Daily Archives: March 8, 2017

Alamo Wing supports NATO mission – Minuteman

Posted: March 8, 2017 at 1:02 pm

JOINT BASE SAN ANTONIO-LACKLAND, Texas --

U.S. Army UH-60 Blackhawk helicopters, four Army vehicles, support equipment and Soldiers from the 10th Combat Aviation Brigade, Ft. Drum, N.Y., were delivered Feb. 28 and March 3, by an Air Mobility Command tasked C-5M Super Galaxy flown by the U.S. Air Force Reserve Commands 68th Airlift Squadron to Riga, Latvia in support of Operation Atlantic Resolve.

OAR demonstrates the United States commitment to maintaining peace and stability in the Baltic region, while providing reassurance to NATO allies and regional partners. Through multinational training and exercises, the operation highlights the flexibility of U.S. ground and air forces to rapidly respond to contingencies alongside regional partners.

One of the largest aircraft in the world and the largest aircraft in the Air Force inventory, the C-5M is capable of carrying six Apache helicopters, two M1A Abrams tanks or 250,000 pounds of relief supplies. The 433rd Airlift Wing assigned C-5M Super Galaxy moved 167 tons of cargo and 63 passengers to Latvia.

The C-5Ms ability to airlift Army assets is vital to mission success.

It is critical, one thing we are trying to demonstrate is speed of assembly, said Army Maj. Nathan Colvin, officer in charge of Task Force Baltic Phoenix.

From the time the first C-5 (M) left Ft. Drum, we were able to rapidly assemble our helicopters and conduct an air assault training mission with Latvian forces on the ground, he said.

On such a long mission, where the aircrew amassed 46 flight hours, a good attitude is key.

Flying these missions is very diverse. What I tell new guys is stay flexible, expect the unexpected and keep a positive attitude, Master Sgt. Eric Mungia, a 68th Airlift Squadron loadmaster said. Sometimes you work in cold or hot weather, sandstorms, or humidity like Hawaii. You just have to stay flexible.

Thats just the way it works flying on the C-5, Mungia said.

The worldwide mission and the Airmens capabilities were enhanced according to Capt. Michael Raggio, 68th AS pilot and aircraft commander for the mission. It has been a very demanding mission as far as the uploads and odd hours of the mission, he said.

Flexibility is a key trait for airlift crews, as the Reservists were tasked with an additional mission after making two round-trips between Ft. Drum and Latvia. The second mission involved taking Air Force personnel and a vehicle from Riga to their home base in Ramstein Air Base, Germany.

It was an add-on mission, it was a good opportunity to pick up some cargo and bolster our presence in Europe, Raggio said.

The extra mission was an opportunity to excel for the San Antonio-based Reservists. The extra mission to Ramstein was something we learned from, and it makes you better as an aircrew member dealing with those differences. It makes you better as an individual and aircrew member, Mungia said.

U.S. Air Forces in Europe, Air Force Reserve Command and Air Mobility Command directly support the joint and multi-national warfighting environment with air superiority, direct air operations, global air transportation and capabilities that are essential to supporting the warfighters on the ground.

This mission has been very rewarding at the same time being able to help out and reaffirm our NATO allies and work with our Army partners, Raggio said.

The Air Forces strategic airlift capability provides global air transportation and enables Eucom to move the helicopters from their home stations rapidly.

They (Reserve air crew) have been nothing but great to work with, Colvin said. Despite any kind of adversity thrown their way, whether it be maintenance or the weather or uncertainty with an airfield they may unfamiliar with, they have responded by making sure everything is taken care of to meet mission and make sure we are successful as a joint partner

Portions of the brigade arrived in Europe via ship at Bremerhaven, Germany, in mid-January. Its operations will include medical transport missions, training, exercise support and various aviation operations throughout Europe to improve interoperability and strengthen relationships with NATO allies, Eucom officials said.

When the mission happens in real life, we are not going to be able to choose the time and the place. It is good to know we can count on our Air Force partners to be there with us anytime, anywhere to get the job done, Colvin said.

Working in below freezing weather on an unfamiliar airfield is a skill building opportunity. It makes you better because you always learn from it, it is always an experience from the pilots to the crew chiefs on how you could do things better, Mungia said.

Overall the mission was a success. We got the cargo there in a timely manner, and we were able to support Operation Atlantic Resolve, he said.

This airlift improved our interoperability and readiness with our host nation and other NATO partners, Colvin said.

More training opportunities are slated in 2017 as Operation Atlantic Resolve will remain in place as long as the need exists to reassure U.S. allies and deter adversaries from regional aggression.

