http://thepiratebay.org/t(...)iefs_of_Police_Ownedquote:Op vrijdag 18 november 2011 23:22 schreef Nemephis het volgende:
FuckFBIFriday release: http://thepiratebay.org/user/AntiSecurity
quote:The IACP thought they could hold their 2011 annual conference in Chicago
unfettered by the clutches of insurrection. They must not have known their
conference starts on the Day of Action Against Police Brutality. They must not
have known that all over the world people are in the streets demonstrating
discontent with capitalism and the state. They also had no idea that for the
past few months black hat hackers have been owning their websites and databases.
They should have expected us.
In solidarity with the Occupation Movement and the International Day of Action
Against Police Brutality, allied #anonymous and #antisec vessels took aim at the
corrupt bootboys of the 1%: the police. We hacked, defaced, and destroyed
several law enforcement targets, leaking over 600MB of private information
including internal documents, membership rosters, addresses, passwords, social
security numbers, and other confidential data. According to the IACP\\\'s
development documents, their systems cost several hundred thousand dollars. We
are pleased to destroy it all for free, leaking their private info and defacing
their websites in one swift blow.
quote:Anonymous Leaks Another Computer Expert’s Personal Emails
In a typically nasty personal-political combo, Anonymous has leaked thousands of private emails belonging to a retired California cybercrime investigator named Fred Bacalagan, in what they say is payback for the recent Occupy Wall Street crackdown.
Anonymous hackers broke into two of Bacalagan's gmail accounts, his text message logs and his Google Voice voicemails, then dumped the whole thing on to a website and The Pirate Bay. Baclagan was a special agent supervisor at the Department of Justice specializing in cybercrime, and his emails contain thousands of correspondences from the private listserv of the International Association of Computer Investigative Specialists, spanning 2005 to 2011. So, any black hat hackers looking for tips on how to avoid being busted might want to scour the archive, which provides essentially an encyclopedia of computer forensics tips and tricks.
SPOILEROm spoilers te kunnen lezen moet je zijn ingelogd. Je moet je daarvoor eerst gratis Registreren. Ook kun je spoilers niet lezen als je een ban hebt.Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
Het artikel gaat verder.quote:Anonymous Hacks Back at Cybercrime Investigators
The Antisec wing of Anonymous has come out with another document release in its ongoing assault on law enforcement.
Antisec anons, who specialize in hacks that show the net’s vulnerabilities, gained access to the Gmail/Google account of one “Fred Baclagan.” Baclagan appears to be San Diego-based Alfredo Baclagan, a retired supervisor of the multi-agency Computer and Technology Crime Hightech Response Team. “CATCH” specializes in cybercrime investigation in the San Diego, Imperial Valley, and Riverside counties of southern California. They released a purported 38,000 emails from two accounts of Baclagan’s as a 581 MB torrent.
The video announcement opens with the computer voice intoning ”Greetings Pirates, and welcome to another exciting Fuck FBI Friday release.” Though not directly an attack on the FBI, this release may be the most consequential for computer crime investigators since the hack of HBGary, and particularly their CEO Aaron Barr, who had raised Anonymous’ ire by claiming to the Financial Times he’d uncovered the leadership of Anonymous.
While Anonymous had fun with Baclagan’s personal information, and even claimed to purchased camera equipment for him using his Google wallet, the most important consequences of this release may be the archives of the International Association of Computer Investigation Specialists mailing list archive. That mailing list includes conversation threads from forensic experts around the world discussing investigations, techniques, and how to counter different legal defense tactics.
quote:35 min 50 sec ago - Egypt
Hackers calling themselves the "Eg-R1z TeAm" have apparently defaced the website of Egyptian state television. State media, personified in the name of its headquarters building "Maspero," has become one of the most hated institutions of the regime for broadcasting what activists say is slanted, biased and inflammatory information.
quote:SOPA Causes Anonymous To Declare Operation Blackout
(Lindsay ONeal) Last month, the Stop Online Piracy Act (SOPA) was introduced to the House of Representatives aiming to censor key aspects of the Internet in order protect the rights of the entertainment industry. The PROTECT IP Act, the Senate counterpart to SOPA, already passed earlier this year, but enforcement has been shelved for the time being due to rising concerns that it has the power to impede freedom of speech. While both bills state they are trying to help the entertainment industry sell more movies and music downloads, the effects of the bill are far-reaching and potentially devastating to Internet freedom as well as to the Internet itself.
SOPA caught the attention of Anonymous and on Wednesday they released this video which warned:
“We are Anonymous. We are Legion. We do not forgive. We do not forget. To the American Congress. Expect us.”
Well, one hour ago, Anonymous released yet another video… SPOILER ALERT:
“We are Anonymous. We are Legion. We do not forgive censorship. We do not forget the denial of our free rights as human beings. To the United States government, you should’ve expected us.“
quote:http://www.jpost.com/NationalNews/Article.aspx?id=246238
About 50 Israeli women posed for a nude photo on Saturday, in a show of solidarity with 20-year-old Egyptian blogger Aliaa Magda Elmahdy. The women posed with a banner reading "Love without borders" in English, Hebrew and Arabic, at Beit Ha'am on Rothschild Boulevard.
Elmahdy was the target of sharp criticism from liberals and conservatives alike in Egypt for posting nude photos of herself on her blog in protest of the conservative Muslim country's restricted freedom of expression.
AnonymouSabu bespreekt wat mails.quote:Op zaterdag 19 november 2011 22:09 schreef Papierversnipperaar het volgende:
[..]
