Inside Par-AnoIA: The Anonymous Intelligence Agency

Inside Par-AnoIA: The Anonymous Intelligence Agency

Paranoia is reputed to destroy you. But if you’re a whistleblower in search of a safe, neutral outlet, it just might save you instead.

Par:AnoIA, short for Potentially Alarming Research: Anonymous Intelligence Agency, is a website designed to collect leaks, allow project participants to work on them, and release them in a way that draws the attention of the public. The Releases section of the site, for example, currently features 1.9 gigs of information from American intel corporation Innodata.

The leaks site developed in part by necessity. WikiLeaks’ touted anonymous submission system has been offline for a year. OpenLeaks never materialized. And Cryptome is… Cryptome, meaning it neither edits nor markets its documents to the public at large.

Simply put, if WikiLeaks is a PR agency for documents and Cryptome is a leak dissemination site, Par:AnoIA aims to have the best of both. Launched in March after a year and a half of development, the site picks up where Anonleaks.ch, an earlier Anonymous leaks site, left off—literally. (Par:AnoIA currently hosts HBGary documents, which were inherited from Anonleaks.ch.) Following a July profile in Wired’s Threat Level blog, it’s suddenly the hottest disclosure site still up and running. More recently, Par:AnoIA published the private information of 3,900 members of the International Pharmaceutical Federation, and a pile of documents related to the Cambodian government, a move dubbed Operation The Pirate Bay.

The Daily Dot reached out on Twitter and, after some back-and-forth that included the stipulation that all chat and Twitter handles would be disguised, sat down for a Web chat with half a dozen key members of Par:AnoIA. We’ve given them letters of the alphabet instead of usernames.

Let’s establish the tone with this excerpt from their front-page manifesto:

Thou hath interrupted our tea moment and hath made us stand up with our backs against thine wall. But hear us; we shall fight back for it is the only choice we hath left. With our whole hearts we shall support this cause. We shan’t enjoy the fight but it is our only option to protect the ones that are not protected, the ones we love and for thine fairness. It is known to us thou doth not fear damage of the collateral kind and thou loveth to contain and restrict innocent peasants.

As Cryptome founder John Young pointed out, Par:AnoIA, being Anonymous, at least has a sense of humor, which differentiates it from the rest of the serious disclosure industry. As you can see from our introduction to the Web chat:

raincoaster has joined #paranoia
<raincoaster> Well, I’m in.

<A> lol
<A> in
<A> out
<A> left
<A> right
<A> up down left right right left down up a b a b a x y

So far, so typical. Anonymous may be trying to make the world a better place, but the hacktivist collective has always been in it for the lulz, too.

“[W]e’re not as srs,” C wrote in regards to Anonymous.

B wanted one thing clarified. “Let it be known that paranoia is not a hacker group.” They are a publishing group, meaning they won’t go out and create their own leaks.

The leak/disclosure community considers itself collegial, although no one else does. Quite the contrary, it can be competitive and even petty. There were no tears at WikiLeaks when rival site OpenLeaks failed to materialize. Cryptome founder John Young has taken pains to distance himself from WikiLeaks, on whose board he originally served. And, of course, whistleblowers and hackers alike are paranoid all the time, for obvious reasons.

For example, on July 12, a WikiLeaks supporter called Par:AnoIA out on Twitter for their choice of top-level domain registrar, Neustar, which Buzzfeed has called “the Keyzer Söze of surveillance,” the law enforcement’s data surveillance provider of choice. @Par:AnoIA, who at that point had fewer than 2,000 followers, said the whole thing was just another pointless flame war that distracted from the issue at hand.

One member explained, “To be honest, we are indifferent to WikiLeaks. They just should not start trying to tell people we host honeypots for feds.” In other words, WikiLeaks accused Par:AnoIA of being a front for the FBI, a sensitive subject given the arrest of former hacker turned informant Hector “Sabu” Monsegur.

“We don’t strive to be unique; why should we?” C asked.

“We just do what we think is good and right, and i think we can do it with minimal efforts, at least in a financial sense. we are not here for competition. We don’t strive to be the best. We just want to offer the best we can.”

Unlike most Anonymous projects, Par:AnoIA does ask for donations in the form of Bitcoins, an international online currency that’s difficult to trace and favored by hackers. They told us publicly that the money goes for server costs. John Young of Cryptome estimates his own server costs at around $100 per month, and he has relatively high traffic, so it’s logical to estimate their costs at less than half that.

They volunteer their time, and they volunteer a lot of it: They read each and every document that comes in. They do not edit the documents in any way, although they will not guarantee publication of every document. Archivists are philosophically split on whether their duty is owed to the documents or to the users, and Par:AnoIA clearly comes down on the side of the documents, as does Cryptome. Its redaction policy means WikiLeaks is on the other side of this prickly, barbed-wire fence.

What does that mean day-to-day? Would they refuse to release a document because it could change the world in a way they didn’t like? According to the Web chat consensus, the only leak they’d withhold would be nuclear launch codes. C explained that, “Public information is better than information in secret hands. We make spies obsolete.”

They’re not relying on the general public for the leaks but rather on people within their existing networks. B said they would never run out of sources. “You always make new connections.” C added, “Our connections extend daily.”

You don’t need an engraved invitation, though, or even a Guy Fawkes mask; the site can accept submissions from anyone. The Anons dismissed the idea of accepting links via email only, for security, context, and philosophical reasons. The point is not simply to take information in, but to take it in in the original form and to also post it in a form the public can access without going through some interstitial person or process.

“You need to have a nice working site where people can just click and read and even see a summary, see evidence that this whole shit is corrupted like fuck,” C said. “Research is another vector. We do that already on a limited basis.”

The first project Par:AnoIA tackled was the Arrest Tracker, correlating all the arrests of Anons worldwide by Anon name. You’d think this would be for PR or media purposes. You’d be wrong. The Arrest Tracker is an old-school wiki (fans of Wikipedia will recognize the aesthetics) that’s thoroughly annotated, with links to newspaper reports of court appearances and schedules. C explained: “We actually started that for ourselves so we can check wtf was going on. Real names are only mentioned if disclosed in media, of course. Everything has a source. It’s no foo, it’s facts. I hate foo.”

The members of Par:AnoIA claimed to not have plans to monetize their content, nor did they desire to market their materials like WikiLeaks does, making media partnerships and controlling the flow of information.

“We do shit when we have time, interest .. and .. meh,” C replied. “All media are the same, 14 reader blog or Fox News. I hate the idea of elitism. Eure, some initial attention is nice.. but in the end…it’s our releases that will speak.”

“I’d like see Bush & Co at the Hague…and…. something that would set Manning free,” B added, referring to alleged WikiLeaks cooperative Bradley Manning.

Knocking out private security and intel corporations like HBGary also remains a priority for the future.

C put it best, in typical chat humor: “I would like to have that document that really buttfucks the whole establishment in a bad way.

“I know it’s out there, on some server, somewhere, hand us enough leaks and we will find it!”

Photo via Par:AnoIA

via DailyDot

Victories Against Fluoride Becoming more Frequent as Citizens Get Informed, Empowered

Victories Against Fluoride Becoming more Frequent as Citizens Get Informed, Empowered

Roughly 85,000 fewer people living in North America will be forced to drink and bathe in fluoridated water, thanks to four recent community victories preventing or overturning water fluoridation mandates. The towns of O’Fallon, Missouri; Rosetown, Saskatchewan; Lake View, Iowa; and Cassadaga, New York are all now officially fluoride-free, proving that individuals really do have the power to step up and protect themselves against one of the most ridiculous folklores of the past century to be thrust on the people in the name of public health.

