Advertisements

Tag Archive: NSA


Daily Video 6.2.15

Patriot Act’s Section 215 Expires, NSA Spying Setback As Rand Paul Stops Mitch McConnell

 

 

 

Published on Jun 1, 2015

” WASHINGTON D.C. — Following gridlock in the US Senate, one of the most controversial sections of the anti-terrorism law, the Patriot Act, expired on Sunday night. Section 215 of the Patriot Act required businesses to turn over “all tangible things” to federal authorities.

In practice, Section 215 was interpreted by the government to allow for the bulk collection of customer data by the NSA. It expired without renewal at 12 a.m. Monday morning.

Section 215 authorized, the bulk warrantless collection of Americans phone metadata, as well as other identifying customer data from telcos and internet firms.

Section 215 also authorized the “roving wiretap” where a secret Foreign Intelligence Surveillance Court (FISC, or FISA) could warrant the tapping of any phone used by a suspect.

Section 215 also permitted the secret FISA courts to issue warrants to surveil “lone wolves,” or people with no connection to any terrorist organization or government.

The Senate had before it, compromise security legislation, called the USA Freedom Act, which the House of Representatives had already passed. One provision of the USA Freedom Act would have extended the powers granted by the Patriot Act’s Section 215 for four more years.

However, Senator Rand Paul (R-Ky) blocked a motion by Senate Majority Leader Mitch McConnell (R-Ky) to fast track review of the USA Freedom Act in order to bring a vote before the midnight deadline.

A revised USA Freedom Act will likely be passed by the Senate midweek, with broad bipartisan support.

The USA Freedom Act is a compromise between the government and telcos, web companies, and civil liberties advocates, who saw Section 215 as too vague. Last month, the Federal 2nd Circuit Court of Appeals ruled such data warrantless data collection to be illegal.

The House version of the USA Freedom Act would ban bulk phone record collections by the NSA, but require telcos to retain customers’ data instead. The the government can still get warrants from the FISA courts. Those warrants must specify a customer’s name or phone number.

The Senate will vote on the revised USA Freedom Act this week.

—————————————-­­———————

Welcome to TomoNews, where we animate the most entertaining news on the internets. Come here for an animated look at viral headlines, US news, celebrity gossip, salacious scandals, dumb criminals and much more! Subscribe now for daily news animations that will knock your socks off.

Visit our official website for all the latest, uncensored videos: http://us.tomonews.net “

 

 

 

 

 

 

 

 

 

 

 

Advertisements

One Shot Dead At Fort Meade After Trying To Enter NSA Gate

 

 

 

 

 

 

” One person is dead, and two more were hospitalized after an unauthorized vehicle tried to gain access to the National Security Agency campus in Fort Meade, Maryland, according to the NSA, which is investigating the incident.

” Shortly before 9:00 AM today, a vehicle containing two individuals attempted an unauthorized entry at a National Security Agency gate,” Jonathan Freed, NSA director of strategic communications, said in a statement. “The driver failed to obey an NSA Police officer’s routine instructions for safely exiting the secure campus. The vehicle failed to stop and barriers were deployed.”

  NSA police on the scene fired on the vehicle when it accelerated toward a police car, blocking its way, according to the NSA. One of the unauthorized vehicle’s two occupants died on the scene. The other was hospitalized, as was an NSA police officer.

  The two men who officials say tried to ram the main gate at NSA headquarters were dressed as women, according to a federal law enforcement official.”

CNN

BlackPhone Maker Silent Circle Announces $50 Million In Funding

 

 

 

 

 

” The BlackPhone, a $600-plus encrypted Android handset designed to keep the prying eyes of criminals and the government out of mobile communications, is now fully owned by Silent Circle thanks to the company raking in investment cash.

  Terms of the buyout deal with Spanish smartphone maker Geeksphone, the phone’s hardware manufacturer, were not disclosed. Silent Circle said Thursday that it has raised $50 million and plans on showing off an encrypted “enterprise privacy ecosystem” at World Mobile Congress next week. A BlackPhone tablet is on the way, too.

” Silent Circle has brought tremendous disruption to the mobile industry and created an integrated suite of secure enterprise communication products that are challenging the status quo,” Mike Janke, cofounder and chairman of the Silent Circle board, said in a statement. “This first stage of growth has enabled us to raise approximately $50M to accelerate our continued rapid expansion and fuel our second stage of growth.”

  The cash infusion and the push for encrypted communications are in part a direct result of National Security Agency whistleblower Edward Snowden’s revelations about massive government surveillance.”

 

Details at Ars Technica

 

 

 

 

 

 

 

 

 

 

 

 

Reddit Bans Edward Snowden, Flames Glenn Greenwald In ‘Citizenfour’ Documentary AMA

 

 

 

” Edward Snowden says the only thing he regrets about his revelations regarding NSA surveillance is that he didn’t do it sooner. The former NSA analyst took part in a question-and-answer session on Reddit along with filmmaker Laura Poitras and and journalist Glenn Greenwald Monday.

  The trio appeared on the site to celebrate the Academy Award that “Citizenfour,” a documentary that depicts some of the earliest interviews between journalists and Snowden, received. The NSA leaker was temporarily banned from the popular submission site during the community Q&A, also known as an “ask me anything” or AMA.

” Hey guys, sorry — the reddit mods are being a little weird. My account is /u/SuddenlySnowden,” Snowden said. “Mods: Can you pull back the ban? I can’t post from the primary account. Thanks.”

  Snowden’s account was restored nine minutes later, but not before a Reddit moderator confronted him for complaining about the ban. The Reddit volunteer then got into a spat with Greenwald, later inferring the journalist was intellectually disabled.”

We doubt Aaron would approve , but then a lot of the Reddit moderators are as*holes . Read more

Russian Researchers Expose Breakthrough U.S. Spying Program

 

 

 

 

 

 

” The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world’s computers, according to cyber researchers and former operatives.

  That long-sought and closely guarded ability was part of a cluster of spying programs discovered by Kaspersky Lab, the Moscow-based security software maker that has exposed a series of Western cyber-espionage operations.

  Kaspersky said it found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria. The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, Kaspersky said. (http://reut.rs/1L5knm0)

  The firm declined to publicly name the country behind the spying campaign, but said it was closely linked to Stuxnet, the NSA-led cyber-weapon that was used to attack Iran’s uranium enrichment facility. The NSA is the agency responsible for gathering electronic intelligence on behalf of the United States.”

 

Lots more on the latest State spying revelations at Yahoo News

 

 

 

 

 

 

 

 

 

 

 

 

… Clean Your Camera Lens!

 

 

 

 

 

” The NSA has issued a Public Announcement today saying that everyone who owns a laptop, cell phone, smart TV, and any other modern social device with video recording, is advised to clean their camera lens regularly.

  An unnamed member of the NSA has released the statement through their Twitter account adding that “It’s really not good for morale when you see a chick in her bedroom through the laptop, and the camera lens blurs the image because of a smudge or something, especially when she’s pretty hot.” The NSA Twitter account later stated that “if you are under a 5 out of 10 on the hotness scale then you can disregard the advisory.”

  This is not the first very open statement the NSA has made in recent months when they released a tweet saying, “You know what? Everyone knows we’re watching, so we might as well save billions on secrecy and be blatant about it. I mean, the cat’s out of the bag and we, as a tax-powered institution, should just admit it.”

  There have also been hundreds of complaints recently from all collective genders about receiving random and untraceable phone texts while at home, asking the recipients things like, “Turn around a few times” and “It’s a little warm for that sweater, don’t you think?”

  When asked about the recent unprofessional attitude they officially state that “it’s 2015, so get with the times, this is the new standard of government professionalism.”