See the rest here:
Alamo Wing supports NATO mission - Minuteman

Posted in NATO | Comments Off on Alamo Wing supports NATO mission – Minuteman

Republicans Starting to Think the NSA Has Too Much Surveillance Power – Gizmodo

Posted: at 1:00 pm

Republicans have long supported the sweeping surveillance capabilities of the NSA and have insisted theyre vitally important to national security. But with their man Trump caught up in multiple scandals that may involve intelligence services targeting his communications, privacy is suddenly a top priority.

The NSAs Prism and upstream data collection programs first hit the public consciousness when Edward Snowden fled the country and revealed extensive details about the agencys enormous powers to intercept foreign and domestic communications. The programs fall under Section 702 of the Foreign Intelligence Surveillance Act which is up for renewal at the end of the year. Just last week, officials from the Trump administration said that the White House supports the clean reauthorization [of Section 702] and the administration believes its necessary to protect the security of the nation. But that may have changed.

Devin Nunes is the Republican chairman of the House intelligence committee. He was part of the Trump transition team and has reportedly developed a close relationship with the president. He also is one of the few members of congress that seems to take Trumps allegation that Obama illegally wiretapped him seriously. Asked today about the renewal of Section 702 in the midst of continued intelligence leaks about Trump and Russia, Nunes said, I think its very problematic.

Many people feel that the investigation of the Trump campaigns relationship with Russia should be handled by an independent commission, rather than the House intelligence committee. Nunes has fought back against that suggestion. They can say whatever they want, but at the end of the day, I hold the gavel, theyre in the minority and were going to do what we want to do, he told CNN. We are not going to give up that jurisdiction to anyone else as long as Im here.

Nunes absolute refusal to acknowledge the growing body of evidence that Trump and his team have repeatedly lied about contacts with the Russian government has led to the impression that he is acting as a shield for the administration. And now, he thinks that the NSAs ability to surveil foreign powers and any American communications that might come up in that surveillance might be a problem. He elaborated at todays press conference:

Ive expressed this concern to the IC [intelligence community]. We have sent them many followup questions as it relates to intelligence thats been collected. And we expect prompt answers. I think we also expect unprecedented answers from them of the information that were going to be asking for.

Democrats have typically agreed with Republicans that the NSA programs are necessary and that doesnt seem to have changed. Adam Schiff, the top Democrat on the House intelligence committee, told the Guardian today that Section 702 has been a far more impactful and important counterterrorism program and tool. But, That doesnt mean though that we shouldnt explore whether there are ways to improve any of the protections in existing law or whether there are any changes that we need to make to the structure of the program.

No one knows how many American citizens communications have been caught up in the NSAs net at this point. In 2014, The Guardian found tens of thousands of Americans emails were intercepted under one program. Lawmakers have shown little concern. Maybe Trumps relentless self-interest will finally result in something good being done about this egregious overreach. More likely hell find a way to make it more horrible, if not through intent, through incompetence.

[The Guardian]

Here is the original post:
Republicans Starting to Think the NSA Has Too Much Surveillance Power - Gizmodo

Posted in NSA | Comments Off on Republicans Starting to Think the NSA Has Too Much Surveillance Power – Gizmodo

FBI, NSA called to testify on Trump-Russia investigation – Washington Times

Posted: at 1:00 pm


Washington Times
FBI, NSA called to testify on Trump-Russia investigation
Washington Times
FBI Director James B. Comey and NSA Director Mike Rogers are invited, as are Mr. Obama's CIA director, national intelligence director and deputy attorney general, each of whom has been critical of President Trump in recent weeks. Top officials from ...
FBI Director James Comey was 'incredulous' over Trump's tweetsCNN

all 109 news articles »

Here is the original post:
FBI, NSA called to testify on Trump-Russia investigation - Washington Times

Posted in NSA | Comments Off on FBI, NSA called to testify on Trump-Russia investigation – Washington Times

No Evidence for Trump’s Wiretap Claims, Former CIA, NSA Chief Says – Fox Business

Posted: at 1:00 pm

Former CIA and NSA director Gen. Michael Hayden said Tuesday there was no body of evidence for President Trump to make the claim that former President Barack Obama ordered wiretaps of his phones during the election.

What was claimed is inconsistent with the way I know the system works, Hayden told FOX Business Neil Cavuto.

According to Hayden, the president hasnt had the authority to order a wiretap since the 1970s. Instead, the request would need to go through a court, he said.

Since the president took office, the White House has been plagued with intel leaks. Hayden, who took over as CIA director in May 2006, said he faced a similar issue.

"One of the biggest problems we had was leaks. And my first speech to the workforce was: this is stopping. We are out of this as source or subject, Hayden said, adding that he does not believe people within the intelligence community should immediately be blamed.

