Daily Archives: September 20, 2014

Former CIA Spy: NSA And DHS Have Not Prevented A Single Terrorist Attack – Video

Posted: September 20, 2014 at 9:48 am


Former CIA Spy: NSA And DHS Have Not Prevented A Single Terrorist Attack
Alex Joens talks with former CIA spy Robert David Steele about the state of America. http://www.infowars.com/house-approves-plan-to-arm-and-train-isis-to-fight-isis/ Follow Alex on TWITTER...

By: TheAlexJonesChannel

Read more here:
Former CIA Spy: NSA And DHS Have Not Prevented A Single Terrorist Attack - Video

Posted in NSA | Comments Off on Former CIA Spy: NSA And DHS Have Not Prevented A Single Terrorist Attack – Video

NSA & The Snowden Trilogy All Campaign(er)s Are Now False – Morris – Video

Posted: at 9:48 am


NSA The Snowden Trilogy All Campaign(er)s Are Now False - Morris
Link to the Gaza refugees drowning by Malta: http://mondoweiss.net/2014/09/sinking-hundreds-fleeing Link to the Ship from Liberia with sick people: http://www.theorganicprepper.ca/ship-from-liberi...

By: 108morris108

Original post:
NSA & The Snowden Trilogy All Campaign(er)s Are Now False - Morris - Video

Posted in NSA | Comments Off on NSA & The Snowden Trilogy All Campaign(er)s Are Now False – Morris – Video

Reza Nsa Bom Parto Tv Serra Azul Porangatu GO SAN – Video

Posted: at 9:48 am


Reza Nsa Bom Parto Tv Serra Azul Porangatu GO SAN

By: Tv Serra Azul - Porangatu/GO

See the original post:
Reza Nsa Bom Parto Tv Serra Azul Porangatu GO SAN - Video

Posted in NSA | Comments Off on Reza Nsa Bom Parto Tv Serra Azul Porangatu GO SAN – Video

Angry NSA Employee Denies NSA Collects Information on Americans (Video)

Posted: at 9:48 am

An NSA employee wearing name tag Neal Z. recently attended the the University of New Mexicos Engineering and Science Career Fair.

The NSA rep was trying to recruit college students to work at the controversial agency, which collects tons of metadata, emails, phone calls and various other information on American citizens.

University of New Mexico grad Andy Beale and student Sean Potter asked Neal Z. about the massive collection of information by the NSA, reports The Intercept.

Beale and Potter filmed the incident from two angles (videos below).

Amazingly, Neal Z. claimed, "NSA is not permitted to track or collect intelligence on U.S. persons.

However, after NSA leaker Edward Snowden revealed the mass surveillance of Americans by the NSA, the director of national intelligence, James Clapper, admitted to Sen. Ron Wyden (D-Ore.) in an April letter that the NSA does collect information on Americans, noted The Guardian.

In June, the NSA admitted it was spying on American phone calls, reported CNET, and even the phone habits of the U.S. Congress, according to The New American.

Later, Neal Z. admitted the NSA does collect data under the guidance of the (secret) FISA court, which is not open or accountable to the public.

After Beale and Potter politely debunked several of Neal Z's claims, Neal Z. angrily threatened to call authorities to silence the two Americans: You do not know what youre talking about. If you dont leave soon, Im going to call university security to get you out of my face.

Neal Z. tried to grab Potter's iPhone, but it was Potter and Beale who were removed from the fair by campus police for causing a disturbance.

Excerpt from:
Angry NSA Employee Denies NSA Collects Information on Americans (Video)

Posted in NSA | Comments Off on Angry NSA Employee Denies NSA Collects Information on Americans (Video)

Civics- The Fifth Amendment (Sarah Hutchinson) – Video

Posted: at 9:47 am


Civics- The Fifth Amendment (Sarah Hutchinson)
Civics.

By: Sarah Hutchinson

Read the rest here:
Civics- The Fifth Amendment (Sarah Hutchinson) - Video

Posted in Fifth Amendment | Comments Off on Civics- The Fifth Amendment (Sarah Hutchinson) – Video

Apple And Google Will Force A Legal Battle Over The Privacy Of Your Passcode

Posted: at 9:47 am

Apple is really serious about privacy, guys.

Apple Apple wants the world to know that its really, really serious about privacy. Accompanying the launch of the iPhone 6 and iOS 8 was a personal letter from Apple CEO Tim Cook about the companys commitment to privacy and a new, revamped page about all-things-privacy on iDevices and a how-to guide for setting preferences to up your privacy if youre an iUser. Apple has long used privacy to differentiate itself from the competition; back in 2010, Steve Jobs said Apple always had a very different view of privacy than some of our colleagues in the Valley. We take privacy extremely seriously. Cook repeated the sentiment more strongly in his letter, taking direct aim at Google Google, saying Apple doesnt build a profile of its users or read their messages to get information to market to you.