As reported by the Fluoride Action Network (FAN), which has tabulated more than 70 community victories against fluoride across North America since 2010, a single citizen activist concerned about the safety of fluoride was able to persuade the City Administrator of O’Fallon, MO, population 80,000, to discontinue the town’s water fluoridation program. The town’s 2012 budget report states that the change will save the town $18,000 annually, and reduce the hazard for water operators who will no longer “have to handle the dangerous chemical on a regular basis.”

In Rosetown, SK, the failure of a fluoride feed pump was enough to scrap the outdated practice of water fluoridation, while water fluoridation’s high cost with lack of economic and societal benefit convinced the city council of Lake View, IA, to discontinue the pointless practice. And in Cassadaga, NY, local citizens rejected a proposal to fluoridate by an 87 percent margin, even after the town had already built a special shed to begin housing and pumping fluoride chemicals into the water supply.

Portland voters soon to vote on water fluoridation

In Portland, Oregon, where rogue city council members and Mayor Sam Adams recently forced through a fluoridation mandate against the will of the people, more than 43,000 local citizens signed a petition to force the issue to a public vote. As of this writing, these signatures are still being counted — but since only 19,858 were required to get the issue on the ballot, the issue will almost surely be put up for a public vote.

And in New York City, where councilman Petter Vallone, Jr. has been working feverishly to end water fluoridation in America’s largest city, a resolution has been introduced to require that a warning about fluoride’s dangers for infants be printed on individual water bills. Both Milwaukee, Wisconsin, and the entire state of New Hampshire recently passed similar requirements for infant warning labels on water bills.

Two Florida communities reconsider water fluoridation

Lastly, both the Greater Pine Island Water Association, which serves the area of St. James City near Fort Myers, Florida, and the Ormond Beach City Commission, also in Florida, are also reconsidering their existing fluoridation mandates. The former group will have its members vote on the issue, while the latter group has already approved a referendum that will allow voters to decide the issue in an upcoming election.

Sources for this article include:

http://www.foodconsumer.org

Anonymous – Documentary ”We Are Legion” Peels Back Hacktivist Group’s History

Anonymous – Documentary ”We Are Legion” Peels Back Hacktivist Group’s History

http://youtu.be/-_aWLu58Y1U

 

New documentary We Are Legion puts an actual human face on Anonymous, the hacktivist group whose members usually are seen wearing Guy Fawkes masks — if they are seen at all.

Considering Anonymous’ retaliatory acts against websites run by the Department of Justice and the entertainment industry just last week in response to the government takedown of file-sharing site Megaupload, We Are Legion: The Story of the Hacktivists could almost be mistaken for a 93-minute news segment.

But unlike most news segments about the group, the documentary contains genuine moments with actual Anons (some maintain their anonymity in the doc, but others don’t).

“The last two or three days we’ve seen a lot of what Anonymous does,” We Are Legion director Brian Knappenberger said in an interview with Wired.com here Saturday, the morning after the documentary’s premiere at the Slamdance Film Festival. “You know, there was a film about the Weather Underground that came out a few years ago, and that was made 30 years after they were blowing up buildings, and I love that film. But picture making a film like that while they were still blowing up buildings — that’s what I’m talking about.”

We Are Legion might be the first to portray the group’s members as true revolutionaries, and it could serve as a time capsule if the kind of online sit-ins and retaliatory strikes that Anonymous has helped create become the new model for civil disobedience across the globe.

For those who didn’t hear of Anonymous until Occupy Wall Street started up, We Are Legion effectively puts the group’s current incarnation in historical perspective. The documentary traces the roots of early hacker-activist groups like the Cult of the Dead Cow and Electronic Disturbance Theater before jumping into Anonymous’ roots in 4chan.

The documentary goes deep. Speaking with current and former Anonymous participants — as well as Wired writers Ryan Singel and Steven Levy — Knappenberger gives a thorough chronological account of Anonymous’ exploits, up to the group’s current place at the forefront of online disobedience.

Starting with Mercedes Renee Haefer, who was arrested in conjunction with the denial-of-service attacks against online payment service PayPal last July, the documentary talks to Anons and experts about Anonymous’ vendetta against Scientology, defense of WikiLeaks, and support of the actions in Tunisia and Egypt during the Arab Spring.

Slamdance, the underground alternative movie fest that runs during the Sundance Film Festival here each year, seems like the perfect place for We Are Legion’s primer on Anonymous. The film might have seemed out of place at a glitzy Hollywood-in-the-hills screening.

“It feels right,” Knappenberger said of the premiere. “Slamdance has a kind of undercurrent of revolutionary, counterculture, slightly anarchic vibe that just seemed to fit [the film] right away.”

Knappenberger is looking for distribution for his film so it can be seen by a wider audience. It seems possible that Hollywood backers will shy away from a film about Anonymous after the group’s actions against the Motion Picture Association of America and other entertainment industry power players. But Knappenberger said he isn’t worried.

“I just want to tell the story,” he said, adding that considering Anonymous’ various targets over the years, “Who aren’t I offending?”

He could also take advice from his subject Haefer, who in the film says that what Anonymous ultimately hopes to protect is freedom of speech, regardless of a person’s opinions or background.

Or, as she says simply, “Your opinion matters.”

via TellMeSpud

Whonix: The Anonymous Operating System

Whonix: The Anonymous Operating System

Whonix is an anonymous general purpose operating system based on Virtual Box, Ubuntu GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible. Not even malware with root rights can find out the user’s real IP/location.

Whonix consists of two machines, which are connected through an isolated network. One machine acts as the client or Whonix-Workstation, the other as a proxy or Whonix-Gateway, which will route all of the Whonix-Workstation’s traffic through Tor. This setup can be implemented either through virtualization and/or Physical Isolation.

Whonix advantages:

  • All applications, including those, which do not support proxy settings, will automatically be routed through Tor.
  • Installation of any software package possible.
  • Safe hosting of Hidden services possible.
  • Protection against side channel attacks, no IP or DNS leaks possible^3^ To test for leaks, see LeakTests.
  • Advantage over Live CD’s: Tor’s data directory is still available after reboot, due to persistent storage. Tor requires persistent storage to save it’s Entry Guards.
  • Java / JavaScript / flash / Browser Plugins / misconfigured applications cannot leak your real external IP.
  • Whonix does even protect against root exploits (Malware with root rights) on the Workstation.
  • Uses only Free Software.
  • Building Whonix from source is easy.
  • Tor+Vidalia and Tor Browser are not running inside the same machine. That means that for example an exploit in the browser can’t affect the integrity of the Tor process.
  • It is possible to use Whonix setup in conjunction with VPNs, ssh and other proxies. But see Tor plus VPN/proxies Warning. Everything possible, as first chain or last chain, or both.
  • Loads of Optional Configurations (additional features / Add-Ons) available.
  • Best possible Protocol-Leak-Protection and Fingerprinting-Protection.
All My Heros Have FBI Files

All My Heros Have FBI Files

 

Tupac Shakur, Bob Dylan, Lucille Ball, Jimmy Hendrix, Albert Einstein, John Lennon, Malcom X, Janice Joplin, Marylin Monroe, Martin Luther King

 

You Might Be Considered a “Potential Terrorist” By Government Officials If….

You Might Be Considered a “Potential Terrorist” By Government Officials If….