 

Thanks to Chedoh at The People’s Cube

 

 

 

 

 

 

 

 

 

 

 

 

On Christmas Eve, NSA Quietly Releases 12 Years Worth Of Internal Reports

 

 

 

” This holiday season, the NSA participated in a longstanding media tradition—dumping a large bit of news during a busy period of time when many likely weren’t paying attention.

  The US spy agency responded to a Freedom of Information Act lawsuit from the American Civil Liberties Union by quietly releasing 12 years worth of internal reports on Christmas Eve. Several included reports were previously withheld illegally, and they became the subject of the FOIA lawsuit in 2009.

  The new trove of information has inspired a different breed of headlines, such as “Highlights From Newly Released NSA Oversight Reports Reveal Bumbling Ineptitude But No Evidence Of Systematic Abuse” from Forbes. The newly discovered errors ran the gamut, including American data being e-mailed to unauthorized recipients, data being kept on unsecured computers, and sensitive information being sent to the wrong printer.”

 

 

 

 

 

Ars Technica has more

 

 

 

 

 

 

 

 

 

 

Congress Has Just Overruled Your 1st, 4th And 5th Amendment Rights

 

 

 

” As of today, Bill HR4681 has passed the house and senate, and is currently undergoing arbitration before being sent to the President for his signature in to law. The law says that the intelligence community can collect, retain, and disseminate all electronic communications including voice calls [without any constitutional restrictions] on all US citizens and everyone else in the world.  And they have 5 years before they are supposed to destroy the records.  However, they can keep them indefinitely if they fall into several categories of interest.

  It is all out in the open now.  Your 1st, 4th, and 5th Amendment protections are gone.  This act gives new meaning to ‘land of the free, home of the brave.’  The intelligence community isn’t doing anything in secret any more.  Americans are now living in an environment much like the days of the old Stalinist Soviet Union, where the presumption was that all conversations were monitored and one takes measures to have a ‘private’ conversations. 

  So turn up your radio or turn the water on in the sink and watch what you say on the phone or Facebook, even casual remarks on twitter may come back to haunt you in the future.  Don’t believe me, I have pasted the relevant parts of the bill below this story. Still don’t believe it? Just go to www.congress.gov/bill/113th-congress/house-bill/4681/text and read it from the horse’s mouth.

What are you willing to do about it?

[Congressional Bills 113th Congress]

[From the U.S. Government Printing Office]

 

[H.R. 4681 Enrolled Bill (ENR)]

H.R.4681

One Hundred Thirteenth Congress

of the

United States of America

TITLE III–GENERAL PROVISIONS

Subtitle A–General Matters

Sec. 309. Procedures for the retention of incidentally acquired

communications.

SEC. 309. PROCEDURES FOR THE RETENTION OF INCIDENTALLY ACQUIRED

COMMUNICATIONS.

(a) Definitions.–In this section:

(1) Covered communication.–The term “covered communication”

means any nonpublic telephone or electronic communication acquired

without the consent of a person who is a party to the

communication, including communications in electronic storage.

(2) Head of an element of the intelligence community.–The term

“head of an element of the intelligence community” means, as

appropriate–

(A) the head of an element of the intelligence community;

or

(B) the head of the department or agency containing such

element.

(3) United states person.–The term “United States person”

has the meaning given that term in section 101 of the Foreign

Intelligence Surveillance Act of 1978 (50 U.S.C. 1801).

(b) Procedures for Covered Communications.–

(1) Requirement to adopt.–Not later than 2 years after the

date of the enactment of this Act each head of an element of the

intelligence community shall adopt procedures approved by the

Attorney General for such element that ensure compliance with the

requirements of paragraph (3).

(2) Coordination and approval.–The procedures required by

paragraph (1) shall be–

(A) prepared in coordination with the Director of National

Intelligence; and

(B) approved by the Attorney General prior to issuance.

(3) Procedures.–

(A) Application.–The procedures required by paragraph (1)

shall apply to any intelligence collection activity not

otherwise authorized by court order (including an order or

certification issued by a court established under subsection

(a) or (b) of section 103 of the Foreign Intelligence

Surveillance Act of 1978 (50 U.S.C. 1803)), subpoena, or

similar legal process that is reasonably anticipated to result

in the acquisition of a covered communication to or from a

United States person and shall permit the acquisition,

retention, and dissemination of covered communications subject

to the limitation in subparagraph (B).

(B) Limitation on retention.–A covered communication shall

not be retained in excess of 5 years, unless–

(i) the communication has been affirmatively

determined, in whole or in part, to constitute foreign

intelligence or counterintelligence or is necessary to

understand or assess foreign intelligence or

counterintelligence;

(ii) the communication is reasonably believed to

constitute evidence of a crime and is retained by a law

enforcement agency;

(iii) the communication is enciphered or reasonably

believed to have a secret meaning;

(iv) all parties to the communication are reasonably

believed to be non-United States persons;

(v) retention is necessary to protect against an

imminent threat to human life, in which case both the

nature of the threat and the information to be retained

shall be reported to the congressional intelligence

committees not later than 30 days after the date such

retention is extended under this clause;

(vi) retention is necessary for technical assurance or

compliance purposes, including a court order or discovery

obligation, in which case access to information retained

for technical assurance or compliance purposes shall be

reported to the congressional intelligence committees on an

annual basis; or

(vii) retention for a period in excess of 5 years is

approved by the head of the element of the intelligence

community responsible for such retention, based on a

determination that retention is necessary to protect the

national security of the United States, in which case the

head of such element shall provide to the congressional

intelligence committees a written certification

describing–

 

(I) the reasons extended retention is necessary to

protect the national security of the United States;

(II) the duration for which the head of the element

is authorizing retention;

(III) the particular information to be retained;

and

(IV) the measures the element of the intelligence

community is taking to protect the privacy interests of

United States persons or persons located inside the

United States. “

 

 

 

 

 

   Many thanks to Universal Free Press for providing this story . Below the reader can see who voted to rob you of your rights and who voted against Statism …

 

 

 

 

 