Apple is getting serious about privacy because it has to. It wants the iPhone to become the only thing you need beyond oxygen. The iPhone is not just for communication and web browsing anymore. It wants to track your health (with HealthKit), be your wallet (with Apple Pay), and control the devices in your home (with HomeKit). Depending on how personalized the iPhone 6s vibration capabilities get, it could be your iSignificantOther. This is all set against the backdrop of concern about tech companies guardianship of our personal information amid the Snowden leaks. So Apple did something very smart. It announced that with iOS 8, the data encrypted on iPhones will only be able to be unlocked with your passcode. Unlike ourcompetitors, Apple cannot bypass your passcode and therefore cannot access this data, Apple wrote on its privacy page. So its not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS8.

So now, if law enforcement wants into your phone, theyll need to get you to enter your passcode. One Apple competitor felt the heat. Google-owned Android quickly issued an us, too! announcement, saying that its next operating system will also encrypt data on smartphones by default for those using a passcode. Privacy advocates are thrilled. Its not just about making it easier to protect civil liberties in the U.S. but exporting it to countries with restrictive governments where it will now be harder to get dissidents iPhone chats.

But former federal prosecutor and legal expert Orin Kerr was not thrilled. He says that if the po-po have a warrant, they should be able to get into a phone, and that Apple is making it harder for them to conduct lawful searches. People encrypting the content of their devices is not common practice now, but moving forward, it could become widespread, and law enforcement will have to force people to hand over or enter their passcodes in order to get evidence from those devices. Thats where the legal showdown will happen.

If the government obtains a subpoena ordering the person to enter in the passcode, and the person refuses or falsely claims not to know the passcode, a person can be held in contempt for failure to comply, writes Kerr.

Thats actually disputed legal territory. Back in 2012, Hanni Fakhoury, a lawyer at civil liberties group EFF, explored the issue of decryption as a Fifth Amendment issue. Is refusing to enter the passcode to your device the same as refusing to give incriminating testimony and pleading the Fifth? There is conflicting law on the issue.

A district court judge in Colorado ruled(PDF) that Ramona Fricosu could be forced to decryptinformation on a computer seized by law enforcement in connection with a mortgage fraud case.But the 11th Circuit Court of Appeals in Atlanta ruled (PDF) that the 5th Amendment prevented the government from forcing a suspect in a child pornography investigation to decrypt the contents of several computers and drives seized by law enforcement.

In one case, the court ruled that law enforcement already knew what it wanted off the computer and could get it. In the other, the court ruled that law enforcement was trying to force the alleged child porn possessor to testify against himself by performing the decryption.

Kerr thinks the Fifth Amendment shouldnt protect people against decrypting evidence that will be used against them, citing a 2009 case from Vermont, but suggests that if this turns out to be a problem, Congress should pass a new law upping the penalties beyond a simple contempt charge for people who wont hand over their passcodes, or pass a law forcing tech companies to design their systems in such a way that they can bypass the passcode.

Read the original:
Apple And Google Will Force A Legal Battle Over The Privacy Of Your Passcode

Posted in Fifth Amendment | Comments Off on Apple And Google Will Force A Legal Battle Over The Privacy Of Your Passcode

The Fourth Amendment By Maison Erdman – Video

Posted: at 9:47 am


The Fourth Amendment By Maison Erdman
description.

By: Monkey5EM

Go here to see the original:
The Fourth Amendment By Maison Erdman - Video

Posted in Fourth Amendment | Comments Off on The Fourth Amendment By Maison Erdman – Video

Great privacy essay: Fourth Amendment Doctrine in the Era of Total Surveillance

Posted: at 9:47 am

When you signed up with your ISP, or with a wireless carrier for mobile devices, if you gave it any thought at all when you signed your name on the contract, you likely didn't expect your activities to be a secret, or to be anonymous, but how about at least some degree of private? Is that reasonable? No, as the law currently suggests that as a subscriber, you "volunteer" your personal information to be shared with third-parties. Perhaps not the content of your communications, but the transactional information that tells things like times, places, phone numbers, or addresses; transactional data that paints a very clear picture of your life and for which no warrant is required.

I'd like to direct your attention to an essay titled "Failing Expectations: Fourth Amendment Doctrine in the Era of Total Surveillance" by Olivier Sylvain, Associate Professor of Law at Fordham University School of Law. He said, "Today's reasonable expectation test and the third-party doctrine have little to nothing to offer by way of privacy protection if users today are at least conflicted about whether transactional noncontent data should be shared with third parties, including law enforcement officials."

Reasonableness is all-important when it comes to the law...what a reasonable person would expect, such as a reasonable expectation of privacy. Although you may try to hold onto your privacy, you also know that most of what you do online can be discovered. "Every moment that a user is connected to the network has become an opportunity to be surveilled by law enforcement and national security agencies." Since we are not all criminals and terrorists, how is that reasonable?

Regarding our cell phones, is it reasonable that our "telecommunication carrier, smartphone manufacturer and others are aware of the location of their cell phone at any given time" because we happened to buy a specific model of phone, signed up with a carrier or installed apps? Additionally, "service providers and governments have forged a public-private collaboration through which law enforcement officials obtain location information about user accounts." In fact, the more we come to accept being tracked, to having our data sold, traded and shared, the more it gnaws away at what the public can consider a reasonable expectation of privacy. Sadly, the new normal is that the Fourth Amendment is in tatters.

