype would not be able to comply with such a request.”

AOL’s responses for AOL Instant Messenger (AIM)

 

Q: Does your service use encryption for authentication when users log on?

Yes

Q: Does your service use encryption for message delivery, meaning when your users send and receive messages?

Yes

Q: Is encryption turned on or off by default?

On by default

Q: Does your service support the OTR (Off the Record) standard? If it uses non-OTR encryption, what kind?

No. AIM supports TLS. [Ed. Note: TLS, or Transport Layer Security, is the successor to Secure Sockets Layer. It supports a variety of cryptographic ciphers for scrambling the content of messages, including AES and Triple DES. It also provides methods for authentication.]

Q: Does your service keep server-based logs of connection information, such as when a particular user signs on or off and from what IP address? If so, what information is stored?

Yes, we keep logs of connection information, such as sign on/off and IP address.

Q: Does your service keep server-based logs of the content of communications, meaning what a particular user sent and received?

No

Q: If any connection or content logs are stored, how long is each type kept?

Connection logs are retained according to the needs of the business for operational and quality control purposes and then regularly deleted.

Q: Have you ever received a subpoena, court order or other law enforcement request asking you to turn over information about a user’s IM account?

Yes

Q: If so, how many law enforcement requests have you received?

We do not share details about requests we receive from law enforcement.

Q: Have you ever received a subpoena, court order or other law enforcement request asking you to perform a live interception or wiretap, meaning the contents of your users’ communications would be instantly forwarded to law enforcement?

We do not share details about requests we receive from law enforcement.

AOL’s responses for ICQ

 

Q: Does your service use encryption for authentication when users log on?

Yes

Q: Does your service use encryption for message delivery, meaning when your users send and receive messages?

No. Message delivery encryption is under consideration for future product releases.

Q: Is encryption turned on or off by default?

N/A

Q: Does your service support the OTR standard? If it uses non-OTR encryption, what kind?

No

Q: Does your service keep server-based logs of connection information, such as when a particular user signs on or off and from what IP address? If so, what information is stored?

Yes, we keep logs of connection information, such as sign on/off and IP address.

Q: Does your service keep server-based logs of the content of communications, meaning what a particular user sent and received?

No

Q: If any connection or content logs are stored, how long is each type kept?

Connection logs are retained according to the needs of the business for operational and quality control purposes and then regularly deleted.

Q: Have you ever received a subpoena, court order or other law enforcement request asking you to turn over information about a user’s IM account?

Yes

Q: If so, how many law enforcement requests have you received?

We do not share details about requests we receive from law enforcement.

Q: Have you ever received a subpoena, court order or other law enforcement request asking you to perform a live interception or wiretap, meaning the contents of your users’ communications would be instantly forwarded to law enforcement?

We do not share details about requests we receive from law enforcement.

Google’s responses for Google Talk

 

Q: Does your service use encryption for authentication when users log on?

Yes.

Q: Does your service use encryption for message delivery, meaning when your users send and receive messages?

Our download client uses encryption. Our Web client sends messages in plain text, but users can opt in to HTTPS if they want encryption. HTTPS does not currently work with the Google Talk Gadget.

Q: Is encryption turned on or off by default?

Encryption is turned on by default for the download client and off by default for the Web client.

Q: Does your service support the OTR standard? If it uses non-OTR encryption, what kind?

Google clients do not currently support OTR. We use TLS for XMPP client to server, and HTTPS for Web clients if users opt in. [Ed. Note: TLS, or Transport Layer Security, is the successor to Secure Sockets Layer. It supports a variety of cryptographic ciphers for scrambling the content of messages, including AES and Triple DES. It also provides methods for authentication.]

Q: Does your service keep server-based logs of connection information, such as when a particular user signs on or off and from what IP address? If so, what information is stored?

The service logs standard data, including the IP address, user name, time stamp, and client type, but does not log chat content.

Q: Does your service keep server-based logs of the content of communications, meaning what a particular user sent and received?

Users may choose to chat “off the record’ in which case chats are not saved in their Gmail chat archives. If a user does not go “off the record,” then chat communications are saved and viewable to the participants of the chat within their Gmail account.