Het artikel gaat verder.
quote:SOPA provokes Anonymous: Hacktivists threaten U.S. Congress
Anonymous fights Internet censorship by opposing the Stop Online Piracy Act (SOPA).
Those claiming to represent the international Internet hacktivist collective known as Anonymous has issued a threat to the U.S. Congress if they pass the Stop Online Piracy Act (SOPA) currently being considered in the U.S. House of Representatives.
SOPA , also known as the Internet censorship bill, would radically restrict Internet freedom in an attempt to protect intellectual property rights. Critics claim the bill, if passed, would cripple the Internet as we know it.
Indeed, growing concern with the Stop Online Piracy Act has generated a great deal of buzz with the online community. Some of the biggest websites and brands in the world are actively encouraging their users to protest the bill, including: AOL Inc., eBay Inc., Facebook Inc., Google Inc., LinkedIn Corporation, Mozilla Corp., Twitter, Inc. and Yahoo! Inc.
quote:Op zondag 20 november 2011 13:47 schreef Papierversnipperaar het volgende:
Is dit niet iets voor Anonymiss?
[..]
quote:Israëlische vrouwen steunen naaktactie Egyptische blogger Aliaa el-Mahdy
Zo’n veertig Israëlische vrouwen gingen gisteren uit de kleren uit solidariteit met de Egyptische blogger Aliaa el-Mahdy. Die laatste plaatste een naaktfoto van zichzelf op haar blog waarna een officiële klacht tegen haar werd ingediend omdat zij de morele regels in Egypte zou hebben overtreden en haar lezers aangezet zou hebben tot onfatsoenlijkheid.
quote:Anonymous hacks cops coordinating Occupy evictions - PERF goes down
Sunday, Anonymous hacktivists assaulted PERF because of their alleged involvement in coordinating police crackdowns on Occupy protests across the country.
Anonymous hacktivists assaulted PERF, the Police Executive Research Forum, by taking down their website and releasing the private information of Sherwin B. "Chuck" Wexler - Executive Director at PERF.
PERF is a private but extremely influential national, non-governmental organization with close ties to law enforcement agencies across the country, as well as the U.S. Department of Homeland Security. The group allegedly orchestrated and coordinated the sometimes brutal police crack down on Occupy Wall Street, and other Occupy movements across the country.
After several news organizations identified PERF as being responsible for advising and coordinating the police crackdowns resulting in Occupy evictions and other brutalities, the hivemind of the nebulous and notorious international Internet collective known as Anonymous began to swarm, and sting.
quote:The #Antisec LE dump, PERF and your police state
I've been sifting through the emails that were dumped by #Antisec on Friday and it would appear that "internet security" is an oxymoron akin to "military intelligence" or "jumbo shrimp". The incompetence would be comical if these people did not wield so much power over the average citizen. Let's take a closer look below the fold...
quote:It is not surprising this breach in security is not being covered by any MSM outlets at the time I am writing this. It's a substantial breach and provides a pretty in depth look into cyber security and the so-called experts that are providing it and it's quite frankly embarrassing to them. Somehow we can't afford Health Care for the masses but we can afford to pay buffoons to not stop internet security breaches at the most basic level. It's a clown show, and we're paying for it while being told austerity is the answer to all our woes. While our kids are being pepper sprayed for exercising their right to assemble these guys are being rewarded with lucrative contracts. Here's a snippet from the release..
quote:How America could impose Internet censorship on the EU
As Victoria A. Espinel, the White House co-ordinator on copyright enforcement prepares to speak in the European Parliament next week, we learn of new powers being sought by the US government to impose IPR rules on other countries, including the EU. The Stop Online Piracy Act (also sometimes referred to as E-parasite) in the US congress seeks to impose the most draconian measures against Internet users and websites. But from an EU perspective, it contains a poison pill. American academics and NGOs who have studied are warning that it contains dangerous provisions which would empower US Embassies to force other countries to adopt the same anti-Internet measures.
The Stop Online Piracy Act ( SOPA - also sometimes referred to as E-parasite) is a twin to the Protect-IP Act in the US Senate. American academics are saying that SOPA will create a firewall of Internet censorship.
SOPA contains measures against search engines and linking sites, and indeed it would appear, against any site which is deemed to be “dedicated to infringing activities.”
Sites could be ordered to disappear from the Internet, without an entitlement to a defence, under measures which would includes orders addressed to ISPs and domain registrars.
SOPA also contains provisions whereby the US government can check out websites for possible infringing content, and if the website tries to stop them, it may be sanctioned.
Section 205 of Stop Online Piracy Act is called: Defending Intellectual Property Rights Abroad. Section 205 would build on the existing Special 301 process but will take it much further. It provides for “aggressive support for enforcement action against violations of the intellectual property rights of United States persons”. And it specifically mandates US embassies to ‘enable’ foreign governments to comply with international obligations regarding IP rights. A new role of IP attache will be created in order to facilitate this. This role will be to work with United States holders of intellectual property rights and industry to address intellectual property rights violations in the countries where the attachés are assigned.
US Embassies currently put pressure on other governments using the Special 301 powers. Exactly how they do so has been revealed in various leaked diplomatic cables published by Wikileaks.
The EU should take this threat very seriously. SOPA could mean that US Embassiess will try to forces changes in EU and Member State law which would contravene to the acquis and indeed are contrary to the balance of rights which we have established in Europe.