VOTE PARTY REPRESENTATIVE DISTRICT
Alabama
YEA   R   Byrne, Bradley AL 1st
YEA   R   Roby, Martha AL 2nd
YEA   R   Rogers, Mike AL 3rd
YEA   R   Aderholt, Robert AL 4th
NAY   R   Brooks, Mo AL 5th
YEA   R   Bachus, Spencer AL 6th
YEA   D   Sewell, Terri AL 7th
Alaska
YEA   R   Young, Don AK
Arizona
YEA   D   Kirkpatrick, Ann AZ 1st
YEA   D   Barber, Ron AZ 2nd
NAY   D   Grijalva, Raúl AZ 3rd
NAY   R   Gosar, Paul AZ 4th
NAY   R   Salmon, Matt AZ 5th
YEA   R   Schweikert, David AZ 6th
YEA   D   Pastor, Ed AZ 7th
YEA   R   Franks, Trent AZ 8th
YEA   D   Sinema, Kyrsten AZ 9th
Arkansas
YEA   R   Crawford, Eric AR 1st
YEA   R   Griffin, Tim AR 2nd
YEA   R   Womack, Steve AR 3rd
YEA   R   Cotton, Tom AR 4th
California
YEA   R   LaMalfa, Doug CA 1st
NAY   D   Huffman, Jared CA 2nd
NAY   D   Garamendi, John CA 3rd
NAY   R   McClintock, Tom CA 4th
YEA   D   Thompson, Mike CA 5th
NAY   D   Matsui, Doris CA 6th
YEA   D   Bera, Ami CA 7th
YEA   R   Cook, Paul CA 8th
YEA   D   McNerney, Jerry CA 9th
YEA   R   Denham, Jeff CA 10th
YEA   D   Miller, George CA 11th
YEA   D   Pelosi, Nancy CA 12th
NAY   D   Lee, Barbara CA 13th
NAY   D   Speier, Jackie CA 14th
NAY   D   Swalwell, Eric CA 15th
YEA   D   Costa, Jim CA 16th
NAY   D   Honda, Mike CA 17th
NAY   D   Eshoo, Anna CA 18th
NAY   D   Lofgren, Zoe CA 19th
NAY   D   Farr, Sam CA 20th
YEA   R   Valadao, David CA 21st
YEA   R   Nunes, Devin CA 22nd
YEA   R   McCarthy, Kevin CA 23rd
YEA   D   Capps, Lois CA 24th
YEA   R   McKeon, Buck CA 25th
YEA   D   Brownley, Julia CA 26th
NAY   D   Chu, Judy CA 27th
YEA   D   Schiff, Adam CA 28th
YEA   D   Cárdenas, Tony CA 29th
YEA   D   Sherman, Brad CA 30th
NO VOTE   R   Miller, Gary CA 31st
YEA   D   Napolitano, Grace CA 32nd
YEA   D   Waxman, Henry CA 33rd
YEA   D   Becerra, Xavier CA 34th
NO VOTE   D   Negrete McLeod, Gloria CA 35th
YEA   D   Ruiz, Raul CA 36th
NAY   D   Bass, Karen CA 37th
YEA   D   Sánchez, Linda CA 38th
YEA   R   Royce, Ed CA 39th
YEA   D   Roybal-Allard, Lucille CA 40th
NAY   D   Takano, Mark CA 41st
YEA   R   Calvert, Ken CA 42nd
NAY   D   Waters, Maxine CA 43rd
NAY   D   Hahn, Janice CA 44th
NO VOTE   R   Campbell, John CA 45th
YEA   D   Sanchez, Loretta CA 46th
NAY   D   Lowenthal, Alan CA 47th
NAY   R   Rohrabacher, Dana CA 48th
YEA   R   Issa, Darrell CA 49th
YEA   R   Hunter, Duncan CA 50th
YEA   D   Vargas, Juan CA 51st
YEA   D   Peters, Scott CA 52nd
YEA   D   Davis, Susan CA 53rd
Colorado
YEA   D   DeGette, Diana CO 1st
NAY   D   Polis, Jared CO 2nd
NAY   R   Tipton, Scott CO 3rd
YEA   R   Gardner, Cory CO 4th
YEA   R   Lamborn, Doug CO 5th
YEA   R   Coffman, Mike CO 6th
YEA   D   Perlmutter, Ed CO 7th
Connecticut
YEA   D   Larson, John CT 1st
YEA   D   Courtney, Joe CT 2nd
YEA   D   DeLauro, Rosa CT 3rd
YEA   D   Himes, James CT 4th
YEA   D   Esty, Elizabeth CT 5th
Delaware
YEA   D   Carney, John DE
Florida
NO VOTE   R   Miller, Jeff FL 1st
YEA   R   Southerland, Steve FL 2nd
NAY   R   Yoho, Ted FL 3rd
YEA   R   Crenshaw, Ander FL 4th
YEA   D   Brown, Corrine FL 5th
YEA   R   DeSantis, Ron FL 6th
NAY   R   Mica, John FL 7th
NAY   R   Posey, Bill FL 8th
NAY   D   Grayson, Alan FL 9th
YEA   R   Webster, Daniel FL 10th
NAY   R   Nugent, Richard FL 11th
YEA   R   Bilirakis, Gus FL 12th
YEA   R   Jolly, David FL 13th
YEA   D   Castor, Kathy FL 14th
YEA   R   Ross, Dennis FL 15th
YEA   R   Buchanan, Vern FL 16th
YEA   R   Rooney, Thomas FL 17th
YEA   D   Murphy, Patrick FL 18th
NAY   R   Clawson, Curt FL 19th
NAY   D   Hastings, Alcee FL 20th
YEA   D   Deutch, Theodore FL 21st
YEA   D   Frankel, Lois FL 22nd
YEA   D   Wasserman Schultz, Debbie FL 23rd
YEA   D   Wilson, Frederica FL 24th
YEA   R   Diaz-Balart, Mario FL 25th
NAY   D   Garcia, Joe FL 26th
YEA   R   Ros-Lehtinen, Ileana FL 27th
Georgia
NAY   R   Kingston, Jack GA 1st
YEA   D   Bishop, Sanford GA 2nd
YEA   R   Westmoreland, Lynn GA 3rd
YEA   D   Johnson, Hank GA 4th
NAY   D   Lewis, John GA 5th
YEA   R   Price, Tom GA 6th
NAY   R   Woodall, Rob GA 7th
NAY   R   Scott, Austin GA 8th
YEA   R   Collins, Doug GA 9th
NAY   R   Broun, Paul GA 10th
YEA   R   Gingrey, Phil GA 11th
YEA   D   Barrow, John GA 12th
YEA   D   Scott, David GA 13th
NAY   R   Graves, Tom GA 14th
Hawaii
NAY   D   Hanabusa, Colleen HI 1st
YEA   D   Gabbard, Tulsi HI 2nd
Idaho
NAY   R   Labrador, Raúl ID 1st
YEA   R   Simpson, Mike ID 2nd
Illinois
YEA   D   Rush, Bobby IL 1st
YEA   D   Kelly, Robin IL 2nd
YEA   D   Lipinski, Daniel IL 3rd
NAY   D   Gutiérrez, Luis IL 4th
YEA   D   Quigley, Mike IL 5th
YEA   R   Roskam, Peter IL 6th
YEA   D   Davis, Danny IL 7th
NO VOTE   D   Duckworth, Tammy IL 8th
NAY   D   Schakowsky, Jan IL 9th
YEA   D   Schneider, Bradley IL 10th
YEA   D   Foster, Bill IL 11th
YEA   D   Enyart, William IL 12th
YEA   R   Davis, Rodney IL 13th
YEA   R   Hultgren, Randy IL 14th
YEA   R   Shimkus, John IL 15th
YEA   R   Kinzinger, Adam IL 16th
YEA   D   Bustos, Cheri IL 17th
VOTE PARTY REPRESENTATIVE DISTRICT
YEA   R   Schock, Aaron IL 18th
Indiana
YEA   D   Visclosky, Peter IN 1st
YEA   R   Walorski, Jackie IN 2nd
YEA   R   Stutzman, Marlin IN 3rd
YEA   R   Rokita, Todd IN 4th
YEA   R   Brooks, Susan IN 5th
YEA   R   Messer, Luke IN 6th
YEA   D   Carson, André IN 7th
YEA   R   Bucshon, Larry IN 8th
YEA   R   Young, Todd IN 9th
Iowa
YEA   D   Braley, Bruce IA 1st
YEA   D   Loebsack, David IA 2nd
YEA   R   Latham, Tom IA 3rd
YEA   R   King, Steve IA 4th
Kansas
NAY   R   Huelskamp, Tim KS 1st
YEA   R   Jenkins, Lynn KS 2nd
YEA   R   Yoder, Kevin KS 3rd
YEA   R   Pompeo, Mike KS 4th
Kentucky
YEA   R   Whitfield, Ed KY 1st
YEA   R   Guthrie, Brett KY 2nd
NAY   D   Yarmuth, John KY 3rd
NAY   R   Massie, Thomas KY 4th
YEA   R   Rogers, Hal KY 5th
YEA   R   Barr, Andy KY 6th
Louisiana
YEA   R   Scalise, Steve LA 1st
YEA   D   Richmond, Cedric LA 2nd
YEA   R   Boustany, Charles LA 3rd
YEA   R   Fleming, John LA 4th
YEA   R   McAllister, Vance LA 5th
YEA   R   Cassidy, Bill LA 6th
Maine
YEA   D   Pingree, Chellie ME 1st
YEA   D   Michaud, Michael ME 2nd
Maryland
YEA   R   Harris, Andy MD 1st
YEA   D   Ruppersberger, A. Dutch MD 2nd
YEA   D   Sarbanes, John MD 3rd
YEA   D   Edwards, Donna MD 4th
YEA   D   Hoyer, Steny MD 5th
YEA   D   Delaney, John MD 6th
NAY   D   Cummings, Elijah MD 7th
YEA   D   Van Hollen, Chris MD 8th
Massachusetts
YEA   D   Neal, Richard MA 1st
NAY   D   McGovern, Jim MA 2nd
YEA   D   Tsongas, Niki MA 3rd
YEA   D   Kennedy, Joseph MA 4th
NAY   D   Clark, Katherine MA 5th
NAY   D   Tierney, John MA 6th
NO VOTE   D   Capuano, Michael MA 7th
YEA   D   Lynch, Stephen MA 8th
YEA   D   Keating, William MA 9th
Michigan
YEA   R   Benishek, Dan MI 1st
YEA   R   Huizenga, Bill MI 2nd
NAY   R   Amash, Justin MI 3rd
YEA   R   Camp, Dave MI 4th
NAY   D   Kildee, Daniel MI 5th
YEA   R   Upton, Fred MI 6th
YEA   R   Walberg, Tim MI 7th
YEA   R   Rogers, Mike MI 8th
YEA   D   Levin, Sander MI 9th
YEA   R   Miller, Candice MI 10th
NAY   R   Bentivolio, Kerry MI 11th
YEA   D   Dingell, John MI 12th
NAY   D   Conyers, John MI 13th
YEA   D   Peters, Gary MI 14th
Minnesota
YEA   D   Walz, Timothy MN 1st
YEA   R   Kline, John MN 2nd
YEA   R   Paulsen, Erik MN 3rd
NAY   D   McCollum, Betty MN 4th
YEA   D   Ellison, Keith MN 5th