I would not automatically assume that the source of this are intel people, even when the data being leaked is intelligence, he said.

Continue Reading Below

ADVERTISEMENT

Furthermore, Hayden offered advice to the administration, based on his past experience.

My tool though wasnt a vendetta, wasnt an investigation, wasnt beating people up, he said. My tool was openness within the agency, so that people actually felt they had a place in which their views were valued. Id suggest that approach for the administration.

He added: What youve got is a situation that we as Americans have to agree is really bad. We cannot have the permanent government at war with the incoming administration. Both sides need to step back, take a breath.

Read the original:
No Evidence for Trump's Wiretap Claims, Former CIA, NSA Chief Says - Fox Business

Posted in NSA | Comments Off on No Evidence for Trump’s Wiretap Claims, Former CIA, NSA Chief Says – Fox Business

Trump v US intelligence: growing feud puts NSA’s legislative priority at risk – The Guardian

Posted: at 1:00 pm

Section 702 permits the NSA to collect communications and associated data from targets it reasonably believes to be non-Americans overseas suspected of contact with a foreign power. Photograph: Patrick Semansky/Associated Press

The escalating feud between Donald Trump and US intelligence is now putting the top 2017 legislative priority of the intelligence agencies at risk.

At the end of the year, a broad legal authority permitting sweeping surveillance is set to expire. The National Security Agency considers the authority, known as Section 702 of the Foreign Intelligence Surveillance Act (Fisa), pivotal to fighting terrorism and stopping espionage. Civil libertarians consider the measure the wellspring of the NSAs Prism and upstream mass communications-data collection unconstitutional.

The typical balance of power on Capitol Hill over surveillance is such that opponents of renewing Section 702 face strong political headwinds. The measure was reauthorized with minimal challenge in 2012.

Now the Republican chairman of the House intelligence committee has thrown reauthorization into question after extensive leaking about Trump and Russia that the president and his Capitol Hill allies have blamed on the US intelligence community.

Asked at a Tuesday press conference about the renewal of section 702 in light of ongoing leaks concerning Trump and Russia, Devin Nunes said, I think its very problematic.

He continued: Ive expressed this concern to the IC [intelligence community]. We have sent them many followup questions as it relates to intelligence thats been collected. And we expect prompt answers. I think we also expect unprecedented answers from them of the information that were going to be asking for.

First passed in 2008 to give legal cover to George W Bush-era warrantless surveillance, Section 702 permits the NSA to collect communications and associated data from targets it reasonably believes to be non-Americans overseas suspected of contact with a foreign power, even if they are in communication with Americans. The surveillance does not require a court order specifying its targets, purposes, or time frame; only the reapproval of the attorney general and the director of national intelligence.

NSA interception of communications between Russian officials or suspected operatives and Trumps associates would not necessarily involve using Section 702. The NSA or FBI can acquire such communications under the terms of the original 1978 Fisa law. Because of a provision in the law about understanding the foreign-intelligence value of the intercepted communications, neither agency would necessarily have to purge references to Americans.

It is not only the NSA that values Section 702 ardently. The FBI director, James Comey, last year called the surveillance activities permitted by Section 702 far more important than the bulk domestic phone-records data program that Congress curtailed in 2015. The FBI is permitted to warrantlessly search through the NSAs hoards of foreign-focused data with few restrictions.

Last week, as the House judiciary committee began hearings over the expiring provision, the Trump administration told Reuters it favors Section 702 reauthorization.

We support the clean reauthorization and the administration believes its necessary to protect the security of the nation, an anonymous official said.

Trumps nominee for director of national intelligence, Dan Coats, testified that he agreed Section 702 is the crown jewels of US intelligence and the intelligence community also sees it that way, the entire community.

Throughout Barack Obamas presidency and the Edward Snowden leaks, the vast majority of national-security-focused Republicans embraced the measure without reservation, with Republicans on the intelligence committee leading the way.

Nunes himself has been a full-throated defender of Section 702. Last year, he and colleague Lynn Westmoreland of Georgia took point in opposing a civil-libertarian effort to block it through an amendment to a defense-spending bill.

Citing the then recent case of Orlando nightclub murderer Omar Mateen, Nunes and Westmoreland circulated a letter to colleagues claiming the loss of 702 would deprive the intelligence community of the authorities it needs to detect and stop terrorist attacks.

But since then, Nunes has become a crucial ally to Trump. Nunes served on Trumps transition team, a closeness that has raised questions about Nunes independence as his committee investigates Trump associates ties to Russia.

Nunes has ardently defended Trumps first national security adviser, Michael Flynn, and implied without evidence that the intelligence agencies abused their surveillance powers in leaking accounts of Flynns December conversations with the Russian ambassador, Sergey Kislyak, that proved to be his downfall.

