Skip to content

Privacy

Oakland Dials Down Mass Surveillance Plans

Less than a year ago, the city of Oakland, Calif., took what privacy activists considered to be a major step toward a surveillance state. In July 2013, the Oakland City Council unanimously approved the implementation of the Domain Awareness Center, a surveillance hub that would combine public and private cameras and sensors from all over California’s eighth-largest city into one $11 million mass surveillance system. The components of the program would include integration of closed-circuit feeds from 700 cameras at Oakland public schools and 135 cameras at the Oakland Coliseum complex, which is home to the NFL’s Raiders and Major League Baseball’s Athletics. The video and data flowing into the system would be analyzed with license plate recognition software, thermal imaging and body movement recognition software, possibly even with facial recognition software.

Bilderberg At 60: Inside The World’s Most Secretive Conference

It's been a week of celebrations for Henry Kissinger. On Tuesday he turned 91, on Wednesday he broke his personal best in the 400m hurdles, and on Thursday in Copenhagen, he'll be clinking champagne flutes with the secretary general of Nato and the queen of Spain, as they celebrate 60 glorious years of Bilderberg. I just hope George Osborne remembered to pack a party hat. Thursday is the opening day of the influential three-day summit and it's also the 60th anniversary of the Bilderberg Group's first meeting, which took place in Holland on 29 May 1954. So this year's event is a red-letter occasion, and the official participant list shows that the 2014 conference is a peculiarly high-powered affair. The chancellor, at his seventh Bilderberg, is spending the next three days deep in conference with the heads of MI6, Nato, the International Monetary Fund, HSBC, Shell, BP and Goldman Sachs International, along with dozens of other chief executives, billionaires and high-ranking politicians from around Europe. This year also includes a visit from the supreme allied commander Europe, and a return of royalty – Queen Sofia of Spain and Princess Beatrix of the Netherlands, the daughter of the Bilderberg founder Prince Bernhard.

Secret Military Device ‘Hailstorm’ Used By Michigan Police

‘HailStorm’ is a new device obtained by the Oakland County Sheriff with monies from a U.S. Homeland Security Grant and so far, there isn’t much information available on what exactly it can and cannot do. There were no questions asked when Oakland County commissioners unanimously approved the use of this cellphone tracking device previously used by the US military in Iraq. Undersheriff Michael McCabe told The Detroit News that the federal Homeland Security Act bars him from discussing the Hailstorm device. Many privacy advocates are questioning why one of the safest counties in Michigan needs the very powerful, super-secretive military device called ‘Hailstorm’. The Detroit News sought basic information about Hailstorm and the county denied their Freedom of Information Act request.

New Snowden Documents Reveal Depth Of Infiltration

We have known for some time now that NSA exploits social networks for surveillance purposes. What kinds of information can be obtained from Online Social Networks (OCNs)? LOTS. Communications, photographs, videos, location and travel information, day to day activities… basically everything about everyone. Is your Facebook locked down? Doesn’t matter. GCHQ & NSA collect your information anyway by exploiting“inherent weaknesses in Facebook’s security model.” The new slides cite Facebook as “a very rich source of information on targets” as it provides insight into personal details, life patterns and connections to associates. NSA slides demonstrate that online social networks (OSNs) are fully exploited for purposes of spying on everyone. Facebook is a huge network so it requires a CDN or a Content Delivery Network to deliver content faster. Your Facebook photos and videos are not hosted on Facebook servers, they are uploaded to Akamai (pronounced ACME) servers around the world. Without a CDN all Facebook content would reside only on one server so users who are far away from that server would take awhile to access and load content.

