Jump to content
IGNORED

whistleblowers: wikileaks, snowden i...


DarkAttraktor

Recommended Posts

za zombiranog albinosa, nažalost, ništa ne možemo da uradimo, amerika je em prokleta, em daleko. ipak, moramo da obratimo posebnu pažnju na njihove ovdašnje marionete.

Najbolji odnosi sa Amerikom su „vitalan interes naroda i države”, jer „bez podrške SAD nije moguće ostvariti nijedan iole važniji spoljnopolitički cilj, niti ekonomski napredak”, izjavio je juče potpredsednik SNS-a Aleksandar Vučić na tribini u Centru za istočnoevropske studije Instituta „Vudro Vilson” u Vašingtonu.
Edited by Hella
Link to comment
Ova fotografija je strašna. Potpuni užas.
Mislim da sam gledao snimak kako ga uvode i nije mi izgledao toliko bled!Send from WC šolja by BVK
Link to comment
From July 2010 to April 2011 he was held as a maximum custody detainee* at Quantico marine base in Virginia, where he sat in a fluorescent-lit 6-by-8-foot cell with no window or natural light for 23 hours per day — guards checked on him every five minutes — and was stripped naked at night because authorities deemed the elastic on his underwear could be used to harm himself.
amerikanci su shvatili da sa uvodjenjem novih tehnologija ima sve vise "rupa" u sistemu, pa je jednostavnije unapred zaplasiti ljude, pre nego sto se i usude da nesto "pozajme". bredli ce zaglaviti nekoliko decenija u zatvoru, a wikileaks polako potonuti u zaborav, pod naletom svakodnevne gomile beskorisnih informacija. Edited by Takeshi
Link to comment

