Daily Archives: December 22, 2014

Obama to call for end to NSA's bulk data collection

Posted: December 22, 2014 at 9:50 pm

Legislative overhaul: Under the Obama administration's proposal, the National Security Agency could obtain specific records only with permission from a judge, using a new kind of court order. Photo: AFP

Washington: The Obama administration is preparing to unveil a legislative proposal for a far-reaching overhaul of the National Security Agencys once-secret bulk phone records program in a way that if approved by Congress would end the aspect that has most alarmed privacy advocates since its existence was leaked last year, according to senior administration officials.

Under the proposal, they said, the NSA would end its systematic collection of data about Americans calling habits. The records would stay in the hands of phone companies, which would not be required to retain the data for any longer than normal. And the NSA could obtain specific records only with permission from a judge, using a new kind of court order.

In a speech in January, US President Barack Obama said he wanted to get the NSA out of the business of collecting call records in bulk while preserving the programs capabilities. He acknowledged, however, that there was no easy way to do so and had instructed Justice Department and intelligence officials to come up with a plan by March 28, this Friday, when the current court order authorising the program expires.

Advertisement

As part of the proposal, the administration has decided to ask the Foreign Intelligence Surveillance Court to renew the program as it currently exists for at least one more 90-day cycle, senior administration officials said. But under the plan the administration has developed and now advocates, the officials said, it would late undergo major changes.

The new surveillance court orders envisioned by the administration would require phone companies to swiftly provide records in a technologically compatible data format, including making available, on a continuing basis, data about any new calls placed or received after the order is received, the officials said.

They would also allow the government to seek related records for callers up to two calls, or "hops", removed from the number that has come under suspicion, even if those callers are customers of other companies.

The NSA now retains the phone data for five years. But the administration considered and rejected imposing a mandate on phone companies that they hold onto their customers calling records for longer than the 18 months that federal regulations already generally require a burden that the companies had resisted and that was seen as a major obstacle to keeping the data in their hands. A senior administration official said that intelligence agencies had concluded that the impact of that change would be small because older data is less important.

The NSA uses the once-secret call records program sometimes known as the 215 program, after Section 215 of the Patriot Act to analyse links between callers in an effort to identify hidden terrorist associates, if they exist. It was part of the secret surveillance program that then president George W. Bush unilaterally put in place after the terrorist attacks of September 11, 2001, outside of any legal framework or court oversight.

Link:
Obama to call for end to NSA's bulk data collection

Posted in NSA | Comments Off on Obama to call for end to NSA's bulk data collection

As chances of NSA reform fade, opinions remain strong

Posted: at 9:50 pm

A total of 19 months after NSA contractor Edward Snowden disclosed details of the National Security Agencys massive surveillance program, the debate has simmered down and a legislative fix looks unlikely.

At the heart of Snowdens disclosures was that the NSA has access to meta-data of millions of phone calls and is also able to access emails, transcripts from online chats and troves of other data directly from internet companies.

While several bills have been introduced and even voted on in Congress, a legislative fix looks unlikely.

In July of 2013, the Amash-Conyers Amendment, sponsored by Rep. Justin Amash, R-Michigan, and Rep. John Conyers, D-Michigan, would have effectively ended NSA collection of data, but narrowly failed the House of Representatives by a vote of 217-205. 211 votes were needed for the bill to pass that day.

More recently, the USA Freedom Act, which would have made some reforms passed the House by a vote of 303-121 in May. Amash sponsored the original bill, but voted against it because it was watered down after changes were made and in his opinion, did not go far enough in reforms. While it passed the House, it failed in the Senate in November, when it could not receive 60 votes to move forward.

One of the bills sponsor, Sen. Patrick Leahy, D-Vermont, blamed the failure on other Senators who were fear mongering, thus stalling debate on the bill.

The program has seen some challenges in court. Several district courts have heard the case against the program, one judge in the D.C. district court called the program likely unconstitutional and almost Orwellian, but other courts have issued opinions in favor of the program.

Dirk Deam, senior lecturer in political science at Iowa State, said the court challenges will likely not spur any changes, rather it is up to Congress.

