Peer2Politics
Follow
Find tag "NSA"
78.6K views | +60 today
Peer2Politics
on peer-to-peer dynamics in the field of politics, economics and institutions
Curated by jean lievens
Your new post is loading...
Scooped by jean lievens
Scoop.it!

2014 Rethinking National Intelligence -- Seven False Premises Blocking Intelligence Reform

2014 Rethinking National Intelligence -- Seven False Premises Blocking Intelligence Reform | Peer2Politics | Scoop.it

Is this the year in which populism defeats the two-party system, when the US stops borrowing to finance waste, and when the NSA debacle outrages the American people to the point that they call for a radical overhaul of the government?

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Out in the Open: An NSA-Proof Twitter, Built With Code From Bitcoin and BitTorrent | Wired Enterprise | Wired.com

Out in the Open: An NSA-Proof Twitter, Built With Code From Bitcoin and BitTorrent | Wired Enterprise | Wired.com | Peer2Politics | Scoop.it
Miguel Freitas has built a more secure and robust alternative to Twitter, making use of code from two other massively successful online projects: bitcoin and BitTorrent.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Busted! 10 myths that reveal just how dangerous the NSA really is

Busted! 10 myths that reveal just how dangerous the NSA really is | Peer2Politics | Scoop.it
NSA apologists make plenty of excuses for the surveillance state. Here's why you shouldn't believe them
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

The NSA's elite hackers can hijack your Wi-Fi from eight miles away

The NSA's elite hackers can hijack your Wi-Fi from eight miles away | Peer2Politics | Scoop.it

Attendees at the Chaos Communications Congress in Berlin this weekend got a surprising rundown of the NSA's surveillance capabilities, courtesy of security researcher Jacob Appelbaum. Appelbaum, who co-wrote the Der Spiegel article that first revealed the NSA catalog, went into further detail onstage, describing several individual devices in the catalog and their intended purposes.

 

more...
Przemyslaw Dubicki's curator insight, January 15, 3:46 AM

15 kilometers... you never know who is listening you

Scooped by jean lievens
Scoop.it!

Out in the Open: Grab What the NSA Is Snooping and Wear It on Your Chest - Wired

Out in the Open: Grab What the NSA Is Snooping and Wear It on Your Chest - Wired | Peer2Politics | Scoop.it
Using an open source gadget they call Open Informant, they grab snippets from recent email messages and display them on their chests for all to see. This electronic badge even highlights the stuff that would look most suspicious the the professional snoops at the NSA and the Department of Homeland Security.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Who should store NSA phone database? - Milwaukee Journal Sentinel

Who should store NSA phone database? - Milwaukee Journal Sentinel | Peer2Politics | Scoop.it
Wall Street Journal
Who should store NSA phone database?
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Prediction: The Government Will Put The NSA In Check - TechCrunch

Prediction: The Government Will Put The NSA In Check - TechCrunch | Peer2Politics | Scoop.it


To that end, he'll likely release the gag order on tech companies who wish to post the number of users being spied on through their platforms.

more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Out in the Open: Ex-Google Ad Man Saves You From Ad Hell - Wired

Out in the Open: Ex-Google Ad Man Saves You From Ad Hell - Wired | Peer2Politics | Scoop.it

As the World Privacy Forum just told Congress, the bottom feeders of the data brokerage world are making big money selling lists of everything from rape victims and AIDS patients to alcoholics, giving marketers the power to hit those folks with emails, phone calls, and ads — and much of this data is coming from the net. In a report of its own, Senator John Rockafeller and his senate investigation committee highlight the massive amounts of consumer data that brokers collect online and off, starkly criticizing how little we know about how this data is collected and used.

 
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Snowden in open letter: NSA's indiscriminate spying is 'collapsing' - CTV News

Snowden in open letter: NSA's indiscriminate spying is 'collapsing' - CTV News | Peer2Politics | Scoop.it

RIO DE JANEIRO, Brazil -- National Security Agency leaker Edward Snowden wrote in a lengthy "open letter to the people of Brazil" that he's been inspired by the global debate ignited by his release of thousands of NSA documents and that the agency's culture of indiscriminate global espionage "is collapsing."

 




more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Corporate Espionage Tactics Used Against Leading Progressive Groups ... - San Diego Free Press

Corporate Espionage Tactics Used Against Leading Progressive Groups ... - San Diego Free Press | Peer2Politics | Scoop.it

Posing as volunteers. Stealing documents. Dumpster diving. Planting electronic bugs. Hacking computers. Tapping phones and voicemail. Planting false information. Trailing family members. Threatening reporters. Hiring cops, CIA officers and combat veterans to do all these dirty deeds—and counting on little pushback from law enforcement, mainstream media or Congress.