twp_logo_300.gifDocuments: U.S. mining data from 9 leading Internet firms; companies deny knowledgeBy Barton Gellman and Laura Poitras, Published: June 6The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post.The program, code-named PRISM, has not been made public until now. It may be the first of its kind. The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers. But there has never been a Google or Facebook before, and it is unlikely that there are richer troves of valuable intelligence than the ones in Silicon Valley.Equally unusual is the way the NSA extracts what it wants, according to the document: “Collection directly from the servers of these U.S. Service Providers: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.”PRISM was launched from the ashes of President George W. Bush’s secret program of warrantless domestic surveillance in 2007, after news media disclosures, lawsuits and the Foreign Intelligence Surveillance Court forced the president to look for new authority.Congress obliged with the Protect America Act in 2007 and the FISA Amendments Act of 2008, which immunized private companies that cooperated voluntarily with U.S. intelligence collection. PRISM recruited its first partner, Microsoft, and began six years of rapidly growing data collection beneath the surface of a roiling national debate on surveillance and privacy. Late last year, when critics in Congress sought changes in the FISA Amendments Act, the only lawmakers who knew about PRISM were bound by oaths of office to hold their tongues.The court-approved program is focused on foreign communications traffic, which often flows through U.S. servers even when sent from one overseas location to another. Between 2004 and 2007, Bush administration lawyers persuaded federal FISA judges to issue surveillance orders in a fundamentally new form. Until then the government had to show probable cause that a particular “target” and “facility” were both connected to terrorism or espionage.In four new orders, which remain classified, the court defined massive data sets as “facilities” and agreed to certify periodically that the government had reasonable procedures in place to minimize collection of “U.S. persons” data without a warrant.In a statement issue late Thursday, Director of National Intelligence James R. Clapper said “information collected under this program is among the most important and valuable foreign intelligence information we collect, and is used to protect our nation from a wide variety of threats. The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.”Clapper added that there were numerous inaccuracies in reports about PRISM by The Post and the Guardian newspaper, but he did not specify any.Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said: “I would just push back on the idea that the court has signed off on it, so why worry? This is a court that meets in secret, allows only the government to appear before it, and publishes almost none of its opinions. It has never been an effective check on government.”Several companies contacted by The Post said they had no knowledge of the program, did not allow direct government access to their servers and asserted that they responded only to targeted requests for information.“We do not provide any government organization with direct access to Facebook servers,” said Joe Sullivan, chief security officer for Facebook. “When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”“We have never heard of PRISM,” said Steve Dowling, a spokesman for Apple. “We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing “collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,” rather than directly to company servers.Government officials and the document itself made clear that the NSA regarded the identities of its private partners as PRISM’s most sensitive secret, fearing that the companies would withdraw from the program if exposed. “98 percent of PRISM production is based on Yahoo, Google and Microsoft; we need to make sure we don’t harm these sources,” the briefing’s author wrote in his speaker’s notes.An internal presentation of 41 briefing slides on PRISM, dated April 2013 and intended for senior analysts in the NSA’s Signals Intelligence Directorate, described the new tool as the most prolific contributor to the President’s Daily Brief, which cited PRISM data in 1,477 items last year. According to the slides and other supporting materials obtained by The Post, “NSA reporting increasingly relies on PRISM” as its leading source of raw material, accounting for nearly 1 in 7 intelligence reports.That is a remarkable figure in an agency that measures annual intake in the trillions of communications. It is all the more striking because the NSA, whose lawful mission is foreign intelligence, is reaching deep inside the machinery of American companies that host hundreds of millions of American-held accounts on American soil.The technology companies, whose cooperation is essential to PRISM operations, include most of the dominant global players of Silicon Valley, according to the document. They are listed on a roster that bears their logos in order of entry into the program: “Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” PalTalk, although much smaller, has hosted traffic of substantial intelligence interest during the Arab Spring and in the ongoing Syrian civil war.Dropbox, the cloud storage and synchronization service, is described as “coming soon.”Sens. Ron Wyden (D-Ore.) and Mark Udall (D-Colo.), who had classified knowledge of the program as members of the Senate Intelligence Committee, were unable to speak of it when they warned in a Dec. 27, 2012, floor debate that the FISA Amendments Act had what both of them called a “back-door search loophole” for the content of innocent Americans who were swept up in a search for someone else.