Daily Archives: September 17, 2014

NSA reform bill stalled with Congress headed toward fall recess

Posted: September 17, 2014 at 10:47 am

Members of Congress are set to leave Washington for an extended fall recess in a few days

The U.S. Congress is unlikely to pass legislation to end the National Security Agency's widespread collection of U.S. telephone records before leaving Washington, D.C., on a two-month break.

Congress is scheduled to leave town for its fall recess by the end of this week, with the USA Freedom Act still awaiting action in the Senate. Members of Congress will head back to their home districts to campaign for November's elections, with all members of the House of Representatives and a third of the Senate on the ballot.

The USA Freedom Act, with significant support in the House and the Senate, still has some lawmakers questioning whether reining in the NSA's phone records collection program would hurt the U.S. government's war on terrorism.

Absent congressional action, the U.S. Department of Justice and the Office of the Director of National Intelligence announced late Friday that they have asked for, and received, court authorization to continue the telephone records collection program. The U.S. Foreign Intelligence Surveillance Court reauthorized the program to continue until Dec. 5, with some limits proposed by President Barack Obama earlier this year.

It's important to "maintain the capabilities" of the telephone records program, "given that legislation has not yet been enacted," the two agencies said in a joint statement.

The House passed a watered-down version of the USA Freedom Act in May, but several senators have pushed for a pumped up version that they say would end the NSA's bulk collection of U.S. phone records.

The Senate version of the bill has even won the support of U.S. Attorney General Eric Holder and Director of National Intelligence James Clapper. But Congress has several other issues to deal with in coming days, including a continuing resolution to continue funding the government and a request from President Barack Obama to assist a fight against the Islamic State of Iraq and al-Sham [ISIS] in the Middle East.

Earlier this month, just after Congress returned from its summer recess, four tech trade groups urged the Senate to pass the USA Freedom Act.

Supporters of the bill said they're disappointed Congress hasn't passed the bill, but suggested it may still have life in a so-called lame duck session following November's election. Congress could also start over with a new bill after new members are seated in January.

Visit link:
NSA reform bill stalled with Congress headed toward fall recess

Posted in NSA | Comments Off on NSA reform bill stalled with Congress headed toward fall recess

Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying

Posted: at 10:47 am

The National Security Agency has some of the brightest minds working on its sophisticated surveillance programs, including its metadata collection efforts. But a new chat program designed by a middle-school dropoutin his spare time may turn out to be one of the best solutions to thwart those efforts.

Prompted by Edward Snowdens revelations about the governments intrusive surveillance activities, loosely knit citizen militias of technologists and security professionals have cropped up around the world to develop systems to protect us from government agencies out to identify us online and grab our communications.

John Brooks is now among them.

Brooks, who is just 22 and a self-taught coder who dropped out of school at 13, was always concerned about privacy and civil liberties. Four years ago he began work on a program for encrypted instant messaging that uses Tor hidden services for the protected transmission of communications. The program, which he dubbed Ricochet, began as a hobby. But by the time he finished, he had a full-fledged desktop client that was easy to use, offered anonymity and encryption, and even resolved the issue of metadatathe to and from headers and IP addresses spy agencies use to identify and track communicationslong before the public was aware that the NSA was routinely collecting metadata in bulk for its spy programs. The only problem Brooks had with the program was that few people were interested in using it. Although hed made Ricochets code open source, Brooks never had it formally audited for security and did nothing to promote it, so few people even knew about it.

Ricochet is idiot-proof and anonymous.

Then the Snowden leaks happened and metadata made headlines. Brooks realized he already had a solution that resolved a problem everyone else was suddenly scrambling to fix. Though ordinary encrypted email and instant messaging protect the contents of communications, metadata allows authorities to map relationships between communicants and subpoena service providers for subscriber information that can help unmask whistleblowers, journalistss sources and others. Its not just these kind of people whose privacy is harmed by metadata, however; in 2012 it was telltale email metadata that helped unmask former CIA director and war commander General David Petraeus and unravel his affair with Paula Broadwall.

With metadata suddenly in the spotlight, Brooks decided earlier this year to dust off his Ricochet program and tweak it to make it more eleganthe knew hed still have a problem, however, getting anyone to adopt it. He wasnt a known name in the security world and there was no reason anyone should trust him or his program.

Enter Invisible.im, a group formed by Australian security journalist Patrick Gray. Last July, Gray announced that he was working with HD Moore, developer of the Metasploit Framework tool used by security researchers to pen-test systems, and with another respected security professional who goes by his hacker handle The Grugq, to craft a secure, open-source encrypted chat program cobbled together from parts of existing anonymity and messaging systemssuch as Prosody, Pidgin and Tor. They wanted a system that was highly secure, user friendly and metadata-free. Gray says his primary motivation was to protect the anonymity of sources who contact journalists.