YEA   R   Bachmann, Michele MN 6th
YEA   D   Peterson, Collin MN 7th
YEA   D   Nolan, Richard MN 8th
Mississippi
YEA   R   Nunnelee, Alan MS 1st
YEA   D   Thompson, Bennie MS 2nd
YEA   R   Harper, Gregg MS 3rd
YEA   R   Palazzo, Steven MS 4th
Missouri
YEA   D   Clay, Lacy MO 1st
YEA   R   Wagner, Ann MO 2nd
YEA   R   Luetkemeyer, Blaine MO 3rd
YEA   R   Hartzler, Vicky MO 4th
YEA   D   Cleaver, Emanuel MO 5th
YEA   R   Graves, Sam MO 6th
YEA   R   Long, Billy MO 7th
YEA   R   Smith, Jason MO 8th
Montana
YEA   R   Daines, Steve MT
Nebraska
YEA   R   Fortenberry, Jeff NE 1st
YEA   R   Terry, Lee NE 2nd
YEA   R   Smith, Adrian NE 3rd
Nevada
YEA   D   Titus, Dina NV 1st
YEA   R   Amodei, Mark NV 2nd
YEA   R   Heck, Joseph NV 3rd
YEA   D   Horsford, Steven NV 4th
New Hampshire
YEA   D   Shea-Porter, Carol NH 1st
YEA   D   Kuster, Ann NH 2nd
New Jersey
YEA   D   Norcross, Donald NJ 1st
YEA   R   LoBiondo, Frank NJ 2nd
YEA   R   Runyan, Jon NJ 3rd
YEA   R   Smith, Chris NJ 4th
NAY   R   Garrett, Scott NJ 5th
NAY   D   Pallone, Frank NJ 6th
YEA   R   Lance, Leonard NJ 7th
YEA   D   Sires, Albio NJ 8th
YEA   D   Pascrell, Bill NJ 9th
YEA   D   Payne, Donald NJ 10th
YEA   R   Frelinghuysen, Rodney NJ 11th
NAY   D   Holt, Rush NJ 12th
New Mexico
YEA   D   Lujan Grisham, Michelle NM 1st
YEA   R   Pearce, Steve NM 2nd
YEA   D   Luján, Ben NM 3rd
New York
YEA   D   Bishop, Timothy NY 1st
YEA   R   King, Pete NY 2nd
YEA   D   Israel, Steve NY 3rd
YEA   D   McCarthy, Carolyn NY 4th
YEA   D   Meeks, Gregory NY 5th
YEA   D   Meng, Grace NY 6th
NAY   D   Velázquez, Nydia NY 7th
YEA   D   Jeffries, Hakeem NY 8th
NAY   D   Clarke, Yvette NY 9th
NAY   D   Nadler, Jerrold NY 10th
YEA   R   Grimm, Michael NY 11th
YEA   D   Maloney, Carolyn NY 12th
NAY   D   Rangel, Charles NY 13th
YEA   D   Crowley, Joseph NY 14th
NAY   D   Serrano, José NY 15th
YEA   D   Engel, Eliot NY 16th
YEA   D   Lowey, Nita NY 17th
YEA   D   Maloney, Sean NY 18th
NAY   R   Gibson, Christopher NY 19th
YEA   D   Tonko, Paul NY 20th
YEA   D   Owens, William NY 21st
YEA   R   Hanna, Richard NY 22nd
YEA   R   Reed, Tom NY 23rd
YEA   D   Maffei, Daniel NY 24th
YEA   D   Slaughter, Louise NY 25th
YEA   D   Higgins, Brian NY 26th
YEA   R   Collins, Chris NY 27th
North Carolina
YEA   D   Butterfield, G.K. NC 1st
YEA   R   Ellmers, Renee NC 2nd
NAY   R   Jones, Walter NC 3rd
YEA   D   Price, David NC 4th
YEA   R   Foxx, Virginia NC 5th
YEA   R   Coble, Howard NC 6th
YEA   D   McIntyre, Mike NC 7th
VOTE PARTY REPRESENTATIVE DISTRICT
YEA   R   Hudson, Richard NC 8th
YEA   R   Pittenger, Robert NC 9th
YEA   R   McHenry, Patrick NC 10th
NAY   R   Meadows, Mark NC 11th
YEA   D   Adams, Alma NC 12th
YEA   R   Holding, George NC 13th
North Dakota
YEA   R   Cramer, Kevin ND
Ohio
YEA   R   Chabot, Steve OH 1st
YEA   R   Wenstrup, Brad OH 2nd
YEA   D   Beatty, Joyce OH 3rd
NAY   R   Jordan, Jim OH 4th
YEA   R   Latta, Robert OH 5th
YEA   R   Johnson, Bill OH 6th
YEA   R   Gibbs, Bob OH 7th
NAY   D   Kaptur, Marcy OH 9th
YEA   R   Turner, Michael OH 10th
YEA   D   Fudge, Marcia OH 11th
YEA   R   Tiberi, Pat OH 12th
YEA   D   Ryan, Tim OH 13th
YEA   R   Joyce, David OH 14th
YEA   R   Stivers, Steve OH 15th
YEA   R   Renacci, James OH 16th
Oklahoma
NAY   R   Bridenstine, Jim OK 1st
YEA   R   Mullin, Markwayne OK 2nd
YEA   R   Lucas, Frank OK 3rd
YEA   R   Cole, Tom OK 4th
YEA   R   Lankford, James OK 5th
Oregon
NAY   D   Bonamici, Suzanne OR 1st
YEA   R   Walden, Greg OR 2nd
NAY   D   Blumenauer, Earl OR 3rd
NAY   D   DeFazio, Peter OR 4th
NO VOTE   D   Schrader, Kurt OR 5th
Pennsylvania
YEA   D   Brady, Robert PA 1st
YEA   D   Fattah, Chaka PA 2nd
YEA   R   Kelly, Mike PA 3rd
NAY   R   Perry, Scott PA 4th
YEA   R   Thompson, Glenn PA 5th
YEA   R   Gerlach, Jim PA 6th
YEA   R   Meehan, Patrick PA 7th
YEA   R   Fitzpatrick, Michael PA 8th
YEA   R   Shuster, Bill PA 9th
YEA   R   Marino, Tom PA 10th
YEA   R   Barletta, Lou PA 11th
YEA   R   Rothfus, Keith PA 12th
YEA   D   Schwartz, Allyson PA 13th
NAY   D   Doyle, Mike PA 14th
YEA   R   Dent, Charles PA 15th
YEA   R   Pitts, Joseph PA 16th
YEA   D   Cartwright, Matthew PA 17th
YEA   R   Murphy, Tim PA 18th
Rhode Island
YEA   D   Cicilline, David RI 1st
YEA   D   Langevin, Jim RI 2nd
South Carolina
NAY   R   Sanford, Mark SC 1st
YEA   R   Wilson, Joe SC 2nd
NAY   R   Duncan, Jeff SC 3rd
NAY   R   Gowdy, Trey SC 4th
NAY   R   Mulvaney, Mick SC 5th
YEA   D   Clyburn, Jim SC 6th
YEA   R   Rice, Tom SC 7th
South Dakota
YEA   R   Noem, Kristi SD
Tennessee
NAY   R   Roe, Phil TN 1st
NAY   R   Duncan, John TN 2nd
YEA   R   Fleischmann, Chuck TN 3rd
NAY   R   DesJarlais, Scott TN 4th
YEA   D   Cooper, Jim TN 5th
YEA   R   Black, Diane TN 6th
YEA   R   Blackburn, Marsha TN 7th
YEA   R   Fincher, Stephen TN 8th
NAY   D   Cohen, Steve TN 9th
Texas
NAY   R   Gohmert, Louie TX 1st
NAY   R   Poe, Ted TX 2nd
YEA   R   Johnson, Sam TX 3rd
NO VOTE   R   Hall, Ralph TX 4th
YEA   R   Hensarling, Jeb TX 5th
YEA   R   Barton, Joe TX 6th
YEA   R   Culberson, John TX 7th
YEA   R   Brady, Kevin TX 8th
YEA   D   Green, Al TX 9th
YEA   R   McCaul, Michael TX 10th
YEA   R   Conaway, Michael TX 11th
YEA   R   Granger, Kay TX 12th
YEA   R   Thornberry, Mac TX 13th
NAY   R   Weber, Randy TX 14th
YEA   D   Hinojosa, Rubén TX 15th
NAY   D   O’Rourke, Beto TX 16th
YEA   R   Flores, Bill TX 17th
NAY   D   Jackson Lee, Sheila TX 18th
YEA   R   Neugebauer, Randy TX 19th
YEA   D   Castro, Joaquin TX 20th
YEA   R   Smith, Lamar TX 21st
YEA   R   Olson, Pete TX 22nd
YEA   D   Gallego, Pete TX 23rd
YEA   R   Marchant, Kenny TX 24th
YEA   R   Williams, Roger TX 25th
NAY   R   Burgess, Michael TX 26th
YEA   R   Farenthold, Blake TX 27th
YEA   D   Cuellar, Henry TX 28th
YEA   D   Green, Gene TX 29th
YEA   D   Johnson, Eddie TX 30th
YEA   R   Carter, John TX 31st
YEA   R   Sessions, Pete TX 32nd
YEA   D   Veasey, Marc TX 33rd
YEA   D   Vela, Filemon TX 34th
NAY   D   Doggett, Lloyd TX 35th
NAY   R   Stockman, Steve TX 36th
Utah
YEA   R   Bishop, Rob UT 1st
YEA   R   Stewart, Chris UT 2nd
YEA   R   Chaffetz, Jason UT 3rd
YEA   D   Matheson, Jim UT 4th
Vermont
NAY   D   Welch, Peter VT
Virginia
YEA   R   Wittman, Robert VA 1st
YEA   R   Rigell, Scott VA 2nd
YEA   D   Scott, Bobby VA 3rd
YEA   R   Forbes, Randy VA 4th
YEA   R   Hurt, Robert VA 5th
YEA   R   Goodlatte, Bob VA 6th
NAY   R   Brat, Dave VA 7th
YEA   D   Moran, Jim VA 8th
NAY   R   Griffith, Morgan VA 9th
YEA   R   Wolf, Frank VA 10th
YEA   D   Connolly, Gerald VA 11th
Washington
NAY   D   DelBene, Suzan WA 1st
YEA   D   Larsen, Rick WA 2nd
YEA   R   Herrera Beutler, Jaime WA 3rd
YEA   R   Hastings, Doc WA 4th
YEA   R   McMorris Rodgers, Cathy WA 5th
YEA   D   Kilmer, Derek WA 6th
NAY   D   McDermott, Jim WA 7th
YEA   R   Reichert, David WA 8th
NO VOTE   D   Smith, Adam WA 9th
NAY   D   Heck, Denny WA 10th
West Virginia
YEA   R   McKinley, David WV 1st
YEA   R   Capito, Shelley WV 2nd
YEA   D   Rahall, Nick WV 3rd
Wisconsin
YEA   R   Ryan, Paul WI 1st
NAY   D   Pocan, Mark WI 2nd
YEA   D   Kind, Ron WI 3rd
NAY   D   Moore, Gwen WI 4th
NAY   R   Sensenbrenner, James WI 5th
YEA   R   Petri, Tom WI 6th
YEA   R   Duffy, Sean WI 7th
NAY   R   Ribble, Reid WI 8th
Wyoming
NAY   R   Lummis, Cynthia