Snowden: Everyone Is Under Surveillance Now

The US intelligence whistleblower Edward Snowden has warned that entire populations, rather than just individuals, now live under constant surveillance. “It's no longer based on the traditional practice of targeted taps based on some individual suspicion of wrongdoing,” he said. “It covers phone calls, emails, texts, search history, what you buy, who your friends are, where you go, who you love.” Snowden made his comments in a short video that was played before a debate on the proposition that surveillance today is a euphemism for mass surveillance, in Toronto, Canada. The former US National Security Agency contractor is living in Russia, having been granted temporary asylum there in June 2013. Before the debates began, 33% of the audience voted in favour of the debate statement and 46% voted against. It closed with 59% of the audience siding with Greenwald and Ohanian.

Victory: European Court Strikes Down Key Aspect Of Surveillance

The ruling today from the European Court of Justice, invalidating the European Union’s 2006 Data Retention Directive policy, was strong and unequivocal: the right to privacy provides a fundamental barrier between the individual and powerful institutions, and laws allowing for indiscriminate, blanket retention on this scale are completely unacceptable. As the Court states, it is not, and never was, proportionate to spy on the entire population of Europe. The types of data retained under this hastily-enacted Directive are incredibly revealing about our lives, including our daily activities and whom we have relationships with. It is right and overdue that this terrible directive was struck down. What the Court said today is similar to arguments privacy advocates have said for some time. The mass collection of metadata is an interference with the right to privacy, and access to this data cannot be justified under vague references to combating serious crimes or terrorism. If access to this sensitive data is granted, such access must be subject to prior review "carried out by a court or by an independent administrative body."

Which Is The Greater Threat To Privacy Google Or Facebook?

You wake up from a Google alarm on your Google phone. The air is Google-cool from your Google thermostat. Your Google car drives you to work at a company that uses Google software. You smile at your sandwich (not made by Google) and take a picture of it, because you're wearing a camera on your face. You look at the sandwich face-photos of your peers, your viewing history logged by Google. An artificial intelligence in your phone queues up a sandwich collage for later. It knows you'll like it. You go home to your wife, which is a giant cargo-hauling military robot, because that's just the fucking way it is now, OKAY? Facebook's desire to produce virtual reality doesn't seem so bad when Google wants to own reality itself.

This Is OUR Moment. It’s Time To Realize OUR Power

It is Time for US to Reset The Net; Not To Ask For Our Privacy but to Take It Back. This is about freedom. When governments steal our data and invade our private lives, they change how we think, how we express ourselves, and how much power they have over us. Luckily, we’re stronger than they are. On June 5th, websites, organizations, and thousands of people are closing the door on the mass surveillance by resetting the net. Together, we'll turn off the parts of the web that governments have infected, and bring them back with new armor that directly confronts the spying. We'll make the Internet ours again, for all of our thoughts and dreams. No one can stop us now. Now that we know how bulk surveillance programs work, we know they have a weakness . . .

7 Ways to Reclaim Your Digital Privacy

Privacy, we say, is about to come roaring back. No, it's not too late. Yes, we know that Google monetizes both our emails and our search histories. It's true that data brokers market our personal dossiers, listing everything from our favorite blogs to our old parking tickets (identity thieves must love it). And NSA leaker Edward Snowden really did prove the paranoids right: The United States government spies on everyone. Now, we agree that security agencies have a vital responsibility to track terrorists, but that mission can't require all citizens to live in a surveillance state. Feel you have nothing to hide? That assumes the data will always be used to defeat terrorists, not to monitor activists, let alone to stalk ex-girlfriends—yes, NSA employees have done that. Here's the other side to the privacy-is-dead argument:

Australian Attorney General Wants ISPs to Spy on Users

"Sophisticated criminals and terrorists are exploiting encryption and related counter-interception techniques to frustrate law enforcement and security investigations, either by taking advantage of default-encrypted communications services or by adopting advanced encryption solutions," the submission noted. Though it does not name its key targets, Yahoo!, Google and Microsoft already enable encryption by default for their respective web-based email services. BlackBerry's messaging encryption has also previously been raised as a law enforcement issue. Under the department's plan, "law enforcement, anti-corruption and national security agencies … [would be able] to apply to an independent issuing authority for a warrant authorising the agency to issue 'intelligibility assistance notices' to service providers and other persons".

