Posts Tagged ‘invasion of privacy’

Cyber security expert and Libertarian presidential candidate John McAfee is alarmed at the potential implications from Apple being forced to create a virtual backdoor to their encrypted system. In an enlightening op-ed, McAfee blasts the FBI for its ineptitude, while exposing the archaic hiring practices of the Feds that create a technology gap between FBI and private sector capabilities. McAfee makes clear that if the government gains access, privacy, as we know it, will fail to exist.+

“No matter how you slice this pie, if the government succeeds in getting this back door, it will eventually get a back door into all encryption, and our world, as we know it, is over,” McAfee writes.

The tech guru offers his teams hacking services to the FBI free of charge, as a means of allowing the phone in question to be accessed – without allowing the government to have a backdoor into all iPhones. McAfee would provide the FBI with the information they claim to seek, while at the same time allowing for secure encryption to continue to exist – of course there is a distinct possibility that the actual intention of forcing Apple to create a backdoor isn’t to access this particular phone, but as a means of breaking encryption on a global basis.

Read McAfee’s op-ed to the FBI below:

Using an obscure law, written in 1789 — the All Writs Act — the US government has ordered Apple to place a back door into its iOS software so the FBI can decrypt information on an iPhone used by one of the San Bernardino shooters.

It has finally come to this. After years of arguments by virtually every industry specialist that back doors will be a bigger boon to hackers and to our nation’s enemies than publishing our nuclear codes and giving the keys to all of our military weapons to the Russians and the Chinese, our government has chosen, once again, not to listen to the minds that have created the glue that holds this world together.

This is a black day and the beginning of the end of the US as a world power. The government has ordered a disarmament of our already ancient cybersecurity and cyberdefense systems, and it is asking us to take a walk into that near horizon where cyberwar is unquestionably waiting, with nothing more than harsh words as a weapon and the hope that our enemies will take pity at our unarmed condition and treat us fairly.

Any student of world history will tell you that this is a dream. Would Hitler have stopped invading Poland if the Polish people had sweetly asked him not to do so? Those who think yes should stand strongly by Hillary Clinton’s side, whose cybersecurity platform includes negotiating with the Chinese so they will no longer launch cyberattacks against us.

The FBI, in a laughable and bizarre twist of logic, said the back door would be used only once and only in the San Bernardino case.

Tim Cook, CEO of Apple, replied:

The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.

No matter how you slice this pie, if the government succeeds in getting this back door, it will eventually get a back door into all encryption, and our world, as we know it, is over. In spite of the FBI’s claim that it would protect the back door, we all know that’s impossible. There are bad apples everywhere, and there only needs to be in the US government. Then a few million dollars, some beautiful women (or men), and a yacht trip to the Caribbean might be all it takes for our enemies to have full access to our secrets.

Cook said:

The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

The fundamental question is this: Why can’t the FBI crack the encryption on its own? It has the full resources of the best the US government can provide.

With all due respect to Tim Cook and Apple, I work with a team of the best hackers on the planet. These hackers attend Defcon in Las Vegas, and they are legends in their local hacking groups, such as HackMiami. They are all prodigies, with talents that defy normal human comprehension. About 75% are social engineers. The remainder are hardcore coders. I would eat my shoe on the Neil Cavuto show if we could not break the encryption on the San Bernardino phone. This is a pure and simple fact.

And why do the best hackers on the planet not work for the FBI? Because the FBI will not hire anyone with a 24-inch purple mohawk, 10-gauge ear piercings, and a tattooed face who demands to smoke weed while working and won’t work for less than a half-million dollars a year. But you bet your ass that the Chinese and Russians are hiring similar people with similar demands and have been for many years. It’s why we are decades behind in the cyber race.

Cyberscience is not just something you can learn. It is an innate talent. The Juilliard school of music cannot create a Mozart. A Mozart or a Bach, much like our modern hacking community, is genetically created. A room full of Stanford computer science graduates cannot compete with a true hacker without even a high-school education.