 
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Corporate Espionage Against Nonprofit Organizations - P2P Foundation

Corporate Espionage Against Nonprofit Organizations - P2P Foundation | Peer2Politics | Scoop.it

"This report is an effort to document something we know little about: corporate espionage against nonprofit organizations. The entire subject is veiled in secrecy. In recent years, there have been few serious journalistic efforts – and no serious government efforts to come to terms with the reality of corporate spying against nonprofits.

 
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Berners-Lee: insidious government surveillance may be worse than outright censorship (Wired UK)

Berners-Lee: insidious government surveillance may be worse than outright censorship (Wired UK) | Peer2Politics | Scoop.it

Despite the air of pessimism surrounding the Web Index 2013 launch in light of the state spying controversies, Berners-Lee remained positive about the many good things that are happening around the globe. According to the report the internet remains vital in catalysing citizen action and real world change. Despite the fact 30 percent of nations engage in targeted web censorship and "moderate to extensive blocking or filtering of politically sensitive content", the web and social media played a big role in "public mobilisation" in 80 percent of nations

 
jean lievens's insight:

"But spying is this insidious form, because of its chilling effect If you feel someone's looking over your shoulder, there's all kinds of things you will not do… [You're not going to be] able to use facilities because of nameless fear."

 
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Trusted Computing Must Repudiate The NSA - Forbes

Trusted Computing Must Repudiate The NSA - Forbes | Peer2Politics | Scoop.it

Trust is fragile and the decade long effort on the part of the NSA to compromise all security models has destroyed trust.  From its inception the coalition of industry giants who have backed the concept of hardware-based security, the Trusted Computing Group (TCG), have been at odds with the “information should be free” crowd. The problem these giants (Microsoft, Intel, AMD, IBM, HP) faced a decade ago was software and media piracy. As the biggest backer, Microsoft, was the most suspect. In recent weeks that suspicion of Microsoft has exploded into bald-face claims from the German BSI that the Trusted Platform Module, the hardware component of Trusted Computing is an NSA backdoor. And who knows what further releases of the Snowden files will unveil about the NSA’s involvement with the Trusted Computing Group?

 
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Cut Off the NSA’s Juice - disinformation

Cut Off the NSA’s Juice - disinformation | Peer2Politics | Scoop.it
Grassroots activists have realize the potential to put the NSA on the defensive in a dozen states where the agency's running surveillance facilities
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

N.S.A. Devises Radio Pathway Into Computers

N.S.A. Devises Radio Pathway Into Computers | Peer2Politics | Scoop.it

WASHINGTON — The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching cyberattacks.

 
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

NSA scandal pushes firms to move data out of US - DatacenterDynamics

NSA scandal pushes firms to move data out of US - DatacenterDynamics | Peer2Politics | Scoop.it
Recent revelations that the US National Security Administration's surveillance practices are far more wide-reaching than previously thought are already having a material impact on the IT services industry in the US. 
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Report: NSA intercepts computer deliveries - WIS

Report: NSA intercepts computer deliveries - WIS | Peer2Politics | Scoop.it

LONDON (AP) - A German magazine lifted the lid on the operations of the National Security Agency's hacking unit Sunday, reporting that American spies intercept computer deliveries, exploit hardware vulnerabilities, and even hijack Microsoft's internal reporting system to spy on their targets.

 
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Inside TAO: Documents Reveal Top NSA Hacking Unit - SPIEGEL ONLINE

Inside TAO: Documents Reveal Top NSA Hacking Unit - SPIEGEL ONLINE | Peer2Politics | Scoop.it
The NSA's TAO hacking unit is considered to be the intelligence agency's top secret weapon.
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

How to defeat Big Brother - Salon

How to defeat Big Brother - Salon | Peer2Politics | Scoop.it

It can be safely argued that those four words, written by the French philosopher Michel Foucault in his discussion of the “panopticon,” were never more true than they were this year. Our visibility — defined as ubiquitous, networked digital connectedness — has at long last enabled an unprecedented surveillance state. In 2013, the negative consequences of our contemporary lifestyles were impossible to ignore.

 
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

While Tech Companies Call for Spying Reform, Telcos Silent - PBS MediaShift

While Tech Companies Call for Spying Reform, Telcos Silent - PBS MediaShift | Peer2Politics | Scoop.it

On Dec. 9, eight of the world’s leading technology companies set aside their rivalries to issue a direct challenge to U.S. lawmakers: Lead the world by example and fix America’s broken surveillance state. Although the tech companies’ statement sends a powerful message, notably absent from the letter’s signatories is the appearance of a single telecommunications company, or telco.

