Monthly Archives: April 2014

ShmooCon 2014: The NSA: Capabilities and Countermeasures – Video

Posted: April 26, 2014 at 12:27 pm


ShmooCon 2014: The NSA: Capabilities and Countermeasures
For more information visit: http://bit.ly/shmooc14 To download the video visit: http://bit.ly/shmooc14_down Playlist Shmoocon 2014: http://bit.ly/shmooc14_pl...

By: Christiaan008

Continued here:

ShmooCon 2014: The NSA: Capabilities and Countermeasures - Video

Posted in NSA | Comments Off on ShmooCon 2014: The NSA: Capabilities and Countermeasures – Video

USA: NSA leaker Snowden is a hero, say Washington protesters – Video

Posted: at 12:27 pm


USA: NSA leaker Snowden is a hero, say Washington protesters

By: memo chan

More here:

USA: NSA leaker Snowden is a hero, say Washington protesters - Video

Posted in NSA | Comments Off on USA: NSA leaker Snowden is a hero, say Washington protesters – Video

An Inside Look at the NSA With Whistleblower William Binney (Part 2 of 2) – Video

Posted: at 12:27 pm


An Inside Look at the NSA With Whistleblower William Binney (Part 2 of 2)
In this video WeAreChange gets an unique inside look at inner workings and evolution of the NSA with NSA Whistleblower William Binney. Binney describes his work with the National Security...

By: WeAreChange

Continued here:

An Inside Look at the NSA With Whistleblower William Binney (Part 2 of 2) - Video

Posted in NSA | Comments Off on An Inside Look at the NSA With Whistleblower William Binney (Part 2 of 2) – Video

Hong Kong: Protesters blow whistles for NSA whistle blower – Video

Posted: at 12:27 pm


Hong Kong: Protesters blow whistles for NSA whistle blower
1. W/S Protesters march 2. C/U Protesters sign reads "We are on your side, Ed" 3. M/S Protesters with sign reading "Protect Snowden" 4. C/U Protesters signs ...

By: memo chan

Read more:

Hong Kong: Protesters blow whistles for NSA whistle blower - Video

Posted in NSA | Comments Off on Hong Kong: Protesters blow whistles for NSA whistle blower – Video

Full Show: Disband The NSA or; Corruption in the Capitol FO SHIZZLE {aTV002} – Video

Posted: at 12:27 pm


Full Show: Disband The NSA or; Corruption in the Capitol FO SHIZZLE {aTV002}
Viewer support keeps the show going: http://www.Patreon.com/AcronymTV Subscribe - http://bit.ly/VUl21B FOLLOW | Facebook: http://www.facebook.com/AcronymTV T...

By: Dennis Trainor, Jr

Read more from the original source:

Full Show: Disband The NSA or; Corruption in the Capitol FO SHIZZLE {aTV002} - Video

Posted in NSA | Comments Off on Full Show: Disband The NSA or; Corruption in the Capitol FO SHIZZLE {aTV002} – Video

NSA – Satu Hari Di Bulan Juni (TULUS) (COVER) – Video

Posted: at 12:27 pm


NSA - Satu Hari Di Bulan Juni (TULUS) (COVER)
We are #39;NSA #39; (Nurma Stephanie Ara). Sorry for the voice, enjoy our face. Find us on Twitter and Instagram; @nurmaaariani @StephanieAlf @maranatha_t Happy watching 🙂

By: Stephanie Alfiah

View post:

NSA - Satu Hari Di Bulan Juni (TULUS) (COVER) - Video

Posted in NSA | Comments Off on NSA – Satu Hari Di Bulan Juni (TULUS) (COVER) – Video

National Security Agency – Wikipedia, the free encyclopedia

Posted: at 12:27 pm

The National Security Agency (NSA) is a U.S. intelligence agency responsible for providing the United States government with encrypted communications (information assurance) and the reading of encrypted communications (signals intelligence) of other nations. The NSA also creates and maintains secure computer network operations for the U.S. Government and prepares for network warfare.[8]

Originating as a unit to decipher code communications in World War II, it was officially formed as the NSA by President Truman in 1952. Since then, it has become one of the largest of U.S. intelligence organizations in terms of personnel and budget,[6][9] operating under the jurisdiction of the Department of Defense and reporting to the Director of National Intelligence.