Find Out If You Are Doing Things Which Might Be Considered Suspicious

There have been so many anti-terrorism laws passed since 9/11 that it is hard to keep up on what kinds of things might get one on a “list” of suspected bad guys.

We’ve prepared this quick checklist so you can see if you might be doing something which might get hassled.

The following actions may get an American citizen living on U.S. soil labeled as a “suspected terrorist” today:

Holding the following beliefs may also be considered grounds for suspected terrorism:

Many Americans assume that only “bad people” have to worry about draconian anti-terror laws.

But as the above lists show, this isn’t true.

When even Supreme Court Justices and congressmen worry that we are drifting into dictatorship, we should all be concerned.

via WashingtonsBlog

Hip-Hop Activism for Gaza: ‘Long Live Palestine’ by Lowkey

Hip-Hop Activism for Gaza: ‘Long Live Palestine’ by Lowkey

This is the official video for Lowkey’s single Tears to Laughter which has been supported by Palestine Solidarity Campaign, Stop the War Coalition, Viva Palestine and others. The song has been a huge hit amongst supporters of the Palestinian cause and Lowkey has toured extensively through Europe, Israel and Palestine to promote the song and its message.

You can now buy Lowkey’s album Soundtrack To The Struggle on double disc from www.soundtracktothestruggle.com! All profits made from the single are being donated to the DEC Gaza Appeal.

Kicking Corruption to the Curb: Hungary Throws Out Monsanto AND The IMF

Kicking Corruption to the Curb: Hungary Throws Out Monsanto AND The IMF

I don’t know about you, but I would label my personal knowledge of Hungary as wanting, if not painfully incomplete. It’s not an easy country to come to grips with, not least of all of course because Hungarian doesn’t look like any western language we know with the possible exception of Finnish. I did visit just after the Wall came down, and remember huge contrasts, almost paradoxes, between rural poverty and a capital, Budapest, that was much richer than other capitals such as Prague, a leftover of Budapest’s status as meeting place between western and eastern diplomats and businessmen.

The riches were not for all, though, the city center was full of beggars and panhandlers, mostly Roma. To keep up the paradox, Mercedes sold more luxury models in Hungary than just about anywhere else back then, reportedly mostly also to Roma; just not the same.

In the years since, precious little attention has been and is being devoted to the former eastern bloc countries in the Anglo press. We know most of the countries are now members of the European Union, but only a few have been allowed to enter the hallowed grounds of the eurozone.

One thing I did pick up on last year was the news that Hungary’s PM Victor Orbán had thrown chemical, food and seed giant Monsanto out of the country, going as far as to plow under 1000 acres of land. Now, I have little patience for Monsanto, infamous for many products ranging from Agent Orange to Round-Up, nor for its ilk, from DuPont to Sygenta, all former chemical companies that have at some point decided they could sell more chemicals than ever before by applying them on and inside everyone’s daily food. Patenting nature itself seems either unworthy of mankind or its grandest achievement. I don’t care much for either one. So Orbán (who has a two-thirds majority in parliament, by the way) has my tentative support on this one.

This is from July 22, 2011, International Business Times:

 

Hungary Destroys All Monsanto GMO Maize Fields

In an effort to rid the country of Monsanto’s GMO products, Hungary has stepped up the pace. This looks like its going to be another slap in the face for Monsanto. A new regulation was introduced this March which stipulates that seeds are supposed to be checked for GMO before they are introduced to the market. Unfortunately, some GMO seeds made it to the farmers without them knowing it.

Almost 1000 acres of maize found to have been grown with genetically modified seeds have been destroyed throughout Hungary deputy state secretary of the Ministry of Rural Development Lajos Bognar said. The GMO maize has been ploughed under, said Lajos Bognar, but pollen has not spread from the maize, he added.

Unlike several EU members, GMO seeds are banned in Hungary. The checks will continue despite the fact that seed traders are obliged to make sure that their products are GMO free, Bognar said. During their investigation, controllers have found Pioneer and Monsanto products among the seeds planted.

 

It’s remarkably hard to find sources on this, ironically. It’s even harder, even more ironically, to find anything that mentions the Wikileaks report on the connections between the US government and the chemical/seed industry. Which is curious, in my opinion; it’s not as if there’s nothing newsworthy in the topic. Just about the only thing I could find was this from Anthony Gucciardi at NaturalSociety.com.

 

US to Start ‘Trade Wars’ with Nations Opposed to Monsanto, GMO Crops

The United States is threatening nations who oppose Monsanto’s genetically modified (GM) crops with military-style trade wars, according to information obtained and released by the organization WikiLeaks. Nations like France, which have moved to ban one of Monsanto’s GM corn varieties, were requested to be ‘penalized’ by the United States for opposing Monsanto and genetically modified foods. The information reveals just how deep Monsanto’s roots have penetrated key positions within the United States government, with the cables reporting that many U.S. diplomats work directly for Monsanto. [..]

Perhaps the most shocking piece of information exposed by the cables is the fact that these U.S. diplomats are actually working directly for biotech corporations like Monsanto. The cables also highlight the relationship between the U.S. and Spain in their conquest to persuade other nations to allow for the expansion of GMO crops. Not only did the Spanish government secretly correspond with the U.S. government on the subject, but the U.S. government actually knew beforehand how Spain would vote before the Spanish biotech commission reported their decision regarding GMO crops.

 

It doesn’t look like Orbán and Hungary have a lot of support in their fight against Monsanto and GMO in general on the political front. But that still does little to explain the radio silence.

There was more international reporting earlier this year, when Orbán again faced up to two other major forces, in this instance the IMF and the EU. On January 1, the Hungarian parliament and president signed a new constitution into law. And it contains a number of things that the Troika members don’t like. In particular, they are probably at odds with taxes levied on bank transactions, and especially central bank transactions. Not the kind of thing the IMF is likely to ever agree with. It all gets clad in protesting (the EU even threatens with courts) the independence under fire of the central bank, the media and other parts of Hungarian society.

The IMF and EU, like the tandem team of Monsanto and Washington before them, act like schoolyard bullies. It’s become their standard MO, and it usually works. Portraits of Orbán as a fool, a reckless idiot and a dangerous populist, on par with that of Hugo Chavez or newly found international enemy Rafael Correa, are much easier to find than those links to Wikileaks Monsanto cables. It would be good to see Orbán continue to stand up to the IMF bullies, but he may not have that choice. They can simply financially bleed him dry, like they have so many other countries and their leaders. It’s a time tested model.

So maybe we’ll have to do with a good and hearty chuckle, and enjoy his announcement yesterday:

 

Hungarian prime minister unfriends IMF on Facebook

Hungary’s prime minister has long had a testy relationship with the International Monetary Fund — and on Thursday he used Facebook to unfriend the agency and reject its allegedly tough loan conditions.

Prime Minister Viktor Orban said in a video message on his official Facebook page that Hungary could not accept pension cuts, the elimination of a bank tax, fewer public employees and other conditions in exchange for an IMF loan that other officials have said could be about €15 billion ($18.9 billion). The IMF’s list of conditions, Orban said, “ contains everything that is not in Hungary’s interests.”

Orban’s announcement took the markets by surprise, in part because just a day earlier he had said loan negotiations with the IMF and the European Union were going according to schedule and both sides were willing to reach an agreement. [..]

In late 2008, under a Socialist government, Hungary became the first EU country to receive an IMF-led bailout. The Orban government, however, decided not to renew the loan agreement in 2010 so it could implement its economic policies without IMF control. But the increasing weakness of the forint, the Hungarian currency, and investors’ growing loss of trust in the country’s economy made the government abruptly change its mind late last year, when it again sought IMF help.