 
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

UN votes to protect privacy in digital age

UN votes to protect privacy in digital age | Peer2Politics | Scoop.it

UNITED NATIONS (AP) — The U.N. General Assembly unanimously adopted a resolution aimed at protecting the right to privacy against unlawful surveillance in the digital age on Wednesday in the most vocal global criticism of U.S. eavesdropping.

 
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Edward Snowden, The Dark Prophet - Cryptome.org

In an interview with Time conducted via e-mail in early December, Snowden explained his answers to those big questions, even as he allowed for the fact that the U.S. public he sees himself serving may not ultimately agree. The privacy of regular citizens, he believes, is a universal right, and the dangers of mass surveillance litter the dark corners of the 20th century. “The NSA is surely not the Stasi,” he argued, in reference to the notorious East German security service, “but we should always remember that the danger to societies from security services is not that they will spontaneously decide to embrace mustache twirling and jackboots to bear us bodily into dark places, but that the slowly shifting foundation of policy will make it such that mustaches and jackboots are discovered to prove an operational advantage toward a necessary purpose.”

 
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Keiser Report Episode 531 2nd half

Max interviews futurist, IT architect and Free Software advocate Arjen Kamphuis about the internet in a post-re-architected NSA world in which the free network is disintegrating, but against which the likes of Google, Oracle and Microsoft are leveraged. They add up the costs to US corporations in lost revenue as nations across Europe and Latin America divorce themselves from industrial espionage on an industrial scale from America.

 
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

US and UK struck secret deal to allow NSA to 'unmask' Britons' personal data - The Guardian

US and UK struck secret deal to allow NSA to 'unmask' Britons' personal data - The Guardian | Peer2Politics | Scoop.it

The phone, internet and email records of UK citizens not suspected of any wrongdoing have been analysed and stored by America's National Security Agency under a secret deal that was approved by British intelligence officials, according to documents from the whistleblower Edward Snowden.

 
more...
No comment yet.
Scooped by jean lievens
Scoop.it!

Why the Government Isn't Worried About Bitcoin

Why the Government Isn't Worried About Bitcoin | Peer2Politics | Scoop.it

With overwhelming government acceptance, Bitcoin also loses much of its punkish appeal as a symbol of freedom and hope for techno-libertarians like Dread Pirate Roberts, the founder of the Silk Road. In their mind, Bitcoin’s rise represents the decline of the state, a world where no one pays taxes and everyone plays Satoshi Dice.

 
more...
Bibiane Bovet's curator insight, November 21, 2013 11:09 AM
The Bitcoin Craze

20WednesdayNov 2013

Posted by Bibiane Bovet 

 

Bitcoin is a crypto-currency and one of the most anarchic alternative currency out there, a criminal haven and quite a chaotic mess. People get robbed every day of their bitcoins, from their Bitcoin wallets held on their cellphones. These latter need to be protected with a bitsafe or stored on the Web. Their system seems to operate out of “nowhere”. But in reality, it actually operates from outside the existing banking system, from clouds on the Web. Here, I must say, that almost all 4,000+ alternative currencies also operate from outside the existing banking system as well. Unless we are talking about alternative currencies such as points systems that President’s Choice’s banking management, for example, offers their clientele as frequent shoppers. Or like Air Miles that are a LoyaltyOne marketing program that belong to Alliance Data, which is a credit card processing company for many retail brands, and is administered by their own banks: the Comenity Bank and the Comenity Capital Bank. Bitcoins, mind you, are created, using people called “Miners”, that solve “mathematical formula” that are encrypted blocks set in Merkel trees that the Miners prune to their simplest expressions to release Bitcoin blocks as a pretext to unlock Bitcoins from their cache, sort of acting in lieu of a central bank system in the Webosphere that is creating Bitcoins out of nowhere, very much like a Keynesian economy. These newly mined Bitcoin blocks are then sold to anonymous users all over the world, and are either used to launder money, to conduct anonymous transactions, for gaming, or to purchase any item from other Bitcoin users. Such are Bitcoin usage and activities worldwide. Notwithstanding the fact that Bitcoins are used profusely throughout the world, that it is gaining everyday in popularity, that it is a legal currency like all other 4,000+ existing alternative currencies, I am entirely against bitcoin as it is.