Trump has blamed the intelligence agencies for the leaks, in particular the FBI and NSA, and his administration has suggested that career intelligence officials are in league with former Obama officials. He has recently taken to claiming, baselessly, that Obama ordered Trump to be surveilled, an act that would be illegal if true.

There is no evidence to support that claim of Obama ordering Trump to be wiretapped, a US official told the Guardian over the weekend.

But Nunes has given the accusation credence. His committee on 1 March added the possible leaks of classified information that Trump wants investigated to its inquiry on Russian measures to interfere with the 2016 election, which the intelligence agencies publicly assessed in January were for Trumps benefit.

Typically weve had great trust with our intelligence agencies, Nunes said on Tuesday.

And I continue to have that trust, but we have to verify, in fact, that all of the tools that are in place, that we oversee, are being used ethically, responsibly and by the law. And if anybody has abused those, we want to know about that. And thats part of the reason why its important for us to know whether or not, as some press reports have indicated, the Department of Justice or any other agency tried to get the warrant on anybody related to the Trump campaign or any other campaign for that matter.

Adam Schiff, the top Democrat on the House intelligence committee, said the authority under Section 702 would be preserved when asked by the Guardian on Tuesday about Nunes comments. But he did not rule out potential reforms to the law if necessary.

Section 702 has been a far more impactful and important counter-terrorism program and tool, Schiff said during a press conference on Capitol Hill.

That doesnt mean though that we shouldnt explore whether there are ways to improve any of the protections in existing law or whether there are any changes that we need to make to the structure of the program.

Schiff said the intelligence committee had been engaged in periodic briefings with members, given the law is poised to sunset this year. Should any questions come up in the same context that are pertinent to the Russia investigation, he added, they ought to be answered so members understand how the program works [and] that its conducted in a lawful way.

See more here:
Trump v US intelligence: growing feud puts NSA's legislative priority at risk - The Guardian

Posted in NSA | Comments Off on Trump v US intelligence: growing feud puts NSA’s legislative priority at risk – The Guardian

Central Tech’s NSA CyberPatriot Team Is Only Oklahoma Team Going To National Competition – Cleveland American

Posted: at 1:00 pm

Central Tech is proud to announce the NSA CyberPatriot Team earned a spot as a national finalist in the CyberPatriot National Youth Cyber Defense Competition. The competition will be held April 2-6, 2017 in Baltimore, MD.

CyberPatriot is an excellent opportunity for students to learn how to solve real world problems using real world solutions. CyberPatriot teams must learn to work together to overcome challenges that could not be completed by individuals, said Nick Gaunt, NSA instructor, Central Tech.

Central Tech was the only Oklahoma school to finish in the top twelve in their division and will move on to the national competition.

With over 4,400 teams representing all 50 States, Puerto Rico, the U.S. Virgin Islands, the Northern Mariana Islands, U.S. Department of Defense schools in Europe and the Pacific, Canada, Australia, Singapore, and Hungary, this years competition was record-breaking. All teams competed in a series of online rounds hoping to secure a top twenty-eight finalist spot and a chance for an all-expenses paid trip to the competition.

We are thrilled to see both returning teams, who continue pushing for excellence in defending their titles, as well as so many new teams qualify for National Finals, said Diane Miller, Director, Global Cyber Education and Workforce Development Programs, Northrop Grumman. Year-over-year, CyberPatriot demonstrates that it is truly accessible to all, creating a much-needed diverse and highly skilled cyber workforce to protect and defend our nations systems. We are so proud to be part of this national imperative and wish the competitors all the best!

CyberPatriot, an education initiative established by the Air Force Association and presented by the Northrop Grumman Foundation, is a one-of-a-kind cyber defense competition designed to inspire students toward futures in science, technology, engineering, and mathematics (STEM) fields. Other program sponsors include Cyber Diamond sponsors AT&T Federal and the AT&T Foundation, Cisco, Microsoft, the U.S. Department of Homeland Security, and the Office of the Secretary of Defense; Cyber Gold sponsors Facebook, Riverside Research, Splunk, and Symantec; and Cyber Silver sponsors Air Force Reserve, American Military University, Embry-Riddle Aeronautical University, Hewlett Packard Enterprise, Leidos, and University of Maryland University College. For more information about the CyberPatriot competition; visit their website http://www.uscyberpatriot.org.

Central Tech would like to congratulate our CyberPatriot team and wish them well at national finals. For more information about Central Tech or the NSA program, visit CentralTech.Edu.

