NATO Sees Worsening Violence in Ukraine
Feb. 6 -- Bloomberg #39;s Phil Mattingly reports on the increasing violence in Ukraine. He speaks on Bloomberg Surveillance. -- Subscribe to Bloomberg on YouTu...
By: Bloomberg Business
Excerpt from:
NATO Sees Worsening Violence in Ukraine
Feb. 6 -- Bloomberg #39;s Phil Mattingly reports on the increasing violence in Ukraine. He speaks on Bloomberg Surveillance. -- Subscribe to Bloomberg on YouTu...
By: Bloomberg Business
Excerpt from:
#39;West won #39;t drop goal to bring Ukraine into NATO #39; - Marcus Papadopoulos
RT talks to Marcus Papadopoulos for some insight into the situation in Ukraine. He #39;s the publisher and editor of Politics First, and a regular commentator on Russia and the Balkans. Munich...
By: RT
Here is the original post:
'West won't drop goal to bring Ukraine into NATO' - Marcus Papadopoulos - Video
NATO Approves Readiness Action Plan
2015 - In the most recent Wales Summit, NATO members approved the Readiness Action Plan to ensure NATO is ready to respond firmly and swiftly.
By: DoD News
Visit link:
[MOD] NSA Blaster | Nerf Vortex Nitron / Strongarm Integration
CORRECTION : the Nitron runs on 15 volts total! The Booom Nitron mod includes a motor swap for the pusher and a separate battery source for the flywheel in order to get the higher ROF! my...
By: blastaway.eu
Link:
[MOD] NSA Blaster | Nerf Vortex Nitron / Strongarm Integration - Video
Edward Snowden Actor Revealed in Staged NSA Security Leak Story
This is the official authorized backup channel for the work of DallasGoldBug, Ed Chiarini, Jr. at http://WellAware1.com. I have written contracted permission...
By: RichardBDawson
Go here to see the original:
Edward Snowden Actor Revealed in Staged NSA Security Leak Story - Video
Obama Keeps His Promise of Making More NSA Reform Promises
More than a year ago, President Barack Obama promised to rein in the NSA and announced a series of reforms to the agency #39;s surveillance programs. The promise...
By: WochitGeneralNews
Go here to see the original:
Obama Keeps His Promise of Making More NSA Reform Promises - Video
nsa crank
Recorded with ScreenCastify (http://www.screencastify.com), the screen video recorder for Chrome.
By: Zecatranium moonjuice gaming
More:
NSA: 10 Minute English: TEST (F)
A free supplementary sesson for Upper Intermediate English Language Students of Native Speakers Academy. We hope this will encourage you to not only further your contact with real English but...
By: Native Speakers Academy - Official Page
Excerpt from:
As part of the NSA's program to certify commercial off-the-shelf technology for use inside the agency, mobile devices from Samsung and Boeing have been cleared for use by NSA employees.
As part of the NSA's program to certify commercial off-the-shelf technology for use inside the agency, mobile devices from Samsung and Boeing have been cleared for use by NSA employees.
This move by the NSA is part of its Commercial Solutions for Classified program (CSfC) to enable government use of the same products that we in the private sector enjoy, rather than specially engineered government-only products that are often feature-poor, slow to market and expensive.
+RELATED: How the NSA is improving security for everyone +
Samsung's products include the Galaxy S4/S5, Galaxy S5 with KNOX, Galaxy Note 3, Galaxy Note 10.1 2014 Edition, Galaxy Note 10.1 2014 Edition with KNOX 2, Galaxy Note Edge with KNOX 2, Galaxy Tab S 8.4 and 10.5 LTE with KNOX 2, and the Galaxy Alpha with KNOX 2. For Samsung, Knox provides the added security features key to making the grade in the CSfC program.
Boeing's offering, which is not commercially available, is the Boeing Black smartphone. Sold only to government agencies and contractors working with government agencies, the Black smartphone is a sealed, tamper proof device.
The heightened level of security built into both product lines comes at a time when the world has seen a significant rise in cyberattacks upon the Android OS. For example, a recent FireEye Mobility Security Team study of the top 1,000 most downloaded free Android Apps found 68 percent susceptible to Man-in-the-Middle (MITM) attacks and contained one or more SSL vulnerabilities.