 

Basically, what the IMF demands is what it has always demanded through the years from countries it lends money to: cut pensions, cut the public sector, cut benefits yada yada, and then privatize, open markets, and open financial systems, so international operating conglomerates can move in and divvy up the spoils – “create a more ‘business friendly’ environment to boost growth” -. The IMF is the poster child for disaster capitalism, no matter how you twist and turn it. And Orbán can see clearly what is being done to Greece, which is just around the corner from Hungary.

 

 

Hungary: Orban’s horror show

A “list of horrors”. That’s how Hungary’s prime minister Viktor Orbán described on Thursday the conditions given by the IMF / EU for a deal, via a video on his Facebook page. [..]

Orban blamed the “long list” of onerous conditions that had, supposedly, been leaked to Magyar Nemzet, a slavishly pro-government daily, on Wednesday. The list contains a number of Orbán’s most sacred political themes, including cuts in pensions, family allowances and transport perks, an increase in the age of retirement, the introduction of a property tax, the abolition of the bank and financial transaction taxes, and modifications to the flat-rate, personal income tax regime.

 

And here’s a bit more:

 

 

Hungary PM rejects IMF/EU terms, hopes fade for deal

Hungary threw hopes for a new loan to prop up its sagging economy into disarray on Thursday as Hungarian Prime Minister Viktor Orban rejected what he called unacceptable IMF conditions, crushing prospects for a fast agreement. Orban, in a video posted on his Facebook page, cited demands from the International Monetary Fund (IMF) for a raft of changes that he said were too high a price for Hungary to pay.

“From cutting pensions to reducing bureaucracy to scrapping the bank tax and the funds to be made available to banks, everything is in there that’s not in Hungary’s interest,” Orban said. “The parliamentary group meeting (of the ruling Fidesz party) took the view, and I personally agree with it, that at this price, this will not work,” he added. [..]

To reverse that momentum, Orban is pushing a 300 billion forint ($1.33 billion) job saving plan, partly funded by a new tax on central bank operations, a key sticking point in the IMF talks, which the European Central Bank has also criticised. [..]

“Junk”-rated Hungary faces a repayment hump in the next five quarters, with the equivalent of €4.6 billion euros falling due from its previous IMF/EU bailout alone.

 

It’s enough of a David vs Goliath fight, or a Little Red Riding Hood vs the Wolf, to make one question the bullies. Now, I don’t really know Victor Orbán, all I know is western media descriptions of him, not a very reliable source, and he could well be a bully himself. But I still like the Little Red Riding Hood story (and dislike Monsanto and the IMF) enough to give him the benefit of the doubt for now.

And besides, it’s as refreshing as it is high time to talk about something else than Greece or Spain. We’ll have to get back to them soon enough, after Draghi’s unlimited buying bailout boondoggle yesterday

Private Investigator Steven Rambam’s Privacy Post-Mortem: OWS Attendee’s ID’d by Cell Phone Sniffers

Private Investigator Steven Rambam’s Privacy Post-Mortem: OWS Attendee’s ID’d by Cell Phone Sniffers

While we in the civil liberties community disagree strongly with private investigator Steven Rambam‘s admonition to “Get Over It,” after listening to him describe electronic surveillance powers it’s hard to disagree with the first part of the title of his talk: “Privacy Is Dead.” (Part two of the talk is below.)

“Where you work, what your salary is, your criminal history, all the lawsuits you’ve been involved in, real property…everything you’ve ever purchased, everywhere you’ve ever been…Your information is worth money. Your privacy today isn’t being invaded by big brother — it’s being invaded by big marketer,” he told an audience of hackers and privacy activists at HOPE 9 in New York during the summer of 2012.

Lots of the talk is about big corporations and their insatiable hunger for data about all of us, but Ramdam also addresses government spying:

One of the biggest changes is the ability to track your physical location. I’m sorry I came in at the end of the previous talk. I heard them talk about surveying cell phones with a drone, in a wide area — this is something that is done routinely now. [Note: Is that what these microwave antennas were used for at Occupy Wall Street in mid September?] I can tell you that everybody that attended an Occupy Wall Street protest, and didn’t turn their cell phone off, or put it — and sometimes even if they did — the identity of that cell phone has been logged, and everybody who was at that demonstration, whether they were arrested, not arrested, whether their photos were ID’d, whether an informant pointed them out, it’s known they were there anyway. This is routine.

I can tell you that if you go into any police station right now, the first thing they do is tell you, “Oh I’m sorry you’re not allowed to bring a cell phone in there. We’ll hold it for you.” Not a joke. And by the way it’s a legitimate investigatory technique. But cell phones are now the little snitch in your pocket. Cell phones tell me where you are, what you do, who you talk to, everbody you associate with. Cell phone tells me [sic] intimate details of your life and character, including: Were you at a demonstration? Did you attend a mosque? Did you demonstrate in front of an abortion clinic? Did you get an abortion?

Watch to hear more on drones and open source intelligence. Part two of Rambam’s talk:

 

Activist Barrett Brown Raided by FBI During Online Video Chat

Activist Barrett Brown Raided by FBI During Online Video Chat

http://youtu.be/eky-q9CE_co

For the second time this year, self-proclaimed Anonymous spokesman Barrett Brown was raided by the FBI.

The latest dramatic incident occurred late Wednesday evening while Brown and another woman identified by some as his girlfriend were participating in an online chat on TinyChat with other individuals.

Two minutes into the recorded chat session, loud voices could be heard in the background of Brown’s residence in Texas while the woman in the room with him was in front of the computer screen. She quickly closed the computer screen, but the audio continued to capture events in the room as the FBI appeared to strong-arm Brown to put handcuffs on him. Brown could be heard yelling in the background.

A spokeswoman in the Dallas County sherriff’s office confirmed to Wired that Brown was raided last night and was booked into the county jail around 11 p.m. She said the FBI removed him from the jail this morning to take him to a different facility, but she did not know where he was headed.

California attorney Jay Leiderman, a member of Brown’s legal team, told Wired that Brown was scheduled to be arraigned today in Texas on making threats to a federal agent.

Asked if the FBI agents were aware that Brown was online at the time of their raid, Leiderman said, “They problaby would have preferred to raid him when he was not online.” He noted that the audio from the raid was “certainly less than flattering when they’re marching through these doors dropping F-bombs…. I imagine they would not want to have that captured if they could help it.”

A transcript of the TinyChat session has been posted online. Just moments before the arrest, there were jokes about whether one of the chat participants was real or just an animated GIF. Moments later, the chat participants faced a different conundrum: trying to figure out whether they’d just witnessed an FBI raid.

A voice that appeared to come from one of the arresting agents was heard saying something to the effect: “You’re going down! Get your hands down!”

Right as the noise began, another participant in the chat room showed up in a video window with a white handkerchief covering his lower face. “Is Barrett Browm getting fuckin’ raided by the FBI?” he appeared to say. “Holy shit!”

Brown’s latest raid came after he posted a long and rambling YouTube video in which he talked about taking drugs (though not today, he noted) and about retaliating against an FBI Agent named Robert Smith after he learned that his mother might be hit with obstruction of justice charges. The threat of charges was apparently related to a laptop of Brown’s that he apparently hid.

“So that’s why Robert Smith’s life is over,” Brown said in the video (beginning around minute 9:40). “When I say his life is over, I’m not saying I’m going to kill him, but I am going to ruin his life and look into his fucking kids. Because Aaron Barr did the same thing and he didn’t get raided for it. How do you like them apples?” he said, smiling.