“As it is written, there is nothing to prohibit the intelligence community from searching through a pile of communications, which may have been incidentally or accidentally been collected without a warrant, to deliberately search for the phone calls or e-mails of specific Americans,” Udall said.Wyden repeatedly asked the NSA to estimate the number of Americans whose communications had been incidentally collected, and the agency’s director, Lt. Gen. Keith B. Alexander, insisted there was no way to find out. Eventually Inspector General I. Charles McCullough III wrote Wyden a letter stating that it would violate the privacy of Americans in NSA data banks to try to estimate their number.Roots in the ’70sPRISM is an heir, in one sense, to a history of intelligence alliances with as many as 100 trusted U.S. companies since the 1970s. The NSA calls these Special Source Operations, and PRISM falls under that rubric.The Silicon Valley operation works alongside a parallel program, code-named BLARNEY, that gathers up “metadata” — technical information about communications traffic and network devices — as it streams past choke points along the backbone of the Internet. BLARNEY’s top-secret program summary, set down in the slides alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”But the PRISM program appears to more nearly resemble the most controversial of the warrantless surveillance orders issued by President George W. Bush after the al-Qaeda attacks of Sept. 11, 2001. Its history, in which President Obama presided over exponential growth in a program that candidate Obama criticized, shows how fundamentally surveillance law and practice have shifted away from individual suspicion in favor of systematic, mass collection techniques.The Obama administration points to ongoing safeguards in the form of “extensive procedures, specifically approved by the court, to ensure that only non-U.S. persons outside the U.S. are targeted, and that minimize the acquisition, retention and dissemination of incidentally acquired information about U.S. persons.”And it is true that the PRISM program is not a dragnet, exactly. From inside a company’s data stream the NSA is capable of pulling out anything it likes, but under current rules the agency does not try to collect it all.Analysts who use the system from a Web portal at Fort Meade, Md., key in “selectors,” or search terms, that are designed to produce at least 51 percent confidence in a target’s “foreignness.” That is not a very stringent test. Training materials obtained by The Post instruct new analysts to make quarterly reports of any accidental collection of U.S. content, but add that “it’s nothing to worry about.”Even when the system works just as advertised, with no American singled out for targeting, the NSA routinely collects a great deal of American content. That is described as “incidental,” and it is inherent in contact chaining, one of the basic tools of the trade. To collect on a suspected spy or foreign terrorist means, at minimum, that everyone in the suspect’s inbox or outbox is swept in. Intelligence analysts are typically taught to chain through contacts two “hops” out from their target, which increases “incidental collection” exponentially. The same math explains the aphorism, from the John Guare play, that no one is more than “six degrees of separation” from any other person.A ‘directive’In exchange for immunity from lawsuits, companies such as Yahoo and AOL are obliged to accept a “directive” from the attorney general and the director of national intelligence to open their servers to the FBI’s Data Intercept Technology Unit, which handles liaison to U.S. companies from the NSA. In 2008, Congress gave the Justice Department authority for a secret order from the Foreign Surveillance Intelligence Court to compel a reluctant company “to comply.”In practice, there is room for a company to maneuver, delay or resist. When a clandestine intelligence program meets a highly regulated industry, said a lawyer with experience in bridging the gaps, neither side wants to risk a public fight. The engineering problems are so immense, in systems of such complexity and frequent change, that the FBI and NSA would be hard pressed to build in back doors without active help from each company.Apple demonstrated that resistance is possible when it held out for more than five years, for reasons unknown, after Microsoft became PRISM’s first corporate partner in May 2007. Twitter, which has cultivated a reputation for aggressive defense of its users’ privacy, is still conspicuous by its absence from the list of “private sector partners.”Google, like the other companies, denied that it permitted direct government access to its servers.“Google cares deeply about the security of our users’ data,” a company spokesman said. “We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a ‘back door’ for the government to access private user data.”Microsoft also provided a statement: “We provide customer data only when we receive a legally binding order or subpoena to do so, and never on a voluntary basis. In addition we only ever comply with orders for requests about specific accounts or identifiers. If the government has a broader voluntary national security program to gather customer data we don’t participate in it.”Yahoo also issued a denial.“Yahoo! takes users’ privacy very seriously,” the company said in a statement. “We do not provide the government with direct access to our servers, systems, or network.”Like market researchers, but with far more privileged access, collection managers in the NSA’s Special Source Operations group, which oversees the PRISM program, are drawn to the wealth of information about their subjects in online accounts. For much the same reason, civil libertarians and some ordinary users may be troubled by the menu available to analysts who hold the required clearances to “task” the PRISM system.There has been “continued exponential growth in tasking to Facebook and Skype,” according to the PRISM slides. With a few clicks and an affirmation that the subject is believed to be engaged in terrorism, espionage or nuclear proliferation, an analyst obtains full access to Facebook’s “extensive search and surveillance capabilities against the variety of online social networking services.”According to a separate “User’s Guide for PRISM Skype Collection,” that service can be monitored for audio when one end of the call is a conventional telephone and for any combination of “audio, video, chat, and file transfers” when Skype users connect by computer alone. Google’s offerings include Gmail, voice and video chat, Google Drive files, photo libraries, and live surveillance of search terms.Firsthand experience with these systems, and horror at their capabilities, is what drove a career intelligence officer to provide PowerPoint slides about PRISM and supporting materials to The Washington Post in order to expose what he believes to be a gross intrusion on privacy. “They quite literally can watch your ideas form as you type,” the officer said.Poitras is a documentary filmmaker and MacArthur Fellow. Julie Tate, Robert O’Harrow Jr., Cecilia Kang and Ellen Nakashima contributed to this report.