Q: If any connection or content logs are stored, how long is each type kept?

The service logs standard data (including the IP address, user name, time stamp, and client type), and stores this data for four weeks. Connection logs not tied to a Gmail account are kept for as long as they are useful. Users may choose to chat “off the record” in which case chats are not saved in their Gmail chat archives. If a user does not go “off the record” then chat communications are saved and viewable to the participants of the chat within their Gmail account.

Q: Have you ever received a subpoena, court order or other law enforcement request asking you to turn over information about a user’s IM account?

As a matter of policy, we do not comment on the nature or substance of law enforcement requests to Google. Whenever possible, we do our best to notify the subject named in such requests in order to give them the opportunity to object.

Q: If so, how many law enforcement requests have you received?

As a matter of policy, we do not share this information.

Q: Have you ever received a subpoena, court order or other law enforcement request asking you to perform a live interception or wiretap, meaning the contents of your users’ communications would be instantly forwarded to law enforcement?

As a matter of policy, we do not comment on the nature or substance of law enforcement requests to Google. Whenever possible, we do our best to notify the subject named in such requests in order to give them the opportunity to object.

IBM’s responses for Lotus Sametime

[Ed. Note: IBM appended this explanation to its response: “Lotus Sametime is an enterprise on-premise unified communications solution. While IBM Global Technology Services offers managed hosting services for Lotus Sametime, it is typically sold as an on-premise solution. Answers below reflect Sametime as an on-premise solution. The answers would also apply for a hosted offering from IBM or IBM Business Partners.”]

Q: Does your service use encryption for authentication when users log on?

As enterprise-grade software, Lotus Sametime offers the security that businesses require. Lotus Sametime authentication gives businesses the confidence of knowing that the people they communicate with are who they say they are, while password protection helps ensure that only invited participants can attend Web conferences. By default, all authentication and authorization credentials are encrypted using 128-bit encryption. Lotus Sametime also supports compliance with FIPS-140, the U.S. Department of Defense standard.

Q: Does your service use encryption for message delivery, meaning when your users send and receive messages?

Yes, Lotus Sametime software can encrypt presence, instant messages, Web conferences, VoIP voice chats, and point-to-point video conversa?tions to help businesses protect sensitive information. By default, Lotus Sametime uses 128-bit encryption, Lotus Sametime also supports compliance with FIPS-140, the U.S. Department of Defense standard.

Q: Is encryption turned on or off by default?

Encryption is turned on by default.

Q: Does your service support the OTR standard? If it uses non-OTR encryption, what kind?

Lotus Sametime does not support the OTR standard. By default Lotus Sametime uses 128-bit RC2 encryption. Lotus Sametime also supports compliance with FIPS-140, the U.S. Department of Defense standard.

Q: Does your service keep server-based logs of connection information, such as when a particular user signs on or off and from what IP address?

Yes, Lotus Sametime provides a variety of logging options that are configurable by the system administrator. Through the Sametime Tool Kits, Sametime also integrates with a variety of third-party compliance software.

Q: Does your service keep server-based logs of the content of communications, meaning what a particular user sent and received?

The system administrator has the ability to configure these types of capabilities. This type of information can also be captured by third-party compliance software such as Facetime, Akonix, and Symantec.

Q: If any connection or content logs are stored, how long is each type kept?

Lotus Sametime provides the flexibility to keep the logs for as long as a business requires. The system administrator sets the duration of the storage of the logs based on the needs of the enterprise.

Q: Have you ever received a subpoena, court order or other law enforcement request asking you to turn over information about a user’s IM account?

This question does not apply to Sametime because it is not a service.

Q: If so, how many law enforcement requests have you received?

This question does not apply to Sametime because it is not a service.

Q: Have you ever received a subpoena, court order or other law enforcement request asking you to perform a live interception or wiretap, meaning the contents of your users’ communications would be instantly forwarded to law enforcement?

This question does not apply to Lotus Sametime because it is not a service.