The video, titled “Why I’m Going to Destroy FBI Agent Robert Smith Part Three: Revenge of the Lithe” was accompanied by a note apparently posted by Brown that reads: “Send all info on Agent Robert Smith to [email protected] so FBI can watch me look up his kids. It’s all legal, folks, Palantir chief counsel Matt Long already signed off on it when Themis planned worse.”

Brown also talked about being a target of the Zeta drug cartel and mentioned that he was heavily armed and was concerned that the cartel would come after him posed as federal officers.

“Any armed official of the U.S. government, particularly the FBI, will be regarded as potential Zeta assassin squads,” he said in the video. “As FBI knows … they know that I’m armed and I come from a military family and I was taught to shoot by a Vietnam veteran … and I will shoot all of them and kill them if they come and do anything…. I have reason to fear for my life.”

He signed off the video saying: “Frankly, it was pretty obvious I was going to be dead before I was 40 or so, so I wouldn’t mind going out with two FBI sidearms like a fucking Egyptian pharaoh. Adios.”

Asked about Brown’s comments, Leiderman said that he hadn’t seen the full video and wasn’t aware of everything Brown had said, but he noted that his client had a reputation for hyperbole and joking around, and that things he said might appear to be a threat when they weren’t really intended to be that way.

“It’s hard to understand the context [of what he said], Leiderman said. “But this is speech, so ordinarily we go to a First Amendment defense, but obviously there are lines that can be crossed where you can lose your First Amendment protection.”

An FBI spokeswoman had no comment to make on Brown’s arrest.

 

 

SOURCE: Wired.com

Thousands of UK Workers ‘Blacklisted’ Over Political Views

Thousands of UK Workers ‘Blacklisted’ Over Political Views

Activists threaten legal action over failure to investigate

Corporations in the UK who used a secret “blacklisting” database to screen out ‘left wing trouble-makers’ and union sympathizers as potential job recruits are facing renewed scrutiny after the UK-activist group Liberty called for a fresh investigation Monday night.

A demonstration outside the Olympic site on March 1, 2011 was called in solidarity with the whistleblower who was fired for standing up for an illegally blacklisted workmate. The blacklist scandal first broke in 2008, when the UK media revealed that more than 40 leading employers had subscribed to the vetting service provided by The Consulting Association, which had surveillance files on more than 3,200 workers, including political activists, shop stewards and health and safety representatives.

Police seized the database three years ago and Ian Kerr, the founder of The Consulting Association, was fined only about $7,500. Invoices were discovered showing that 44 companies had paid to access the names on the list.

But full details of the material it contained only emerged as workers began to pursue legal action over their inclusion.

Liberty is now threatening to go to court to force the UK government to investigate the case, which it has compared in severity to the national press phone hacking scandal.

Corinna Ferguson, legal officer for Liberty, told the Independent: “We can’t believe the inaction of the Information Commissioner on a human-rights violation of such wide public interest.

“Contracting out the blacklisting of innocent workers, politicians and journalists is no better than farming out phone hacking to private detectives and the consequences for our democracy are just as grave. If we cannot persuade the Commissioner to discharge his public duty, we will consider seeking assistance from the courts.”

Statements from some of the blacklisted workers from the Blacklist Support Group (BSG):

Mick Abbott, a 74-year-old ex-scaffolder, commented: “This nearly ruined my marriage and it meant that my children were on free meals at school. My file goes back to 1964 and the last entry says that I rekindled the campaign for justice for the Shrewsbury picketers in 2006. They have been watching me all these years and passing this information around, blighting my life over four decades.”

Steve Kelly, an electrician and spokesperson for the Blacklist Support Group said: “I was blacklisted because I was a union member and because I raised issues about safety. In 2007, [Sir Robert] McAlpine sacked me from the Colchester Barracks project after 2 days for refusing to work on a moving platform without proper training (exactly as we had been instructed in the site induction) – the dismissal is recorded on my blacklist file.

“Over the year I suffered severe financial strain, my wages were cut in half which caused immense stress paying bills and putting food on table. I was out of work for a year apart from few weeks here and there in 2001. Being sacked from Colchester Barracks after only two days piled up the stress and caused a nervous breakdown for me eventually.

“The blacklisting firms should be made to pay compensation for years lost and years in future. They should be made to employ blacklisted workers or not be awarded any public government backed contracts. An apology in national press and to individuals whose lives they ruined would be a start.”

SOURCE: CommonDreams.org

Former US Service Member DETAINED via NDAA for Anti-Government Facebook Posts

Former US Service Member DETAINED via NDAA for Anti-Government Facebook Posts

http://www.youtube.com/watch?v=UVWA_u6Uk_Q

The Police, FBI and Secret Service swarmed in and took Brandon Raub to John Randolph Metal Hospital.   This patriotic Marine had posted 5 posts on the Dont-Tread-On.Me blog linked below.  Just glancing over them they seem to be of the religious and patriotic fight for truth and justice.  He used the blog to have people join his FaceBook group and even did and promoted a Richmond Liberty March.

I looked through my email to see if there was any emails between the two of us and I did not find any, although I am sure there was as I would not have given him access to post on the blog if I did not.

There are a couple of lessons I want everyone to know form what little information we have from this incident.

1. Delete Facebook. I did a video for The Greatest Truth Never Told series called Delete Facebook giving a non conspiracy reason why people should quit FaceBook as it is destroying our lives. Now you should all see the conspiracy reason why you should Delete Facebook.  This incident proves that it is just a huge monitoring tool for the Elite to track and build a profile of you.  You give willingly the details of your political leaning, friends, interests.  The hidden influence of the CIA  through In-Q-Tel is becoming more and more visible.

2. This is designed to create a chilling effect to people speaking out and more importantly to keep sheeple from look at us for the Truth.  I stated in the 3 Coming False Flags that the Elite would eventually criminalize or restrict our freedom of speech of the Freedom Movement.  The Elite know the economic collapse is going to bring about the Anger Phase of the Awakening.  They are actively preparing for riots and civil war. The thing that I find amazing is that these .gov people don’t ask why they are preparing for Civil War?  What could make people so mad to want to go to war?  Well since the Elite know the collapse of the dollar is coming they are conditioning their minions for that collapse.  What these people should realize is that their paychecks are going to bounce and their entire life’ savings are going to be robbed.

3. Non violent, non compliance is a smart and effective strategy.  Walking away from the paradigm is the best way of resisting the paradigm.  Anyone physically pushing back will be taken down as it is of the same consciousness of those that are spreading debt and death throughout the world.   Go peacefully if you are arrested, but question them on why and for what reason.  You ask the questions and you should give no answers.  You still have the right to keep quiet and ask for a lawyer.  Unless you are really good under pressure I would suggest you just say nothing accept for asking for your lawyer.  Also family members need to shut their mouths too as they immediately go after their friends and family in phone interviews.

4. Video tape everything you can.  If you are confronted record every aspect not only to protect yourself, your rights and keep the story straight but also for a future law suit. You have every right to record every confrontation, I would be discreet about it because you don’t want an officer break the law and take your evidence.  This is also very important to help keep your narrative straight as you will be told a lot of lies along the way.

5. Apparently questioning the government is a mental condition.  Brandon was immediately brought to John Randolph Mental Hospital.  The use of psychology was very common to political tool the Soviets and the Nazis to silence political opposition.  Look at what Vladimir Putin is doing in Russia.