Follow this link:
Central Tech's NSA CyberPatriot Team Is Only Oklahoma Team Going To National Competition - Cleveland American

Posted in NSA | Comments Off on Central Tech’s NSA CyberPatriot Team Is Only Oklahoma Team Going To National Competition – Cleveland American

What our First Amendment freedoms are for – News – DesertDispatch … – Desert Dispatch

Posted: at 12:56 pm

By Richard ReebContributed Content

Congress shall make no law . . . abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.

Surely, the freedom guarantees of the First Amendment to the United States Constitution are a timely topic given the lengths to which boorish behavior is being taken by some, while claiming legal protection. Could angry and unreasoning mobs really be what the Founders had in mind when they penned those immortal words?

The key word in the First Amendment is peaceably. As the Constitution establishes a government for the United States of America, it places all discussion within that framework. That is, public oral, written or electronic communications must serve the purposes and follow the procedures laid down by our supreme law and cannot justifiably be in conflict with them.

Put another way, public discussion is justified so long as it is about how, not whether, to achieve our goals as a nation. Speech or publication that aims to undermine or overthrow our form of government is rightly denominated as unconstitutional and certainly seditious.

Our ancestors revolted against a despotic government, engaging in illegal and violent means, including prolonged warfare, to end British imperial authority in the 13 American colonies. But the sequel was the establishment of republican governments in all of them and, ultimately an effective federal government.

The American Revolution was legitimate only to the extent it brought self-government to the North American continent, but not to institutionalize revolution. To forestall that possibility, frequent elections of the peoples representatives were adopted to secure the consent of the governed.

The most severe test of our constitutional framework came in 1860 when seven, ultimately 11, Southern states attempted to secede from the federal union. When rebel forces fired on Fort Sumpter in 1861, the situation changed from one of extreme agitation to full-scale war. Fortunately, that rebellion was crushed. But unless the nation learns the appropriate lessons from the Civil War, we will not have benefited.

Before the conflict began, mostly Southern politicians were not only declaring a right to block the enforcement of federal law and even the Constitution, but asserting that the Declaration of Independence was based on a self-evident lie. In their defense of chattel slavery, they struck at the central idea of the American Republic that held that all human beings are equally endowed by God with the rights to life, liberty and the pursuit of happiness. They even said that such a proposition was unscientific, arguing that the emerging idea of the survival of the fittest applied not just to species but to the races of mankind as well.

Slaverys apologists argued that Caucasians had established their superiority and consequent right to rule over inferior races. Accordingly, the Confederate Constitution distinguished itself from the U.S. Constitution by inserting the word slave without apology and avoided the latters more ambiguous word person.

A comprehensive account of our nations greatest crisis is possible only if we recall that open rebellion was preceded by seditious and even heretical speech. If one denies, as Confederates did, the truth of the proposition that all men are created equal, it is just a matter of time and opportunity before our form of government is at risk.

It is striking that the angry left in America, while professing dedication to equality, denies that our ancestors or their descendants shared that dedication. The claim is that the very existence of slavery proved their hypocrisy, if not their evil intentions for persons of African descent.

The steady progress of justice that ended both slavery and compulsory racial segregation gives the lie to that claim. Of course, if the left is wrong in its diagnosis, America deserves not only the benefit of the doubt but our peoples full dedication. Mimicking their Confederate mentors, todays progressive left is arguing that America is based on a lie. Because its minions believe that lie, they feel free to reject any and all authority that stands in their way.

It never made sense to hold that those who speak or write about our Constitution with contempt are entitled to the full protection secured by the First Amendment. The germ of rebellion against it lies with the heresy that acts of the freely chosen representatives of the people can be defied at will.

We should certainly hear the arguments of the Republics critics if we are to know what they are about, but we are not obliged to be shouted down, driven from our public (and even private) places or put in fear of our lives. The First Amendment, properly understood, absolutely favors peaceable speech. The alternative is mob rule.

Richard Reeb taught political science, philosophy and journalism at Barstow Community College from 1970 to 2003. He is the author of "Taking Journalism Seriously: 'Objectivity' as a Partisan Cause" (University Press of America, 1999). He can be contacted at rhreeb@verizon.net

Continued here:
What our First Amendment freedoms are for - News - DesertDispatch ... - Desert Dispatch

Posted in First Amendment | Comments Off on What our First Amendment freedoms are for – News – DesertDispatch … – Desert Dispatch

Tor Browser for Windows – Online anonymity and censorship circumvention

Posted: at 12:55 pm

Posted10 August 2016

Tor Browser keeps your online activities private. It disguises your identity and protects your web traffic from many forms of internet surveillance. Tor can also be used to bypass internet filters.