 

 

   This is a despicable vote and all the Republicans that voted in favor of this bill should hang their heads in shame . 

 

 

 

 

 

 

 

 

Brilliant New Device Lets Protestors Block Surveillance And Stingrays

 

tun angles 2

 

 

 

” Reports about agents using a Stingray on protesters to unconstitutionally monitor their phones are circulating widely, and now protesters have a way to fight back.

  Earlier this week an anonymous leaked recording exposed the agents monitoring the protesters’ movements by tracking their phones. A Stingray mimics a cellular tower, letting agents pry into citizens’ cell phones and gather their data/location without a warrant.

  Stingrays were supposed to be used for “terrorists,” but now they’re being used against us locally — which is unconstitutional.

  And that’s where a new product called Tunnel enters the scene .

  We’ve known that the NSA spies on us ever since Edward Snowden blew the whistle on them.

  But have you ever wondered if it’s possible for somebody to spy back on them?

  The NSA has a special way of protecting itself against such a possibility.  And you’ve probably never heard of it.

  To hide its own privacy, the NSA installs copper  – yes, you read that correctly: copper – around the equipment in its buildings.

  It turns out that copper has a unique conductive property that allows it to block surveillance, letting those who use it hide their activities from would-be spies.

  The main NSA headquarters is described as ”a building covered with one-way dark glass, which is lined with copper shielding in order to prevent espionage by trapping in signals and sounds.”

  The question becomes: if they can protect their own privacy with copper, why can’t we use this same technique to protect our privacy from them?

