Pastor Mike Online 03-12-15, NSA Spy Apps, Hillary Has Horns, And Ferguson Update – Video


Pastor Mike Online 03-12-15, NSA Spy Apps, Hillary Has Horns, And Ferguson Update
Visit http://PastorMikeOnline.com - In today #39;s show, Pastor Mike Hoggard discusses topics that include: NSA using IOS and Android apps to spy on Americans, H...

By: MikeHoggardVideos

More:

Pastor Mike Online 03-12-15, NSA Spy Apps, Hillary Has Horns, And Ferguson Update - Video

Posted in NSA

Everyone’s a Target, NSA’s Mass Surveillance and Cyber Warfare in the Middle East – Video


Everyone #39;s a Target, NSA #39;s Mass Surveillance and Cyber Warfare in the Middle East
Since the revelations of Edward Snowden, there has been a great deal of discussion about NSA and domestic eavesdropping. But except for Germany, there has been very little examination of NSA #39;s...

By: American University of Beirut

Go here to see the original:

Everyone's a Target, NSA's Mass Surveillance and Cyber Warfare in the Middle East - Video

Posted in NSA

NSAs top lawyer joins private sector

The top lawyer for the National Security Agency, Rajesh De, has stepped down from his post and will join the law firm Mayer Brown.

Des last day was Friday, and he plans to start at Mayer Brown in June as head of the firms privacy and security practice in Washington. He had been NSAs general counsel since April 2012 and oversaw the exposure of the governments controversial surveillance program by former NSA contractor Edward Snowden.

Its a natural time to move on, De said.

The NSAs deputy general counsel Teisha Anthony will be the acting general counsel until a permanent replacement is named. De defended the NSAs practices during his three-year tenure, arguing that the agency has acted within the legal and policy framework provided by the executive branch, Congress and the courts.

But he said that reasonable people can have an intelligent and thoughtful discussion about what they want that framework to look like. De said he hopes Congress, which has a June deadline to reauthorize Section 215 of the Patriot Act the provision that grants the NSA legal authority to collect Americans phone records will reach a resolution that allows the government to preserve the operational capabilities it needs to maintain national security, while also addressing the need to move the metadata out of the governments hands.

De declined to comment specifically on Snowden, other than to say that he believes no one should consider themselves above the law. No person, a king or an IT guy, should consider themselves above our democratic system, De said. Theres a legal process we all adhere to. None of us is above the system.

In his new role, De who was a partner in Mayer Browns litigation group before joining the government will advise companies in the financial services, health-care, retail and manufacturing sectors on data privacy and cybersecurity issues. He said he has not decided whether he will register as a lobbyist.

De held a number of senior roles in the Obama administration over the past six years, including staff secretary and deputy assistant to the president, principal deputy assistant attorney in the Justice Departments Office of Legal Policy, and counsel to the 9/11 Commission.

De is joining Mayer Brown at a time when law firms are clamoring to grow their data privacy and cybersecurity practices. A number of major firms, including DLA Piper and Pillsbury, have bulked up their cybersecurity capabilities in recent months.

Privacy and cybersecurity is probably the number one issue clients have been asking us about over the last year, Mayer Brown Chairman Paul Theiss said. Its certainly the fastest-growing.

See more here:

NSAs top lawyer joins private sector

Posted in NSA

Ex-NSA Researcher Finds Sneaky Way Past Apple Mac's Gatekeeper

Want to know something odd? Its 2015 and all the top anti-virus products for Mac OS X use insecure lines to transmit their software to Apple Apple machines. Download files, known as .dmg files,for products including Kaspersky, Symantec Symantec, Avast, Avira, Intego, BitDefender, Trend Micro, ESET and F-Secure are all sentover unencrypted HTTP lines, rather than the more secure HTTPS. There is method in their madness, as they trust Apples Gatekeepersecurity technology to recognise the digital signatures they sign their software with that should guarantee the authenticity of the download.

But a former NSA and NASA staffer Patrick Wardle, who now heads up research at security start-up Synack, believes he has found a new way to abuse such insecure downloads and bypass protections in Apple Macs without getting caught. Normally, anyone who intercepts a download to turn it nasty wont get away with it, as Mac Gatekeeperwill see that the vendors original signature has been altered or taken away entirely, and the software tampered with, meaning its no longer trusted.

Yetthe Gatekeeper software doesnt check all components of Mac OS X download files, according to Wardle. He believes he can sneak a malicious version of whats known as a dylib file into legitimate downloads done over HTTP to infect Macs and start stealing data.These dylibs (short for dynamic libraries) are designed to be re-used by different applications; they might be used for actions such as compressing a file or using native graphics capabilities of the operating system. Theyre supposed to make apps work more efficiently.