6. You get more flak the closer you get to the target. We must be coming very close to the collapse date with all of the things that are going on.  I recommend that people stock up on food and gear and get ready to ride out the storm.

 

 I hope to get more details as they develop and eventually I hope to thoroughly de-brief  Brandon as soon as he can. 

Join the Insider mailing list at the top right hand side of the blog for email updates.

 

Here are the 5 articles from Brandon Raub on the Dont-Tread-On.Me site.

Property, Liberty, Jesus, and Our Country

What God Tried To Do

Richmond Liberty March

Economics 101

The Richmond Liberty Movement

 

SOURCE: Dont-Tread-On.Me

 

#OpBigBrother – EMERGENCY ALERT ABOUT WORLDWIDE SURVEILLANCE FROM ANONYMOUS

#OpBigBrother – EMERGENCY ALERT ABOUT WORLDWIDE SURVEILLANCE FROM ANONYMOUS

For years Anonymous worked hard to protect our world and its peoples.

NOW LISTEN CAREFULLY,
This is an ALERT ABOUT SURVEILLANCE.

Privacy of the people all over the world is suffering more and more outrages. We should not tolerate it. Cameras are everywhere even in our sky, and robots are used to gather and treat information collected through Internet spying.

If Governments and corporations reach their goal to use network surveillance technologies to take control of our world, they will clear Freedom from both the real life and the Internet. That means Anonymous won’t be able to continue helping humanity.
They plan to destroy each form of protest including Anonymous. That means that Anonymous members will be tracked and neutralized if we do not unite against surveillance.

The population is not ready to understand and help us, we need to join the biggest fight ever seen on Anonymous era and use every means necessary to expose truth.

Let the HIVE begins the strongest online and offline worldwide protest ever seen in the history of humanity. They showed they had no limits, we will show our power goes well beyond.

Worldwide governments, evil corporations time of summations is over.

We are Anonymous, we are not numbers, united as one, divided by zero.
Wordwide union will shutdown BigBrother.
That fight will lead us to triumph or to perish.
This is a time trial. WE ACT OR WE FALL.

We are Anonymous,
We are Legion
We do not forgive
We do not forget
Expect us !

=======================================================
Join us on irc.anonops.pro/6697 SSL chan #OpBigBrother

Follow us on twitter : https://twitter.com/OpBigBrother

PAD : https://pad.riseup.net/p/MMhJshLWd6AV

1984 | Thought Crime to Destroy New World Order?

1984 | Thought Crime to Destroy New World Order?

http://youtu.be/3NHmOfwI1Kw

Christopher Greene explains how thought crime will destroy the New World Order paradigm.

GreeneWave is a completely independent alternative media channel focused on the economy and politics and dedicated to bringing controversial news and truth to the public. Featuring popular video/radio host Christopher Greene, GreeneWave has established itself as an early pioneer on the Web, broadcasting to tens-of-thousands of people every day and covering news and events that the mainstream media ignores.

About Christopher

GreeneWave started in 2010 when I decided to quit my job as a broker at Merrill Lynch. After witnessing the collapse of global stock markets in 2008 and seeing just how badly it had devastated and ruined the lives of the people that I cared about, I decided that it was time for me to take action and do something about it! So at that very moment I dropped everything that was convenient or comfortable to me and started GreeneWave.

I realized at the time that this was a bit crazy and also a shot in the dark (that I could potentially fail miserably) but I decided to do it anyway because it was the right thing to do and I wanted to share a message of truth with the public and help others. A little over a year later what started from just a few subscribers and barely any traffic at all has grown to tens-of-thousands of subscribers, a brand new radio show, our first appearance on national television and millions of video views on YouTube.

Much of what we predicted since the very beginning has come true in real life (the collapse and fragmentation of the Eurozone, worse median peak-to-trough declines in residential real estate than during the 1930′s Great Depression, the invasion of Libya, the Occupy Wall Street movement, bailouts-to-infinity and now a growing police state in America).

Please don’t let this happen to a Country and a world that I and many of you love! Join The Wave today and support GreeneWave. I realize that not all of you have the ability to drop everything and take the risk of becoming an activist full-time like myself. But it is my hope that the millions of you out there that feel the same way I do about freedom and liberty will help support those people and organizations like GreeneWave that fight for these ideals on your behalf. Please help GreeneWave grow in 2012 and fight tyranny face-to-face. “We can’t do it alone but with your help we can change the world!”

 

 

When an Agent Knocks, Talk About It

When an Agent Knocks, Talk About It

Often, when folks find themselves having been visited or otherwise solicited for information by law enforcement, their reaction is to keep the fact that they’ve been targeted for government harassment quiet. In reality, however, the worst thing (next to cooperating!) that you can do in this situation is to keep it to yourself. In doing so, you deprive yourself of community support at a time that may be stressful and even terrifying and, simultaneously, you help the government maintain a veil of secrecy around the harassment and surveillance they use to destroy resistance movements.

Many people who’ve been harassed by law enforcement officers report having been threatened with negative consequences should they choose to go public about the incident. This, like so much of what they’ll tell you, is utter and complete bullshit. YOU ARE NOT LEGALLY BOUND TO KEEP THEIR SECRETS, and the fact that they often lie and try to convince you that you are only speaks to the fact that doing so benefits them, while spreading the word benefits us. Part of their strategy for repressing dissent is to quietly isolate individuals from their communities and terrorize them into cooperating in their efforts. If we expose what they’re doing every time they do it, we strip them of the freedom and protection that secrecy offers- think of it as a little counter-counter-insurgency tactic.

Publicizing government harassment is a protective measure. As we build a culture where people talk about and prepare for government repression, and support those facing it, we reduce the number of people who will turn on their comrades to save their own asses. If you come from a community where everyone is informed about incidents of harassment and knows how to deal with them calmly and effectively, and where not cooperating is the norm, you’ll be better equipped to deal with more serious situations as they arise. Whether or not you ever have been or ever will be involved in illegal activity, it’s possible that you, or someone you care about, or someone they care about, will at some point find themselves sitting in a jail cell being given the option of cooperating in exchange for some sort of leniency in charges or sentencing. And even if you don’t support ELF actions or other things that people are being indicted for these days, the old adage holds true with law enforcement: “give ’em an inch, and they’ll take down every poor fucker they can get their hands on.” That is, acquiescing to law enforcement demands that we remain silent about the things they do is just like giving a mouse a vegan cookie- who wants just one vegan cookie, after all?

Lastly, letting your community know that you’ve been visited is important because law enforcement visits are dangerous for everyone, not just the particular person who’s been visited, and you owe your community any information that may keep them safer. You don’t and can’t necessarily know exactly who may be endangered by government activity, but you can be sure that making it possible for those people it may affect to find out about it will help them. When you get visited, you may not have any idea why they’re asking what they’re asking- this could be because they’re wacked out creepers who don’t know what they’re talking about, or it could be that their asking about things that you had no involvement in. It’s not uncommon for visits to be made in a desperate attempt to find any in into radical circles that may, eventually, lead to a suspect. Thus, it’s important to be cautious about acting rashly and publicizing details (e.g., names mentioned, actions, etc.) of a visit in a way that will only incite open and potentially incriminating speculation in your community, and to balance that against the need to get as much information as possible out into the public realm so that people who it may affect can take appropriate actions to protect themselves. So, while there’s no doubt that you should go public immediately with your experience of government harassment, you should also take the time to consult with trusted friends and support networks to determine the best way to do so and still avoid unwittingly getting others in trouble.

http://midwestgreenscare.files.wordpress.com/2008/06/mgs-zine-30.pdf

How To Hack Satellite Internet & Surf Anonymously

How To Hack Satellite Internet & Surf Anonymously

 

A Spanish researcher demos new satellite-hijacking tricks with cybercriminal potential.