The NSA is tasked with the global monitoring, collection, decoding, translation and analysis of information and data for foreign intelligence and counterintelligence purposes, including surveillance of targeted individuals in U.S. territory. The agency is authorized to accomplish its mission through clandestine means,[10] among which are bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13]

The NSA is also responsible for the protection of U.S. government communications and information systems.[14] As part of the growing practice of mass surveillance in the United States, the NSA collects and stores all phone records of all American citizens.[15]

Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, the NSA has no authority to conduct human-source intelligence gathering, although it is often portrayed doing so in popular culture. Instead, the NSA is entrusted with coordination and deconfliction of SIGINT components of otherwise non-SIGINT government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[16]

As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

The NSA has been a matter of political controversy on several occasions in its short history. During the Watergate affair, as a result of A Congressional Inquiry led by Sen. Frank Church [17] it was revealed that the NSA, in collaboration with Britains secret listening post, GCHQ, had routinely intercepted the international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock.[18] A multi-year investigation by the European Parliament highlighted the NSA's role in economic espionage in a report entitled 'Development of Surveillance Technology and Risk of Abuse of Economic Information', in 1999.[19]

However, in 2013, the extent of the NSA's secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts phone and internet communications of over a billion people worldwide and tracks the movement of hundreds of millions of people using cellphones. It has also created or maintained security vulnerabilities in most software and encryption (by collaborating with, coercing, or infiltrating numerous technology companies), so that the majority of the internet is susceptible to cyber attacks from the NSA and other parties.

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau and Military Intelligence Branch, Section 8 (MI-8). It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army's organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy's cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[20][21]

MI-8 was also called the Black Chamber.[23] Headed by cryptologist Herbert Yardley, the Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the companys wires.[24]

Excerpt from:

National Security Agency - Wikipedia, the free encyclopedia

Posted in NSA | Comments Off on National Security Agency – Wikipedia, the free encyclopedia

National Speakers Association New Jersey Chapter NSA

Posted: at 12:27 pm

Home Board of Directors About Us Become a Member Find a Speaker Honorary Members Speaker Resources Member Activities Monthly Meetings Upcoming Events Speaker Opportunitites OnLine Payments Vendor Resources The Spirt of NSA Contact Us

Charles Fleisher is highly experienced speaker, mentor and life coach, having spoken to over 50,000 people during his career.

On October 10, 1988, Charles was the passenger in a vehicle driving at speeds over 100 miles an hour. The ride ended with him being thrown from the vehicle for over 100 feet, resulting in a broken neck and sustaining a paralyzing injury.Charles now devotes his life to sharing the awareness he has received from living with paralysis. He works with audiences and individuals to manage change and capitalize on difficulties.

In his recently released book, The Secret of Difficulties: 4 Steps to Turn Tragedies into Opportunities, Charles profiles individuals who have taken difficult situations and turned them into opportunities they would not have had if they had not had the difficulty in the first place. It provides 4 clear steps to take your own difficult situations and turn them into opportunities to improve your own work, organization, or personal life.

Your Story Blows Me Away: Secrets of Amazing Storytelling for Businesses

Speaker: Dave Leiber

Thursday, May 15, 2014

Stop beating around the bush. Get people to pay attention. Scrap those bullet points. Talk in a way that makes hearts flutter. Learn how to tell your story so that everyone who hears it cares and remembers. Columnist Dave Lieber has been working for more than 30 years to get his newspaper audiences to not turn the page on him. In today's world, it's harder than ever to get people to notice you. But there's one tried and true method that works every time. Dave will share his simple-to-use storytelling method and customize it for your industry. You can use these techniques immediately to increase sales, get that contract, and increase your loyal fan base whose members will help you, fund you, support you and care about you.