If an attacker can hijack the dylib processes used by Mac apps, however, they can carry out nasty attacks and send user data to their own servers, the researcher explained. Such an attack would not be trivial, Wardle admits. First, the attacker would have to get on the same network as a target, either by breaching it or simply logging on to the same public Wi-Fi. They would also have to injecta legitimate yet vulnerable application into the downloadand shuffle around the content of the .dmg so thatthe injected legitimate softwareis shown to the user. The latter is not so tricky:the attacker can set the name and icon of thisvulnerable app so nothing looks suspicious, said Wardle.

Finding vulnerable apps shouldnt be too hard either.Wardle created a scanner that looked for applications that would use his naughty dylibs. He found around 150 on his own machine, including hugely popular software likeMicrosoftWord and Excel,Apples own iCloud Photos and Dropbox. The list also includedApples developer tool XCODE and email encryption key management software GPG Keychain, both of which he abused in his proof of concept attacks. According to a recent article in The Intercept, Snowden files showed researchers were demonstrating how amodified version of XCODEcould be used to siphon off targets passwords and other data. Wardle said it was 100 per cent coincidence that his former employer had also targeted XCODE.

Wardled noted that apps from Apples Mac App Store are not vulnerable.

Apps vulnerable to dylib attacks slide from Patrick Wardle

Despite the barriers to successful exploitation, his techniques have provided him with a novel way to bypass Gatekeepers draconian detection mechanism (its also not too dissimilar from DLL attacks of yore on Windows).It is, he added, a cunning way to bypass Mac OS X Gatekeeper protections and allow hackers to go back to their old tricks.

When the injected legitimateapplication is launched the unsigned malicious dylib is loaded or executed(even if the user sets his machine to accept only all apps from the Mac App Store) before theapps main code. At this point the dylib can do anything. I see it a)kicking off the legitimate application that the user was downloading sonothing seems amiss, and b) installing the implant component which will then complete the rest of the attack, persistently infecting the userscomputer. He noted theattack should also work on downloaded .zip filesthat contain applications.

Mac OS X dylib hijacking attacks slide from Patrick Wardle

Read more:

Ex-NSA Researcher Finds Sneaky Way Past Apple Mac's Gatekeeper

Posted in NSA

Reports of NSA spying on Canadian companies fuel calls for more transparency

Critics say a crisis of transparency surrounds modern spying methods in Canada after revelations that a close ally the U.S. National Security Agency has been looking at the communications traffic of at least two Canadian corporations.

There are people from the NSA working inside of CSE as we speak, said NDP defence critic Jack Harris, referring to U.S. intelligence analysts embedded inside the Communications Security Establishment, the NSAs Canadian counterpart.

Mr. Harris said he has many questions about the extent of Canadas close surveillance partnerships with the United States, but Parliamentarians are not authorized to get answers.

Were reaching a crisis point on this, he said in an interview, pointing out that the Conservative government faces several spying controversies.

The Globe and Mail reported on Tuesday that a leaked NSA document from 2012 includes Royal Bank of Canada and Rogers Communications Inc. on a list of global firms whose private communication networks the U.S. agency appeared to be interested in mapping.

The document which The Globe obtained from a confidential source suggests the agency was describing efforts to identify and analyze computer networks controlled by corporations.

Markings on the document, a presentation for intelligence officers, indicate it may have been shared with Ottawa nearly three years ago. Rogers and RBC told The Globe they had no idea the NSA had any interest in their networks, which they insist are secured against intruders.

The NSA has said it will not discuss allegations about its intelligence activities.

There is no indication the NSA went as far as getting at any data inside individual computers or reading communications related to the Canadian companies. However, the presentation suggests the agency went further in using its mapping techniques to look at the computer systems controlled by a Chinese telecom giant.

The name of Huawei Technologies Co. Ltd. appears in the presentation, and the NSA appears to have had a keen interest in isolating the corporations data channels. These links are likely to carry Huawei traffic, reads one slide.

Excerpt from:

Reports of NSA spying on Canadian companies fuel calls for more transparency

Posted in NSA

Faculty on Point | Professor Jeffrey Fisher on Digital Privacy and the Riley Decision – Video


Faculty on Point | Professor Jeffrey Fisher on Digital Privacy and the Riley Decision
Professor Jeffrey L. Fisher, lead counsel in the digital privacy case Riley v. California, discusses preparing the case and implications of this landmark U.S. Supreme Court Fourth Amendment...