Victoria A. Espinel is speaking at the IP Forum, co-ordinated by the French pro-copyright MEP Marielle Gallo, next week.European Parliament hardline event on ACTA and enforcement
quote:"Possibly the most interesting content in his emails are the IACIS.com internal email list archives (2005-2011) which detail the methods and tactics cybercrime units use to gather electronic evidence, conduct investigations and make arrests," said the group, and invited anyone who has ever been arrested for computer crimes to check the archives for discussions about their case.
quote:“Pirate Blogger” Law Student Raided By Police For File-Sharing Articles
Anti-piracy group RettighedsAlliancen say they have been busy recently tracking down piracy ‘masterminds’. After busting who they claim is the leader of a huge movie piracy group, last week they had the police detain a less likely target – a 19-year-old law student who runs a file-sharing blog. RettighedsAlliancen say that guides on his site showed readers how to break the law, an act serious enough to involve the police.
On November 2nd, lawyers from RettighedsAlliancen, officials from the bailiff’s court and computer experts called at the home of an individual claimed to be a leading movie pirate.
The man, known online as Kefissos, stands accused of being connected to the ‘After Dark’ release group and responsible for the illegal uploading of hundreds of movies. Although it’s not certain they belong to the man, accounts in the name of Kefissos can be found on several leading torrent sites including The Pirate Bay, and many of the movies indexed have Danish connections.
But RettighedsAlliancen’s work this month had only just begun.
On Tuesday last week, as usual 19-year-old law student Halfdan Timm was studying at the University of Aarhus. Half a mile away the occupants of an unmarked Ford Mondeo car were unsuccessfully trying to track Halfdan down at his apartment. A little later during a break in his lectures Halfdan was confronted by police officers.
“I was given two options,” Halfdan explains. “Either I could go quietly with the two policemen, or I could be arrested and ‘do it the hard way’.”
Halfdan told TorrentFreak that he was under suspicion of “piratkopiering” (piracy-copying), and that the police had a search warrant for his apartment.
Not wanting to make life difficult, Halfdan chose the easy way and took the police to his home. Once there the police asked him if he had anything to show them in advance of their search. Halfdan pointed to his desktop computer containing downloaded songs and informed them that he had a collection of 50 downloaded movies burned on DVD.
“One policeman in rubber gloves then began a very careful examination. Sofa pillows, broom closet, refrigerator, my dirty underwear, the rest of my wardrobe, my entire bedroom, under my bed, toilet and even my roommate’s room – even though he has nothing to do with the case,” Halfdan adds.
Then the discussion moved on to the 40,000-member NextGen site, a private BitTorrent tracker founded in February 2010. NextGen is also home to Sublime, a group supplying local subtitles for all the latest Hollywood movies.
Nxtgen
“At first, they tried to figure out whether I was leading the tracker, searching for hidden equipment in the apartment, but when they realized that wasn’t the case, they tried to get as much information as possible about the actual owners.”
Halfdan doesn’t deny being a member of the site and admits he has downloaded movies and music, but according to comments made to Politiken by RettighedsAlliancen chief Maria Fredenslund, Halfdan is a file-sharing “mastermind”.
“By mastermind we mean one who stands behind file-sharing services,” she said. “We came across him in connection with our investigations and have notified the police.”
Halfdan puts the “mastermind” label down to simple stupidity but believes he may have been targeted for another reason – running a file-sharing related blog.
GratisFilm.info was founded by Halfdan in February 2011 and contains posts covering issues such as staying anonymous online (Halfdan notes the irony) and using seedboxes.
“It’s quite an idealistic cause for me, as I believe being anonymous online is (should be) a human right,” Halfdan told TorrentFreak.
“On the site, I guide on how to stay anonymous, gain access to The Pirate Bay even though it’s blocked in Denmark, but also about more ‘common’ subjects like new South Park episodes, the forthcoming Google Music, who Anonymous (the group) is and so on. Pretty much everything I find interesting. I believe using the police is [RettighedsAlliancen's] way of shutting me down.”
GratisFilm also carries reviews on a handful of BitTorrent sites, including NextGen. In early October, Halfdan interviewed the site’s owner, a fact he discussed with the police. This, he believes, has led some to believe he has a personal relationship with the site’s owner.
Halfdan’s assertion, that he was targeted because of his negativity towards anti-piracy companies, is rejected by RettighedsAlliancen, but they are clearly unimpressed with some of his articles.
“I was not aware that he criticized RettighedsAlliancen,” said Maria Fredenslund.
“But we can see that he teaches others to break the law and conceal themselves on the net. He is one of those who deliberately break the law. We believe that this was something that was so serious that it should be handled by the police.”
So are the police taking the matter seriously?
“The officers told me even they thought this was a waste of time, and that they could use their day better than driving around the whole day to pick up 50 movies and a computer,” Halfdan told us.
“I’m very surprised that the police went in on the case at all, but it does say quite a bit that they waited 3 months [after the initial complaint] to move, and that it’ll take at least 6 months before they start investigating my computer. This has a very, very low priority for them.”
Troels Møller, Piratgruppen spokesman and co-founder of internet think-tank Bitbureauet, is clearly outraged at this latest entertainment industry response to the file-sharing issue, describing it as completely disproportionate.
“Just as I thought Antipiratgruppen was becoming a bit more reasonable lately, they show their evil face from the old days again – the days of threat letters and blackmail,” he told TorrentFreak. “They were ransacking his apartment and searching through his dirty clothes! All this for copying some stuff on the internet? Where are the proportions? Is this really how the entertainment industry wants to treat its fans and customers?”