Microsoft’s reply for Windows Live (MSN) Messenger

 

Q: Does your service use encryption for authentication when users log on?

Windows Live Messenger accounts that are accessed upon authentication of a user’s Windows Live ID and password are protected by industry standard SSL encryption. [Ed. Note: SSL is Secure Sockets Layer, also known as Transport Layer Security.]

Q: Does your service use encryption for message delivery, meaning when your users send and receive messages?

We do not provide encryption for instant messages at this time. However, if a customer chooses to send or receive messages that contain a file, like a document or photo, Windows Live Messenger protects those files with the industry standard SSL encryption.

Q: Is encryption turned on or off by default?

Encryption of file transfer functions automatically and cannot be turned off.

Q: Does your service support the OTR standard? If it uses non-OTR encryption, what kind?

Windows Live does not use the OTR standard. Windows Live Messenger accounts are protected by industry standard SSL encryption.

Q: Does your service keep server-based logs of connection information, such as when a particular user signs on or off and from what IP address? If so, what information is stored?

Windows Live Messenger does not maintain server-based logs of connection information. Microsoft is committed to protecting the privacy of its customers and believes they deserve to have their personal data used only in ways described to them. Microsoft’s privacy policy informs our customers of the ways in which they can control the collection, use and disclosure of their personal information. More information is available on Microsoft’s privacy policy at: http://privacy.microsoft.com/en-us/default.aspx.

Q: Does your service keep server-based logs of the content of communications, meaning what a particular user sent and received?

Windows Live Messenger does not maintain server-based logs of the content of messages that our customers send or receive. Microsoft is committed to protecting the privacy of its customers and believes they deserve to have their personal data used only in ways described to them. Microsoft’s privacy policy informs our customers of the ways in which they can control the collection, use and disclosure of their personal information. More information is available on Microsoft’s privacy policy at: http://privacy.microsoft.com/en-us/default.aspx.

Q: If any connection or content logs are stored, how long is each type kept?

Not applicable.

Q: Have you ever received a subpoena, court order or other law enforcement request asking you to turn over information about a user’s IM account?

We do not comment on specific requests from the government. Microsoft is committed to protecting the privacy of our customers and complies with all applicable privacy laws. In particular, the Electronic Communications Privacy Act (“ECPA”) protects customer records and the communications of customers of online services. As set forth above, however, Microsoft does not maintain records about our customers’ use of the IM service and would have no information to provide in response to a request from law enforcement.

Q: If so, how many law enforcement requests have you received?

We do not disclose how many government requests we receive; in certain circumstances, we are not permitted by law to disclose that we have received a government order. However, we follow ECPA in responding to all requests.

Q: Have you ever received a subpoena, court order or other law enforcement request asking you to perform a live interception or wiretap, meaning the contents of your users’ communications would be instantly forwarded to law enforcement?

We do not comment on specific requests from the government, but in general, we provide the government with the contents of communications intercepted in real-time only pursuant to a court order.

Skype

 

Q: Does your service use encryption for authentication when users log on?

Yes.

Q: Does your service use encryption for message delivery, meaning when your users send and receive messages?

Yes. Skype’s tight security model is integrally linked to its underlying peer-to-peer (P2P) architecture. As a result, Skype’s traffic cannot be intercepted and decoded while in transit. In short, Skype provides transport-layer security to ensure that message content traveling over Skype cannot be tapped or intercepted.

Q: Is encryption turned on or off by default?

Skype’s encryption is always on and cannot be turned off.

Q: Does your service support the OTR standard? If it uses non-OTR encryption, what kind?

No. Skype employs strong end-to-end encryption using 256-bit AES, which is then authenticated by PKI cryptography, to guarantee authenticity, secrecy, and integrity of communication over Skype.

Q: Does your service keep server-based logs of connection information, such as when a particular user signs on or off and from what IP address? If so, what information is stored?

Where servers are used to facilitate the offering of a product such as SkypeOut, only username, version, and IP address are stored.

Q: Does your service keep server-based logs of the content of communications, meaning what a particular user sent and received?

No. Skype does not record any content from communications.