Tor Browser is an up-to-date, privacy-optimised version of Mozilla Firefox. It is free and open source software that enables online anonymity and censorship circumvention. Unlike other browsers, Tor Browser:

The Tor Browser operates on the Tor network, which runs on Free and Open Source Software (FLOSS) and which is designed to enable online anonymity and censorship circumvention.

The Tor network consists of thousands of servers run by volunteers all over the world. Every time the Tor Browser makes a new connection, it selects three of these Tor relays and connects to the Internet through them. It encrypts each leg of this journey in such a way that the relays themselves do not know the full path through which it sends and receives data.

When you use the Tor Browser, your internet traffic will appear to come from a different IP address, often in a different country. As a result, the Tor Browser hides your IP address from the websites you access while also hiding the websites you access from third parties who might try to monitor your traffic. It also ensures that no single Tor relay can figure out both your location on the Internet and the websites you visit (though some of them will know one or the other).

Tor also takes steps to encrypt communications into and throughout its network. However, this protection does not extend all the way to websites that are accessible through unencrypted channels (that is, websites that do not support HTTPS).

Because the Tor Browser hides the connection between you and the websites you visit, it allows you to browse the Web anonymously and avoid online tracking. It it also useful for circumventing online filters so that you can access content from (or publish content to) websites that would otherwise be restricted.

The following steps illustrate how the Tor network works when Alice's computer uses Tor Browser to communicate with Bob's server:

Step 1. Alice's Tor Browser obtains a list of Tor nodes or relays [1] from the Tor directory server (Dave).

Step 2. Alice's Tor Browser picks a random path through Tor network to the destination server (Bob). All connections inside Tor network are encrypted (green [3]). In this example, the last connection is not-encrypted (red [2]). The last connection would be encrypted if Alice were visiting an https website.

Step 3. If at the later time, Alice visits another server (Jane), Alice's Tor Browser selects a different random path.

Note: There is a trade-off between anonymity and speed. Tor provides anonymity by bouncing your traffic through volunteer servers in various parts of the world. It will almost always be slower than a direct connection to the Internet.

Microsoft Windows, Mac OS, GNU/Linux, Android and iOS compatible programs:

The Tor Browser is available for the GNU Linux, Mac OS, Microsoft Windows and Android operating systems. Tor is the most rigorously tested tool for keeping your online activities anonymous. Below are a few other tools that are suitable for circumventing online censorship and protecting the confidentiality of your local traffic. Unlike Tor, these tools require that you trust the service provider:

Note: If you are in a location where access to the Tor Project website is blocked, you can use email to request a download link that is more likely to work. Send an email to gettor@torproject.org with the version you need (windows, osx or linux) in the body of the message. You will receive a response that includes a link to a Tor Browser archive via Dropbox, Google Docs or Github. Further details about this feature are available on the Tor Project website.

Start off by making sure you are on the Tor Browser download site. (The https indicates that the connection between your browser and the website is encrypted, which makes it harder for an attacker to modify the file that you are about to download.)

Figure 1: Tor Browser page

Step 1. Click [Download Tor Browser] to get directed to the bottom part of the page, which includes links for downloading Tor Browser.

Figure 2: Tor Browser download links

Step 2. Click the appropriate download link and save the package somewhere convenient (in your Desktop or Documents folder, for example, or on a USB storage device).

Step 3. Click [Save File] through the following window to start downloading Tor Browser:

Figure 3: Saving the Tor Browser file

You do not have to install the Tor Browser as you would most software. If you prefer, you can extract it to a USB storage device, for example, and run it from there.

To install the Tor Browser, follow the steps below:

Step 1. Navigate to the folder in which you saved the Tor Browser package. In this example, we assume you saved the file in your Downloads folder.

Figure 1: The Downloads folder containing the Tor Browser file

Step 2. Right-click on the Tor Browser file and then click [Open].

Figure 2: Opening the Tor Browser file

Step 3. Select the language you would like to use Tor Browser in and click [OK].

Figure 3: Tor Browser Language Installer

Step 4. Select the folder where you would like to install Tor Browser in. This example installs Tor Browser on the Desktop.

Figure 4: Tor Browser Installation Location

Step 5. Once you have chosen where you want to install Tor Browser, click [Install]. The following window should appear while Tor Browser is being installed:

Figure 5: Installing Tor Browser

Step 6. Click [Finish] through the following window, to complete the installation of Tor Browser:

Figure 5: Completing the Tor Browser Setup Wizard

By selecting [Run Tor Browser] in this window, you will proceed to running this browser.

The first time you launch Tor Browser, it will ask you how it should connect to the Internet:

Direct Access: Select this option if your access to the Internet is unrestricted and if the use of Tor is not blocked, banned, or monitored where you are located.

Restricted Access: Select this option if your access to the Internet is restricted or if the use of Tor is blocked, banned, or monitored where you are located.