John Morrison, senior director, Samsung Research America says "the CSfC Program really stretches the boundaries of high security on mobility." He adds that "the innovation driven by the U.S. government results in more secure products in private sector hands."
In order for these products to be certified, the vendors must satisfy stringent security requirements. For example, the devices must generate asymmetric cryptographic keys used for key Establishment and Authentication; perform encryption/decryption in accordance with a specified cryptographic algorithm; perform cryptographic hashing in accordance with a specified cryptographic algorithm and message digest size; and they must restrict the ability to configure policies for passwords, session locking, device enabling/disabling, application installation, VPN protection or specify wireless networks.
A key example of the security issues surrounding BYOD smartphones and tablets is the camera that most have. Morrison says, "The issue for various government and commercial entities is that they have unique missions and therefore require customization or a different configuration for the devices they want to use. For example, while many commercial work sites that permit cameras to be available for use, there are many sites, both government and commercial, where the CAMERA MUST ALWAYS BE OFF."
More here:
NSA approves Samsung and Boeing mobile devices for employee use
By Cole del Charco | Published 10 hours ago
The man charged with cleaning up the National Security Agency after reports surfaced that the organization was monitoring millions of Americans and their communications had one message about personal cybersecurity at the Carolina Inn on Monday.
He warned the audience to use caution when sharing information online.
We need to know that someone out there has an interest in you, he said. You need to sit down and think about what we are comfortable with.
Admiral Michael S. Rogers, director of the NSA and commander of the U.S. Cyber Command, visited Chapel Hill as part of a speaker series co-sponsored by UNCs Department of Peace, War and Defense and the Triangle Institute for Security Studies.
He added that he wants the NSA to prioritize conversations with citizens as the agency looks to combat national cybersecurity problems.
A world of great security but limited freedom, I have zero interest in the U.S. being a part of. But a world of limited security but great freedom, with my two sons, I have no desire in the U.S. being a part of. We need a balance between freedom and security, he said.
He said the NSA treats cyberwarfare like nuclear warfare.
Rogers then defined the job of the NSA, saying it collects foreign intelligence and defends U.S. information.
We are a foreign intelligence agency, he said. We do not collect information from U.S. citizens. I must get that authority from a judge. We do not violate the law.
See original here:
THE FOURTH AMENDMENT - ISAIAH AND DAKOTA
By: Dakota Tate
The rest is here:
Prof. Eugene Volokh, UCLA Law School *
I. Text of the Second Amendment and Related Contemporaneous Provisions II. Calls for the Right to Keep and Bear Arms from State Ratification Conventions III. "The Right of the People" in Other Bill of Rights Provisions IV. Some Other Contemporaneous Constitutional Provisions With a Similar Grammatical Structure V. 18th- and 19th-Century Commentary A. William Blackstone, Commentaries on the Laws of England (1765) B. St. George Tucker, Blackstone's Commentaries (1803) C. Joseph Story, Commentaries on the Constitution of the United States (1833) D. Thomas Cooley, General Principles of Constitutional Law (1880) VI. Supreme Court Cases A. United States v. Miller, 307 U.S. 174 (1939) B. Dred Scott v. Sandford, 60 U.S. 393, 416-17, 449-51 (1857) C. United States v. Cruikshank, 92 U.S. 542, 551 (1876) D. Presser v. Illinois, 116 U.S. 252, 264-66 (1886) E. Logan v. United States, 144 U.S. 263, 286-87 (1892) F. Miller v. Texas, 153 U.S. 535, 538-39 (1894) G. Dissent in Brown v. Walker, 161 U.S. 591, 635 (1896) (Field, J., dissenting) H. Robertson v. Baldwin, 165 U.S. 275, 280 (1897) I. Maxwell v. Dow, 176 U.S. 581, 597 (1900) J. Trono v. United States, 199 U.S. 521, 528 (1905) K. Twining v. New Jersey, 211 U.S. 78, 98 (1908) L. United States v. Schwimmer, 279 U.S. 644 (1929) M. Dissent in Adamson v. California, 332 