Q: If any connection or content logs are stored, how long is each type kept?

Connection logs are kept for only a short time.

Q: Have you ever received a subpoena, court order or other law enforcement request asking you to turn over information about a user’s IM account?

Yes. We co-operate with law enforcement agencies as much as is legally and technically possible.

Q: If so, how many law enforcement requests have you received?

That is confidential information.

Q: Have you ever received a subpoena, court order or other law enforcement request asking you to perform a live interception or wiretap, meaning the contents of your users’ communications would be instantly forwarded to law enforcement?

We have not received any subpoenas or court orders asking us to perform a live interception or wiretap of Skype-to-Skype communications. In any event, because of Skype’s peer-to-peer architecture and encryption techniques, Skype would not be able to comply with such a request.

Yahoo’s response for Yahoo Messenger

 

Q: Does your service use encryption for authentication when users log on?

Yahoo Messenger for the Web and the current downloadable Yahoo Messenger uses SSL to protect the user’s password during authentication. [Ed. Note: SSL is Secure Sockets Layer, also known as Transport Layer Security.]

Q: Does your service use encryption for message delivery, meaning when your users send and receive messages?

Yahoo Messenger does not use encryption for message delivery.

Q: Is encryption turned on or off by default?

The encryption as described above in No. 1 is on by default.

Q: Does your service support the OTR standard? If it uses non-OTR encryption, what kind?

Yahoo Messenger does not use Off-the-Record cryptographic protocol. We use the Secure Sockets Layer (SSL) standard during password authentication as described in our answer to No. 1.

Q: Does your service keep server-based logs of connection information, such as when a particular user signs on or off and from what IP address? If so, what information is stored?

Yahoo logs Messenger activity consistent with Web-based services generally.

Q: Does your service keep server-based logs of the content of communications, meaning what a particular user sent and received?

Yahoo Messenger provides users with the ability to store and retrieve their IM messages. Users can choose not to use this convenient feature. Most versions of the downloadable Yahoo Messenger store conversations on the user’s computer while Yahoo Messenger for the Web stores these conversations on Yahoo servers.

Q: If any connection or content logs are stored, how long is each type kept?

Yahoo retains data as necessary to help comply with financial, legal, and security obligations, and for research purposes to improve our users’ experience with Messenger.

Q: Have you ever received a subpoena, court order or other law enforcement request asking you to turn over information about a user’s IM account?

Yahoo responds to law enforcement in compliance with all applicable laws.

Q: If so, how many law enforcement requests have you received?

Given the sensitive nature of this area and the potential negative impact on the investigative capabilities of public safety agencies, Yahoo does not discuss the details of law enforcement compliance. Yahoo responds to law enforcement in compliance with all applicable laws.

Q: Have you ever received a subpoena, court order or other law enforcement request asking you to perform a live interception or wiretap, meaning the contents of your users’ communications would be instantly forwarded to law enforcement?

Given the sensitive nature of this area and the potential negative impact on the investigative capabilities of public safety agencies, Yahoo does not discuss the details of law enforcement compliance. Yahoo responds to law enforcement in compliance with all applicable laws.

News.com’s Anne Broache contributed to this report

 

 

 

 

Declan McCullagh is the chief political correspondent for CNET. Declan previously was a reporter for Time and the Washington bureau chief for Wired and wrote the Taking Liberties section and Other People’s Money column for CBS News’ Web site.

How to Beat Facial Recognition & the Surveillance State

How to Beat Facial Recognition & the Surveillance State

Big Brother is watching you, though probably not in the ways most of us would imagine.

Sure, the cameras at banks or airport checkpoints may be on the lookout for robbers or would-be terrorists, using facial recognition technology to match pictures to existing ones. But private enterprise is busy as well.

If you tag a picture of yourself on Facebook or Google’s Picasa, that image can be used to identify you in other pictures.

Adam Harvey says the technology is intruding on your right to privacy, and he’s figured out some low-tech ways to outsmart them.

“Don’t ask me about privacy, because I tend to talk too long about it,” he said. “When we live in an environment where we’re constantly being monitored, we cherish the right just to talk to someone face-to-face.”