For some, ignorance may be bliss; for none, however, is ignorance an excuse in the eyes of the law. Take the third-party doctrine, for example. Sylvain wrote, "Courts have presumed that users consent to the public disclosure of transactional data when they volunteer them to their service providers. The third-party doctrine presumes that, when users share it with third-party service providers, they convey an expectation that the information is not private. And 'it is not a defense that defendants do not control or know about the role of the third-party service provider'."

In the courts, judges want guidance from legislatures, but let's face it; the majority of Congress couldn't fill a thimble with their combined technical prowess. Yet these individuals are working on legislation that eventually determines what can and cannot be done...what is or is not the public's reasonable expectation of privacy.

Sylvain argues that "the reasonable expectation standard is particularly flawed if it has the effect of encouraging judges to seek guidance from legislatures on constitutional norms and principles. Judicial review is the vital antimajoritarian check against excessive government intrusions on individual liberty under our constitutional scheme. This is a responsibility that courts cannot pass off to the political branches when, as is the case today, most people expect that the cost of network connection is total surveillance."

He adds that "court-administered privacy law doctrine must change if the protection against 'unreasonable searches and seizures' is to have any positive legal meaning. The current court-created doctrine will not be able to keep up if it compels judges to measure public expectation. It is time for courts to reassert their positive duty to say what privacy law is."

The reasonable expectation standard and the third-party doctrine have outlived their time and usefulness. Reform is especially urgent today, in the era of total surveillance, when data brokers and governments can aggregate and trade transactional subscriber data about electronic communications so easily. Expectations are difficult to define when everyone, it seems, shares their personal information with service providers and application developers in order to be connected.

Courts should "bring a needed dose of reality to Fourth Amendment analysis by excising any broad assumptions about the nature of user consent in the third-party doctrine. This reform would recognize that users do not generally choose to compromise their data about their phone use (or web browsing or e-mailing) just because they disclose information for the limited purpose of obtaining telecommunications service. Participation in the networked information economy is practically a necessity today."

The rest is here:
Great privacy essay: Fourth Amendment Doctrine in the Era of Total Surveillance

Posted in Fourth Amendment | Comments Off on Great privacy essay: Fourth Amendment Doctrine in the Era of Total Surveillance

Judge expounds on privacy rights

Posted: at 9:47 am

EUREKA SPRINGS -- If you're stopped for a moving traffic violation, does the officer have the right to search your vehicle without a warrant? Ask to look at your cell phone? Detain you for longer than 15 minutes?

Judge Kent Crow addressed those and other questions last week at a program on the Fourth Amendment to the Constitution, given to the local chapter of the Daughters of the American Revolution. What he finds fascinating about the amendment, which protects against unreasonable search and seizure:

"It's an absolute mess," he said. "It has created more litigation than any other amendment."

Crow, whose ancestors fought in the American Revolution, said the Fourth Amendment was a response to English writs of assistance, which gave the king's men the right to enter a home and search it any time they wanted.

"We are a nation of thieves," Crow said. "We were smugglers. We didn't want to pay the king's tax."

What the Fourth Amendment prevents: officers from crossing the threshold of your home without a search warrant specifying what (or who) they are looking for, and where it is likely to be found. If they have a warrant to search your computer, for example, they cannot go through your bedroom drawers or open the refrigerator, he said.

If, however, officers knock on your door and ask to come in and you admit them, then they are free to search the house, he said, something people may not be aware of. There is also a "knock and announce" law, meaning that with a search warrant, they can enter the house after waiting a reasonable time for someone to answer the door. They can also enter your home if there are exigent circumstances, meaning immediate concerns of an emergency nature, for example, for the safety of a person inside.

Once you are served with a search warrant, officers will proceed to the area specified and search while you peruse the warrant, Crow said. If the search is improperly conducted, you can challenge the evidence in court.

Fourth Amendment rulings have had a hard time keeping up with changing technology, Crow said, which have opened up more ways "the king's men" can cross your threshold. The general rule: If you are in a place where you have a reasonable expectation of privacy, for example, in a fenced backyard surrounded by shrubs, the Fourth Amendment protects you from government entry or surveillance.

"The right of privacy keeps expanding," he said.

Go here to read the rest:
Judge expounds on privacy rights

Posted in Fourth Amendment | Comments Off on Judge expounds on privacy rights

Ted Nugent on the Second Amendment – Video

Posted: at 9:47 am


Ted Nugent on the Second Amendment
Ted Nugent speaking on CNN about the Second Amendment and gun rights. Twitter: https;//twitter.com/TheSecondAmdmt Tumblr: https;//TheSecondAmdmt.tumblr.com.

By: The Second Amendment

Link:
Ted Nugent on the Second Amendment - Video

Posted in Second Amendment | Comments Off on Ted Nugent on the Second Amendment – Video