U.S. 46, 78 (1947) (Black, J., dissenting) N. Johnson v. Eisentrager, 339 U.S. 763, 784 (1950) (Jackson, J., for the majority) O. Knapp v. Schweitzer, 357 U.S. 371, 378 n.5 (1958) (Frankfurter, J., for the majority) P. Konigsberg v. State Bar, 366 U.S. 36, 49 & n.10 (1961) (Harlan, J., for the majority) Q. Dissent in Adams v. Williams, 407 U.S. 143, 149-51 (1972) (Douglas, J., dissenting, joined by Marshall, J.) R. Lewis v. United States, 445 U.S. 55, 65 (1980) S. United States v. Verdugo- Urquidez, 494 U.S. 259, 265 (1990) T. Casey v. Planned Parenthood, 505 U.S. 833, 848 (1992) (dictum) U. Concurrence in Printz v. United States, 521 U.S. 898, 938-939 (1997) (Thomas, J., concurring) V. Dissent in Muscarello v. United States, 524 U.S. 125, 143 (1998) (Ginsburg, J., joined by Rehnquist, C.J., and Scalia and Souter, JJ.) VII. Relevant Statutes A. Militia Act of 1792 B. The currently effective Militia Act C. The Freedmen's Bureau Act (1866) D. The Firearms Owners' Protection Act (1986) VIII. Other Materials IX. State Constitutional Right to Keep and Bear Arms Provisions (Current and Superseded) A. Sorted by state, though including both current and superseded provisions B. Sorted by date, from 1776 to the present
These materials can be useful for discussing how the Second Amendment ought to be interpreted. I intentionally include more materials here than any teacher will likely use, to give people flexibility in picking and choosing.
Second Amendment: A well regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed.
English Bill of Rights: That the subjects which are protestants may have arms for their defence suitable to their conditions and as allowed by law (1689). 1
Connecticut: Every citizen has a right to bear arms in defense of himself and the state (1818). 2
Kentucky: [T]he right of the citizens to bear arms in defense of themselves and the State shall not be questioned (1792). 3
Massachusetts: The people have a right to keep and to bear arms for the common defence (1780). 4
North Carolina: [T]he people have a right to bear arms, for the defence of the State; and, as standing armies, in time of peace, are dangerous to liberty, they ought not to be kept up; and that the military should be kept under strict subordination to, and governed by, the civil power (1776). 5
Continued here:
CHEYENNE - The Wyoming Senate on Monday approved second reading of a bill that would extend workplace and other anti-discrimination protections on the basis of sexual orientation and gender identity.
Senate File 115 was approved after consideration of several new amendments to the bill.
The first, sponsored by Sen. Larry Hicks, R-Baggs, would have added creed, disability, political affiliation, economic status, ethnic background and ancestry to the protected classes afforded under SF 115. It also would have struck the "gender" in gender identity and replaced it with "sex," with Hicks arguing the two terms are interchangeable and the change would make the language consistent with the rest of Wyoming statutes.
But the bill's key sponsor, Sen. Chris Rothfuss, D-Laramie, noted that the purpose of the bill is to exclusively address discrimination on the basis of sexual orientation and gender identity.
While he appreciated what Hicks was attempting to do, he suggested the amendment overreached, given the bill's intent. "In my reading, it's outside the scope," he said.
"It's a little too broad for what the bill title indicates," Rothfuss said.
Sen. Michael Von Flatern, R-Gillette, agreed, adding that Hicks' amendment covered a lot of ground that already exists elsewhere in Wyoming statute.
Senate President Phil Nicholas, R-Laramie, ruled that the amendment was not germane to the bill, and it was subsequently withdrawn.
The second amendment to the bill, offered by Senate Vice President Drew Perkins, R-Casper, sought to rework his previous amendment, which was approved on the bill's first reading.
The amendment sought to expand the list of organizations that would be exempt from SF 115, going beyond religious organizations to include nonprofit "expressive associations" whose primary purpose or function "are grounded in religious teachings."
Excerpt from:
OLYMPIA Family and friends of a woman killed by her husband at a Spokane hospital last July tried to make it clear Monday they are not anti-gun. They arepro-warning.