After you initially configure and launch Tor Browser it will continue to connect to the Tor network with no additional configuration. But you can change these settings at any time from within the Tor Browser. You may need to change them when you are travelling, or if the situation changes in your country. To do so, see Section 3.3, How to reconfigure access to the Tor network.

Once you have installed Tor Browser, the Tor Browser Setup Wizard will direct you to the following window:

Figure 1: Tor Network Settings

If access to the internet (and to the Tor Network) is not restricted in your location, perform the following step to configure Tor Browser:

Step 1. Click [Connect] to launch Tor Browser

Figure 2: Connecting to the Tor Network

After a few moments, Tor Browser will open:

Figure 3: Tor Browser

If you want to use the Tor Browser from a location where the Tor network is blocked, you will have to use a bridge relay. Bridges are not listed in the public directory of Tor relays, so they are more difficult to block. Some bridges also support pluggable transports, which try to disguise your traffic to and from the Tor network. This helps prevent online filters from identifying and blocking bridge relays.

The default pluggable transport, called obfs4, also makes it slightly more difficult for others to figure out that you are connecting to the Tor network. In general, though, Tor is not designed to hide the fact that you are using Tor.

You can learn more about bridges on the Tor project website. There are two ways to use bridges. You can enable the provided bridges or you can request custom bridges.

Once you have installed Tor Browser, the Tor Browser Setup Wizard will direct you to the following window:

Figure 1: Tor Network Settings

Step 1. If your connection to the Tor network is blocked or otherwise censored, Click [Configure]

Note: If you have already configured the Tor Browser, you can activate the screen below by following the steps in Section 3.3

Figure 2: Tor bridges configuration

Step 2. Select Yes

Step 3. Click [Next] to display the bridge configuration screen.

Figure 3: The bridge configuration screen

Step 4. Select Connect with provided bridges.

Step 5. Click [Next] to display the local proxy configuration screen.

The Tor Browser will now ask if you need to use a local proxy to access the Internet. The steps below assume that you do not. If you do, you can check your regular browser settings and copy over your proxy configuration. (In Firefox you can find these settings in the Options > Advanced > Network tab of Connection Settings. In other browsers you might find them under Internet Options. You can also use the Help feature within your browser for further assistance.

Figure 4: The local proxy configuration screen

Step 6. Select [No].

Step 7. Click [Connect] to launch Tor Browser.

Figure 5: Connecting to the Tor network

After a few moments, Tor Browser will open.

You can also connect to the Tor network through custom bridges, which are used by fewer people than the provided bridges and are therefore less likely to be blocked. If you are unable to access the Tor Project website, you can request custom bridge addresses by sending an email to bridges@torproject.org using a Riseup, Gmail or Yahoo account. Include the phrase, get bridges in the body of your message

If you can access the Tor Project website, you can obtain custom bridge addresses by visiting https://bridges.torproject.org/options and following the steps below.

Step 1. Click Just give me bridges!

Figure 1: Obtaining Tor bridges

Step 2. Fill in the captcha and press enter.

Figure 2: Captcha

This should display three bridge addresses:

Figure 3: Bridge addresses

Step 3. Once you have your custom bridge addresses, you can type them into Tor Bridge Configuration screen shown below.

Note: If you are launching Tor Browser for the first time, you can find the Tor Bridge Configuration screen by follow the first few steps of the previous section. To find this screen if you have already setup Tor Browser, see the following section.

Figure 4: Tor bridge configuration screen

At any stage, if you need to access the Tor Network a different way, for example if you have travelled to a country that blocks Tor, you can update your settings from within the browser by following the steps below:

Step 1: Click the button to activate the Tor Browser menu

Figure 1: The Tor Browser Configuration menu

Step 2. Select Tor Network Settings to change how Tor Browser connects to the Internet.

Figure 2: Tor Network Settings

This screen allows you to enable or disable the use of Bridges and add custom Bridges, among other configuration changes.

When you are done, click [OK] and restart the Tor Browser.

It is important to remember that Tor Browser only provides anonymity for the things you do within a Tor Browser window. Your other online activities do not use Tor just because it is running.

Note: In keeping with a policy of privacy by design, Tor Browser is configured in such a way that it does not save your browsing history to your hard drive. Each time you quit Tor Browser, your browsing history will be deleted.

Tor Browser hides your IP address from the websites you visit. If it is working properly, you should appear to be accessing websites from a location on the internet that:

The simplest way to confirm this is by visiting the Tor Check website, which is located at https://check.torproject.org/.