About Dave Lieber:

Continued here:

National Speakers Association New Jersey Chapter NSA

Posted in NSA | Comments Off on National Speakers Association New Jersey Chapter NSA

WikiLeaks' Julian Assange: NSA critics got lucky because agency had no PR strategy

Posted: at 12:27 pm

WikiLeaks founder Julian Assange, speaking by Skype at SXSW today. Daniel Terdiman/CNET

AUSTIN, Tex.--National security reporters are a new kind of political refugee, but for the first time they've had a extremely powerful opponent without an effective public relations strategy.

Those were two of the main points delivered by WikiLeaks founder Julian Assange during a teleconference interview at South by Southwest today.

Assange, speaking over Skype from the Ecuadorian Embassy in London, said that while the Internet had, over the last few years, been co-opted by the U.S. National Security Agency, the Pentagon, and other government organizations in what could amount to the "most aggressive form of state surveillance" ever created, critics had in some ways gotten lucky.

In the past, Assange said, the NSA had run a public relations strategy that relied on radio silence, to essentially not exist. But, he said, it appears that the intelligence agency was not prepared for the worldwide outcry that resulted from the release by former NSA contractor Edward Snowden of documents revealing the organization's massive surveillance efforts. "The Pentagon has [always had] that strategy of trotting out soldiers wrapped in flags trying to demonstrate bravery, but the NSA didn't have that strategy," Assange said. "We got lucky, because we ended up with an opponent that didn't have a PR strategy."

What that's meant, he suggested, is that while the NSA has almost certainly not curtailed its surveillance actions, it has come under much brighter scrutiny than ever before, with substantial coverage of what it does, and intense criticism, both at home and abroad. And that, though change may be slow, can only be a good thing.

To be sure, many of the leading voices in the community of critics of national-security surveillance have had to run from prosecution. Assange, for example, has been forced to hole up in the Ecuadorian Embassy in London for nearly two years to avoid prosecution. Similarly, Snowden is in exile in Russia, and four other vocal critics, Glenn Greenwald, Jacob Applebaum, Sarah Harrison, and Laura Poitras are all living outside the United States and Britain. Greenwald is in Brazil, while Applebaum, Harrison, and Poitras are all living in Berlin.

To be sure, those critics have lost much of their personal freedom, at least insofar as where they live and work, and as such have become what Assange called "a new type of [political] refugee."

In addition to Assange, both Snowden and Greenwald will be speaking to SXSW by teleconference.

At the same time, though, Assange said he and the others have a freedom few political critics, especially those on the run, have never had before. Thanks to the Internet, each can still work and criticize organizations like the NSA, and similar institutions abroad. And in Assange's own situation, because he is protected inside an embassy, he is outside the reach of British police or other attempts to silence him. "To some degree," he said, "it is every national security reporter's dream, to be in a land without police."

Link:

WikiLeaks' Julian Assange: NSA critics got lucky because agency had no PR strategy

Posted in NSA | Comments Off on WikiLeaks' Julian Assange: NSA critics got lucky because agency had no PR strategy

Fifth Amendment to the United States Constitution …

Posted: at 12:26 pm

The Fifth Amendment (Amendment V) to the United States Constitution is part of the Bill of Rights and protects against abuse of government authority.

The Amendment requires that felonies be tried only upon indictment by a grand jury; the Grand Jury Clause is one of the few provisions of the Bill of Rights not held to have been incorporated to the states, most of which have replaced grand juries. The Amendment also provides several trial protections, including the right against self-incrimination (held to also apply to custodial interrogations and before most government bodies) as well as the right to be tried only once ("double jeopardy") in federal court for the same offense. The Amendment also has a Due Process Clause (similar to the one in the 14th Amendment) as well as an implied equal protection requirement (Bolling v. Sharpe). Finally, the Amendment requires that the power of eminent domain be coupled with "just compensation" for those whose property is taken.