Itll be up to Congress. At the root of this is application of the Foreign Intelligence Surveillance Act, which is an act of Congress, Deam said. Almost all the issues surrounding things that have been leaked are connected to FISA, so to the extent that people are going to react to that, theyre going to have to [make changes] through legislation.

Several students at Iowa State said they do not approve of the program.

Continue reading here:
As chances of NSA reform fade, opinions remain strong

Posted in NSA | Comments Off on As chances of NSA reform fade, opinions remain strong

Child molester refuses to testify at Etan Patz trial

Posted: at 9:50 pm

A convicted Pennsylvania child molester long suspected of kidnapping and killing Etan Patz will not take the stand at the trial of another man accused of the horrific crime, a Manhattan judge ruled Monday.

Sicko Jose Ramos, 71, indicated through his lawyer that hed invoke his Fifth Amendment right if called to testify at Pedro Hernandezs trial set begin early next year.

Justice Maxwell Wiley sided with Prosecutor Joan Illuzzi-Orbon who argued that it would be confusing for jurors if Ramos took the stand only to refuse to answer questions.

Defense lawyer Harvey Fishbein intends to cast doubt on Hernandezs guilt by portraying Ramos as the real perpetrator at trial, court papers show.

Hernandez, 53, confessed to the crime in 2012 but later recanted.

Convicted child molester Jose Ramos, left, and Pedro Hernandez, who is accused of abducting and killing Etan Patz in 1979.Photo: AP

Wiley will permit the defense to introduce damning statements Ramos made to investigators in 1988 and other incriminating evidence about his long history of preying on young boys, he said in court Monday.

Ramos told New York detectives and a federal prosecutor that he was 90 percent sure he was with Etan, 6, the day he vanished May 25, 1979.

He claimed hed lured the boy to his apartment but didnt kidnap or kill him.

Ramos is not the type to just seize a boy on the street and sexually abuse him, hes the type that lures, entices, engages the individual to come with him, said Fishbein.

More:
Child molester refuses to testify at Etan Patz trial

Posted in Fifth Amendment | Comments Off on Child molester refuses to testify at Etan Patz trial

Elijah P Lovejoy, First Amendment Rally, August 21, 2013 – Video

Posted: at 9:49 pm


Elijah P Lovejoy, First Amendment Rally, August 21, 2013
Sandra Dragoo is one of many speakers at this event. This video is copyrighted and portions may not be used without written permission.

By: Springfield Illinois Tea Party

Read more:
Elijah P Lovejoy, First Amendment Rally, August 21, 2013 - Video

Posted in First Amendment | Comments Off on Elijah P Lovejoy, First Amendment Rally, August 21, 2013 – Video

Threats and Sensibilities: Presidents Kim, Lynton and Mason

Posted: at 9:49 pm

December 20 and 22, 2014, 10:00 a.m. The University of Iowa should consider developing a course for entering undergraduates first semester that exposes them to the values underlying the First Amendment, the history of protest movements in this country and on this very campus.

-- Nicholas Johnson

So it is with free speech its a good idea, and also the law. With two distinctions from the law of gravity.

(1) The law doesnt always apply.

Although the First Amendment to our Constitution merely forbids Congress to make a law abridging the freedom of speech, or of the press, the courts interpret congress to mean all government action things done by city councils, school boards, and yes, state universities like the University of Iowa. But that means the First Amendment gives you no protection from restrictions on your speech at the family dinner table, or in the corporate workplace.

Courts also permit governments to restrict freedom of speech in a variety of contexts how companies can advertise and label their products and new stock offerings, restrictions on sound trucks blasting messages throughout suburban neighborhoods after midnight, and a prohibition on airline passengers telling jokes as they pass through TSA security.

(2) And even when free speech is legally protected, its not free.

Speech is free like food is free in a Michelin four-star Paris restaurant. You tell the waitperson what you want, its presented before you, and you eat it. Only after the final cup of coffee, when youre preparing to leave, do you pay the price.

This speak-now-pay-later quality of free speech made the news recently from Iowa and California.