“What strikes me most about this case though, is that Maria Fredenslund apparently thinks that people should be arrested for teaching others how to use the internet anonymously. I would like to point out that this is not illegal! They don’t care about privacy or freedom of expression. In fact, they appear to be outright enemies of these fundamental rights.”
“Denmark is quickly becoming a frightening and shameful example to the rest of the world on how not to handle the filesharing ‘problem’,” Troels concludes.
quote:‘Anonymous’ targets pepper-spraying policeman
The online “hacktivist” group Anonymous published the personal contact details on Monday of a California university policeman who used pepper spray on protesters, and it urged supporters to flood him with phone calls and emails.
YouTube videos of Friday’s incident on the campus of theUniversity of California, Davis have gone viral and led to the suspension of the college police chief, two police officers and calls for the chancellor to step down.
In the YouTube videos, one of which has received 1.44 million views, two university police officers in riot gear are seen spraying an orange mist on protesters sitting peacefully on the ground.
Following the spraying, the crowd begins chanting “Shame on you!”
A YouTube video on Monday purportedly from Anonymous published the home address, the home telephone number, the cellphone number and the email address of one of the policeman who allegedly used the pepper spray on protestors.
In the video, an artificially altered voice tells the “police forces of the world” that “brutalization of our citizens is both unjust and uncalled for.”
Specifically addressing the officer involved in the Davis incident, it said: “You are a coward, and a bully.”
“Flood his phones, email and mailbox to voice your anger,” it said.
A call to the cellphone number listed identified it as that of the police officer involved and said his voicemail box was full.
Anonymous has been involved in scores of hacking exploits including the recent defacing of a website of Syria’s Ministry of Defense to protest a bloody crackdown on anti-government protestors.
Last year, the shadowy group launched retaliatory attacks on companies perceived to be enemies of the anti-secrecy website WikiLeaks.
Sowieso dat een Universiteit zijn eigen politie heeft is bizar. Net zoals dat ze pepperspray kunnen en mogen gebruiken. Die twee agenten hadden ze niet moeten schorsen, maar meteen moeten ontslaan.quote:
quote:#OpT4Traitor
Anonymous Press Release
Arturas T. Rosenbacher has been up to his games again. It wasn’t enough that he scammed Anonymous supporters out of money under the guise of AnonCMD, and it wasn’t enough that he was posting false information on OccupyChicago’s Facebook profile, and lying to the organizers about his false claims in helping start Wiki leaks, he had to do something to solidify is narcissistic insanity. On Sunday, November 6th Arturas decided it would be a great idea to release a famous rap star’s cell phone number to the world on twitter. The rap star, known as Lupe Fiasco donated tents, food and water to Occupy Chicago, and is an outspoken supporter of the Anonymous collective. Arturas did this under the flag and banner of Anonymous, using Anon Dev Pro as his twitter name, and telling those who listened that he knows high profile anons. The only reason Arturas knows high profile Anons, is because of his past track record with us, which is entrenched with scamming innocent people out of money.
Arturas wants attention, he wants to be famous. Let us make him famous. Let us all contact each and every Occupy movement and make sure the people know about the traitor T. No Occupy is safe with a traitor in the midst; T must be cataloged and identified by each and every individual within all Occupy movements. He must be shamed upon site for the damage he has done to Occupy Chicago, Lupe Fiasco, and the collective of Anonymous.
Arturas;
We told you we would come for you T, we warned you, and you did not listen. How did you think we would forget? How did you think we would forgive? Your actions will no longer con the masses into believing you are of any worth. Now everyone will know exactly who and what you are, which is nothing more than a small time con man with psychological problems seeking attention.
We are Anonymous,
We are Legion.
We do not Forgive,
We do not Forget,
Expect us.
Any Info on T?
Contact @Anon2World on Twitter or Youtube
quote:South African lawmakers approve 'secrecy bill' to protect state
.
ANC majority vote pushes controversial bill, which could outlaw whistleblowers and dilute public interest rights, to upper house
A controversial law to protect state secrets has been approved by South Africa's parliament, despite objections from Archbishop Desmond Tutu, rights organisations, and a group representing Nelson Mandela.
The African National Congress majority ensured that 229 MPs voted in favour of the protection of state information bill, with 107 votes against and two abstentions.
The ANC claimed it was updating legislation drawn up 30 years ago by the apartheid government.
Llewellyn Landers, an ANC MP, said the bill would not have a public-interest defence clause because "it would do irrevocable harm to the state and the people of South Africa if a court should find that a whistleblower was found to have given information not out of public interest but out of maliciousness".
But rival MPs united against the "secrecy bill", legislation that critics argue is the first piece of law-making since the end of apartheid to dismantle a part of South African democracy.
The law would make it a crime to leak, possess or publish information judged as classified by the government. Whistleblowers and journalists could face up to 25 years in jail if found guilty of such action.
In a rousing speech from the floor on Tuesday, Lindiwe Mazibuko, parliamentary leader of the opposition Democratic Alliance, warned: "This bill will unstitch the very fabric of our constitution. It will criminalise the freedom so many of our people fought for.
"What will you, the members on that side of the house, tell your grandchildren one day? I know you will tell them that you fought for freedom. But will you also tell them you helped to destroy it?
"Because they will pay the price for your actions today. Let this weigh heavy on your conscience as you cast your vote."
More than 1,000 protesters gathered outside the parliament building in Cape Town. Many wore black on what was dubbed Black Tuesday, a reference to Black Wednesday on 19 October 1977 when the apartheid government banned two newspapers and 19 black consciousness movements.