  Well now we finally can.

  Tunnel is a portable Faraday enclosure that uses a 100% authentic copper shielding system to surround your phone.  When your phone is inside, it forms a topologically near-complete surface to prevent non-ionizing radiation from penetrating its boundaries, letting you avoid surveillance.

  Thankfully, it’s not going to cost thousands of dollars, which has come as great news for protesters and other privacy advocates. “

 

 

   Be sure to read the rest at Filming Cops and while you are there grab their coupon code that will give the first 100 purchasers 35% off of the already discounted holiday price . Order yours today , we did and got it for a mere $43 with shipping thanks to the Filming Cops coupon . 

 

 

 

 

 

 

 

 

 

 

The Best Obama Joke Yet

 

 

 

 

” Did you hear about…..

> Bob: “Did you hear about the Obama administration scandal?,
> Jim: “You mean the Mexican gun running?”
> Bob: “No, the other one.”

> Jim: “You mean SEAL Team 6?”
> Bob: “No, the other one.”

> Jim: “You mean the State Dept. lying about Benghazi?”
> Bob: “No, the other one.”

> Jim: “You mean voter fraud?”
> Bob: “No, the other one.”

> Jim: “You mean the military not getting their votes counted?”
> Bob: “No, the other one.”

> Jim: “The NSA monitoring our phone calls, emails and everything else?”
> Bob: “No, the other one.”

> Jim: “You mean the of drones in our own country without the benefit of the law?”
> Bob: “No, the other one.”

> Jim: “Giving 123 Technologies $300 Million and right after it declared bankruptcy and was sold to the Chinese?”
> Bob: “No, the other one.”

> Jim: “You mean the president arming the Muslim Brotherhood?”
> Bob: “No the other one:.

> Jim: “The IRS targeting conservatives?”
> Bob: “No, the other one.”

> Jim: “The DOJ spying on the press?”
> Bob: “No, the other one.”

> Jim: “Sebelius shaking down health insurance executives?”
> Bob: “No, the other one.”

> Jim: “Giving SOLYNDRA $500 MILLION DOLLARS and 3 months later they declared bankruptcy and then the Chinese bought it?”
> Bob: “No, the other one.”

> Jim: “The NSA monitoring our phone calls, emails and everything else?”
> Bob: “No, the other one.”

> Jim: “The president’s ordering the release of nearly 10,000 illegal immigrants from jails and prisons, and falsely blaming the sequester?”
> Bob: “No, the other one.”

> Jim: “The president’s threat to impose gun control by Executive Order in order to bypass Congress?”
> Bob: “No, the other one.”

> Jim: “The president’s repeated violation of the law requiring him to submit a budget no later than the first Monday in February?”
> Bob: “No, the other one.”

> Jim: “The 2012 vote where 115% of all registered voters in some counties voted 100% for Obama?”
> Bob: “No, the other one.”

> Jim: “The president’s unconstitutional recess appointments in an attempt to circumvent the Senate’s advise-and-consent role?”
> Bob: “No, the other one.”

> Jim: “The State Department interfering with an Inspector General investigation on departmental sexual misconduct?”
> Bob: “No, the other one.”

> Jim: “Clinton, the IRS, Clapper and Holder all lying to Congress?”
> Bob: “No, the other one.”

> Jim: “I give up! … Oh wait, I think I got it! You mean that 65 million low-information voters who don’t pay taxes and get free stuff from taxpayers and stuck us again with the most pandering, corrupt administration in American history?”
> Bob: “THAT’S THE ONE!” “

 

 

     Of course the greatest joke of the Obama presidency is Obama himself , and if we couldn’t laugh these past six years would surely have been the death of us …

Thanks to Obama For Dummies & YoungCons

 

 

 

 

 

 

 

 

 

Researchers Uncover Government Spy Tool Used To Hack Telecoms And Belgian Cryptographer

 

 

Regin-Architecture

 

 

” It was the spring of 2011 when the European Commission discovered it had been hacked. The intrusion into the EU’s legislative body was sophisticated and widespread and used a zero-day exploit to get in. Once the attackers established a stronghold on the network, they were in for the long haul. They scouted the network architecture for additional victims and covered their tracks well. Eventually, they infected numerous systems belonging to the European Commission and the European Council before being discovered.

  Two years later another big target was hacked. This time it was Belgacom, the partly state-owned Belgian telecom. In this case, too, the attack was sophisticated and complex. According to published news reports and documents leaked by Edward Snowden, the attackers targeted system administrators working for Belgacom and used their credentials to gain access to routers controlling the telecom’s cellular network. Belgacom publicly acknowledged the hack, but has never provided details about the breach.

  Then five months after that announcement, news of another high-profile breach emerged—this one another sophisticated hack targeting prominent Belgian cryptographer Jean-Jacques Quisquater. “

 

 

 

 

 

” Now it appears that security researchers have found the massive digital spy tool used in all three attacks. Dubbed “Regin” by Microsoft, more than a hundred victims have been found to date, but there are likely many others still unknown. That’s because the espionage tool—a malicious platform capable of taking over entire networks and infrastructures—has been around since at least 2008, possibly even earlier, and is built to remain stealth on a system for years.

  The threat has been known since at least 2011, around the time the EU was hacked and some of the attack files made their way to Microsoft, who added detection for the component to its security software. Researchers with Kaspersky Lab only began tracking the threat in 2012, collecting bits and pieces of the massive threat. Symantec began investigating it in 2013 after some of its customers were infected. Putting together information from each, it’s clear the platform is highly complex and modulated and can be customized with a wide range of capabilities depending on the target and the attackers’ needs. Researchers have found 50 payloads so far for stealing files and other data, but have evidence that still more exist.

“ It’s a threat that everyone has detected for some time, but no one has exposed [until now],” says Eric Chien, technical director of Symantec’s Security Technology and Response division.

  The researchers have no doubt that Regin is a nation-state tool and are calling it the most sophisticated espionage machine uncovered to date—more complex even than the massive Flame platform, uncovered by Kaspersky and Symantec in 2012 and crafted by the same team who created Stuxnet. “

 

The whole story may be read at Wired

 

 

 

 

 

 

 

 

 

Americans Trust Government Less And Less Because We Know More And More About How It Operates

 

 

 

” Fifty years ago, FBI operatives sent Martin Luther King, Jr. was has come to be known as the “suicide letter,” an anonymous note suggesting the civil rights leader should off himself before his private sex life was made public. The information about King’s extramarital assignations was gathered with the approval not just of the FBI’s J. Edgar Hoover but Attorney General Robert Kennedy and President Lyndon Johnson.

” There is but one way out for you,” reads the note, which appeared in unredacted form for the first time just last week. “You better take it before your filthy fraudulent self is bared to the nation.”

  Thus is revealed one of the most despicable acts of domestic surveillance in memory. These days, we worry less about the government outing our sex lives than in it tracking every move we move online. It turns out that President Obama, who said he would roll back the unconstitutional powers exercised by his predecessor, had a secret “kill list” over which he was sole authority. Jesus, we’ve just learned that small planes are using so-called dirtboxes to pick up cell phone traffic. One of the architects of Obamacare publicly states that Americans are stupid and that the president’s healthcare reform was vague and confusing on purpose. The former director of national intelligence, along with the former head and current heads of the CIA, have lied to Congress.”

 

Read more

 

 

 

 

 

 

 

 

 

Rap Sheets, Watchlists And Spy Networks Now Available With Single Click

 

 

 

” Law enforcement officials nationwide now have the ability to search multiple sensitive databases, including spy agency intranets and homeland security suspicious activity reporting – with a single login. 

