Oct 17, 2014
IMEMC : The Palestinian Center for Development and Media Freedoms (MADA) released a report, on Thursday, estimating that over 80 percent of Palestinian journalists were engaged in self-censorship.
The group released a report of its findings following two studies, along with a meeting on self-censorship and its impact on freedom of expression and media in Palestine, according to Ma’an News Agency.
Mousa Rimawi, general director of MADA, said that self-censorship is the most “serious and dangerous kind of censorship” journalists face, noting that the practice began during the Israeli occupation prior to the establishment of the Palestinian Authority.
Mr. Rimawi said that direct censorship by Israeli authorities during the First Intifada, in the late eighties, led to self-censorship among Palestinian journalists as media outlets used different methods of skirting Israeli restrictions on media output.
Self-censorship continued after the creation of the PA, Rimawi said, and has escalated “concretely and dangerously” since the 2007 split between Hamas and Fateh.
Ma’an further reports that, during a meeting entitled “Self-censorship: Is there a way to get rid of it?”, dozens of journalists and media students were presented with the results of two studies by MADA which revealed that some 80 percent of journalists surveyed practiced self-censorship on some or all of the material which they had written or produced.
Over 68 percent of journalists claim that their work, or their colleagues’ work, had been banned from being published, at one time or another, by their employer.
They also explained that the practice of self-censorship was related not only to official institutions, but also to fears that society and publishers are not willing to discuss taboo subjects.
MADA released a statement, in December of 2013, which documented “worrying violations” against media freedoms in the occupied West Bank and the Gaza Strip.
The report noted several arbitrary arrests of journalists by PA forces in the West Bank, as well as Hamas security forces in Gaza.
Canadian Awareness Network
Oct 2, 2014
Thomas Moore College in Belgium is experimenting with using remote controlled UAV to catch students cheating on their tests
A Belgian school has found a surprising new use for flying drones – making sure students don’t cheat on their exams.
Teachers at Thomas Moore College, in Belgium, are testing out the remote controlled aircraft to keep an eye on students during tests.
DJI Phantom drones are equipped with GoPro cameras to fly around the exam room, looking down on students as they work.
The technology has a way to go before being used for real, though as the drones only have a flight time of around 15 minutes – less than even the shortest exam.
There’s also the problem of the wind pushed out by the drone’s propellers – which could make a mess of exam papers.
Read More Here
Recently Apple has announced that it is providing basic encryption on mobile devices that they cannot bypass, even in response to a request from law enforcement. Google has promised to take similar steps in the near future. Predictably, law enforcement has responded with howls of alarm .
We’ve seen this movie before. Below is a slightly adapted blog post from one we posted in 2010, the last time the FBI was seriously hinting that it was going to try to mandate that all communications systems be easily wiretappable by mandating “back doors” into any encryption systems. We marshaled eight “epic failures” of regulating crypto at that time, all of which are still salient today. And in honor of the current debate, we’ve added a ninth.
They can promise strong encryption. They just need to figure out how they can provide us plain text. – FBI General Counsel Valerie Caproni, September 27, 2010
[W]e’re in favor of strong encryption, robust encryption. The country needs it, industry needs it. We just want to make sure we have a trap door and key under some judge’s authority where we can get there if somebody is planning a crime. – FBI Director Louis Freeh, May 11, 1995
If the government howls of protest at the idea that people will be using encryption sound familiar, it’s because regulating and controlling consumer use of encryption was a monstrous proposal officially declared dead in 2001 after threatening Americans’ privacy, free speech rights, and innovation for nearly a decade. But like a zombie, it’s now rising from the grave, bringing the same disastrous flaws with it.
Canadian Awareness Network
Aug 13, 2014
Matrix: Who is Edward Snowden?
By Jon Rappoport
July 8, 2013
This article is a compilation of a number of pieces I’ve written about Ed Snowden and the NSA. It doesn’t replace them, but it hits the high points…
Let’s begin here: If you absolutely must have a hero, watch Superman movies.
If your need for a hero is so great, so cloying, so heavy, so juicy that it swamps your curiosity, don’t read this.
If you can’t separate Snowden’s minor revelations from the question of who he is, if you can’t entertain the notion that covert ops and intelligence-agency games are reeking with cover stories, false trails, and limited hangouts, you need more fun in your life.
NSA? CIA? These guys live for high-level bullshit. They get down on their knees and worship it. They fall into a suicidal funk if they aren’t lying on at least three or four levels at once.
Okay. Let’s look at Snowden’s brief history as reported by The Guardian. Are there any holes?
Is the Pope Catholic?
In 2003, at age 19, without a high school diploma, Snowden enlists in the Army. He begins a training program to join the Special Forces. At what point after enlistment can a new soldier start this elite training program?
Snowden breaks both legs in an exercise. He’s discharged from the Army. Is that automatic? How about healing and then resuming service?
If he was accepted in the Special Forces training program because he had special computer skills, then why discharge him simply because he broke both legs?