In a rare political intervention, the Nelson Mandela Centre of Memory issued an "expression of concern" about the bill and proposed four amendments. Mandela, 93, has always remained loyal to the ANC, and has almost never intervened since stepping down as the country's president.
Tutu said: "It is insulting to all South Africans to be asked to stomach legislation that could be used to outlaw whistleblowing and investigative journalism … and that makes the state answerable only to the state..
"Please hear the warnings of the academics, civil society leaders, labour representatives, media corps, and legal and constitutional experts. This law will do our people and our country a disservice."
In the past few months, the ANC did accept more than 120 amendments to its original draft but not, crucially, a public-interest defence clause.
When the bill was passed, editors in the parliamentary public gallery walked out in protest.
There was swift condemnation within South Africa and abroad.
Human Rights Watch, in New York, described the move as "a blow to freedom of expression and democratic accountability'. The group said: "Parliament should have heeded the calls of South African civil society, representatives of the media and political opposition, and refrained from holding the vote."
Daniel Bekele, the group's Africa director, added: "The manner in which the government pushed this bill through parliament instead of proceeding with consultations as promised, as well as the secrecy embedded in this legislation, send very worrying signs about the government's commitment to transparency."
The Helen Suzman Foundationexpressed outrage at the vote. "This marks a low point in South Africa's transition to democracy. It represents a significant step backwards in the long walk to freedom to which so many South Africans have devoted their lives."
The group Media Monitoring Africa said it had noted the decision with deep regret and warned that it would be bad for South Africa and its international reputation.
The Times of South Africa on Tuesday carried a black front page with the headline "Not in our name," and a statement signed by 15 national newspaper editors. It began: "Mark this day. Depending on the actions of the 400 MPs in the national assembly at 2pm, it will end as a day of triumph or of shame for our adolescent democracy.
"The spreading culture of self-enrichment, either corrupt, or merely inappropriate, makes scrutiny fuelled by whistleblowers who have the public interest at heart more essential than ever since 1994."
The bill will now move to parliament's upper house before going to the president, Jacob Zuma, to be signed into law. It could face a challenge in the constitutional court.
twitter:BABYDIABOLICAL twitterde op dinsdag 22-11-2011 om 18:57:24RT @anonops: They continue censoring the video and we continue uploading it #Anonymous Message - Op Pepper Police http://t.co/n8WZo31U reageer retweet
Het artikel gaat verder.quote:MPAA Costs Hollywood More Than US BitTorrent Piracy
During the last year Netflix managed to outgrow BitTorrent in terms of the amount of US Internet traffic it generates. A promising finding for Hollywood as it shows that there’s an overwhelming interest for the legal movie streaming service. At TorrentFreak we wondered what might happen if all US BitTorrent users made the switch to Netflix, and the results of this exploration are quite intriguing.
The movie industry claims that piracy is costing them billions of dollars a year.
Luckily for Hollywood, many Americans choose to consume their online media through legal services such as Netflix. In fact, there are now so many that the total Internet traffic generated by Netflix has outgrown that of BitTorrent.
This made us wonder – what would happen if all movie-downloading BitTorrent users made the switch to Netflix? What if movie piracy via BitTorrent disappeared?
Before we crunch some numbers we have to say that the model we use relies on a lot of assumptions. However, we try to keep these in favor of the movie industry to maximize their potential ‘profits’. We obviously chose Netflix as a BitTorrent replacement because it comes closest to what ‘pirates’ want.
twitter:Anon_Central twitterde op vrijdag 25-11-2011 om 09:59:56#DirectAction call to all #Occupy Movements on Twitter || Lets trend #OccupyBlackFriday! ty @OWS_Live Full support from #Anonymous! reageer retweet
Het artikel gaat verder.quote:Hacker ontdekt lek bij publieke omroep: ’2,3 miljoen gegevens op straat’
De hacker ‘Bitbuster’ heeft een lek in een beheersysteem van publieke omroepen en radiostations ontdekt waardoor 2,3 miljoen persoonsgegevens op straat zijn komen te liggen. Dat meldt Webwereld.
Een woordvoerder van Angry Bites, de webdeveloper verantwoordelijk voor het beheersysteem van de websites, zegt in een reactie tegen De Pers dat de hacker via een verouderde versie van de site bij de gegevens kon. Eén gelekt wachtwoord zou toegang hebben gegeven tot 160 websites van NPO en daarbuiten. Onder andere Slam FM, KRO, Omroep.nl, BNN, diverse publieke radiozenders en RTV Noord-Holland zouden getroffen zijn. Vooral 3FM, QMusic en de website van Klokhuis zijn het zwaarst getroffen.
Erik Kroeze, woordvoerder van NPO, wil tegenover nrc.nl graag benadrukken dat NPO slachtoffer is geworden van een beveiligingsprobleem bij de webdeveloper:
“Ik kan op dit moment niet zeggen welke gegevens precies zijn gelekt. Het lijkt er nu in de berichtgeving op dat NPO de gegevens heeft gelekt, terwijl dat niet zo is. Er zijn namelijk ook problemen met websites buiten de NPO. We hebben contact gehad met Angry Bites en de garantie gekregen dat het probleem zo snel mogelijk verholpen wordt. Wanneer weet ik nog niet. Alles dat dichtgezet kon worden, is dichtgezet.”
quote:Failure is not an option.
Enemies of Anonymous are permanent.
Enemies are to be eliminated swiftly and without incident.
Anonymous must work as one. No single Anonymous knows everything.