  The breakthrough in interconnectivity is expected to close information gaps that, among other things, have contributed to the rise in homegrown terrorism and school shootings. 

” Let’s say you have a lone-wolf incident or an active-shooter incident, where you need to be able to securely share information in a timely way. With a single sign-on capability, there is no wrong door,” Kshemendra Paul, program manager for the Information Sharing Environment at the Office of Director of National Intelligence, said during an interview. “If you have an account, you can get to the virtual command center that the fusion center may be using – in a very direct way.” “

 

Read it all at NextGov.com

 

 

 

 

 

 

 

 

 

This Is How The Feds Illegally Obtain Evidence Of A Crime And Lie About It In Court

 

 

 

” The president continues to dispatch his National Security Agency (NSA) spies as if he were a law unto himself, and Congress—which is also being spied upon—has done nothing to protect the right to privacy that the Fourth Amendment was written to ensure. Congress has taken an oath to uphold the Constitution, yet it has failed miserably to do so. But the spying is now so entrenched in government that a sinister and largely unnoticed problem lurks beneath the surface.

  NSA documents released by Edward Snowden show that the feds seriously deceived Congress and the courts in an effort to spy upon all of us and to use the gathered materials in criminal prosecutions, even though they told federal judges they would not. Among the more nefarious procedures the feds have engaged in is something called “parallel reconstruction.” This procedure seeks to hide the true and original source of information about a criminal defendant when it was obtained unlawfully.

  Thus, in order to maintain the facade of spying only for domestic intelligence purposes, and to appear faithful to public and secret promises (the FISA court only sits in secret) that any evidence of criminal behavior inadvertently discovered by NSA spies will not be used in criminal prosecutions, and so as to keep the mechanisms of domestic spying hidden from non-FISA federal judges who are more likely to apply normative interpretations of the Fourth Amendment than their FISA court colleagues, the NSA and the DOJ began the process of parallel reconstruction.

  Parallel reconstruction consists largely of the creation of a false beginning—an untrue one—of the acquisition of evidence. This, of course, is criminal. Lawyers and agents for the NSA and DOJ may no more lawfully lie to federal judges and criminal defense attorneys about the true origins of evidence than may a bank robber who testifies in his own defense claiming to have been at Mass at the time of the robbery.

  While parallel reconstruction is deceptive, unlawful and unconstitutional, I suspect it is but the tip of a dangerous iceberg spawned by the unbridled NSA spying that Bush and Obama have given us. When you mix a lack of fidelity to the plain meaning of the Constitution with a legal fiction, and then add in a drumbeat of fear, enforced secrecy, and billions of unaccounted-for taxpayer dollars, you get a dangerous stew of unintended tyrannical consequences.”

 

Read the whole thing at Reason

 

 

 

 

 

 

 

 

 

 

 

 

FBI Not Happy With Apple & Google’s Encryption Policy

 

 

 

 

” Users might have praised the technology companies for efforts to encrypt their latest devices that would prevent law enforcement agencies’ hands on users’ private data, but the FBI is not at all happy with Apple and Google right now.
 
  The Federal Bureau of Investigation director, James Comey, said Thursday he was “very concerned” over Apple and Google using stronger or full encryption in their Smartphones and Tablets that makes it impossible for law enforcement to collar criminals.
  According to Comey, the Silicon Valley tech giants are “marketing something expressly to allow people to place themselves above the law.”

There will come a day – well it comes every day in this business – when it will matter a great, great deal to the lives of people of all kinds that we be able to with judicial authorization gain access to a kidnapper’s or a terrorist or a criminal’s device,” Comey told reporters.

I just want to make sure we have a good conversation in this country before that day comes. I’d hate to have people look at me and say, ‘Well how come you can’t save this kid,’ ‘How come you can’t do this thing.’” “

Hacker News

Facebook Poses A Threat To Every American

 

 

 

 

 

” Participation on Facebook could prove very dangerous to your future well-being. There is a reason that Facebook is aligned with both the CIA and the NSA. I have several credible sources tell me that all data posted on Facebook goes into series of cataloged files which culminates with each person being assigned a “Threat Matrix Score”. The mere existence of a Threat Matrix Score should send chills up and the collective spines of every American.

  When, not if, martial law comes to America, this Threat Matrix Score, of which Facebook data is used to help compile an “enemies of the state” list, your future longevity could be seriously imperiled. It is too late for people like Steve Quayle, Doug and Joe Hagmann, John B. Wells and myself to avoid being placed on this list. However, it is not too late for the average American to limit their exposure by NOT posting and participating on Facebook. Facebook participation should come with a black box warning:

“ WARNING: The views expressed on Facebook can and will be used against you. Participation in Facebook could prove detrimental to the length of your life. All political dissident views are immediately reported to the CIA and the NSA. Risk of repeated exposure on Facebook could result in you and your family being hauled out of their homes at 3AM, separated from your family and sent to a re-education camp”. “

 

 

 

Read the rest

 

 

 

 

 

 

 

 

 

 

Apple Will No Longer Unlock Most iPhones, iPads For Police, Even With Search Warrants

 

 

 

 

 

 

 

” Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user information.

  The move, announced with the publication of a new privacy policy tied to the release of Apple’s latest mobile operating system, iOS 8, amounts to an engineering solution to a legal quandary: Rather than comply with binding court orders, Apple has reworked its latest encryption in a way that prevents the company — or anyone but the device’s owner — from gaining access to the vast troves of user data typically stored on smartphones or tablet computers.

  The key is the encryption that Apple mobile devices automatically put in place when a user selects a passcode, making it difficult for anyone who lacks that passcode to access the information within, including photos, e-mails and recordings. Apple once maintained the ability to unlock some content on devices for legally binding police requests but will no longer do so for iOS 8, it said in the new privacy policy.

“ Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data,” Apple said on its Web site. “So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.” “

 

Washington Post

 

 

 

 

 

 

 

 

 

Tech Chiefs In Plea Over Privacy Damage

 

 

 

 

 

” The US tech industry has failed to appreciate the mounting global concern over its record on online privacy and security and must act fast to prevent deeper damage to its image, Silicon Valley’s top executives and investors have conceded.

  The self-criticism, much of it aimed at consumer internet companies such as Google and Facebook, comes as some of the tech sector’s best-known names have been battered by a backlash over revelations of widespread US internet surveillance and concerns about their growing business and cultural dominance.

  Peter Thiel, a prominent start-up investor and Facebook director, said: “Silicon Valley is quite oblivious to the degree to which this crescendo of concern is building up in Europe. It’s an extremely important thing and Silicon Valley is underestimating it badly.

  Jim Breyer, an early investor and former board member of Facebook, said: “The US government and [tech] companies will have to step up significantly if they want to regain the world’s trust.”

 

Financial Times

 

 

 

 

 

 

 

 

 

 

U.S. Threatened Massive Fine To Force Yahoo To Release Data

 

 

 

 

 

” The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed Thursday that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program.

  The documents, roughly 1,500 pages worth, outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online com­munications by users of Yahoo and other U.S.-based technology firms.”

 

This is the power of Leviathan … we’ve been warned

 

 

 

 

 

 

 

 

 

Left To Obama: Check Spy Agencies

 

 

 

” Activists on the left are demanding President Obama flex his muscle over the country’s spy agencies.

  The CIA’s admission that a handful of officials spied on Senate staffers is proof that the White House has lost control of the intelligence agencies, critics say. They are also discomforted by the continued support Obama has offered for agency Director John Brennan. 

“ This is not an isolated incident,” said Becky Bond, political director with the progressive group Credo.

“ The fact that these intelligence officials are able to keep their job when major breaches or major assaults on the Constitution are made public — let alone all the things that are happening that we don’t know about — it sets a very dangerous precedent,” she added.