If you are not using Tor, it will display the following:

Figure 1: Tor Check showing that Tor is not working properly

If you are using Tor, it will display the following:

Figure 2: Tor Check showing that Tor is working properly

If you want to check your apparent IP address using a service that is not associated with the Tor Project, there are many options online. Examples that support https encryption (which makes it more difficult for someone other than the service provider to "fake" the result) include:

If you access these websites without using Tor Browser, they should display your real IP address, which is linked to your physical location. If you access them through Tor Browser, they should display a different IP address.

You can create a "new identity" for your Tor Browser. When you do so, Tor Browser will randomly select a new set of Tor relays, which will make you appear to be coming from a different IP address when you visit websites.To do this, follow the steps below:

Step 1. Click the button to activate the Tor Browser menu

Figure 1: Creating a new identity in Tor Browser

Step 2. Select [New Identity] from the menu.

Read this article:
Tor Browser for Windows - Online anonymity and censorship circumvention

Posted in Tor Browser | Comments Off on Tor Browser for Windows – Online anonymity and censorship circumvention

Europe-wide raids against cybercrime networks – ABC News

Posted: at 12:55 pm

Police in three European countries have raided dozens of homes and offices linked to suspected cybercriminals, including the alleged operators of a secret forum used to trade illicit wares, officials said Wednesday.

More than 1,000 investigators searched over 120 premises across Germany late Tuesday in connection with crimenetwork.biz, a so-called darknet site that is allegedly used to buy and sell stolen goods, drugs and medication.

The darknet is a part of the internet hosted within an encrypted network and accessible only through specialized anonymity-providing tools, most notably the Tor Browser.

German federal police said in a statement that the raids followed a four-month criminal probe during which investigators sifted through over a million posts and private messages exchanged by some 260 members of the darknet forum.

It said that 153 members of the forum were identified, including 11 people considered to be part of the "leadership level" who now face charges of forming a criminal organization.

In a separate set of raids Tuesday, police in Germany, Latvia and Britain on Tuesday targeted 10 premises and 12 people suspected of stealing money from online banking customers in Germany.

Prosecutors in Frankfurt said the suspects used so-called phishing attacks to gain access to victims' passwords and then obtained duplicate SIM cards for their cellphones.

Using those SIM cards they were able to receive text messages from the victims' bank containing an authorization code needed for money transfers.

Prosecutors said the main suspect is a 34-year-old Belarusian citizen who was arrested in Frankfurt in February. A 27-year-old dual citizen of Kazakhstan and Germany was arrested Tuesday, as was a 47-year-old Moldovan citizen living in London.

Read this article:
Europe-wide raids against cybercrime networks - ABC News

Posted in Tor Browser | Comments Off on Europe-wide raids against cybercrime networks – ABC News

Tax Coalition Forms to Address Uncertainty in US Cryptocurrency Market – Finance Magnates

Posted: at 12:54 pm

The legal status, and especially the tax classification, of cryptocurrency in the US is a burning issue at the moment following the IRS (Internal Revenue Service) demands that the Coinbase Bitcoin and Ethereum exchange will surrender all its US client data.

To help fix the situation, the Chamber of Digital Commerce and Steptoe & Johnson LLP today announced the formation of the Digital Assets Tax Policy Coalition, a Washington, D.C.-based coalition created to help develop effective and efficient tax policies for the market. Participants include exchanges, wallet providers, and transaction processing companies withSteptoe as counsel.

They explain that developing these policies will allow the IRS to implement the recent recommendations by the Treasury Inspector General for Tax Administration (TIGTA) that the IRS develop a strategic plan for its virtual currency program and create third-party tools to allow for greater compliance, while minimizing the need for aggressive and burdensome enforcement actions.

Clear tax treatment for digital assets is essential to ensure robust growth of this important sector, said Perianne Boring, president and founder of the Chamber of Digital Commerce.

We are proud to be working with the industrys leading companies to engage with policymakers on an issue of vital importance to the sector. Tax solutions that allow the IRS to do its job without resorting to actions such as a John Doe summons will be of benefit to all, said Jason Weinstein, partner at Steptoe and co-chair of Steptoes Blockchain and Digital Currency practice.

Blockchain and digital asset technologies pose unique challenges to tax administration. We look forward to working with the Coalition to develop policies that minimize compliance burdens for the industry while also providing the IRS the tools it needs to administer the tax code effectively and efficiently, said Cameron Arterton, of counsel at Steptoe.

Like a number of other regulators around the world, since 2014 the IRS considers cryptocurrencies to be property, not currency, for tax purposes.

See more here:
Tax Coalition Forms to Address Uncertainty in US Cryptocurrency Market - Finance Magnates

Posted in Cryptocurrency | Comments Off on Tax Coalition Forms to Address Uncertainty in US Cryptocurrency Market – Finance Magnates