Daily Archives: December 29, 2014

Nato 29 – Video

Posted: December 29, 2014 at 4:49 pm


Nato 29

By: Sekander Takhari

Go here to read the rest:
Nato 29 - Video

Posted in NATO | Comments Off on Nato 29 – Video

Oliver Stone making Movie About NSA Whistleblower Edward Snowden – Video

Posted: at 4:49 pm


Oliver Stone making Movie About NSA Whistleblower Edward Snowden
hi.viewer how are you....i #39;m sharing the videos about education related ...because i want t0o inform you world circumstance ...i have many videos about education related...please like,share,comment...

By: Michael Korss

Go here to see the original:
Oliver Stone making Movie About NSA Whistleblower Edward Snowden - Video

Posted in NSA | Comments Off on Oliver Stone making Movie About NSA Whistleblower Edward Snowden – Video

Long war tactics … or how we learned to stop worrying and love the NSA [31c3] – Video

Posted: at 4:49 pm


Long war tactics ... or how we learned to stop worrying and love the NSA [31c3]
Long war tactics or how we learned to stop worrying and love the NSA Referring to the seminal talk Dymaxion gave at the closing of the NoisySquare at OHM in ...

By: CCCen

Read the original here:
Long war tactics ... or how we learned to stop worrying and love the NSA [31c3] - Video

Posted in NSA | Comments Off on Long war tactics … or how we learned to stop worrying and love the NSA [31c3] – Video

NSA Thunder Remix (Its a tad fast) – Video

Posted: at 4:49 pm


NSA Thunder Remix (Its a tad fast)
Description.

By: Jim Witkowski

Read more from the original source:
NSA Thunder Remix (Its a tad fast) - Video

Posted in NSA | Comments Off on NSA Thunder Remix (Its a tad fast) – Video

NSA Xmas gift: 12 yrs of surveillance data

Posted: at 4:49 pm

With little fanfare, the National Security Agency dropped hundreds of pages worth of surveillance reports into the dead of night before Christmas Evesome of which detailed U.S. citizens that were "inadvertently" swept up in the government's data dragnet.

As Americans were preparing to open holiday gifts, the agency quietly published a trove of declassified data spanning more than a decade of intelligence gathering. Those documents, required by the President's Intelligence Oversight Board (IOB), were heavily redacted to protect disclosures of sensitive information.

Read MoreMeet the NSA's hacker recruiter

Entire swaths of text were blanked out, making it nearly impossible to determine specific names, programs or occurrences of privacy violations. However, the documents detailed a number of instances where analysts "erroneously" gathered information on U.S. citizens, or were at least guilty of shoddy practices.

In a 2012 quarterly report, for example, an analyst "forwarded in an email to unauthorized recipients the results of a raw traffic database query that included terms associated with "an unidentified U.S. citizen. The email was recalled, the report said, without providing further information.

See the original post:
NSA Xmas gift: 12 yrs of surveillance data

Posted in NSA | Comments Off on NSA Xmas gift: 12 yrs of surveillance data

Tor, TrueCrypt, Tails topped the NSA's 'most wanted' in 2012, per newly revealed Snowden leaks

Posted: at 4:49 pm

Three out of three? That could be the score for the U.S. National Security Agencys cryptographic most wanted list of 2012.

In January 2012, it saw Internet traffic anonymizing tool Tor (The Onion Router), Linux distribution Tails (The Amnesic Incognito Live System) and disk encryption system TrueCrypt as the biggest threats to its ability to intercept Internet traffic and interpret other information it acquires.

Since then, flaws have been found in Tor, and the FBI has unmasked Tor users. A vulnerability was found in Tails allowing attackers to determine users IP addresses.

Whilea source-code audit gave TrueCrypt a relatively clean bill of health in April, TrueCrypts anonymous developersinexplicably abandoned the software a few weeks later, warning it was insecure.

That the NSA considered these tools dangerous is perhaps little surprise: In July it was revealed that the agencys XKeyScore traffic interception tool contains rules for tracking who visited the websites of the Tor and Tails projects.

But now German magazine Der Spiegel has published further documents from the cache leaked by Edward Snowden, including one outlining, on page 25, the tools the NSA most wanted to crack in order to intercept and decrypt its targets communications.

The tools were ranked by their impact, from trivial to catastrophic, and their use risk, from current highest priority targets down to experimentation by technical thought leaders.

