Tag: Wiretapping

  • Raw List of NSA Nicknames and Codewords

    Raw List of NSA Nicknames and Codewords

    Below is a listing of nicknames and codewords related to US Signals Intelligence (SIGINT) and Communications Security (COMSEC). Most of them are from the NSA, some are from other government or military agencies. Some of them also have an abbreviation which is shown in brackets. NICKNAMES are generally unclassified. NSA uses single word nicknames, outside NSA…

  • Whitehouse ‘Panel’ Is Dead Before It Even Starts – Lacks Tech And Telco Execs

    Whitehouse ‘Panel’ Is Dead Before It Even Starts – Lacks Tech And Telco Execs

    As part of his promises regarding better oversight of the National Security Agency, President Obama called for expert external opinion on where the lines of privacy should be drawn: Fourth, we’re forming a high-level group of outside experts to review our entire intelligence and communications technologies. We need new thinking for a new era. We…

  • Anonymous #OpNSA – A Message to Intel Puppet Saxby Chambliss

    Anonymous #OpNSA – A Message to Intel Puppet Saxby Chambliss

    We do not forgive We do not forget Expect Us    

  • 11 Secret Documents Americans Deserve to See

    11 Secret Documents Americans Deserve to See

    Many documents produced by the U.S. government are confidential and not released to the public for legitimate reasons of national security.  Others, however, are kept secret for more questionable reasons.  The fact that presidents and other government officials have the power to deem materials classified provides them with an opportunity to use national security as…

  • NSA Whistleblower: Everyone in US Under Virtual Surveillance, All Info Stored

    NSA Whistleblower: Everyone in US Under Virtual Surveillance, All Info Stored

    http://youtu.be/TuET0kpHoyM RT talks to William Binney, whistleblower and former NSA crypto-mathematician who served in the agency for decades. Virtual privacy in US, Petraeus affair and whistleblowers’ odds in fight against the authorities are among key topics of this exclusive interview RT: In light of the Petraeus/Allen scandal while the public is so focused on the…

  • DHS Insider Part 2: Gun Confiscation, Assassination, Timeline & End Of The Constitution

    DHS Insider Part 2: Gun Confiscation, Assassination, Timeline & End Of The Constitution

    The latest from “DHS Insider” (Part II) By Douglas J. Hagmann DH: Wait, this sounds way, way over the top. Are you telling me… [Interrupts] RB: [Over talk/Unintelligible] …know who was selected or elected twice now. You know who his associates are. And you are saying this is way over the top? Don’t forget what…

  • 10 Outrageous Tactics Cops Get Away With

    10 Outrageous Tactics Cops Get Away With

    Talk to someone who has never dealt with the cops about police behaving badly, and he or she will inevitably say, “But they can’t do that! Can they?” The question of what the cops can or can’t do is natural enough for someone who never deals with cops, especially if their inexperience is due to class and/or race…

  • Stingrays: The Biggest Technological Threat to Cell Phone Privacy You Don’t Know About

    Stingrays: The Biggest Technological Threat to Cell Phone Privacy You Don’t Know About

      On Friday, EFF and the ACLU submitted an amicus brief in United States v. Rigmaiden, a closely-followed case that has enormous consequences for individuals’ Fourth Amendment rights in their home and on their cell phone. As the Wall Street Journal explained today, the technology at the heart of the case invades the privacy of…

  • The Supreme Court Isn’t Bothered By the NSA’s Warrantless Wiretapping

    The Supreme Court Isn’t Bothered By the NSA’s Warrantless Wiretapping

    The Supreme Court refused to hear a case on Tuesday that holds telecom companies accountable for letting the National Security Agency spy on unknowing Americans without a warrant. Dating back to 2006 when the American Civil Liberties Union and the Electronic Frontier Foundation first filed the class-action lawsuit, the case accuses AT&T of providing the…

  • New Book Details the NSA’s Warrantless Wiretapping Program, As Government Moves to Avoid All Accountability in Court

    New Book Details the NSA’s Warrantless Wiretapping Program, As Government Moves to Avoid All Accountability in Court

    Former New York Times reporter Kurt Eichenwald’s new book, published last week, provides yet more details about how the the NSA’s unconstitutional warrantless wiretapping program came about, and confirms that even top Bush Administration lawyers felt there was a “strong argument” that the program violated the law. “Officials might be slammed for violating the Fourth…

  • Shredding the Constitution: National Detention, Targeted Killing and Spying Cases

    Shredding the Constitution: National Detention, Targeted Killing and Spying Cases

    Indefinite detention, targeted killing and warrantless wiretapping are hot issues in the courts this week. Here’s the latest: INDEFINITE DETENTION // The National Defense Authorization Act (NDAA) of 2012 provision that allows the government to indefinitely detain US citizens without charge or trial is once again in effect, after a Second Circuit Court overturned Judge…

  • Full Spectrum Dominance: Totalitarian Democracy in the New World Order

    Full Spectrum Dominance: Totalitarian Democracy in the New World Order

    Book Description Publication Date: May 12, 2009 For the faction controlling the Pentagon, the military industry, and the oil industry, the Cold War never ended. They engineered an incredible plan to grab total control of the planet, of land, sea, air, space, outer space and cyberspace. Continuing ‘below the radar,’ they created a global network…

  • Why can’t you say “Tavistock” on Godlike Productions?