“Sorry, Ed, but with two broken legs we just don’t think you can hack into terrorist data anymore. You were good, but not now. Try Walmart. They always have openings.”
Circa 2003, Snowden gets a job as a security guard for an NSA facility at the University of Maryland. He specifically wanted to work for NSA? It was just a generic job opening he found out about?
Snowden shifts jobs. Boom. He’s now in the CIA, in IT. He has no high school diploma. He’s a young computer genius.
In 2007, Snowden is sent to Geneva. He’s only 23 years old. The CIA gives him diplomatic cover there. He’s put in charge of maintaining computer-network security. Major job. Obviously, he has access to a wide range of classified documents. Sound a little odd? He’s just a kid. Maybe he has his GED. Otherwise, he still doesn’t have a high school diploma.
Snowden says that during this period, in Geneva, one of the incidents that really sours him on the CIA is the “turning of a Swiss banker.” One night, CIA guys get a banker drunk, encourage him to drive home, the banker gets busted, the CIA guys help him out, then with that bond formed, they eventually get the banker to reveal deep secrets to the Agency.
This sours Snowden? He’s that naïve? He doesn’t know by now that the CIA does this sort of thing all the time? He’s shocked? He “didn’t sign up for this?” Come on.
In 2009, Snowden leaves the CIA. Why? Presumably because he’s disillusioned. It should noted here that Snowden claimed he could do very heavy damage to the entire US intelligence community in 2008, but decided to wait because he thought Obama, just coming into the presidency, might keep his “transparency” promise.
After two years with the CIA in Geneva, Snowden really had the capability to take down the whole US inter-agency intelligence network, or a major chunk of it?
If you buy that without further inquiry, I have condos for sale on the dark side of the moon.
In 2009, Snowden leaves the CIA and goes to work in the private sector. Dell, Booze Allen Hamilton. In this latter job, Snowden is assigned to work at the NSA.
He’s an outsider, but, again, he claims to have so much access to so much sensitive NSA data that he can take down the whole US intelligence network in a single day. The. Whole. US. Intelligence. Network.
This is Ed Snowden’s sketchy legend. It’s all red flags, alarm bells, sirens, flashing lights.
Then we have the crowning piece: they solved the riddle: Ed Snowden was able to steal thousands of highly protected NSA documents because…he had a thumb drive.
It’s the weapon that breached the inner sanctum of the most sophisticated information agency in the world.
It’s the weapon to which the NSA, with all its resources, remains utterly vulnerable. Can’t defeat it.
Not only did Snowden stroll into NSA with a thumb drive, he knew how to navigate all the security layers put in place to stop people from stealing classified documents.
“Let’s see. We have a new guy coming to work for us here at NSA today? Oh, whiz kid. Ed Snowden. Outside contractor. Booz Allen. He’s not really a full-time employee of the NSA. Twenty-nine years old. No high school diploma. Has a GED. He worked for the CIA and quit. Hmm. Why did he quit? Oh, never mind, who cares? No problem.
“Tell you what. Let’s give this kid access to our most sensitive data. Sure. Why not? Everything. That stuff we keep behind 986 walls? Where you have to pledge the life of your first-born against the possibility you’ll go rogue? Let Snowden see it all. Sure. What the hell. I’m feeling charitable. He seems like a nice kid.”
NSA is the most awesome spying agency ever devised in this world. If you cross the street in Podunk, Anywhere, USA, to buy an ice cream soda, on a Tuesday afternoon in July, they know.
They know whether you sit at the counter and drink that soda or take it and move to the only table in the store. They know whether you lick the foam from the top of the glass with your tongue or pick the foam with your straw and then lick it.
They know if you keep the receipt for the soda or leave it on the counter.
They know whether you’re wearing shoes or sneakers. They know the brand of your underwear. They know your shaving cream, and precisely which container it came out of.
But this agency, with all its vast power and its dollars…
Can’t track one of its own, a man who came to work every day, a man who made up a story about needing treatment in Hong Kong for epilepsy and then skipped the country.
Just can’t find him.
[...CONTINUE READING THIS ARTICLE]
Jul 2, 2014
[click here for part 1]
This episode is part 2 about Bitcoin, cryptography and online security and safety and is called Anonymous Bitcoin, Cryptography and Online Safety: It’s being released on Wednesday, July 2, 2014, and was recorded yesterday on Tuesday, July 1, 2014.
Kristov Atlas is a network security and privacy researcher who studies crypto-currencies. He is the author of Anonymous Bitcoin: How to Keep Your Ƀ All to Yourself, a practical guide to maximizing financial privacy with Bitcoin. Kristov is also a correspondent for the World Crypto Network, appearing regularly on the the weekly roundtable show “The Bitcoin Group”, and host of “Dark News”, a show about un-censorship technologies.
References to this episode:
Anonymous Bitcoin book:
Dark News Show:
Send Bitcoin donations for this episode to:
Please make other forms of donations here:
Donations. This episode is brought to you by:
This episode is video only.
by Frankie Gotz
Canadian Awareness Network
Apr 23, 2014
A retired U.S Air Force veteran by the name of Ross McNutt owns a company called Persistent Surveillance Systems (PSS) based out of Ohio USA.