Harvey, a New York web designer, started a project called CV Dazzle when he was getting his master’s degree at New York University in 2010. His objective: to show people how to hide in plain sight.

If you look at the images he generated, you’ll get a sense of what he has in mind. Face-recognition software looks for key points on one’s face, such as eyes, nose, and mouth, and where they meet and the distance between them. So he suggests simple ways to block them.

A spike of hair proved to be effective if it covered the area where the eyes, forehead and nose come together. Computer-vision software often looks for that spot, said Harvey, and will not detect a face without it.

Similarly, he said, a bit of face paint will confuse a computer. Harvey said he found that black geometric shapes, painted on one’s cheeks, would prevent a machine from registering that it was looking at a face.

Of course, these are not things that most people would do to their faces — but Harvey joked that in New York, where he lives, people with eccentric hairdos or makeup wouldn’t stand out much. And they’re more effective than hoodies or baseball caps pulled over one’s face. In those cases the software is unnecessary; people simply look as if they have something to hide.

Of course, the issue of privacy is complicated, especially when you’re talking about privacy in a public place. Richard Falkenrath, a principal with the Chertoff Group of security consultants who was an advisor on homeland security in the Bush administration, said facial recognition is not widely used in the United States except at places like security checkpoints. He looked at Adam Harvey’s work and said it would be most useful in social media, not as a way to get around government security.

“There are clearly certain activities for which you have no reasonable expectation of privacy,” Falkenrath said. “When you take out the garbage, people see you. When you walk down the street, people can take pictures of you.”

Would work like Harvey’s be helpful to criminals — the very people who ought not to be able to hide? Falkenrath said he didn’t think so, and Harvey said he did not intend it that way.

“This project is not about dodging the law, it’s about adapting to living in surveillance societies,” he said.

“In the next decade we’ll have to figure out how to balance security with privacy and move on,” Harvey said. “The research I’m doing is aimed at integrating fashion, privacy and technology to make real products that people can use.”

Stallman, Founder of GNU/Linux Predicted NDAA & SOPA

Stallman, Founder of GNU/Linux Predicted NDAA & SOPA

Richard Stallman Was Right All Along:

Late last year, president Obama signed a law that makes it possible to indefinitely detain terrorist suspects without any form of trial or due process. Peaceful protesters in Occupy movements all over the world have been labelled as terrorists by the authorities. Initiatives like SOPA promote diligent monitoring of communication channels. Thirty years ago, when Richard Stallman launched the GNU project, and during the three decades that followed, his sometimes extreme views and peculiar antics were ridiculed and disregarded as paranoia – but here we are, 2012, and his once paranoid what-ifs have become reality.

Up until relatively recently, it’s been easy to dismiss Richard Stallman as a paranoid fanatic, someone who lost touch with reality long ago. A sort of perpetual computer hippie, the perfect personification of the archetype of the unworldly basement-dwelling computer nerd. His beard, his hair, his outfits – in our visual world, it’s simply too easy to dismiss him.

His views have always been extreme. His only computer is a Lemote Yeelong netbook, because it’s the only computer which uses only Free software – no firmware blobs, no proprietary BIOS; it’s all Free. He also refuses to own a mobile phone, because they’re too easy to track; until there’s a mobile phone equivalent of the Yeelong, Stallman doesn’t want one. Generally, all software should be Free. Or, as the Free Software Foundation puts it:

 

As our society grows more dependent on computers, the software we run is of critical importance to securing the future of a free society. Free software is about having control over the technology we use in our homes, schools and businesses, where computers work for our individual and communal benefit, not for proprietary software companies or governments who might seek to restrict and monitor us.

I, too, disregarded Stallman as way too extreme. Free software to combat controlling and spying governments? Evil corporations out to take over the world? Software as a tool to monitor private communication channels? Right. Surely, Free and open source software is important, and I choose it whenever functional equivalence with proprietary solutions is reached, but that Stallman/FSF nonsense is way out there.