    Why can’t you say “Tavistock” on Godlike Productions?

    I’ve been hearing rumours for a few months now that Godlike Productions has a “banned words” list that will result in you being blocked from reading the website should you decide to use one. While I fully expect certain keywords to result in you unable to make a posting on the site, but I have…

  • Three NSA Whistleblowers Back EFF’s Lawsuit Over Government’s Massive Spying Program

    Three NSA Whistleblowers Back EFF’s Lawsuit Over Government’s Massive Spying Program

    EFF Asks Court to Reject Stale State Secret Arguments So Case Can Proceed San Francisco – Three whistleblowers – all former employees of the National Security Agency (NSA) – have come forward to give evidence in the Electronic Frontier Foundation’s (EFF’s) lawsuit against the government’s illegal mass surveillance program, Jewel v. NSA. In a motion…

  • Real Journalism Under Attack: RAP NEWS Nails it Again with “A News Hope”

    Real Journalism Under Attack: RAP NEWS Nails it Again with “A News Hope”

    Juice Rap News: Episode XIII – A NEWS HOPE. It is a time of corporate war; deprived of a reliable media the people of Planet Earth are kept misinformed and in a state of perpetual conflict. Is an honest Fourth Estate the only Force than can restore peace and balance to the Galaxy? To find…

  • The US Government Is Running A Massive Spy Campaign On Occupy Wall Street

    The US Government Is Running A Massive Spy Campaign On Occupy Wall Street

    Remember the Occupy Movement? Since last November, when the NYPD closed the Zuccotti Park encampment in downtown Manhattan –the Movement’s birthplace and symbolic nexus—Occupy’s relevance has seriously dwindled, at least as measured by coverage in the mainstream media. We’re told that this erosion is due to Occupy’s own shortcomings—an inevitable outcome of its disjointed message…

  • US Police Can Copy Your iPhone’s Contents In Under Two Minutes

    US Police Can Copy Your iPhone’s Contents In Under Two Minutes

    It has emerged that Michigan State Police have been using a high-tech mobile forensics device that can extract information from over 3,000 models of mobile phone, potentially grabbing all media content from your iPhone in under two minutes. The CelleBrite UFED is a handheld device that Michigan officers have been using since August 2008 to copy information from…

  • Whistleblower: The NSA Is Lying–U.S. Government Has Copies of Most Of Your Emails

    Whistleblower: The NSA Is Lying–U.S. Government Has Copies of Most Of Your Emails

    In his first television interview since he resigned from the National Security Agency over its domestic surveillance program, William Binney discusses the NSA’s massive power to spy on Americans and why the FBI raided his home after he became a whistleblower. Binney was a key source for investigative journalist James Bamford’s recent exposé in Wired…

  • Twitter, the FBI, and You

    Twitter, the FBI, and You

    In the future, if you tweet out a photo of a hilarious, meme-tastic kitten, it might be best not to include terms like “white powder,” “dirty bomb,” or “Death to America.” Since late January, the Federal Bureau of Investigation has been asking the IT industry to help it develop an open-source social-media application that would provide…

  • Jacob Appelbaum on Being Target of Widespread Gov’t Surveillance

    Jacob Appelbaum on Being Target of Widespread Gov’t Surveillance

    We speak with Jacob Appelbaum, a computer researcher who has faced a stream of interrogations and electronic surveillance since he volunteered with the whistleblowing website, WikiLeaks. He describes being detained more than a dozen times at the airport and interrogated by federal agents who asked about his political views and confiscated his cell phone and…

  • UPDATE: Wiretapping Fundraiser – One Week Mark

    UPDATE: Wiretapping Fundraiser – One Week Mark

    To Serve or Not to Serve. I’m submitting my story because I feel it’s one a lot of people need to hear. I have been getting some negative feedback on CopBlock’s Facebook page from the cops that visit it, so here we go. I was a member of the united states marine corps for 14…

  • History of FBI Wiretapping & Telecommunications Spying

    History of FBI Wiretapping & Telecommunications Spying

    Courtesy of Cryptome’s link distribution, we get a glimpse into the mind of 1952 (an era when crypto on land lines was very limited, indeed). We get to see how the US tapped and how it worked with the phone company to tap others – in the course of determining that standard US techniques for…