Anonymous does not tolerate action against Anonymous.
Any action against Anonymous will be dealt with swiftly and thoroughly.
Nothing can harm Anonymous.
Anonymous is the will to power.
Anonymous is always in control.
Anonymous has no identity.
Anonymous worships nothing.
Anonymous has no leader, and is led by no-one.
Human weakness is the virus; Anonymous is the cure.
Anonymous is anonymous.
Anonymous stays together through common ideas.
We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.
quote:ANONYMOUS attacks www.pricoahuila.com asking where the $3 billion dollars stolen from Coahuila are located
REPORTING FROM MEXICO: At 3:00 p.m. Mexican central standard time, twitter trend #OpTranzas skyrocked. At first I did not understand what exactly that trend was but it did not take me much time to understand that it was another ANONYMOUS operation. Their target was www.pricoahuila.com the official website of the Coahuila state ruling party: Institutional Revolutionary Party or PRI in Spanish.
It was incredible to read the outright hacking of the site live on twitter. The objective was to send a message to the PRI Party for the outright embezzlement of $3 billion dollars or $32 billion pesos. The fingers point at the past governor but only members of his cabinet were arrested.
$3 billion dollars for any state government to be embezzled is simply outrageous and ANONYMOUS simply will not let go of this line of investigation.
quote:Criminals and cyber bullies to be banned from the web
Criminals who commit offences online and cyber bullies will be banned from the internet as part of the Government’s new cyber security strategy, announced today.
It calls for police and courts to make more use of existing “cyber sanctions” to restrict access to the social networks and instant messaging services in cases of hacking, fraud and online bullying. Sex offenders and those convicted of harrassment or anti-social behaviour also face more internet restrictions under the new strategy.
Similar orders have been imposed on those charged with involvement in a series of cyber attacks by the Anonymous and LulzSec groups earlier this year, while they await trial.
Cyber sanctions were also used following the riots this summer. Two teenagers in Dundee were banned from the web for inciting riots via Facebook.
Officials are now looking into whether "cyber tag" technology could be used to monitor offenders and report to authorities if break their bail or sentence conditions by using the internet.
"The Ministry of Justice and the Home Office will consider and scope the development of a new way of enforcing these orders, using ‘cyber-tags’ which are triggered by the offender breaching the conditions that have been put on their internet use, and which will automatically inform the police or probation service," cyber security strategy said.
It added that if the regime is a success restrictions on internet use could be imposed on "a wider group of offenders".
Police forces across the country will also follow the example of the Met’s Police Central e-Crime Unit by recruiting “cyber specials”; internet experts will be encouraged to volunteer as special constables to help investigate online crime.
The four-year strategy is also designed to address cyber espionage and attacks from states such as China and Russia and "patriotic" hackers.
GCHQ, Britain’s eavesdropping agency, is to receive around £385m of the total £650m budget to develop its ability to detect, defend and fight back online. The problem of discovering the true source of a cyber attack will be among the top priorities for the Cheltenham-based agency's experts, as well as developing "tactics and techniques” for online conflict in collaboration with the Ministry of Defence's new cyber unit.
GCHQ will also declassify and commercialise some of its cyber technology to help the private sector improve its security online, as part of a broader effort to increase cooperation between government and industry. Other measures with include a new "hub" for information sharing to allow the security services to share information on cyber threats with major infrastructure firms such as BT, Barclays and utilities companies.
“This strategy not only deals with the threat from terrorists to our national security, but also with the criminals who threaten our prosperity as well as blight the lives of many ordinary people through cyber crime,” said David Cameron.
Terrorists are not believed to yet have the ability to launch damaging cyber attacks against critical infrastructure such as water and power stations, but they are thought to have discussed such operations.
quote:Surveillance Company Says It Sent Fake iTunes, Flash Updates
Gamma International UK Ltd. touts its ability to send a “fake iTunes update” that can infect computers with surveillance software, according to one of the company’s marketing videos.
quote:Hacker zet tekenfilmpjes op website RTV Utrecht
De website van RTV Utrecht was vanmorgen gehackt. Wie een bepaald nieuwsbericht aanklikte, kreeg 'Badger badger badger', een tekenfilmpje met dansende dassen, te zien.
Het probleem is inmiddels verholpen, aldus een woordvoerster van de regionale zender.
'We zitten er bovenop. Voor zover we kunnen nagaan zijn geen andere bestanden gehackt. De schade valt mee. Maar we vinden het ontzettend vervelend en proberen de bron te achterhalen', aldus de woordvoerster.
De laatste tijd zijn websites van omroepen vaker doelwit van hackers.
quote:European high court rejects Internet traffic filtering as violation of fundamental rights
While Thanksgiving is an American holiday, internet service providers and users in Europe had reason to give thanks yesterday. The highest court in the European Union overturned a ruling that would have forced a Belgian ISP to preemptively filter Internet traffic to prevent the unauthorized sharing of music files.
The European Court of Justice overturned a ruling by a Belgian court in a suit brought by the Belgian Society of Authors, Composers and Publishers (SABAM). SABAM filed it against Scarlet Extended over alleged illegal peer-to-peer filesharing by Scarlet's customers. That 2007 ruling required Scarlet to filter traffic on its network, so that it could identify and block illegal peer to peer filesharing traffic. It was based on an interpretation of Belgian copyright laws that put the burden of enforcement on ISPs.