So here is my offer to the FBI. I will, free of charge, decrypt the information on the San Bernardino phone, with my team. We will primarily use social engineering, and it will take us three weeks. If you accept my offer, then you will not need to ask Apple to place a back door in its product, which will be the beginning of the end of America.

If you doubt my credentials, Google “cybersecurity legend” and see whose name is the only name that appears in the first 10 results out of more than a quarter of a million.

Make no mistake that this is one of the most epic battles in the history of privacy, as the decisions that are reached in this case will reverberate throughout the world and have far reaching consequences. There is a fundamental battle taking place as to whether an individual has a right to privacy or, if as the U.S. government is asserting; privacy is a privilege bestowed upon individuals at the behest of the government.+

Ironically, privacy is considered a fundamental human right as recognized in the UN Declaration of Human Rights, the International Covenant on Civil and Political Rights and in many other international and regional treaties. Privacy is the lynchpin of human dignity and many other key values such as freedom of association and freedom of speech have their roots in privacy.

When the U.S. government works to undermine what is considered a fundamental human right by most of the world, perhaps it’s time to seriously question why those elected to represent the people are actively working to undermine the rights of those that put them in office.


Source:

Via NC Renegade

The Kentucky 10 - The Nauglers

If the government does not like the way that you are raising your kids, they will come in and grab them at any time without giving any warning whatsoever.  Of course this is completely and totally unlawful, but it has been happening all over America.  The most recent example of this that has made national headlines is particularly egregious.  Joe and Nicole Naugler of Breckinridge County, Kentucky just had their 10 children brutally ripped away from them just because the government does not approve of how they are living their lives and how they are educating their young ones.  Let’s be very clear about this – Joe and Nicole had done nothing to violate the law whatsoever.  All of their kids were happy, healthy and very intelligent.  But because the control freaks running things in Kentucky got wind of their “off the grid lifestyle”, they have now had all of their children unlawfully abducted from them.

Read the rest @ http://ncrenegade.com/editorial/police-abduct-10-children-from-a-family-in-kentucky-because-of-their-off-the-grid-lifestyle/

By Michael Snyder

Are you a conservative, a libertarian, a Christian or a gun owner?  Are you opposed to abortion, globalism, Communism, illegal immigration, the United Nations or the New World Order?  Do you believe in conspiracy theories, do you believe that we are living in the “end times” or do you ever visit alternative news websites (such as this one)?

If you answered yes to any of those questions, you are a “potential terrorist” according to official U.S. government documents.

At one time, the term “terrorist” was used very narrowly.  The government applied that label to people like Osama bin Laden and other Islamic jihadists.  But now the Obama administration is removing all references to Islam from terror training materials, and instead the term “terrorist” is being applied to large groups of American citizens.

And if you are a “terrorist”, that means that you have no rights and the government can treat you just like it treats the terrorists that are being held at Guantanamo Bay.  So if you belong to a group of people that is now being referred to as “potential terrorists”, please don’t take it as a joke.  The first step to persecuting any group of people is to demonize them.  And right now large groups of peaceful, law-abiding citizens are being ruthlessly demonized.

Below is a list of 72 types of Americans that are considered to be “extremists” and “potential terrorists” in official U.S. government documents.  To see the original source document for each point, just click on the link.  As you can see, this list covers most of the country…