Graphic: NSA slides explain the PRISM data-collection program Special Report: Top Secret America Introducing the programA slide briefing analysts at the National Security Agency about the program touts its effectiveness and features the logos of the companies involved.prism-slide-1.jpgThe program is called PRISM, after the prisms used to split light, which is used to carry information on fiber-optic cables.This note indicates that the program is the number one source of raw intelligence used for NSA analytic reports.The seal ofSpecial Source Operations, the NSA term for alliances with trusted U.S. companies. Monitoring a target's communicationThis diagram shows how the bulk of the world’s electronic communications move through companies based in the United States.prism-slide-2.jpg Providers and dataThe PRISM program collects a wide range of data from the nine companies, although the details vary by provider.prism-slide-4.jpg Participating providersThis slide shows when each company joined the program, with Microsoft being the first, on Sept. 11, 2007, and Apple the most recent, in October 2012.prism-slide-5.jpg

Link to comment
Obama defends surveillance programs
US president Barack Obama has staunchly defended US surveillance programs monitoring telephone and internet usage, calling it a modest encroachment on privacy necessary to defend the country from attack.Mr Obama said the programs were "trade-offs" designed to strike a balance between privacy concerns and keeping Americans safe from terrorist attacks.The move comes as Facebook chief Mark Zuckerberg responded to what he described as "outrageous" reports about the surveillance program, which is codenamed PRISM.The Washington Post reported on Friday that federal authorities have been tapping into the central servers of companies including Google, Apple and Facebook to gain access to emails, photos and other files allowing analysts to track a person's movements and contacts.
Link to comment
WikiLeaks founder Julian Assange says he fears the whistleblower who exposed a vast US surveillance program could face the same fate as the US soldier who leaked files to his website.In an interview with CBS This Morning from the Ecuadoran embassy in London where he has been holed up for nearly a year, Assange defended the public's right to know about the internet data mining program revealed late on Thursday.But he fears the individual who leaked details of the program could face the same fate as WikiLeaks source Bradley Manning, who faces possible life imprisonment for "aiding the enemy" in a military trial begun this week."Let's ask ourselves whether the whistleblower who has revealed those - and there's more to come - is going, in three years' time, to be in exactly the same position that Bradley Manning is in today," Assange said on Friday.The US government has defended the monitoring program - in which it directly accessed the servers of internet giants like Microsoft, Apple and Facebook - as essential to preventing terrorist attacks on US soil.It has said the program was approved by Congress and conducted with secret court orders, and that the leaked revelations put American security at risk.But Assange said the public had the right to know about the program."Of course, we need government to do all sorts of things. But when it's done properly, there is a law, people are aware of what the law is, there's a process for carrying out the law and there's a process for checking the law."There's open justice where judges, in their decisions of trying people, themselves are tried before the public," Assange said."It doesn't mean that every aspect, every detail must be public, but at least enough parameters to understand what is really going on."The revelations about the internet spying program, first reported by the Washington Post and Britain's Guardian newspaper, came one day after a Guardian report about the widespread mining of phone records by the same US spy agency.The Post said the leak came from a career US intelligence officer "with firsthand experience of these systems and horror at their capabilities.""They quite literally can watch your ideas form as you type," the officer was quoted as saying.WikiLeaks rose to fame after Manning, a US Army intelligence analyst based in Iraq, leaked to the anti-secrecy group hundreds of thousands of classified war logs from Iraq and Afghanistan and secret cables from US embassies.Manning has said he leaked the documents to encourage public debate about the wars and US foreign policy, but the US government has portrayed him as a traitor who put lives at risk and endangered national security.
Link to comment