Scarlet had appealed, focusing on European data privacy laws, saying that the ruling would in effect force the company to monitor all Internet traffic passing through its network—which would, aside from being technically unfeasible, violate the privacy of its customers. The case has been closely watched by Internet companies in Europe, which were concerned that they could be faced with similar requirements.
In its ruling, The Court of Justice upheld the right of copyright holders to file injunctions against intermediaries over illegal file sharing. But it struck down the provisions of the Belgian court ruling that required filtering, finding that the filtering provisions violated European Union e-commerce laws, and infringed on the rights of Scarlet and its customers. The broad monitoring required to filter file-sharing would "infringe the fundamental rights of [Scarlet's] customers, namely their right to protection of their personal data and their right to receive or impart information, which are rights safeguarded by the Charter of Fundamental Rights of the EU," the court panel wrote.
Comment:quote:The spies behind your screen
It’s both possible and legal to take control of a computer without its owner ever knowing. And it could prove deadlier than any missile.
David Vincenzetti isn’t your typical arms dealer. He’s never sold a machine gun, a grenade or a surface-to-air missile. But, make no mistake, he has access to a weapon so powerful it could bring a country to its knees. It’s called RCS – Remote Control System – and it’s a piece of computer software. Developed by Vincenzetti and a team of former computer hackers, RCS is able to “invade” a digital device undetected, bypass the most sophisticated electronic defences so far devised and, if the user so desired, disrupt the running of anything from a railway signalling system to a nuclear power station.
RCS can be installed on smartphones and computers without their owners' knowledge, and gives its user almost complete access to the "infected" device. The user can listen in on phone calls, read encrypted communications and even send apparently genuine email or text messages, all without the owner suspecting a thing. It can take screenshots of the computer, and photographs of the user. It can even activate the phone microphone, effectively turning a Blackberry left on the table during a meeting into a powerful bugging device. The software operates in the background, undetected by anti-spyware, anti-malware or anti-virus software, hiding its transmissions inside the user's usual email or internet traffic. It makes hacking into mobile phone voicemail look like the ham-fisted bungling of amateurs.
quote:It sounds amazing, but if you take a look at their shoddy marketing video and their literature, it soon becomes clear that behind all the technobabble and amazing claims is nothing more than a glorified keylogger which still has to be actually installed on a target system, whether by trickery or more directly. It doesn't install itself by some form of incomprehensible cybermagic as the article above seems to imply.
This is the sort of cunning marketing-driven technobabble (or should that be "cybertechnobabble"?) that makes otherwise intelligent people in the military and elsewhere who aren't au fait with the world of information technology believe that a "hacking" attack can actually be carried out on command.
quote:Basic error puts anonymous bloggers at risk
In a recent experiment writer Andy Baio was able to uncover the identities of seven anonymous bloggers from a random sample of 50 in under 30 minutes; all thanks to a simple mistake they'd made in setting up their websites.
twitter:jeanassy twitterde op dinsdag 29-11-2011 om 09:13:58If you know someone working for the UN, you can surprise him by giving him his email's password http://t.co/hbKczogV #Anonymous #AntiSec reageer retweet
quote:Facebook reaches deal with FTC over 'unfair and deceptive' privacy claims
Facebook forced to obtain consent before making privacy changes as Mark Zuckerberg admits 'high-profile mistakes'
Facebook "deceived consumers by telling them they could keep their information on Facebook private, and then repeatedly allowing it to be shared and made public," US regulators said as they announced a settlement over privacy issues with the social networking giant.
Facebook has been repeatedly criticised for changing its policies in ways that disclose more of its 800 million users' personal information without giving them adequate notice. Last year, critics organised a Quit Facebook Day in response to the firm's alleged privacy breaches.
The Federal Trade Commission (FTC) said Facebook had made claims about its privacy policies that were "unfair and deceptive, and violated federal law."
The FTC said it had reached a proposed settlement with Facebook that would force it to obtain consent before making changes to privacy settings. The firm will also have to undergo an independent audit of its consumer privacy policy every two years for the next 20 years, to make sure it complies with the FTC ruling.
"Facebook is obligated to keep the promises about privacy that it makes to its hundreds of millions of users," said Jon Leibowitz, the FTC chairman. "Facebook's innovation does not have to come at the expense of consumer privacy. The FTC action will ensure it will not."
In a blogpost, Facebook founder and chief executive Mark Zuckerberg said the company made a "small number of high-profile mistakes."
"I founded Facebook on the idea that people want to share and connect with people in their lives, but to do this everyone needs complete control over who they share with at all times," said Zuckerberg.
"Overall, I think we have a good history of providing transparency and control over who can see your information," he wrote. "I also understand that many people are just naturally sceptical of what it means for hundreds of millions of people to share so much personal information online, especially using any one service," he said.
Zuckerberg said the deal was part of a broader push by the government to ensure consumer privacy regulations from other companies, including Google and Twitter. "For Facebook, this means we're making a clear and formal long-term commitment to do the things we've always tried to do and planned to keep doing – giving you tools to control who can see your information and then making sure only those people you intend can see it," he said.
Facebook is currently lining up a $100bn floatation that could come as early as next April. The initial public offering (IPO) values Zuckerberg's stake in the firm at $24bn.
The FTC said Facebook made eight specific promises that it did not keep.
In December 2009, Facebook changed its website so certain information that users may have designated as private – such as their friends list – was made public. They did so without warning or approval in advance.
Facebook said that company's apps would have access only to the information that they needed to operate. In fact, the apps could access nearly all of users' personal data – data the apps didn't need, said the FTC.