1. Those that talk about “individual liberties”
2. Those that advocate for states’ rights
3. Those that want “to make the world a better place”
4. “The colonists who sought to free themselves from British rule”
5. Those that are interested in “defeating the Communists”
6. Those that believe “that the interests of one’s own nation are separate from the interests of other nations or the common interest of all nations”
7. Anyone that holds a “political ideology that considers the state to be unnecessary, harmful,or undesirable”
8. Anyone that possesses an “intolerance toward other religions”
9. Those that “take action to fight against the exploitation of the environment and/or animals”
10. “Anti-Gay”
11. “Anti-Immigrant”
12. “Anti-Muslim”
13. “The Patriot Movement”
14. “Opposition to equal rights for gays and lesbians”
15. Members of the Family Research Council
16. Members of the American Family Association
17. Those that believe that Mexico, Canada and the United States “are secretly planning to merge into a European Union-like entity that will be known as the ‘North American Union’”
18. Members of the American Border Patrol/American Patrol
19. Members of the Federation for American Immigration Reform
20. Members of the Tennessee Freedom Coalition
21. Members of the Christian Action Network
22. Anyone that is “opposed to the New World Order”
23. Anyone that is engaged in “conspiracy theorizing”
24. Anyone that is opposed to Agenda 21
25. Anyone that is concerned about FEMA camps
26. Anyone that “fears impending gun control or weapons confiscations”
27. The militia movement
28. The sovereign citizen movement
29. Those that “don’t think they should have to pay taxes”
30. Anyone that “complains about bias”
31. Anyone that “believes in government conspiracies to the point of paranoia”
32. Anyone that “is frustrated with mainstream ideologies”
33. Anyone that “visits extremist websites/blogs”
34. Anyone that “establishes website/blog to display extremist views”
35. Anyone that “attends rallies for extremist causes”
36. Anyone that “exhibits extreme religious intolerance”
37. Anyone that “is personally connected with a grievance”
38. Anyone that “suddenly acquires weapons”
39. Anyone that “organizes protests inspired by extremist ideology”
40. “Militia or unorganized militia”
41. “General right-wing extremist”
42. Citizens that have “bumper stickers” that are patriotic or anti-U.N.
43. Those that refer to an “Army of God”
44. Those that are “fiercely nationalistic (as opposed to universal and international in orientation)”
45. Those that are “anti-global”
46. Those that are “suspicious of centralized federal authority”
47. Those that are “reverent of individual liberty”
48. Those that “believe in conspiracy theories”
49. Those that have “a belief that one’s personal and/or national ‘way of life’ is under attack”
50. Those that possess “a belief in the need to be prepared for an attack either by participating in paramilitary preparations and training or survivalism”
51. Those that would “impose strict religious tenets or laws on society (fundamentalists)”
52. Those that would “insert religion into the political sphere”
53. Anyone that would “seek to politicize religion”
54. Those that have “supported political movements for autonomy”
55. Anyone that is “anti-abortion”
56. Anyone that is “anti-Catholic”
57. Anyone that is “anti-nuclear”
58. “Rightwing extremists”
59. “Returning veterans”
60. Those concerned about “illegal immigration”
61. Those that “believe in the right to bear arms”
62. Anyone that is engaged in “ammunition stockpiling”
63. Anyone that exhibits “fear of Communist regimes”
64. “Anti-abortion activists”
65. Those that are against illegal immigration
66. Those that talk about “the New World Order” in a “derogatory” manner
67. Those that have a negative view of the United Nations
68. Those that are opposed “to the collection of federal income taxes”
69. Those that supported former presidential candidates Ron Paul, Chuck Baldwin and Bob Barr
70. Those that display the Gadsden Flag (“Don’t Tread On Me”)
71. Those that believe in “end times” prophecies
72. Evangelical Christians

The groups of people in the list above are considered “problems” that need to be dealt with.  In some of the documents referenced above, members of the military are specifically warned not to have anything to do with such groups.

We are moving into a very dangerous time in American history.  You can now be considered a “potential terrorist” just because of your religious or political beliefs.  Free speech is becoming a thing of the past, and we are rapidly becoming an Orwellian society that is the exact opposite of what our founding fathers intended.

Please pray for the United States of America.  We definitely need it.

http://directorblue.blogspot.com/2015/02/the-72-types-of-americans-that-are.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+DougRossJournal+%28Doug+Ross+@+Journal%29

From-The Burning Platform

Guest Post by John W. Whitehead

The Fourth Amendment was designed to stand between us and arbitrary governmental authority. For all practical purposes, that shield has been shattered, leaving our liberty and personal integrity subject to the whim of every cop on the beat, trooper on the highway and jail official. The framers would be appalled.”—Herman Schwartz, The Nation

Our freedoms—especially the Fourth Amendment—are being choked out by a prevailing view among government bureaucrats that they have the right to search, seize, strip, scan, spy on, probe, pat down, taser, and arrest any individual at any time and for the slightest provocation.