Although a gun-rights group questioned whether Sheena Hendersons law would infringe on the Second Amendment, her father Gary Kennison said the proposal has nothing to do with taking guns away from people. Instead, its about letting family members know when a person who may be suffering from mental health issues or was accused of domestic violence gets their guns back from policecustody.
Sheena Henderson was killed by
You have viewed 20 free articles or blogs allowed within a 30-day period. FREE registration is now required for uninterrupted access.
S-R Media, The Spokesman-Review and Spokesman.com are happy to assist you. Contact Customer Service by email or call 800-338-8801
OLYMPIA Family and friends of a woman killed by her husband at a Spokane hospital last July tried to make it clear Monday they are not anti-gun. They arepro-warning.
Although a gun-rights group questioned whether Sheena Hendersons law would infringe on the Second Amendment, her father Gary Kennison said the proposal has nothing to do with taking guns away from people. Instead, its about letting family members know when a person who may be suffering from mental health issues or was accused of domestic violence gets their guns back from policecustody.
Sheena Henderson was killed by her husband, Christopher Henderson, last July. Christopher had been evaluated by law enforcement as a potential suicide risk less than 24 hours earlier, but after he had been cleared by Spokane Valley officers, he retrieved a gun from the Spokane Police Department that had been seized during an earlier suicide attempt; he went to Deaconess where Sheena worked, fatally shot her, then killedhimself.
The family assumed the gun was still in police custody, said Kennison, who was at the Spokane County Courthouse trying to get a restraining order that would have kept Christopher away from Sheena and allowed Deaconess to bar him from the area where she worked. Had I been notified that his gun had been retrieved, she would have been standing beside me at thecourthouse.
The proposed law would set up a three-day waiting period for the return of a gun seized under certain circumstances, and family notification that the return has beenrequested.
Continue reading here:
Washingtons Sheenas Law presented to committee - Tue, 10 Feb 2015 PST
First Amendment Aliyah Kelly
First Amendment-- Created using PowToon -- Free sign up at http://www.powtoon.com/join -- Create animated videos and animated presentations for free. PowToon is a free tool that allows you...
By: Aliyah Tatenbach
Read more:
Court rules that publishing drivers license details broke the lawand First Amendment is no defense
In what could prove to be a consequential decision, the US Court of Appeals for the Seventh Circuit ruled Friday that the Chicago Sun-Times improperly obtained and disclosed personal information from motor vehicle records, and that the papers actions were not protected by the First Amendment. The decision by a three-judge panel allows a lawsuit against the paper, brought by five Chicago police officers who claim their privacy rights were violated, to proceed.
With its ruling, the court tackled a question that US courts have rarely if ever addressed: whether the First Amendment protects the publication of material that the press itself has unlawfully acquired. In this case, the judges ruled, it does notpartly because, in the courts view, the material in question was of marginal public value.
The cases underlying facts are colorful and tragic. In 2004, R.J. Vanecko, a nephew of Richard M. Daley, then the mayor of Chicago, had been drinking for eight hours before he punched a 21-year-old man, David Koschman, outside a Division Street bar. Koschman fell and hit his head, and died days later of a brain injury.
The Chicago Police Department investigated the incident, and at one point placed Vanecko in an eyewitness lineup, with five officers acting as fillers. Eyewitnesses failed to identify Vanecko as the perpetrator, so no charges were filed and the department closed the investigation in March 2011.
But suspicions lingered that the department had manipulated its investigation to protect Vanecko because of his family connections. The Sun-Times dug into the case and published a series of reports criticizing the investigation, including a Nov. 21, 2011, story about the Vanecko lineup. Under the headline Daley Nephew Biggest Guy on Scene, But Not in Lineup, the story suggested that several of the officers too closely resembled Vanecko for the lineup to be reliable.
The Sun-Times published lineup photos and the fillers names, along with their birth months and years, their heights and weights, and their hair and eye colors. The paper obtained the photos and names from the police department through a public records request. But apparentlyand crucially, for the legal analysisthe paper obtained the officers physical information from motor vehicle records maintained by the Illinois Secretary of State.
Eventually, a special prosecutor investigated Koschmans death, and in December 2012, eight years after the fatal incident, Vanecko was indicted and charged with one count of involuntary manslaughterto which he pleaded guilty in January 2014.