Feinstein The Hypocrite

"Senator Feinstein had harsh words for what the CIA was doing: the same kind of words used by citizens to describe the activities of the NSA when they learned of its spying on citizens and the likes of Germany’s Angela Merkel and Brazil’s Dilma Rousseff. Senator Feinstein said the CIA may have violated the Constitution and U.S. laws by spying on committee computers being used by staff members to review CIA documents about the programs used by the CIA to interrogate terror suspects. The CIA was also searching internal messages and staffers’ work on other computers. Commenting on the CIA activities Senator Feinstein said: “I have grave concerns that the CIA’s search may well have violated the separation –of-powers-principles embodied in the U.S. Constitution.” As she explained, the CIA has violated federal law and undermined the constitutional principle of congressional oversight."

Techniques Used In Prisons Are Now Applied To All Of US

Has our country become one giant correctional institution? Americans are not typically aware of how their federal and state prison systems work. What we think we know, we learned from watching television. When I took my first walk through at FCI (Federal Correctional Institution) El Reno Oklahoma as a new employee, I was surprised at how non-Hollywood real prison life is. Frankly, all I knew about prison life was what I saw on television or at the movies. Not even close. As I got closer to retiring from the Federal Bureau of Prisons (FBOP), it began to dawn on me that the security practices we used in the prison system were being implemented outside those walls. “Free worlders” is prison slang for the non-incarcerated who reside in the “free world.” In this article I am going to compare a number of practices used in federal prisons to those being used today in the “free world.”

Surveillance Puts A Damper On Democratic Dissent

Though the highly repressive Stasi and Securitate strove to surveil and censor all communications in East Germany and Romania respectively, the efficacy and extent of those campaigns pales into rather feeble and ineffectual insignificance when compared to the unprecedented scope, depth and rigor of current comprehensive and indiscriminate network information sweeps. Not only were the spying efforts of East Germany and Romania limited by highly labor intensive systems to what could be eavesdropped upon by an army of full-time operatives, but the means to collect, store, search and scrutinize data collected was pitifully plodding and primitive when compared with that which is now in use. Not only can modern electronic eavesdroppings -- every word said or written, heard or read, every place visited, purchase made -- be archived and searched in retrospect and perpetuity . . .

International Day Of Protest: STOP WATCHING US

Never before has the level of daily monitoring been so clear to so many. With the recent revelations brought to light from former NSA security contractor Edward Snowden and the many whistle blowers before him, the world is opening its eyes to the reality that everything we do in a digital format is collected by Governmental bodies like the NSA and GCHQ, but also by private security corporations and used to form a digital fingerprint of our every keystroke, often in complete secrecy and without any oversight.

Occupied Times’ Guide To Combat Online Surveillance

Governments have transformed the internet into a surveillance platform, but they are not omnipotent. They’re limited by material resources as much as the rest of us. We might not all be able to prevent the NSA and GCHQ from spying on us, but we can at least create more obstacles and make surveilling us more expensive. The more infrastructure you run, the safer the communication will be. Download installation software for these programs. You can read detailed installation and setup instructions here.
assetto corsa mods

Urgent End Of Year Fundraising Campaign

Online donations are back! Keep independent media alive. 

Due to the attacks on our fiscal sponsor, we were unable to raise funds online for nearly two years.  As the bills pile up, your help is needed now to cover the monthly costs of operating Popular Resistance.

Urgent End Of Year Fundraising Campaign

Online donations are back! 

Keep independent media alive. 

Due to the attacks on our fiscal sponsor, we were unable to raise funds online for nearly two years.  As the bills pile up, your help is needed now to cover the monthly costs of operating Popular Resistance.

Sign Up To Our Daily Digest

Independent media outlets are being suppressed and dropped by corporations like Google, Facebook and Twitter. Sign up for our daily email digest before it’s too late so you don’t miss the latest movement news.