At the moment, when sources contact a journalist, theyre going to leave a metadata trail, whether its a phone call record or instant message or email record [regardless of whether or not the content of their communication is encrypted], he says. And that data is currently accessible to authorities without a warrant.

When Brooks wrote to say hed already designed a chat program that eliminated metadata, Gray and his group took a look at the code and quickly dropped their plan to develop their own tool, in favor of working with Brooks to develop his.

See more here:
Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying

Posted in NSA | Comments Off on Middle-School Dropout Codes Clever Chat Program That Foils NSA Spying

NRA Endorses Tom Corbett for Governor in Pennsylvania

Posted: at 10:47 am

press release from the NRA:

On behalf of our five million members across the country, the National Rifle Association Political Victory Fund (NRA-PVF) is proud to endorse Tom Corbett for Governor in Pennsylvania.

Based on his support of and commitment to the Second Amendment, Corbett has earned an A rating from the NRA-PVF in the 2014 general election. An A rating is reserved for a solidly pro-gun candidate who has supported the NRAs position on issues of importance to gun owners and sportsmen.

Tom Corbett has stood up to the gun control crowd and protected our Second Amendment freedoms in Pennsylvania, said Chris W. Cox, chairman of the NRA-PVF. As Governor, he signed into law Castle Doctrine legislation expanding protection to law-abiding citizens for self-defense. Prior to that, when he served as Attorney General, Tom tripled the number of right-to-carry reciprocity agreements with other states allowing Pennsylvanians to better protect themselves and their families while traveling outside the Keystone state.

Gov. Corbett has a proven record supporting our fundamental, individual Right to Keep and Bear Arms. He believes hunting is a valuable tool for wildlife management, a positive use of natural resources, and an American tradition that teaches young people responsibility and respect for the outdoors. In addition, Corbett signed pro-gun friend of the court briefs in the landmark Heller and McDonald cases asserting that the Second Amendment guarantees a fundamental, individual right for all law-abiding Americans.

We can continue to count on Tom Corbett to stand up for our constitutional freedoms in Pennsylvania, added Cox. On behalf of the NRAs five million members, I want to thank Tom for his steadfast support of the Second Amendment and urge all NRA members, gun owners and sportsmen in Pennsylvania to vote Tom Corbett for Governor on November 4.

Follow this link:
NRA Endorses Tom Corbett for Governor in Pennsylvania

Posted in Second Amendment | Comments Off on NRA Endorses Tom Corbett for Governor in Pennsylvania

Growing Together: Mexico and the United States – Video

Posted: at 10:47 am


Growing Together: Mexico and the United States
On September 12, 2014, The McCain Institute co-hosted Growing Together: Mexico and the United States with the Center for American Progress at The First Amendment Forum at The Walter Cronkite...

By: The McCain Institute

Go here to read the rest:
Growing Together: Mexico and the United States - Video

Posted in First Amendment | Comments Off on Growing Together: Mexico and the United States – Video

The Constitution protects the rich, too

Posted: at 10:47 am

WE ARE, as it always seems, "at a pivotal moment in American history." At least that's what Sens. Tom Udall and Bernie Sanders maintained in a melodramatic Politico op-ed last week as they explained their efforts to repeal the First Amendment.

Let me retort in their language:

It's true that building the United States has been long, arduous and rife with setbacks. But throughout the years, the American people have repelled efforts to weaken or dismantle the First Amendment. We have weathered the Sedition Act of 1918, a law that led to the imprisonment of innocent Americans who opposed the war or the draft. Since then, we have withstood numerous efforts to hamper, chill and undermine basic free expression in the name of "patriotism." We have, however, allowed elected officials to treat citizens as if they were children by arbitrarily imposing strict limits on their free speech in the name of "fairness."

But nowadays, after five members of the Supreme Court upheld the First Amendment and treated all political speech equally, liberal activists and Democrats in the Senate would have us return to a time when government dispensed speech to favored institutions--as if it were the government's to give.

In 2010, the Supreme Court issued a 5-4 opinion striking down major parts of a 2002 campaign-finance reform law in Citizens United v. Federal Election Commission. This case and subsequent rulings, including McCutcheon v. FEC, have led to more political activism and more grass-roots engagement than ever before. In the 2012 presidential election, we quickly saw the results. More Americans voted than in any election; more minorities voted; more Americans engaged in more debate and had more information in their hands than ever before. More than 60 percent of all those super PAC funds came from just 159 donors, each of whom gave more than $1 million. And still, every vote held the same sway. You may be persuaded by someone, but no one can buy your vote. I wish the same could be said for your senators.