On the PSS website it writes, “Persistent Surveillance Systems provides Wide-Area Surveillance Sensors and Services that enable continuous, second-by-second video monitoring of a city-sized area. Because of the very high-resolution nature of PSS’s sensors (up to 200 megapixels), vehicle and pedestrian activity can be tracked over a 16 square-mile area. If an event-of-interest happens within this area (a murder, for example), users can rewind the event to identify the perpetrator’s place-of-origin, meeting locations, accomplices, driving routes, and final destination. PSS’s HAWKEYE sensor has been used in countless major crime investigations, and has been used to backtrack criminals for officers to apprehend.”
Video Report from LeakSourceNews below:
The operation involves flying a small civilian aircraft high in the sky (10,000 feet) with cameras pointed at desired locations. There are three types of cameras or sensors available for wide range surveillance from sky:
[...CONTINUE READING THIS ARTICLE]
Friends of Syria
Jul 26, 2014
A security researcher considered to be among the foremost experts in his field says that more than a half-billion mobile devices running Apple’s latest iOS operating system contain secret backdoors.
Jonathan Zdziarski, also known by his online alias “NerveGas,” told the audience attending his Friday morning presentation at the Hackers on Planet Earth conference in New York City that around 600 million Apple devices, including iPhones and tablets, contain hidden features that allow data to be surreptitiously slurped from those devices.
During Zdziarski’s HOPE presentation, “Identifying Backdoors, Attack Points and Surveillance Mechanisms in iOS Devices,” the researcher revealed that several undocumented forensic services are installed on every new iPhone and iPad, making it easier that ever for a third-party to pull data from those devices in order to compromise a target and take hold of their personal information, including pictures, text messages, voice recordings and more.
Among the hidden functions running on iOS devices, Zdziarski said, are programs called “pcapd,” “file_relay” and “file_relay.” If used properly, he added, those programs can allow anyone with the right means and methodology to pull staggering amounts of data from a targeted phone, even when the rightful owner suspects the device is sufficiently locked.
Zdziarski has previously exploited older versions of the iOS operating system and authored several books on mobile security. Even after raising multiple questions with Apple, however, he said he has yet to figure out why, exactly, the tech giant ships iOS devices with programs that appear to do nothing other than leak digital data.
According to the slides Zdziarski presented during Friday’s talk, there’s little reason to believe the functions are used to run diagnostics or help developers.
“Most services are not referenced by any known Apple software,” one slide says in part, and “the raw format of the data makes it impossible to put data back onto the phone, making useless for Genius Bar or carrier tech purposes.”
“The personal nature of the data makes it very unlikely as a debugging mechanism,” he added.
According to the researcher, evidence of the mysterious programs raises more questions than it does answers.
“Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?” he asked in one slide. “Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone? Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?”
“Apple really needs to step up and explain what these services are doing,” Zdziarski told Ars Technia on Monday after his HOPE presentation was hailed over the weekend by the conference’s attendees as a highlight of the three-day event. “I can’t come up with a better word than ‘backdoor’ to describe file relay, but I’m willing to listen to whatever other explanation Apple has. At the end of the day, though, there’s a lot of insecure stuff running on the phone giving up a lot of data that should never be given up. Apple really needs to fix that.”
Indeed, Apple responded on late Tuesday by saying that the tree functions in question are “diagnostic capabilities to help enterprise IT departments, developers and AppleCare troubleshoot issues.”
“Apple has, in a traditional sense, admitted to having back doors on the device specifically for their own use,” Zdziarski responded quickly on his blog. “Perhaps people misunderstand the term ‘back door’ due to the stigma Hollywood has given them, but I have never accused these ‘hidden access methods’ as being intended for anything malicious, and I’ve made repeated statements that I haven’t accused Apple of working with NSA. That doesn’t mean, however that the government can’t take advantage of back doors to access the same information. What does concern me is that Apple appears to be completely misleading about some of these (especially file relay), and not addressing the issues I raised on others.”
“I give Apple credit for acknowledging these services, and at least trying to give an answer to people who want to know why these services are there – prior to this, there was no documentation about file relay whatsoever, or its 44 data services to copy off personal data. They appear to be misleading about its capabilities, however, in downplaying them, and this concerns me,” he added.
On Apple’s part, the company said they have “never worked with any government agency from any country to create a backdoor in any of our products of services.”
The Corbett Report
Dec 20, 2013
Podcast: Play in new window | Download | Embed
In this blockbuster no-holds-barred conversation, Sibel Edmonds, Guillermo Jimenez and James Corbett discuss Edmonds’ recent series of articles on Glenn Greenwald and his connection to billionaire Pierre Omidyar. We talk about the NSA/PayPal connection and Greenwald’s refusal to discuss this issue, and Edmonds reveals specific examples of publicly documented cases that Greenwald has been covering up for years.