No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offense to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.[1]

Whether a crime is "infamous" is determined by the nature of the punishment that may be imposed, not the punishment that is actually imposed;[2] however, crimes punishable by death must be tried upon indictments. In United States v. Moreland, 258 U.S. 433 (1922), the Supreme Court held that incarceration in a prison or penitentiary, as opposed to a correction or reformation house, attaches infamy to a crime. In Mackin v. United States, 117 U.S. 348 (1886), the Supreme Court judged that "'Infamous crimes' are thus, in the most explicit words, defined to be those 'punishable by imprisonment in the penitentiary.'", while it later in Green v. United States 356 U.S. 165 (1957), stated that "imprisonment in a penitentiary can be imposed only if a crime is subject to imprisonment exceeding one year". Therefore an infamous crime is one that is punished by imprisonment for over one year. Susan Brown, a former defense attorney and Professor of Law at the University of Dayton School of Law, concluded: "Since this is essentially the definition of a felony, infamous crimes translate as felonies."[3]

Grand juries, which return indictments in many criminal cases, are composed of a jury of peers and operate in closed deliberation proceedings; they are given specific instructions regarding the law by the judge. Many constitutional restrictions that apply in court or in other situations do not apply during grand jury proceedings. For example, the exclusionary rule does not apply to certain evidence presented to a grand jury; the exclusionary rule states that evidence obtained in violation of the Fourth, Fifth or Sixth amendments cannot be introduced in court.[4] Also, an individual does not have the right to have an attorney present in the grand jury room during hearings. An individual would have such a right during questioning by the police while in custody, but an individual testifying before a grand jury is free to leave the grand jury room to consult with his or her attorney outside the room before returning to answer a question.

Currently, federal law permits the trial of misdemeanors without indictments.[5] Additionally, in trials of non-capital felonies, the prosecution may proceed without indictments if the defendants waive their Fifth Amendment right.

Grand jury indictments may be amended by the prosecution only in limited circumstances. In Ex Parte Bain, 121 U.S. 1 (1887), the Supreme Court held that the indictment could not be changed at all by the prosecution. United States v. Miller, 471 U.S. 130 (1985) partly reversed Ex parte Bain; now, an indictment's scope may be narrowed by the prosecution. Thus, lesser included charges may be dropped, but new charges may not be added.

The Grand Jury Clause of the Fifth Amendment does not protect those serving in the armed forces, whether during wartime or peacetime. Members of the state militia called up to serve with federal forces are not protected under the clause either. In O'Callahan v. Parker, 395 U.S. 258 (1969), the Supreme Court held that only charges relating to service may be brought against members of the militia without indictments. That decision was overturned in 1987, when the Court held that members of the militia in actual service may be tried for any offense without indictments.[6]

The grand jury indictment clause of the Fifth Amendment has not been incorporated under the Fourteenth Amendment.[7] This means that the grand jury requirement applies only to felony charges in the federal court system. While many states do employ grand juries, no defendant has a Fifth Amendment right to a grand jury for criminal charges in state court. States are free to abolish grand juries, and many (though not all) have replaced them with preliminary hearing.

The Double Jeopardy Clause encompasses four distinct prohibitions: subsequent prosecution after acquittal, subsequent prosecution after conviction, subsequent prosecution after certain mistrials, and multiple punishment in the same indictment.[9] Jeopardy "attaches" when the jury is empaneled in a jury trial, when the first witness is sworn in during a bench trial, or when a plea is accepted unconditionally.[10]

View original post here:

Fifth Amendment to the United States Constitution ...

Posted in Fifth Amendment | Comments Off on Fifth Amendment to the United States Constitution …