Serhat Tanyolacar, a visiting assistant professor in the University of Iowa art department, declaring that he was displaying the horrifying truth, the fact of racism, put a seven-foot sculpture of a klan robe on the universitys central campus. It was covered with prints from newspapers stories of our countrys racist past. The artists intent not that its necessarily relevant appears to have been one of encouraging more serious discussion of what has long been an American problem, to trigger awareness by putting in historical context the current demonstrations and other reactions to a number of police shootings of unarmed African American males.

See the rest here:
Threats and Sensibilities: Presidents Kim, Lynton and Mason

Posted in First Amendment | Comments Off on Threats and Sensibilities: Presidents Kim, Lynton and Mason

The Best Privacy And Security-Focused Web Browsers

Posted: at 9:48 pm

Your web browser knows a lot about you, and tells the sites you visit a lot about you as well if you let it. Weve talked about which browsers are best for privacy before, and the best tools to lock your browser down, but there are also entire browsers designed to keep your data as secure and private as possible. Lets take a look at some of them.

Whether your preferred browser is Chrome or Firefox, you have a few options to help you browse more securely assuming youre ready to give up on the version everyone else uses and try something new. Here are some options worth trying out.

Tor is going through a rough period right now, but overall, the service is still excellent if youre looking to preserve your anonymity and privacy, and if you want to keep away from malicious tracking cookies and ads. Tor routes your traffic across a series of relays designed to keep your real identity and computer as anonymous as possible. Its not perfect and it certainly has its drawbacks, but if anonymity is your end goal, the Tor Browser (more specifically, the Tor Browser Bundle) is a great way to go.

The Tor Browser is based on Firefox, open source, and comes preconfigured to access the Tor network. The vast majority of built-in plugins and services have been disabled or stripped out, and its important that you leave them that way, or else data you mean to keep private can leak to the sites youre visiting. Available for Windows, Mac, Linux, and in portable forms for all of those, its a great way to surf when youre using an untrusted system, want to keep your identity concealed, need to get around content filtering or site-specific blocks, or want to keep your physical location a secret from sites downstream/

Remember Tor is designed for physical and digital anonymity, not security and encryption. What you do while youre using it may give away that anonymity (such as sending emails or logging on to web services), and while communications inside the Tor network are encrypted, as soon as you leave the network, your data is in the clear (if its not encrypted another way.)

Epic Privacy Browser is based on Chromium, is open-source, and is available for Windows and Mac. Weve highlighted Epic before, and while theres genuine scepticism about the browser and its roots in Chromium (the open-source platform upon which Chrome is also based), overall Epic does what it promises. The browser blocks ads, tracking cookies, social boxes and widgets (until you interact with them), blocks tracking scripts and modules from loading (which results in faster-loading web pages), and sandboxes third-party processes and plugins. Epic Browser even encrypts your connection whenever possible (largely by shunting to HTTPS/SSL whenever its available), routes your browsing through a proxy, and protects you from widgetjacking or sidejacking when youre browsing over Wi-Fi.

All of these features are great, and the browser itself is fast and works smoothly. Of course, it doesnt support extensions or plug-ins by design, and its a little heavier than your normal Chrome install, but once its up and running you shouldnt have a problem actually using it. Youll also have to give up some of the conveniences you may be used to in order to protect your privacy, such as autofill, address saving, password saving, history and cache all of those elements are either never stored, or deleted when you close the browser.

Comodo is an internet security company that has been in the business of protecting data for decades. Comodo develops three web browsers, and each of them offers additional protection that you wont find in a standard download of Chrome or Firefox.

Comodo Dragon is a Chromium-based browser that was one of Comodos first browsers. It incorporates a number of Comodo-branded tools into the browsing experience, such as the companys own SSL validation, where every site you visit has its SSL certificate and identity validated by Comodo. Youll receive a notification to let you know everything is OK, or if Comodo thinks the site youre trying to visit is questionable.

If you allow it to, Comodo will route all of your browsing through its secure, encrypted DNS, so you leave fewer traces of your movements around the web. Comodo Dragon also blocks third-party tracking cookies, widgets and other site components from loading. Because its branded by Comodo, it will prompt you to use Comodos other security products as well to complement it, which is a little ironic if youre using a privacy-focused browser in order to not be sold to all the time. Its worth noting that Comodo says that Dragon will only run on Windows 7 and below (although we had no issues with it in Windows 8).