Satellites can bring a digital signal to places where the Internet seems like a miracle: off-the-grid desert solar farms, the Arctic or an aircraft carrier at sea. But in beaming data to and from the world’s most remote places, satellite Internet may also offer its signal to a less benign recipient: any digital miscreant within thousands of miles.

In a presentation at the Black Hat security conference in Arlington, Va., Tuesday, Spanish cybersecurity researcher Leonardo Nve presented a variety of tricks for gaining access to and exploiting satellite Internet connections. Using less than $75 in tools, Nve, a researcher with security firm S21Sec, says that he can intercept Digital Video Broadcast (DVB) signals to get free high-speed Internet. And while that’s not a particularly new trick–hackers have long been able to intercept satellite TV or other sky-borne signals–Nve also went a step further, describing how he was able to use satellite signals to anonymize his Internet connection, gain access to private networks and even intercept satellite Internet users’ requests for Web pages and replace them with spoofed sites.

“What’s interesting about this is that it’s very, very easy,” says Nve. “Anyone can do it: phishers or Chinese hackers … it’s like a very big Wi-Fi network that’s easy to access.”

In a penetration test on a client’s network, Nve used a Skystar 2 PCI satellite receiver card, a piece of hardware that can be bought on eBay ( EBAY – news – people ) for $30 or less, along with open source Linux DVB software applications and the network data analysis or “sniffing” tool Wireshark.

Exploiting that signal, Nve says he was able to impersonate any user connecting to the Internet via satellite, effectively creating a high-speed, untraceable anonymous Internet connection that that can be used for nefarious online activities.

Nve also reversed the trick, impersonating Web sites that a satellite user is attempting to visit by intercepting a Domain Name System (DNS) request–a request for an Internet service provider (ISP) to convert a spelled out Web site name into the numerical IP address where it’s stored–and sending back an answer faster than the ISP. That allows him to replace a Web site that a user navigates to directly with a site of his choosing, creating the potential for undetectable cybercrime sites that steal passwords or installs malicious software.

In his tests on the client’s network, Nve says he was also able to hijack signals using GRE or TCP protocols that enterprises use to communicate between PCs and servers or between offices, using the connections to gain access to a corporation or government agency’s local area network.

The Barcelona-based researcher tested his methods on geosynchronous satellites aimed at Europe, Africa and South America. But he says there’s little doubt that the same tricks would work on satellites facing North America or anywhere else.

What makes his attacks possible, Nve says, is that DVB signals are usually left unencrypted. That lack of simple security, he says, stems from the logistical and legal complications of scrambling the signal, which might make it harder to share data among companies or agencies and–given that a satellite signal covers many countries–could run into red tape surrounding international use of cryptography. “Each [country] can have its own law for crypto,” says Nve. “It’s easier not to have encryption at the DVB layer.”

Nve isn’t the first to show the vulnerability of supposedly secure satellite connections. John Walker, a British satellite enthusiast, told the BBC in 2002 that he could watch unencrypted NATO video feeds from surveillance sorties in the Balkans. And the same lack of encryption allowed insurgents to hack into the video feed of unmanned U.S. drone planes scouting Afghanistan, the Wall Street Journal reported in December.

In fact, the techniques that Nve demonstrated are probably known to other satellite hackers but never publicized, says Jim Geovedi, a satellite security researcher and consultant with the firm Bellua in Indonesia. He compares satellite hacking to early phone hacking or “phreaking,” a practice that’s not well protected against but performed by only a small number of people worldwide. “This satellite hacking thing is still considered blackbox knowledge,” he wrote in an e-mail to Forbes. “I believe there are many people out there who conduct similar research. They may have some cool tricks but have kept them secret for ages.”

At last year’s Black Hat D.C. conference, British cybersecurity researcher Adam Laurie demonstrated how he intercepts satellite signals with techniques similar to Nve, using a DreamBox satellite receiver and Wireshark. But Nve argues that his method is far cheaper–Laurie’s DreamBox setup cost around $750–and that he’s the first to demonstrate satellite signal hijacking rather than mere interception.

“I’m not just talking about watching TV,” says Nve. “I’m talking about doing some very scary things.”

 

 

At 12:57 PM, Anonymous satellite_hacker said…

Satellite hacking for fun isn’t cheap! One of the sessions I was really looking forward to ahead of the Black Hat DC event this year was Adam Laurie’s session titled – Satellite Hacking for Fun and Profit.

It’s a session that didn’t disappoint, Laurie is always entertaining, but it also revealed how much effort is actually required to try and get at satellite signals.

First off, Laurie prefaced his talk by noting that he wasn’t going to talk about hacking the actual satellite in space itself.

“I’m playing it safe and just looking at what is coming down,” Laurie told the Black Hat audience.

Instead what Laurie focused his talk on was something he called ‘Feed Hunting’ – that is looking for satellite feeds that are not supposed to be found. Laurie claimed that he has been doing satellite feed hunting for years – at least as far back as the untimely demise of the late Princess Diana in 1997. Laurie claimed that he was able to find a non-public feed from a TV broadcaster that had left their transponder on in a Paris hotel room.

Fast forward a dozen years and Laurie commented that the technology to identify satellite feeds has progressed dramatically. Among the reasons why he satellite feed hunting has gotten easier is an open source based satellite received called the dreambox.

Laurie explained that the dreambox has a web interface that makes it easier to find streams and provides information on what the stream includes. Another open source technology also helps to feed hunt satellite content.

A project called dvbsnoop is a DVB (dIgital video broadcasting) and MPEG stream analyzer that lets the user access raw data from DVB card. By sifting through the raw data, Laurie demonstrated that interesting satellite feeds that weren’t intended to be public could be found.

Going a step further, Laurie claimed that he had created his own python based script called dreaMMap that could create a 3d model of satellite frequency transmissions. With the 3D model the user just does a point and click to steer dish to a particular satellite frequency. One memory of the Black Hat audience asked Laurie if what he was doing was legal. Laurie shrugged and commented:

“I’m in the US giving a talk where I’m tunneled to my server in the UK and looking at a satellite in space that is over Africa – so who would get me?”

All told there is a financial cost to Laurie’s satellite feed hunting techniques – and that cost is approximately $785 for the Dreambox hardware, the actual satellite dish and then the motor and the mount for the dish. Well I guess if you’ve got the money to burn…

SOURCE: Satellite Internet Blog

VPN vs. SSH Tunnel: Which Is More Secure?

VPN vs. SSH Tunnel: Which Is More Secure?

image

VPNs and SSH tunnels can both securely “tunnel” network traffic over an encrypted connection. They’re similar in some ways, but different in others – if you’re trying to decide which to use, it helps to understand how each works.

An SSH tunnel is often referred to as a “poor man’s VPN” because it can provide some of the same features as a VPN without the more complicated server setup process – however, it has some limitations.

How a VPN Works

VPN stands for “virtual private network,” – as its name indicates, it’s used for connecting to private networks over public networks, such as the Internet. In a common VPN use case, a business may have a private network with file shares, networked printers, and other important things on it. Some of the business’s employees may travel and frequently need to access these resources from the road. However, the business doesn’t want to expose their important resources to the public Internet. Instead, the business can set up a VPN server and employees on the road can connect to the company’s VPN. Once an employee is connected, their computer appears to be part of the business’s private network – they can access file shares and other network resources as if they were actually on the physical network.