Forced cavity searches, forced colonoscopies, forced blood draws, forced breath-alcohol tests, forced DNA extractions, forced eye scans, forced inclusion in biometric databases—these are just a few ways in which Americans are being forced to accept that we have no control over what happens to our bodies during an encounter with government officials.

Worse, on a daily basis, Americans are being made to relinquish the most intimate details of who we are—our biological makeup, our genetic blueprints, and our biometrics (facial characteristics and structure, fingerprints, iris scans, etc.)—in order to clear the nearly insurmountable hurdle that increasingly defines life in the United States: we are all guilty until proven innocent.

Thus far, the courts have done little to preserve our Fourth Amendment rights, let alone what shreds of bodily integrity remain to us.

For example, David Eckert was forced to undergo an anal cavity search, three enemas, and a colonoscopy after allegedly failing to yield to a stop sign at a Wal-Mart parking lot. Cops justified the searches on the grounds that they suspected Eckert was carrying drugs because his “posture [was] erect” and “he kept his legs together.” No drugs were found. During a routine traffic stop, Leila Tarantino was subjected to two roadside strip searches in plain view of passing traffic, during which a female officer “forcibly removed” a tampon from Tarantino. Nothing illegal was found. Nevertheless, such searches have been sanctioned by the courts, especially if accompanied by a search warrant (which is easily procured), as justified in the government’s pursuit of drugs and weapons.

Close to 600 motorists leaving Penn State University one Friday night were stopped by police and, without their knowledge or consent, subjected to a breathalyzer test using flashlights that can detect the presence of alcohol on a person’s breath. These passive alcohol sensors are being hailed as a new weapon in the fight against DUIs. However, because they cannot be used as the basis for arrest, breathalyzer tests are still required. And for those who refuse to submit to a breathalyzer, there are forced blood draws. One such person is Michael Chorosky, who was surrounded by police, strapped to a gurney and then had his blood forcibly drawn after refusing to submit to a breathalyzer test. “What country is this? What country is this?” cried Chorosky during the forced blood draw. Thirty states presently allow police to do forced blood draws on drivers as part of a nationwide “No Refusal” initiative funded by the federal government.

Not even court rulings declaring such practices to be unconstitutional in the absence of a warrant have slowed down the process. Now the police simply keep a magistrate on call to rubber stamp the procedure over the phone. That’s what is called an end-run around the law, and we’re seeing more and more of these take place under the rubric of “safety.”

The National Highway Safety Administration, the same government agency that funds the “No Refusal” DUI checkpoints and forcible blood draws, is also funding nationwide roadblocks aimed at getting drivers to “voluntarily” provide police with DNA derived from saliva and blood samples, reportedly to study inebriation patterns. When faced with a request for a DNA sample by police during a mandatory roadblock, most participants understandably fail to appreciate the “voluntary” nature of such a request. Unfortunately, in at least 28 states, there’s nothing voluntary about having one’s DNA collected by police in instances where you’ve been arrested, whether or not you’re actually convicted of a crime. The remaining states collect DNA on conviction. All of this DNA data is being fed to the federal government. Indeed, the United States has the largest DNA database in the world, CODIS, which is managed by the FBI and is growing at an alarming rate.

Airline passengers, already subjected to virtual strip searches, are now being scrutinized even more closely, with the Customs and Border Protection agency tasking airport officials with monitoring the bowel movements of passengers suspected of ingesting drugs. They even have a special hi-tech toilet designed to filter through a person’s fecal waste.

Iris scans, an essential part of the U.S. military’s boots-on-the-ground approach to keeping track of civilians in Iraq and Afghanistan, are becoming a de facto method of building the government’s already mammoth biometrics database. Funded by the Dept. of Justice, along with other federal agencies, the iris scan technology is being incorporated into police precincts, jails, immigration checkpoints, airports and even schools. School officials—from elementary to college—have begun using iris scans in place of traditional ID cards. As for parents wanting to pick their kids up from school, they have to first submit to an iris scan.