  In recent days, more than 42,000 people have signed Credo’s petition calling for Obama to “fire” Brennan, along with agency officials who knew about the snooping on Congress. The petition also calls for the Justice Department to file criminal charges against people involved in the congressional snooping.

  The spying is just “the latest evidence that America’s shadowy intelligence agencies are out of control,” the group said in its petition. “Yet disturbingly, President Obama is still defending Brennan.”

  The administration’s positions have inflamed civil libertarians on both sides of the aisle. But for liberals who supported Obama based in part on his opposition to the powerful security apparatus of the administration of President George W. Bush, the shift is especially painful. 

“ It looks incredibly hypocritical relative to the promises he made over the campaign, and that’s completely been made transparent,” said Demand Progress executive director David Segal. “

 

The Hill

 

 

 

 

 

 

 

 

 

Report: Ordinary Americans Caught Up In Data Sweep

 

 

 

 

 

” When the U.S. National Security Agency intercepted the online accounts of legally targeted foreigners over a four-year period it also collected the conversations of nine times as many ordinary Internet users, both Americans and non-Americans, according to a probe by The Washington Post.

  Nearly half of those surveillance files contained names, email addresses or other details that the NSA marked as belonging to U.S. citizens or residents, the Post reported in a story posted on its website Saturday night. While the federal agency tried to protect their privacy by masking more than 65,000 such references to individuals, the newspaper said it found nearly 900 additional email addresses that could be strongly linked to U.S. citizens or residents.”

The Snowden revelations continue to reveal the extent of State spying during the Age Of Obama …

” The material reviewed by the Post included roughly 160,000 intercepted e-mail and instant-message conversations, some of them hundreds of pages long, and 7,900 documents taken from more than 11,000 online accounts. It spanned President Barack Obama’s first term, 2009 to 2012, and was provided to the Post by former NSA analyst Edward Snowden.

  The daily lives of more than 10,000 account holders who were not targeted were catalogued and recorded, the Post reported. The newspaper described that material as telling “stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes.” The material collected included more than 5,000 private photos, the paper said.”

AP News

Commentary From John Whitehead At The Rutherford Institute

 

 

 

 

 

” By John W. Whitehead 
June 16, 2014

A standing military force, with an overgrown Executive will not long be safe companions to liberty.”—James Madison

“ Here [in New Mexico], we are moving more toward a national police force. Homeland Security is involved with a lot of little things around town. Somebody in Washington needs to call a timeout.”—Dan Klein, retired Albuquerque Police Department sergeant.

  If the United States is a police state, then the Department of Homeland Security (DHS) is its national police force, with all the brutality, ineptitude and corruption such a role implies. In fact, although the DHS’ governmental bureaucracy may at times appear to be inept and bungling, it is ruthlessly efficient when it comes to building what the Founders feared most—a standing army on American soil.

The third largest federal agency behind the Departments of Veterans Affairs and Defense, the DHS—with its 240,000 full-time workers, $61 billion budget and sub-agencies that include the Coast Guard, Customs and Border Protection, Secret Service, Transportation Security Administration (TSA) and the Federal Emergency Management Agency (FEMA)—has been aptly dubbed a “runaway train.”

  In the 12 years since it was established to “prevent terrorist attacks within the United States,” the DHS has grown from a post-9/11 knee-jerk reaction to a leviathan with tentacles in every aspect of American life. With good reason, a bipartisan bill to provide greater oversight and accountability into the DHS’ purchasing process has been making its way through Congress.

  A better plan would be to abolish the DHS altogether. In making the case for shutting down the de facto national police agency, analyst Charles Kenny offers the following six reasons: one, the agency lacks leadership; two, terrorism is far less of a threat than it is made out to be; three, the FBI has actually stopped more alleged terrorist attacks than DHS; four, the agency wastes exorbitant amounts of money with little to show for it; five, “An overweight DHS gets a free pass to infringe civil liberties without a shred of economic justification”; and six, the agency is just plain bloated.

  To Kenny’s list, I will add the following: The menace of a national police force, a.k.a. a standing army, vested with so much power cannot be overstated, nor can its danger be ignored. Indeed, as the following list shows, just about every nefarious deed, tactic or thuggish policy advanced by the government today can be traced back to the DHS, its police state mindset, and the billions of dollars it distributes to police agencies in the form of grants.

  Militarizing police and SWAT teams. The DHS routinely hands out six-figure grants to enable local municipalities to purchase military-style vehicles, as well as a veritable war chest of weaponry, ranging from tactical vests, bomb-disarming robots, assault weapons and combat uniforms. This rise in military equipment purchases funded by the DHS has, according to analysts Andrew Becker and G.W. Schulz, “paralleled an apparent increase in local SWAT teams.” The end result? An explosive growth in the use of SWAT teams for otherwise routine police matters, an increased tendency on the part of police to shoot first and ask questions later, and an overall mindset within police forces that they are at war—and the citizenry are the enemy combatants.”

     Below are a list of other ways in which the State is busy eroding our Constitutional rights , all explored in greater depth at the Rutherford Institute .

” Spying on activists, dissidents and veterans. 

Stockpiling ammunition. 

Distributing license plate readers. 

Contracting to build detention camps. 

Tracking cell-phones with Stingray devices. 

Carrying out military drills and lockdowns in American cities. 

Using the TSA as an advance guard. 

Conducting virtual strip searches with full-body scanners. 

Carrying out soft target checkpoints. 

Directing government workers to spy on Americans.  

Conducting widespread spying networks using fusion centers. 

Carrying out Constitution-free border control searches. 

Funding city-wide surveillance cameras. 

Utilizing drones and other spybots. 

  It’s not difficult to see why the DHS has been described as a “wasteful, growing, fear-mongering beast.” If it is a beast, however, it is a beast that is accelerating our nation’s transformation into a police state through its establishment of a standing army, a.k.a. national police force.

  This, too, is nothing new. Historically, as I show in my book A Government of Wolves: The Emerging American Police State, the establishment of a national police force has served as a fundamental and final building block for every totalitarian regime that has ever wreaked havoc on humanity, from Hitler’s all-too-real Nazi Germany to George Orwell’s fictional Oceania. Whether fictional or historical, however, the calling cards of these national police agencies remain the same: brutality, inhumanity, corruption, intolerance, rigidity, and bureaucracy—in other words, evil. “

Read more here

Imagine … If You Will , A President Who Orders The Collection Of Virtually Every Fact About American Citizens , Yet …

 

 

 

 

 

 

… Has All Of His Own Records Sealed By Court Order Before Running For President

 

 

 

 

 

 

 

 

 

 

 

How The NSA Could Bug Your Powered-Off iPhone, and How To Stop Them

 

 

 

 

 

” Just because you turned off your phone doesn’t mean the NSA isn’t using it to spy on you.

  Edward Snowden’s latest revelation about the NSA’s snooping inspired an extra dose of shock and disbelief when he said the agency’s hackers can use a mobile phone as a bug even after it’s been turned off. The whistleblower made that eye-opening claim when Brian Williams of NBC Nightly News, holding his iPhone aloft during last Wednesday’s interview, asked, “What can the NSA do with this device if they want to get into my life? Can anyone turn it on remotely if it’s off? Can they turn on apps?

They can absolutely turn them on with the power turned off to the device,” Snowden replied.

  Snowden didn’t offer any details on this seemingly magical feat. But a group of particularly cunning iPhone hackers say it’s possible. They also say you can totally and completely turn off your iPhone so no one—not even the NSA—can use it to spy on you.”

 

 

Learn mored at Wired