The VPN client communicates over the public Internet and sends the computer’s network traffic through the encrypted connection to the VPN server. The encryption provides a secure connection, which means the business’s competitors can’t snoop on the connection and see sensitive business information. Depending on the VPN, all the computer’s network traffic may be sent over the VPN – or only some of it may (generally, however, all network traffic goes through the VPN). If all web browsing traffic is sent over the VPN, people between the VPN client and server can’t snoop on the web browsing traffic. This provides protection when using public Wi-Fi networks and allows users to access geographically-restricted services – for example, the employee could bypass Internet censorship if they’re working from a country that censors the web. To the websites the employee accesses through the VPN, the web browsing traffic would appear to be coming from the VPN server.

Crucially, a VPN works more at the operating system level than the application level. In other words, when you’ve set up a VPN connection, your operating system can route all network traffic through it from all applications (although this can vary from VPN to VPN, depending on how the VPN is configured). You don’t have to configure each individual application.

To get started with your own VPN, see our guides to using OpenVPN on a Tomato router, installing OpenVPN on a DD-WRT router, or setting up a VPN on Debian Linux.

How an SSH Tunnel Works

SSH, which stands for “secure shell,” isn’t designed solely for forwarding network traffic. Generally, SSH is used to securely acquire and use a remote terminal session – but SSH has other uses. SSH also uses strong encryption, and you can set your SSH client to act as a SOCKS proxy. Once you have, you can configure applications on your computer – such as your web browser – to use the SOCKS proxy. The traffic enters the SOCKS proxy running on your local system and the SSH client forwards it through the SSH connection – this is known as SSH tunneling. This works similarly to browsing the web over a VPN – from the web server’s perspective, your traffic appears to be coming from the SSH server. The traffic between your computer and the SSH server is encrypted, so you can browse over an encrypted connection as you could with a VPN.

However, an SSH tunnel doesn’t offer all the benefits of a VPN. Unlike with a VPN, you must configure each application to use the SSH tunnel’s proxy. With a VPN, you’re assured that all traffic will be sent through the VPN – but you don’t have this assurance with an SSH tunnel. With a VPN, your operating system will behave as though you’re on the remote network – which means connecting to Windows networked file shares would be easy. It’s considerably more difficult with an SSH tunnel.

For more information about SSH tunnels, see this guide to creating an SSH tunnel on Windows with PuTTY. To create an SSH tunnel on Linux, see our list of cool things you can do with an SSH server.

Which Is More Secure?

If you’re worried about which is more secure for business use, the answer is clearly a VPN — you can force all network traffic on the system through it. However, if you just want an encrypted connection to browse the web with from public Wi-Fi networks in coffee shops and airports, a VPN and SSH server both have strong encryption that will serve you well.

There are other considerations, too. Novice users can easily connect to a VPN, but setting up a VPN server is a more complex process. SSH tunnels are more daunting to novice users, but setting up an SSH server is simpler – in fact, many people will already have an SSH server that they access remotely. If you already have access to an SSH server, it’s much easier to use it as an SSH tunnel than it is to set up a VPN server. For this reason, SSH tunnels have been dubbed a “poor man’s VPN.”

Businesses looking for more robust networking will want to invest in a VPN. On the other hand, if you’re a geek with access to an SSH server, an SSH tunnel is an easy way to encrypt and tunnel network traffic – and the encryption is just as good as a VPN’s encryption.

 

SOURCE: HowToGeek.com

Attention Activists: Your Phone May Not Be Safe at Protests

Attention Activists: Your Phone May Not Be Safe at Protests

Ever wondered why your cell phone reception suddenly becomes terrible at protests? Ever worried that police could use electronic spoofing devices to suck up your mobile data because you are in the streets exercising your rights?

You might have been onto something.

Mobile “IMSI catchers”, currently on the market and being pushed to police and intelligence agencies worldwide, enable these creepy, stealth spying tactics. And if they build it and hawk it, history tells us police will buy it and deploy it.

On Tuesday, July 3, 2012, electronic privacy advocate and technology researcher Chris Soghoian tweeted a link to a photograph of a talk he gave at TED in Scotland in late June. Behind him in the photograph is another image, this one taken by privacy researcher Eric King at a surveillance trade show. (King’s Twitter bio contains a quote from a representative of the notorious ISS World — a global surveillance trade firm that often hosts such trade shows: the rep called him an “Anti-lawful interception zealot blogger.” High praise.)

Look at the slide behind Soghoian; that’s the photo in question. It shows an IMSI catcher strapped onto a model, under the model’s shirt.

IMSI stands for “International Mobile Subscriber Identity”. The technology is essentially a mobile phone tower with “a malicious operator”. It mimics the behavior of a cell tower and tricks mobile phones into sending data to it, instead of to the tower.

As such it is considered a Man In the Middle (MITM) attack. It is used as an eavesdropping device used for interception and tracking of cellular phones and usually is undetectable for the users of mobile phones.

Once it has made a connection with the phone and tricked it into thinking it is a mobile tower, the IMSI catcher forces the phone to drop its encryption, enabling easy access to the contents of the device. The tool then lets the attacker listen in on mobile conversations and intercept all data sent from a mobile phone, remaining undetected. In some cases the tool also allows the operator to manipulate messages.

Here’s a creepy video that a purveyor of IMSI catchers made to advertise its product:

Please note that by playing this clip YouTube and Google will place a long term cookie on your computer.

Police in the United States claim they do not need a warrant to use an IMSI catcher or other spoofing device to track your location. A case to determine whether or not the courts agree is working itself through the system.

Privacy International’s Eric King took the photo on the slide behind Soghoian at a surveillance trade show, where he says the tool was “pitched to me as being perfect for covert operations in public order situations.” In other words, at protests. 

 

The FBI uses IMSI catchers and claims it does so legally, even though it says it doesn’t need a warrant to deploy them. The Electronic Privacy Information Center is currently pursuing FOIA litigation to find out exactly how the bureau uses the “Stingray” (a brand name IMSI catcher); unsurprisingly, the FBI wasn’t forthcoming with documents to reveal its legal standard or other information about how it uses the tool. Stay tuned for more information as that case makes its way through the courts.

Meanwhile, how can you protect yourself against IMSI catchers? Unfortunately, you probably can’t. And the threats are not just from government. As Soghoian and others warned in a friend of the court brief,

Finally, the communications privacy of millions of law-abiding Americans is already threatened by the use of this and similar interception technologies by non-US government entities, such as stalkers, criminals, and foreign governments engaged in espionage. As such, the public interest is best served by greater public discussion regarding these tracking technologies and the security flaws in the mobile phone networks that they exploit, not less.

Yet again, we are faced with a situation in which our technology has outpaced our law reform. It’s time for Congress to change that.


To get a more detailed sense of how the technology actually works, watch this excellent talk from DefCon 2011, with Chris Paget: “Practical Cellphone Spying”. He spoofs the phones of the people in the audience during the talk; it’s well worth watching if you have some time.

 

For more on IMSI catchers and the state of the law, click here.

 

SOURCE: PrivacySOS

Make it Happen 2012 – Anonymous Transmission

Make it Happen 2012 – Anonymous Transmission

Protesting, Police Violence, Transparency, Global Government, all being manipulated against Humanity’s interests.  2012 is the year we take back our FREEDOMS.

We do not forgive

We do not forget

We are legion

Expect us