By: stanfordlawschool

See the original post here:

Faculty on Point | Professor Jeffrey Fisher on Digital Privacy and the Riley Decision - Video

First Amendment Test – Lukeville Port of Entry, Mexico to U.S.A., Customs and Border Protection – Video


First Amendment Test - Lukeville Port of Entry, Mexico to U.S.A., Customs and Border Protection
First Amendment Test - Lukeville Port of Entry, Arizona, Mexico to U.S.A., Customs and Border Protection, 14 March 2015, Civil Disobedience 0:00:59.954,0:01:01.314 [Ready for Officer] 0:01:05.000,...

By: Robert Trudell

See the original post:

First Amendment Test - Lukeville Port of Entry, Mexico to U.S.A., Customs and Border Protection - Video

MidPoint | Robert Muise, Attorney who represents the American Freedom Defense Initiative – Video


MidPoint | Robert Muise, Attorney who represents the American Freedom Defense Initiative
Attorney who represents the American Freedom Defense Initiative in a first amendment case involving their group wanting to put signs linking Islam to Hitler on Philadelphia buses and trains....

By: NewsmaxTV

Read more from the original source:

MidPoint | Robert Muise, Attorney who represents the American Freedom Defense Initiative - Video

U.S. Customs and Border Protection Agent shuts camera off at Lukeville Port of Entry, GP013755 – Video


U.S. Customs and Border Protection Agent shuts camera off at Lukeville Port of Entry, GP013755
Customs and Border Protection Agent shuts camera off at Lukeville Port of Entry, 14 March 2015, GP013755 Part One of this First Amendment Test: https://www.youtube.com/watch?v=Vk9UUg9lMxk...

By: Robert Trudell

See the original post here:

U.S. Customs and Border Protection Agent shuts camera off at Lukeville Port of Entry, GP013755 - Video

Jacksonville attorney George Gabel honored as Friend of the First Amendment

George Gabel has a tie he wears on special occasions: Its red and sprinkled with many tiny American flags.

Those special occasions? He gives a grin: This is the tie I like to wear when Im arguing First Amendment cases.

Those flags, he figures, are a not-so subtle reminder to judges and anyone else of the importance of a free press and open government. Its something Gabel, a Jacksonville attorney with a courtly, soft-spoken manner, has been fighting for since the 1960s.

For that work, he was honored Tuesday in Tallahassee with the First Amendment Foundations Pete Weitzel/Friend of the First Amendment Award.

Frank Denton, editor of The Florida Times-Union, nominated Gabel for the award, calling him a warrior for the First Amendment. He cited numerous cases in which Gabel tangled with judges and politicians on behalf of the publics right to know what is going on, noting that Gabel is always there to stand up in court on behalf of the Sunshine Laws and the First Amendment.

It is a point of passion for Gabel, who likes to quote Thomas Jefferson on the matter. And he mentions a T-shirt that Judy, his wife of 52 years, bought him emblazoned with quote from Martin Luther King Jr. that reads: Our lives begin to end the day we become silent about things that matter.

Without a pause, he then said: One of the things that matters to me is the First Amendment and open government.

Gabel is an attorney at Holland & Knight and has an office on the 39th floor of the Bank of America Tower, where he has miles-long views of the water and land of his hometown.

Hes become something on an institution in Jacksonville. Walking through downtown toward a lunch spot last week, it was hard for him to get more than 20 yards without someone hailing him by name.

Gabel, 75, grew up in the Murray Hill neighborhood, the second of five children. His childhood was pretty idyllic, he said people seemed nicer then, and life was simpler, safer.

Link:

Jacksonville attorney George Gabel honored as Friend of the First Amendment

Why We Filed a Brief Defending Offensive Speech

Heres Boston College law professor Kent Greenfield, writing at The Atlanticabout the racist-chant scandal at the University of Oklahoma:

We are told the First Amendment protects the odious because we cannot trust the government to make choices about content on our behalf. That protections of speech will inevitably be overinclusive. But that this is a cost we must bear. If we start punishing speech, advocates argue, then we will slide down the slippery slope to tyranny.

If that is what the First Amendment means, then we have a problem greater than bigoted frat boys. The problem would be the First Amendment.

Catos brief inWalker v. Texas Division(the Confederate flag license-plate case) pokes plenty of fun at government censors who would protect us from offensive speech, but this is no laughing matter.

H/t Trevor Burrus

View original post here:

Why We Filed a Brief Defending Offensive Speech

21 tips, tricks and shortcuts to help you stay anonymous online

Avoiding being tracked online is nearly impossible, but here are a few ways to reduce the risk.