As for those endless pictures everyone so cheerfully uploads to Facebook (which has the largest facial recognition database in the world) or anywhere else on the internet, they’re all being accessed by the police, filtered with facial recognition software, uploaded into the government’s mammoth biometrics database and cross-checked against its criminal files. With good reason, civil libertarians fear these databases could “someday be used for monitoring political rallies, sporting events or even busy downtown areas.”

As these police practices and data collections become more widespread and routine, there will be no one who is spared from the indignity of DNA sampling, blood draws, and roadside strip and/or rectal or vaginal searches, whether or not they’ve done anything wrong. We’re little more than economic units, branded like cattle, marked for easy identification, and then assured that it’s all for our “benefit,” to weed us out from the “real” criminals, and help the police keep our communities “safe” and secure.

What a bunch of hokum. As I point out in my book A Government of Wolves: The Emerging American Police State, these databases, forced extractions and searches are not for our benefit. They will not keep us safe. What they will do is keep us mapped, trapped, targeted and controlled.

Moreover, what if you don’t want to be forced to trust the government with your most intimate information? What if you don’t trust the government to look out for your best interests in the first place? How do you protect yourself against having your blood forcibly drawn, your DNA extracted, your biometrics scanned and the most intimate details of who you are—your biological footprint—uploaded into a government database?

What recourse do you have when that information, taken against your will, is shared, stolen, sold or compromised, as it inevitably will be in this age of hackers? We know that databases can be compromised. We’ve seen it happen to databases kept by health care companies, motor vehicle agencies, financial institutions, retailers and intelligence agencies such as the NSA. In fact, 2014 was dubbed the Year of the Hack in light of the fact that over a billion personal data records were breached, leaving those unlucky enough to have their data stolen vulnerable to identity theft, credit card fraud and all manner of criminal activities carried out in their names.

Banks now offer services —for a fee—to help you in the event that your credit card information is compromised and stolen. You can also pay for services to protect against identity theft in the likely event that your social security information is compromised and misused. But what happens when your DNA profile is compromised? And how do you defend yourself against charges of criminal wrongdoing in the face of erroneous technological evidence—DNA, biometrics, etc., are not infallible—that place you at the scene of a crime you didn’t commit?

“Identity theft could lead to the opening of new fraudulent credit accounts, creating false identities for criminal enterprises, or a host of other serious crimes,” said Jason Hart, vice president of cloud services, identity and data protection at the digital security company Gemalto. “As data breaches become more personal, we’re starting to see that the universe of risk exposure for the average person is expanding.”

It’s not just yourself you have to worry about, either. It’s also anyone related to you—who can be connected by DNA. These genetic fingerprints, as they’re called, do more than just single out a person. They also show who you’re related to and how. As the Associated Press reports, “DNA samples that can help solve robberies and murders could also, in theory, be used to track down our relatives, scan us for susceptibility to disease, or monitor our movements.”

Capitalizing on this, police in California, Colorado, Virginia and Texas use DNA found at crime scenes to identify and target family members for possible clues to a suspect’s whereabouts. Who will protect your family from being singled out for “special treatment” simply because they’re related to you? As biomedical researcher Yaniv Erlich warns, “If it’s not regulated and the police can do whatever they want … they can use your DNA to infer things about your health, your ancestry, whether your kids are your kids.”

These are just a few of the questions we should be asking before these technologies and programs become too entrenched and irreversible.

While the Fourth Amendment was created to prevent government officials from searching an individual’s person or property without a warrant and probable cause—evidence that some kind of criminal activity was afoot—the founders could scarcely have imagined a world in which we needed protection against widespread government breaches of our privacy on a cellular level. Yet that’s exactly what we are lacking.

Once again, technology has outdistanced both our understanding of it and our ability to adequately manage the consequences of unleashing it on an unsuspecting populace. As for all of those databases being sold to you for your safety and benefit, whether or not they’re actually effective in catching criminals, you can be assured that they will definitely be snatching up innocent citizens, as well.