In the slide deck, the NSA explained that, with rare exceptions, it only developed application-specific solutions based on those two criteria, impact and use risk. In a resource-constrained environment, it said, the need for responses to current threats would always trump speculative work on threats that might become more widespread. Der Spiegel had something to say about those constraints: Of the NSAs 2013 budget of over $10 billion, some $34.3 million was allocated to Cryptanalysis and Exploitation Services.

Top of the NSAs list of major or catastrophic threats, capable of causing a majority or near-total loss or lack of insight into the highest-priority targets communications or online presence, were Tor, Tails and TrueCrypt.

Of course, its unlikely that the published attacks on Tor and Tails were developed by the NSAbut with the Tor's unmasking attack costing researchers just $3,000, the NSA could certainly have done something similar with its budget over the last three years. Although some of the wilder conspiracy theories linking TrueCrypts demise to the NSA have evaporated, there is still no convincing explanation for why the developers abandoned a tool that had just come through a code audit with no major flaws found.

See the original post here:
Tor, TrueCrypt, Tails topped the NSA's 'most wanted' in 2012, per newly revealed Snowden leaks

Posted in NSA | Comments Off on Tor, TrueCrypt, Tails topped the NSA's 'most wanted' in 2012, per newly revealed Snowden leaks

NSA Documents Show Agents Spying On Love Interests

Posted: at 4:49 pm

The National Security Agency is supposed to collect data to protect American citizens from security threats. It turns out that isn't the only reason the agency is collecting data.

It has been found that NSA agents have abused their surveillance authority to spy on their love interests, previously referred to as LOVEINT or Love Intelligence, by the Wall Street Journal.

Recently released NSA documents show that their have been at least 12 cases of intentional misuse by intelligence authorities.

One of the reports shows that an NSA colleague was spying on his foreign girlfriend. Another case involved an NSA spy monitoring the calls of a number she found in her husbands cellphone, suspecting he was unfaithful.

Slate reported last year that six other LOVEINT cases were recorded by the NSA. One case revealed an analyst was searching her spouse's telephone records for two years before being told to stop. These are just the reported cases.

The list of NSA documents stem back to 2001. The heavily redacted documents show that this type of spying has been going on for more than a decade.

Source: New York Daily News, NSA, Wall Street Journal, Slate / Photo Credit: Wikimedia Commons

See the original post:
NSA Documents Show Agents Spying On Love Interests

Posted in NSA | Comments Off on NSA Documents Show Agents Spying On Love Interests

South Carolina law makers pushing for more gun education

Posted: at 4:48 pm

Sunday, December 28th, 2014

AIKEN, SC (WRDW)- Kids already have English,science, and history class, but South Carolina lawmakers want to add one more.

A right to bear arms, a right some South Carolina law makers don't want students to forget.

"People say that's the amendment that helps keep all others," said owner of Aiken Gun Rack Range, Chuck Scott.

A bill hitting the house floor at the first of the year, could make your kids a lot more gun savvy. The bill would designate December 15th second amendment awareness day.

"I think a second amendment day is a great thing. It's very cool," said Scott.

It's not just one day devoted to gun rights, but three weeks. The NRA will develop the curriculum.

"Kids need to know what it's about and why it's so important and that's what sets us apart from other countries," said Scott.

After they learn about the second amendment they may want to pick a gun and learn to shoot. One bill will allow them to do that at school. It will create a marksmanship class and, South Carolina gun safety program.

"The earlier kids learn to be safe and have proper instruction the safer they're going to be and the less accidents they're going to have," said Scott.

More here:
South Carolina law makers pushing for more gun education

Posted in Second Amendment | Comments Off on South Carolina law makers pushing for more gun education

With Bitcoin you’ve got no excuse to be colluding behind closed doors – Video

Posted: at 4:47 pm


With Bitcoin you #39;ve got no excuse to be colluding behind closed doors
Chris Ellis Networks With IamSatoshi. http://www.iamsatoshi.com/the-blockchain-is-telling-a-story-about-justice-trust-doesnt-scale https://twitter.com/Iam_Sa...

By: Satoshi Pollen

Read this article:
With Bitcoin you've got no excuse to be colluding behind closed doors - Video

Posted in Bitcoin | Comments Off on With Bitcoin you’ve got no excuse to be colluding behind closed doors – Video

#PackTheBay: Bitcoin St. Petersburg Bowl Game Preview – Video

Posted: at 4:47 pm


#PackTheBay: Bitcoin St. Petersburg Bowl Game Preview

By: NCStatePackFootball

Read the original post:
#PackTheBay: Bitcoin St. Petersburg Bowl Game Preview - Video

Posted in Bitcoin | Comments Off on #PackTheBay: Bitcoin St. Petersburg Bowl Game Preview – Video