Getty Images

Consider installing Mailvelope.

Mozilla Screenshot of Firefox private window. Mozilla This is perhaps one of the most basic privacy options that just about anyone can take advantage of. The top four most popular browsers - Google Chrome, Internet Explorer, Mozilla Firefox and Safari - have a private browsing mode, which can be found in their respective settings menus. With private browsing activated, your browser will not store cookies or internet history on your computer. This has very limited uses and is perhaps really only effective at hiding your browsing history from your significant other, siblings or parents. Private browsing does not securely hide your identity or browsing activities beyond your local machine as your IP address can still be tracked.

Dado Ruvic/Reuters A man is silhouetted against a video screen with a Twitter and a Facebook logo as he poses with a Dell laptop in this photo illustration taken in the central Bosnian town of Zenica, August 14, 2013. The amount of personal data that social networking sites like Facebook, Google Plus and Twitter have harvested from their billions of users is shocking. Head to facebook.com/settings and click Download a copy of your Facebook data and you might be surprised to see just how much information is on file. Everything from who you have poked, what events you have or have not attended and when and where you have logged into your account is logged and saved. Similar levels of data harvesting occurs on all major social media sites. This is the price you pay for using a free service. The only sure-fire way to avoid giving up this information is to delete your accounts entirely. A word of warning, deactivating your account is not the same as deleting it. Deactivating your account is sort of like putting it into hibernation - all your information is stored and can be re-activated if you have second thoughts. Always delete rather than deactivate an account if you wish to completely wipe it.

A large amount of websites track and collect the browsing habits of the users that visit them. These trackers are invisible and most people arent aware that theyre being tracked. Ghostery is a free browser extension - available on all major web browsers - that will reveal these trackers, also known as web bugs. You can then decide which web bugs youre comfortable with tracking you and which ones youd like to block. In total, Ghostery keeps track of over 1,900 companies. Each company has a profile in the Ghostery Knowledge Library, allowing you to better understand who and why someone is keeping tabs on you and what action you would like to take.

Getty Images Hushmail is currently very popular, it provides a private email account with no ads. Most of the well known and popular email services - Gmail, Hotmail, Yahoo Mail, Outlook - are not particularly privacy-friendly. For full Pretty Good Privacy (PGP) encrypted emails, consider signing up to a more secure provider. Hushmail is currently very popular, it provides a private email account with no ads, built-in encryption and unlimited email aliases. A limited free service is offered, with more features available for a monthly subscription fee. However, Hushmail is not above the law and in the past it has been forced to reveal user data to U.S. authorities following a court order. The company also logs user IP addresses. MyKolab is a similar service that has not revealed any user information in the past, however, they are also obliged to provide access to lawful interception requests so this still remains a possibility.

Arda Guldogan/Getty Images Keeping your real email address away from spammers is crucial to protecting your identity online. Disposable Email Addresses (DEAs) are anonymous and temporary. They allow users to quickly create new email addresses as-and-when theyre needed, which can then be disposed of after use. This is particularly useful for avoiding spam when filling in forms on websites that require an email address to proceed. Keeping your real email address away from spammers is crucial to protecting your identity online and DEAs are a great solution. Popular providers of this service include Guerrilla Mail and Mailinator, although there are hundreds out there to choose from. Most DEAs are not particularly secure, so it is not advised to use these services to send sensitive information - rather, use them as a way to avoid giving away your own information in situations where you are obliged to do so.

Virtual Private Networks (VPNs) are one of the most effective ways to protect your privacy online. A VPN essentially hides your IP address - your unique online identifier - and runs all your online data via a secure and encrypted virtual tunnel, which can keep websites from tracking your online activity or even knowing which country youre browsing from. These days, there are many VPNs to choose from. Hotspot Shield, TorGuard, CyberGhost and HideMyAss are some of the more popular ones that are currently available. Most of them require a small monthly subscription fee and they dont all provide the same list of features, so its worth shopping around for a VPN that suits you.

Tor Tors anonymity network allows access to the deep or hidden web. Originally developed with the U.S. Navy in mind as a way to protect government communications, Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Tors anonymity network allows access to the deep or hidden web, where websites can be created anonymously and individuals can communicate privately with each other. When using the Tor browser - which can be downloaded for free from torproject.org - it is very difficult for websites or individuals to track your online activity and location. However, while Tor is quite effective at protecting your online anonymity, it can be slow, complicated and restricting. Its also worth noting that while the network can and has been used for good, it has also been used for illicit purposes, such as selling drugs and distributing images of child abuse.

See the original post:

21 tips, tricks and shortcuts to help you stay anonymous online