But here we are, at the start of 2012. Obama signed the NDAA for 2012, making it possible for American citizens to be detained indefinitely without any form of trial or due process, only because they are terrorist suspects. At the same time, we have SOPA, which, if passed, would enact a system in which websites can be taken off the web, again without any form of trial or due process, while also enabling the monitoring of internet traffic. Combine this with how the authorities labelled the Occupy movements – namely, as terrorists – and you can see where this is going.

In case all this reminds you of China and similarly totalitarian regimes, you’re not alone. Even the Motion Picture Association of America, the MPAA, proudly proclaims that what works for China, Syria, Iran, and others, should work for the US. China’s Great Firewall and similar filtering systems are glorified as workable solutions in what is supposed to be the free world.

The crux of the matter here is that unlike the days of yore, where repressive regimes needed elaborate networks of secret police and informants to monitor communication, all they need now is control over the software and hardware we use. Our desktops, laptops, tablets, smartphones, and all manner of devices play a role in virtually all of our communication. Think you’re in the clear when communicating face-to-face? Think again. How did you arrange the meet-up? Over the phone? The web? And what do you have in your pocket or bag, always connected to the network?

This is what Stallman has been warning us about all these years – and most of us, including myself, never really took him seriously. However, as the world changes, the importance of the ability to check what the code in your devices is doing – by someone else in case you lack the skills – becomes increasingly apparent. If we lose the ability to check what our own computers are doing, we’re boned.

That’s the very core of the Free Software Foundation’s and Stallman’s beliefs: that proprietary software takes control away from the user, which can lead to disastrous consequences, especially now that we rely on computers for virtually everything we do. The fact that Stallman foresaw this almost three decades ago is remarkable, and vindicates his activism. It justifies 30 years of Free Software Foundation.

And, in 2012, we’re probably going to need Free and open source software more than ever before. At the Chaos Computer Congress in Berlin late last year, Cory Doctorow held a presentation titled “The Coming War on General Purpose Computation“. In it, Doctorow warns that the general purpose computer, and more specifically, user control over general purpose computers, is perceived as a threat to the establishment. The copyright wars? Nothing but a prelude to the real war.

“As a member of the Walkman generation, I have made peace with the fact that I will require a hearing aid long before I die, and of course, it won’t be a hearing aid, it will be a computer I put in my body,” Doctorow explains, “So when I get into a car – a computer I put my body into – with my hearing aid – a computer I put inside my body – I want to know that these technologies are not designed to keep secrets from me, and to prevent me from terminating processes on them that work against my interests.”

And this is really the gist of it all. With computers taking care of things like hearing, driving, and more, we really can’t afford to be locked out of them. We need to be able to peek inside of them and see what they’re doing, to ensure we’re not being monitored, filtered, or whatever. Only a short while ago I would’ve declared this as pure paranoia – but with all that’s been going on recently, it’s no longer paranoia. It’s reality.

“Freedom in the future will require us to have the capacity to monitor our devices and set meaningful policy on them, to examine and terminate the processes that run on them, to maintain them as honest servants to our will, and not as traitors and spies working for criminals, thugs, and control freaks,” Doctorow warns, “And we haven’t lost yet, but we have to win the copyright wars to keep the Internet and the PC free and open. Because these are the materiel in the wars that are to come, we won’t be able to fight on without them.”

This is why you should support Android (not Google, but Android), even if you prefer the iPhone. This is why you should support Linux, even if you use Windows. This is why you should support Apache, even if you run IIS. There’s going to be a point where being Free/open is no longer a fun perk, but a necessity.

And that point is approaching fast.

SOURCE by Thom Holwerda on Mon 2nd Jan 2012 19:12 UTC

POLICE ENCOUNTERS: Top 3 Things To Remember

POLICE ENCOUNTERS: Top 3 Things To Remember

Flex your rights: The top 3 things to do in every police encounter

Dealing with police in the U.S. can be a touchy situation, no matter who you are, where you’re going, or what you’re up to. That’s why three law enforcement experts attending the 2011 Drug Policy Alliance conference in Los Angeles decided to stage a panel discussion about what people can do to prevent police encounters from becoming seriously detrimental to one’s life.