Read more here:
The Constitution protects the rich, too

Posted in First Amendment | Comments Off on The Constitution protects the rich, too

jitsi.org | Jitsi

Posted: at 10:46 am

Jitsi (formerly SIP Communicator) is an audio/video and chat communicator that supports protocols such as SIP, XMPP/Jabber, AIM/ICQ, Windows Live, Yahoo! and many other useful features.

Jitsi is Open Source / Free Software, and is available under the terms of the LGPL.

Videos from DebConf13 and ClueCon

We had a couple of interesting presentations of Jitsi and Jitsi Videobridge during the past two weeks when we attended DebConf 13 (video | article) in Switzerland and ClueCon (video | slides) in Chicago. We thought wed share them here for those whod like to check them out. In both of them we go over things such as using Videobridge for quality video conferences, combined use of SIP and XMPP through CUSAX, Jitsis existing and upcoming features and other interesting topics. Check them out!

The jitsi deb packages are now officially part of the Debian SID repositories! The first candidate was uploaded for approval on Dec 10, 2012 and now, after a good 8 months of productive communication with the Debian developers, exchanging comments and feedback and many package candidates, our efforts are finally rewarded. We believe our next stable release will be obtainable through official Debian repositories.

See the original post:
jitsi.org | Jitsi

Posted in Jitsi | Comments Off on jitsi.org | Jitsi

LXC Coin crowdfunds in challenge to Bitcoin

Posted: at 10:46 am

LXC Coin will work with a network of P2P lenders across the world, and could evolve into its own P2P vehicle over the coming years.

Unlike many other cryptocurrencies, the LXC Coin is real, according to Ellefsen. If crypocurrencies were banned tomorrow - and Russia is looking to do that right now - our coin would keep its value. You could reclaim your investment from us.

Cryptocurrencies havent been real money until now, he claims.

Bitcoin, which currently trades for around $500 per coin, is seen as a volatile currency by investors. It can lose up to 30pc of its value in a single day. LXC Coin will control supply and demand, much like a central bank, ensuring a consistent price for the coin.

Some 1.1bn of these new coins will be issued over the next four to five years.

The LXC Coin is based on the code from the worlds most famous cryptocurrency, Bitcoin, mixed with BlackCoin technology. Unlike Bitcoin, BlackCoin does not have to be mined. It is based on a proof of stake concept, which means that it has become a dominant digital currency through the sheer proliferation of coins held in wallets by users.

By using the BlackCoin model, LXC Coin does not require vast amounts of computing power and electricity to exist.

Customers must pay hard cash or exchange it for other digital currencies.

The company was founded in Denmark in 2012 and became a UK holding company in 2014.

Ellefsen chose to raise money on Crowd For Angels, the UKs FCA-regulated debt and equity platform, to generate awareness for the start-up and prove that its model was FCA compliant.

Original post:
LXC Coin crowdfunds in challenge to Bitcoin

Posted in Cryptocurrency | Comments Off on LXC Coin crowdfunds in challenge to Bitcoin

BitNwS Bitcoin – Video

Posted: at 10:45 am


BitNwS Bitcoin

By:

Go here to see the original:
BitNwS Bitcoin - Video

Posted in Bitcoin | Comments Off on BitNwS Bitcoin – Video

Bitcoin to the moon1 – Video

Posted: at 10:45 am


Bitcoin to the moon1
Bitcoin to $ 8000!!! Hey you, bring your bongos, tambourines, drums and boxes, and begin! Now, every night! Support this together! 1J8aCs3wQib5UEjBtWz8ZnfBsHpnnnNttx.

By: Shaman Voodoo

Original post:
Bitcoin to the moon1 - Video

Posted in Bitcoin | Comments Off on Bitcoin to the moon1 – Video

2014 – Mayday & Murs – Mursday – 10 Bitcoin Beezy – Video

Posted: at 10:45 am


2014 - Mayday Murs - Mursday - 10 Bitcoin Beezy
I DO NOT OWN THIS SONG . ALL COPYRIGHTS BELONG TO THEIR PRODUCERS/ARTISTS. FIND ME ON : https://www.facebook.com/pages/Dj-Pavan/580593958682450?fref=ts https://soundcloud.com/pavlosantonioudakis/tr...

By: Pavlos Antonioudakis

Link:
2014 - Mayday & Murs - Mursday - 10 Bitcoin Beezy - Video

Posted in Bitcoin | Comments Off on 2014 – Mayday & Murs – Mursday – 10 Bitcoin Beezy – Video