Here's The $2 Billion Facility Where The NSA Will Store And Analyze Your CommunicationsMichael Kelley and Brian Jones | Jun. 7, 2013, 12:55 PM ap13060605455.jpgAP/Rick BowmerThe NSA's Utah Data Center, located 25 miles south of Salt Lake City.The National Security Agency (NSA) is in the information harvesting business — and business is booming.That's why the nation's premier covert intelligence gathering organization has been building a million square-foot data mining complex in Bluffdale, Utah, that will house a 100,000 square foot "mission critical data center."The NSA's official mandate is to listen to and decode all foreign communications of interest to the security of the U.S.But given the fact the NSA already reportedly intercepts 1.7 billion American electronic records and communications a day, it makes sense that they would need to expand operations beyond its sprawling headquarters at Fort Meade, Maryland.The facility, called the Utah Data Center, is located on Camp Williams, a training facility for the Utah National Guard, is set to open in October.And boy does it seem like an impressive operation.ap132411996867.jpgAP/Rick BowmerOne Fox News report says as much as 5 zettabytes — 1 zettabyte = 1 billion terabytes = 1 trillion gigabytes — and with just 1 zettabyte (1024 exabytes) of space, the NSA can store a year's worth of the global Internet traffic (which is estimated reached 966 exabytes per year in 2015).Here's James Bamford of Wired, author of the book "The Shadow Factory: The NSA from 9/11 to the Eavesdropping on America":"Once it's operational, the Utah Data Center will become, in effect, the NSA cloud. The center will be fed data from the agency's eavesdropping satellites, overseas listening posts, and secret monitoring rooms in telecom facilities throughout the U.S."pict17-1.jpgCryptomeReams of data will be handled by NSA hackers — who harvest2.1 million gigabytes of data per hour — as well as the most powerful computer the world has ever known.That machine, the Titan Supercomputer, is capable of churning through more than 20,000 trillion calculations each second or 20 petaflops. (1 petaflop = 1 quadrillion instructions per second).The top-of-the-line tech will be used to analyze foreign and domestic communications — obtained from Americas major Internet Service Providers (ISPs) — in an effort to detect terrorist activity (note: the facility's precise mission is classified).screen%20shot%202013-06-07%20at%202.26.46%20pm.pnghttp://nsa.gov1.info/utah-data-center/Supporting facilities include water treatment facilities, chiller plant, power substations, vehicle inspection facility, visitor control center, and sixty diesel-fueled emergency standby generators and fuel facility for a 3-day 100% power backup capability.The chiller plant will keep the suped-up system from overheating:ap957255269727.jpgAP/Rick BowmerHere's a look at the plans:screen%20shot%202013-06-07%20at%202.34.58%20pm.pnghttp://nsa.gov1.info/utah-data-center/And he's what it looks like today:ap769405642647.jpgAP/Rick Bowmer

Edited by slow
Link to comment

ako ćemo pravo, mora se naći neki način za sprečidbu bostonizacije amerike. a dok levičarski ajnštajni ne nađu nešto jeptinije i pametnije, gvirkanje u depeše sumnjivaca ostaje jedina opcija.

Link to comment

Ako cemo pravo, Boston nisu sprecili (pre ce biti da su ga napravili svojim osvajanjem hearts & minds).Inace si na pogresnom tragu atakujuci levicare, reakcije na ovaj, jos jedan, Obamin overreach su retko ujedinile ceo USA politicki spektar.Sent from my iPhone using Tapatalk

Link to comment
ozbiljan svet a ne ko mi amateri,
Ko će ga znati, ozbiljan svet ne daje stranim firmama da izrade softversko/hardversko srce sistema od koga zavisi nacionalna bezbednost:

The newest information regarding the NSA domestic spying scandal raises an important question: If America's tech giants didn't 'participate knowingly' in the dragnet of electronic communication, how does the NSA get all of their data?One theory: the NSA hired two secretive Israeli companies to wiretap the U.S. telecommunications network.In April 2012 Wired's James Bamford — author of the book "The Shadow Factory: The NSA from 9/11 to the Eavesdropping on America" — reported that two companies with extensive links to Israel's intelligence service provided hardware and software the U.S. telecommunications network for the National Security Agency (NSA).By doing so, this would imply, companies like Facebook and Google don't have to explicitly provide the NSA with access to their servers because major Internet Service Providers (ISPs) such as AT&T and Verizon already allows the U.S. signals intelligence agency to eavesdrop on all of their data anyway.From Bamford (emphasis ours):"According to a former Verizon employee briefed on the program, Verint, owned by Comverse Technology, taps the communication lines at Verizon...At AT&T the wiretapping rooms are powered by software and hardware from Narus, now owned by Boeing, a discovery made by AT&T whistleblower Mark Klein in 2004."Klein, an engineer, discovered the "secret room" at AT&T central office in San Francisco, through which the NSA actively "*vacuumed up Internet and phone-call data from ordinary Americans with the cooperation of AT&T" through the wiretapping rooms, emphasizing that "much of the data sent through AT&T to the NSA was purely domestic."NSA whistleblower Thomas Drake corroborated Klein's assertions, testifying that while the NSA is using Israeli-made NARUS hardware to "seize and save all personal electronic communications." evilsmile.gifBoth Verint and Narus were founded in Israel in the 1990s. Both provide monitoring and intercept capabilities to service providers and government organizations, promoting claims that their equipment can access and retain large amounts of information on a vast number of targets.From Robert Poe of Wired:Narus' product, the Semantic Traffic Analyzer, is a software application that runs on standard IBM or Dell servers using the Linux operating system. It's renowned within certain circles for its ability to inspect traffic in real time on high-bandwidth pipes, identifying packets of interest as they race by at up to 10 Gbps."*Anything that comes through (an internet protocol network), we can record," Steve Bannerman, marketing vice president of Narus, a Mountain View, California company, said. "We can reconstruct all of their e-mails along with attachments, see what web pages they clicked on, we can reconstruct their (voice over internet protocol) calls."With a telecom wiretap the NSA only needs companies like Microsoft, Google, and Apple to passively participate while the agency to intercepts, stores, and analyzes their communication data. The indirect nature of the agreement would provide tech giants with plausible deniability.And having a foreign contractor bug the telecom grid would mean that the NSA gained access to most of the domestic traffic flowing through the U.S. without technically doing it themselves.This would provide the NSA, whose official mission is to spy on foreign communications, with plausible deniability regarding domestic snooping.Meanwhile projects like the agency's $2 billion data center in Bluffdale, Utah — which can collect and analyze "yottobytes" of information— to sift through domestic internet traffic.In 2007 a former commander of the highly secret Unit 8200 (i.e. Israel’s NSA) told Forbes that the technology of Comverse (i.e. the company that owns Verint) is based on Unit 8200 technology.One of the founders of Verint, Jacob "Kobi" Alexander, is a former Israeli intelligence officer.A co-founder and former chairmen of Narus, Ori Cohen, told Fortune in 2001 that his partners have done technology work for Israeli intelligence.In 2011 another former chief of Unit 8200 acknowledged to the Israeli paper Haartez that high-tech firms around the world employ both Unit 8200 equipment and its veteran personnel.From Bamford Wired (emphasis ours):“Cautious estimates indicate that in the past few years... Unit 8200 veterans have set up some 30 to 40 high-tech companies, including 5 to 10 that were floated on Wall Street.” Referred to only as “Brigadier General B,” he added, “This correlation between serving in the intelligence Unit 8200 and starting successful high-tech companies is not coincidental: Many of the technologies in use around the world and developed in Israel were originally military technologies and were developed and improved by Unit veterans.”The NSA began eavesdropping on the international communications of Americans after President Bush secretly authorized the practice in 2002 — without the court-approved warrants ordinarily required for domestic spying — to search for evidence of terrorist activity.The newest revelations confirm that the practices employed during the secret program, code-named Stellar Wind, hasn't stopped under President Obama.From the Pulitzer-Prize winning 2005 story by Eric Lichtblau and James Risen of the New York Times:As part of the program approved by President Bush for domestic surveillance without warrants, the N.S.A. has gained the cooperation of American telecommunications companies to obtain backdoor access to streams of domestic and international communications, the officials said.

evo ihhttp://www.narus.com/

Edited by slow
Link to comment
×
×
  • Create New...