I have been invited recently to the Bitcoin Embassy, as an expert in the field of alternative and complementary currencies. They wanted to introduce me to their organization, to discuss my interests with the Bitcoin concept and to relate its flaws, to allow me to reflect on their issues at stake, which of course, I had already majorly analyzed. Let me tell you, that I was fascinated with their problems and the critical issues that Bitcoin users experience on a daily basis. They were extremely enthusiastic communicating with me and confiding in me, knowing very well that I understood perfectly the problems they have. In order for me to psychoanalyze the system and user interactions, to analyze the information flow and system flaws, to understand the mathematical concerns and security concerns, and the existing protocol; I kept silent the entire time of their expose. I wanted them to relax and clearly open up to me, telling me all about their Bitcoin system. At the present time, there are still lots of caveat with respect to bitcoin, its system, its protocol and its usage. Although, after conducting a thorough analysis of Bitcoin, I can assure you, that aside from its main security issue, Bitcoin is not a system to be ignored, but a legitimate alternative currency system to be reformed in order to attain the goal it has set for itself: to remain free from all banking structure and evolve as an open international floating currency system comparable to the WOCU (World Currency Unit), for example.

I am currently working on the development of a protocol that will verify the origin of funds prior to the purchase of Bitcoins and monitor identity prior to enter the system. I am also working at reforming it from its delinquent transactional format and anarchic currency issuance, by creating a syndicate in clouds, of all such “anarchic” currencies, and introducing it to a robust security and a dire protocol system, ensuring legitimacy of funds’ origin, as well as developing a regularization of transactions, using an encrypted clearing protocol, and track records of all transactions for all users within the syndicate. Those that will continue operating outside these syndicated cloud organizations will obviously be operating their own separate organizations and activities.

All this being said, there exist well over 4,000+ alternative complementary currencies in the world today, and the great majority of them are legitimate alternative currencies, complementary to existing fiat currencies, and are government compliant, tax paying, and well organized currencies management systems, with each organization having tenth of thousands of users. The only problem with most of them is that, just like Bitcoin, they are for the most part, anarchic and inflationist currency systems, that have been issuing their currency out of nowhere, cumulating a lot of bad debt, unpaid loans and unpaid credit margins causing a net devaluation of the products and services of their users. For this reason, the solutions I have developed for all government, remediate these problems by taking into considerations the impact these problems have and responding adequately to these anarchic conditions with a proprietary technology, that can replace government expenditures and their social structure with a standardized complementary economic system that is not inflationary. I have also created a compensation chamber solution for all of these organizations that are operating within a closed economic system that are devaluated, to help them conduct business between them such organizations using a robust complementary currency, affording them a high level of confidence, having zero inflation, such that their transactions via this compensation chamber carry zero debt as an economic system instrument and therefore no devaluation of the products and services for all their members using it.

My primary aim is to sell solutions I have developed for governments to all government level. Helping governments retain as much money as it is possible to replace their social structured expenditures, with a proprietary solution involving a standardized complementary economic system using complementary instrument as solutions to their shrinking money supply, which is specifically designed in response to their growing needs. This is what I am proposing provincial, federal, and aboriginal governments of Canada, as well as other democratic governments throughout the world.

With regards to Bitcoin, there is still much to be learned about the behavior of this currency and its users, before engaging a nation with its predicate. There is much to be taken into considerations yet. When deconstructing the existing protocol of Bitcoin, one is to ponder whether Bitcoin is rather a currency designed for the gaming industry or “gamers” per se, than for an economic mission. My analysis of Bitcoin, relates it more to ISK (InterStellar Kredit) than to trade dollars or barter dollars. But still, it is important not to jump to conclusion too quickly with this economic animal, because once reformed with a proper protocol, even though its transactions lies outside the known banking system, there are some very strong resemblance with the WOCU because both are existing in a open structure as opposed to most complementary currencies which exist solely within a closed structure. The main difference between the WOCU and Bitcoin is that WOCU is a world indexed currency that is based on forex trade and its derivative markets, where Bitcoin currently has a dubious source, it is unsecured, unsecuritized and floating on its own, claiming to be tied to labour hours from their “miners’’ activitiy. Clearly, between Bitcoin and the WOCU, the WOCU offers a normalized stability based on world currency trading value that can leave us empty handed if all currency collapses. Which is unlikely to happen at once. Where Bitcoin offers us an unsecured currency with major security issues within an anarchic structure that is inflationary in its present nature, that can leave us with devaluated products or services, for which instrument is not made for savings but for immediate consumer trade, which can leave us empty handed at any moment for several reasons: such as theft, loss as data, supply restrictions or constrictions and/or demand contraction. Again, Bitcoin is merely one of the existing 4,000+ alternative complementary currencies that are in usage throughout the world, with organizations that have perhaps more experience in its transaction management systems or clouds that can harbor your funds with greater saving security. Anyhow, that leaves us with something to think about.

I hope that this answers your question. I remain at your disposal for further inquiries.

Cordially,

Bibiane Bovet, Mathematician/Cultural Psychoanalyst, Government Consultant

http://www.BibianeBovet.com

BibiBovet@gmail.com
1-800-805-3120