In the end, what all of this amounts to is a carefully crafted campaign designed to give the government access to and control over what it really wants: you.

SAN FRANCISCO (Reuters) – The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world’s computers, according to cyber researchers and former operatives.

That long-sought and closely guarded ability was part of a cluster of spying programs discovered by Kaspersky Lab, the Moscow-based security software maker that has exposed a series of Western cyberespionage operations.

Kaspersky said it found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria. The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, Kaspersky said. (http://reut.rs/1L5knm0)

The firm declined to publicly name the country behind the spying campaign, but said it was closely linked to Stuxnet, the NSA-led cyberweapon that was used to attack Iran’s uranium enrichment facility. The NSA is the agency responsible for gathering electronic intelligence on behalf of the United States.

A former NSA employee told Reuters that Kaspersky’s analysis was correct, and that people still in the intelligence agency valued these spying programs as highly as Stuxnet. Another former intelligence operative confirmed that the NSA had developed the prized technique of concealing spyware in hard drives, but said he did not know which spy efforts relied on it.

NSA spokeswoman Vanee Vines declined to comment.

Kaspersky published the technical details of its research on Monday, which should help infected institutions detect the spying programs, some of which trace back as far as 2001. (http://bit.ly/17bPUUe)

MIAMI (AP) — Drivers at drunken-driving checkpoints don’t have to speak to police or even roll down their windows. They just have to place their license and registration on the glass, along with a note saying they have no comment, won’t permit a search and want a lawyer. At least, that’s the view of a South Florida attorney.

Warren Redlich contends the commonly-used checkpoints violate drivers’ constitutional rights. He and an associate have created a website detailing their tactics. They’ve even made videos, one viewed more than 2 million times on the Internet, of their refusals to interact with police.

Doubts over the legality — and wisdom — of the tactics have been expressed by legal experts and local authorities.

Redlich, of Boca Raton, said his goal is not to protect drunken drivers, but to protect the innocent. He says some of his clients who passed breath-alcohol tests still faced DUI charges because the officer said he detected an odor of alcohol or the person had slurred speech.

“The point of the card is, you are affirmatively asserting your rights without having to speak to the police and without opening your window,” he said.

Not surprisingly, this does not sit well with law enforcement officials who insist drivers must speak in order to make the checkpoints work. And, they point out the U.S. Supreme Court in 1990 upheld the use of random DUI checkpoints, concluding they don’t violate constitutional protections against unreasonable search and seizure.

“They wouldn’t be allowed out of that checkpoint until they talk to us. We have a legitimate right to do it,” said Sheriff David Shoar of St. Johns County, president of the Florida Sheriffs Association. “If I was out there, I wouldn’t wave them through. I want to talk to that person more now.”

The widely viewed video was shot Dec. 31 at a checkpoint in Levy County, Florida, by Redlich’s associate Jeff Gray. In it, Gray approaches the officers with the flyer, his license, registration and insurance card in a plastic bag dangling outside the slightly open car window. The officers briefly examine it with a flashlight and then allow him to continue.

In bold type, the flyer states: “I remain silent. No searches. I want my lawyer.”

Police across Florida have seen the video. A spokeswoman for a large metro police agency says Gray’s experience at the checkpoint doesn’t mean the no-talk tactic is legitimate.

“He was allowed to proceed because he clearly was not driving while intoxicated,” said Veda Coleman-Wright, spokeswoman for the Broward Sheriff’s Office. “If those officers had reasonable suspicion to believe that the driver was impaired, they would have investigated further.”

There have been other incidents of motorists refusing to speak at DUI checkpoints around the country. In the Southwest, some drivers resist cooperating at Border Patrol checkpoints miles from the Mexican border that are aimed at finding immigrants in the country illegally.

Based on differences in DUI laws, Redlich has created versions of his flyer for 10 states with more on the way.

Read the rest @

http://news.yahoo.com/florida-lawyer-sparks-debate-rights-dui-checkpoints-172407203.html