See original here:
The Best Privacy And Security-Focused Web Browsers

Posted in Tor Browser | Comments Off on The Best Privacy And Security-Focused Web Browsers

PayCoin Denver | PayCoin CryptoCurrency Coaching +

Posted: at 9:48 pm

Paycoin-Cryptocurrency Coaching & Business Development

By PayCoin

When lots of people think of cryptocurrency they might too be thinking of puzzling currency. Really few folks seem to understand what it is as well as for some reason everybody seems to be discussing it as if they do. This record will with any luck debunk all the aspects of cryptocurrency to ensure that by the time youre completed reading you will have a respectable suggestion of what it is and what its everything about.

You may discover that cryptocurrency is for you or you might not however a minimum of youll have the ability to speak with a level of surety and also understanding that wont possess.

There are lots of people that have already reached millionaire standing by dealing in cryptocurrency. Plainly theres a bunch of cash in this brand-new market.

Cryptocurrency is electronic money, brief and also easy. Nonetheless, whats not so brief and easy is specifically how it comes to have value.

Cryptocurrency is a digitized, online, decentralized money created by the application of cryptography, which, according to Merriam Webster dictionary, is the digital encoding as well as decoding of details. Cryptography is the foundation that makes debit cards, computer system banking as well as eCommerce systems possible.

Cryptocurrency isnt supported by financial institutions; its not supported by a government, but by a very challenging plan of formulas. Cryptocurrency is electrical power which is encoded right into intricate strings of formulas. What lends financial value is their intricacy and their protection from cyberpunks. The method that crypto currency is made is just as well difficult to replicate.

Cryptocurrency is in direct opposition to exactly what is called fiat cash. Fiat money is currency that gets its worth from government ruling or law. The dollar, the yen, as well as the Euro are all instances. Any kind of money that is defined as legal tender is fiat cash.

Unlike fiat cash, one more part of just what makes crypto money important is that, like an asset such as silver and also gold, theres only a finite amount of it. Just 21,000,000 of these incredibly complicated formulas were made. No more, no less. It cannot be changed by printing even more of it, like a federal government printing even more cash to pump up the system without backing. Or by a banking changing a digital journal, something the Federal Reserve will advise financial institutions to do to readjust for inflation.

Visit link:
PayCoin Denver | PayCoin CryptoCurrency Coaching +

Posted in Cryptocurrency | Comments Off on PayCoin Denver | PayCoin CryptoCurrency Coaching +

NC State’s Dave Doeren Previews Bitcoin St. Petersburg Bowl | ACC Now – Video

Posted: at 9:48 pm


NC State #39;s Dave Doeren Previews Bitcoin St. Petersburg Bowl | ACC Now
Wolfpack head coach Dave Doeren praises his team for a successful 2014 season and details why a victory will be so important for his team over Central Florid...

By: ACC Digital Network

Read the original:
NC State's Dave Doeren Previews Bitcoin St. Petersburg Bowl | ACC Now - Video

Posted in Bitcoin | Comments Off on NC State’s Dave Doeren Previews Bitcoin St. Petersburg Bowl | ACC Now – Video

2014 Bitcoin St. Petersburg Bowl Preview – Video

Posted: at 9:48 pm


2014 Bitcoin St. Petersburg Bowl Preview
Visit TheAmerican.org for more information.

By: AmericanAthleticConf

More here:
2014 Bitcoin St. Petersburg Bowl Preview - Video

Posted in Bitcoin | Comments Off on 2014 Bitcoin St. Petersburg Bowl Preview – Video

New York Regulator Lays Out Tweaks to Bitcoin Rules – Video

Posted: at 9:48 pm


New York Regulator Lays Out Tweaks to Bitcoin Rules
After receiving a round of public comments, New York state plans to soften proposed rules for virtual currencies such as bitcoin, its banking regulator said ...

By: WochitGeneralNews

See the rest here:
New York Regulator Lays Out Tweaks to Bitcoin Rules - Video

Posted in Bitcoin | Comments Off on New York Regulator Lays Out Tweaks to Bitcoin Rules – Video