Along the way, the case took a bizarre turn: The officers sued the Sun-Times, claiming the paper had violated the federal Drivers Privacy Protection Act (DPPA) by publishing their physical information.
The DPPA and personal information
Continue reading here:
A new search engine being developed by DARPA aims to shine a light on the dark web and uncover patterns and relationships in online data to help law enforcement and others track illegal activity.
The project, dubbed Memex, has been in the works for a year and is being developed by 17 different contractor teams who are working with the militarys Defense Advanced Research Projects Agency. Google and Bing, with search results influenced by popularity and ranking, are only able to capture approximately five percent of the internet. The goal of Memex is to build a better map of more internet content.
The main issue were trying to address is the one-size-fits-all approach to the internet where [search results are] based on consumer advertising and ranking, says Dr. Chris White, the program manager for Memex, who gave a demo of the engine to the 60 Minutes news program.
To achieve this goal, Memex will not only scrape content from the millions of regular web pages that get ignored by commercial search engines but will also chronicle thousands of sites on the so-called Dark Websuch as sites like the former Silk Road drug emporium that are part of the TOR networks Hidden Services.
These sites, which have .onion web addresses, are accessible only through the TOR browser and only to those who know a sites specific address. Although sites do exist that index some Hidden Services pagesoften around a specific topicand there is even already a search engine called Grams for uncovering sites selling illicit drugs and other contraband, the majority of Hidden Services remain well under the radar.
White says part of the Memex project is aimed at determining just how much of TOR traffic is related to Hidden Services sites. The best estimates before were in the single digitsin the one-thousands, he says. But we think there are, at any given time, between 30,000 and 40,000 Hidden Service Onion sites that have content on them that one could index.
The content on Hidden Services is publicin the sense that its not password protectedbut is not readily accessible through a commercial search engine. Were trying to move toward an automated mechanism of finding [Hidden Services sites] and making the public content on them accessible, White says. The DARPA team also wants to find a way to better understand the turnover of such sitesthe relationships that exist for example between two sites when one goes down and a seemingly unrelated site pops up.
But the creators of Memex dont want just to index content on previously undiscovered sites. They also want to use automated methods to analyze that content in order to uncover hidden relationships that would be useful to law enforcement, the military, and even the private sector. The Memex project currently has eight partners involved in testing and deploying prototypes. White wont say who the partners are but they plan to test the system around various subject areas or domains. The first domain they targeted were sites that appear to be involved in human trafficking. But the same technique could be applied to tracking Ebola outbreaks or any domain where there is a flood of online content, where youre not going to get it if you do queries one at a time and one link at a time, he says.
In a demo conducted for 60 Minutes, Whites team showed how law enforcement could possibly track the movement of peopleboth trafficked and traffickersbased on data related to online advertisements for sex. The 60 Minutes piece wasnt clear about how this was done and appeared to focus on the IP address of where the ads were hosted, implying that tracking where an ad moves from one IP address to another could reveal to law enforcement where the trafficker is located. But White says the IP address is the least important information they analyze. Instead they focus on other data points.
Sometimes its a function of IP address, but sometimes its a function of a phone number or address in the ad or the geolocation of a device that posted the ad, he says. There are sometimes other artifacts that contribute to location.
View post:
2-5-15 The Age of Cryptocurrency - Michael Casey
Host Kevin Price and Guest Michael Casey his new book, "The Age of Cryptocurrency" on this segment of the Price of Business. Kevin Price is host of the Price...
By: Kevin Price
Read the rest here:
OneCoin Cryptocurrency OneCoin China OneCoin Thailand
If you looking forward Passive income. One coin Business may be Answer for you. ...
By: OnecoinU ThaiLand
Original post:
OneCoin Cryptocurrency OneCoin China OneCoin Thailand - Video
Andreas Antonopoulos Comes and Speaks at our Monthly Bitcoin Meetup!
Andreas Antonopoulos, a bitcoin and cryptocurrency expert, serves as a mentor for Plug and Play #39;s FinTech Bitcoin program. On Monday, January 31st, 2015, A...
By: PlugandPlayTC
Excerpt from:
Andreas Antonopoulos Comes and Speaks at our Monthly Bitcoin Meetup! - Video