While the conversation was wide-ranging and covered a lengthy variety of topics, there were several main points they all made that can help every single person to deal with police in a manner that limits the potential for arrest or violence.                    (more…)

Beast1333: Templars of Hip Hop Present – Anonymous

http://www.youtube.com/watch?v=1XFSAeLo65Q

Distributed denial of Service
the Barbs are Stacheldrat
When DOS attacks
Suits without a Head
Get scared and shit they Slacks
See what we lacks A Sense of Compassion
our Justice must be Swift
Hal Turner hurting the pockets
of White Supremacists
These Nemesises
Never This Vicious
We Troll the Net for Missions
If evils your position
Your files gonna come up Missing

(more…)

Anonymous: A Message to NATO

http://www.youtube.com/watch?v=U8HRFBviUDs

Good evening, NATO.

We are Anonymous.

It has come to our attention that a NATO draft report has classified Anonymous a potential „threat to member states’ security”, and that you seek retaliation against us.

It is true that Anonymous has committed what you would call ‘cyber-attacks’ in protest against several military contractors, companies, lawmakers, and governments, and has continuously sought to fight against threats to our freedoms on the Internet. And since you consider state control of the Internet to be in the best interest of the various nations of your military alliance, you therefore consider us a potential threat to international security.
(more…)

Anonymous: Message to Monsanto – We Fight for Farmers

http://www.youtube.com/watch?v=Q1A-DYK4M4Q

To the free-thinking citizens of the world:
Anonymous stands with the farmers and food organizations denouncing the practices of Monsanto We applaud the bravery of the organizations and citizens who are standing up to Monsanto, and we stand united with you against this oppressive corporate abuse. Monsanto is contaminating the world with chemicals and genetically modified food crops for profit while claiming to feed the hungry and protect the environment. Anonymous is everyone, Anyone who can not stand for injustice and decides to do something about it, We are all over the Earth and here to stay.
To Monsanto, we demand you STOP the following:

-Contaminating the global food chain with GMO’s.
– Intimidating small farmers with bullying and lawsuits.
– Propagating the use of destructive pesticides and herbicides across the globe.
– Using “Terminator Technology”, which renders plants sterile.
– Attempting to hijack UN climate change negotiations for your own fiscal benefit.
– Reducing farmland to desert through monoculture and the use of synthetic fertilizers.
-Inspiring suicides of hundreds of thousands of Indian farmers.
-Causing birth defects by continuing to produce the pesticide “Round-up”
-Attempting to bribe foriegn officials
-Infiltrating anti-GMO groups
(more…)

Top Secret America: Network of Gov’t Contractors

“Top Secret America” is a project nearly two years in the making that describes the huge national security buildup in the United States after the Sept. 11, 2001, attacks.

When it comes to national security, all too often no expense is spared and few questions are asked – with the result an enterprise so massive that nobody in government has a full understanding of it. It is, as Dana Priest and William M. Arkin have found, ubiquitous, often inefficient and mostly invisible to the people it is meant to protect and who fund it.

(more…)

User Guide: Online Anonymity

The act of keeping your identity hidden online by using connection methods and encryption methods, to make yourself untraceable to a person, website, company, school or whatever else you are doing/connecting to.

(more…)

Intro: Whistleblowers, Researchers & Activists

Humanists, Autobots, Scholoars, Monks, Patriots and those playing for the Good Guys. Plenty of men and women have traveled this road before us.  These secrets are not secrets anymore, and  thanks to them, we have information available that would otherwise never see the light of day.  Look closely at what these have to share, and you will see they are each telling a very small piece of the same overall story.

Short Version:  There are other events in play on this planet, that you are not being told about. Those things would completely change the way you view yourself, and the world, if known. This is all just a dream, and reality is whatever you decide.  Still hungry? Keep reading.

Disclaimer: We will be the first to admit.. a few of these could easily be ‘wolves’ disguised well, in ‘whistleblower’ clothing.   but who… and why..?

This is intended to evolve into a quick and efficient resource/database/archive.  Check back frequently for updates….

(more…)