Facebook told users they could restrict sharing of data to limited audiences – for example with Friends Only. In fact, selecting Friends Only did not prevent their information from being shared with third-party applications their friends used.
Facebook had a Verified Apps programme, and claimed it certified the security of participating apps. It didn't.
Facebook promised users that it would not share their personal information with advertisers. It did.
Facebook claimed that when users deactivated or deleted their accounts, their photos and videos would be inaccessible. But Facebook allowed access to the content, even after users had deactivated or deleted their accounts.
Facebook claimed that it complied with the US–EU Safe Harbour Framework that governs data transfer between the US and the European Union. It didn't.
In future, the firm will be required to obtain consent from its users ahead of making changes that change their privacy settings, and it will be required to prevent anyone from accessing a Facebook user's account 30 days after they have deleted it.
De link is iets uitgebreider. Heb 't echter nergens anders kunnen vinden online, dus waar hij 't vandaan haalt weet ik ook niet precies. Maar als 't waar is, goed nieuws!quote:EU officially agrees that nobody reads terms of service agreements.
[..]
What the EU is saying, essentially, is that getting users to agree to a long-winded user contract does not let companies off the hook for informing users.
In other words, it's now assumed that nobody reads terms of service agreements (which is true).
quote:Op dinsdag 29 november 2011 09:21 schreef Papierversnipperaar het volgende:
twitter:jeanassy twitterde op dinsdag 29-11-2011 om 09:13:58If you know someone working for the UN, you can surprise him by giving him his email's password http://t.co/hbKczogV #Anonymous #AntiSec reageer retweet
quote:Hackers post UN staffer user names, passwords
UNITED NATIONS (AP) — A hackers group calling itself "Team Poison" has posted what it says are the user names and passwords of more than 100 United Nations staffers' email accounts it pulled from a U.N. computer server.
Many of the accounts posted on pastebin.com website appear to belong to U.N. Development Program staffers.
A telephone call seeking comment from a UNDP spokeswoman in New York was not immediately returned Wednesday evening.
Team Poison is among several politically motivated cyber activists or activist groups whose stunts are prompting increased police attention.
Generally known as "hacktivists," they've targeted a series of government, military and intelligence-related websites across the globe.
Het artikel gaat verderquote:Mobiele provider kan elke toetsaanslag zien
Mobiele providers weten meer van je dan je denkt. Dat zou blijken uit een nieuw privacy-lek dat smartphonegebruikers treft. CarrierIQ, een verborgen programma dat standaard op veel telefoons geïnstalleerd staat om netwerkactiviteiten te monitoren, stuurt ongevraagd persoonlijke gegevens naar Amerikaanse providers door. Waaronder de inhoud van sms’jes en webverkeer dat eigenlijk beveiligd zou moeten zijn. Nederlandse bellers lijken echter buiten schot te blijven.
quote:
quote:Anonymous launches new operation targeting big banks
Hacktivist collective Anonymous and hacking group Teamp0ison have announced that they will be joining their forces once again and starting another operation against banks.
They call it OpRobinHood, and apparently it will consist of stealing credit card details from big banks in order to use it to make donations to charities and others.
"In regards to the recent demonstrations and protests across the globe, we are going to turn the tables on the banks," they state. "Operation Robin Hood is going to return the money to those who have been cheated by our system and most importantly to those hurt by our banks. Operation Robin Hood will take credit cards and donate to the 99% as well as various charities around the globe. The banks will be forced to reimburse the people there money back."
The operation is meant to damage the banks' financial standing as well as their reputation, and as such it should continue the work initiated by the Operation Cash Back, with which bank users were urged to close their accounts and transfer the money to accounts opened with credit unions.
"Operation Robin Hood urges YOU, to now move your accounts into secure credit unions, before it’s too late while we hit them from the inside," they say, but don't reveal whether the stolen information will be used by them or made public for the "99%" to use.
Allegedly, Chase, Bank of America, and CitiBank have already been hit with big breaches, and credit cards issued by them have been used to make donations.
While is true that in most cases the bank is required to refund the money taken through fraudulent transactions if the credit card owner can prove it happened, I can't imagine the recipients of that money - even if they are charities - being allowed to keep it. So, I'm very interested in seeing how successful this operation proves to be, and how the groups intend to pull it off.
quote:De Kamer is tegen, maar Teeven wil tóch een downloadverbod
Ondanks grote weerstand bij de Tweede Kamerfracties wil staatssecretaris Fred Teeven (VVD) nog niet van de kabinetsplannen voor invoering van het downloadverbod afzien. 'Ik kan niet stil blijven staan, want er is druk vanuit de Europese Commissie. Maar ik kan wel knopen tellen, en ik zie dat ik een probleem heb', zei hij vandaag tijdens het debat over de hervorming van auteursrechten. 'Maar ik hoop u nog wel van het een en ander te kunnen overtuigen.'
Tijdens het debat bleek vanmorgen dat alle partijen, met uitzondering van Teevens eigen VVD, tegen diens voorstel zijn om de thuiskopieheffing te vervangen door het downloadverbod. Bij de nu geldende thuiskopieheffing betaalt de consument een extra heffing op lege cd's en dvd's. Maar volgens Teeven is dat te ouderwets, en werkt een downloadverbod veel beter.
Teeven belooft de Kamer met 'heel grote waarborgen' te komen om de privacy van de consument en de vrijheid van het internet goed in het oog te houden. Van mensen die slechts beperkt downloaden zullen naam en adres niet bekend worden, en alleen sites die heel actief illegaal materiaal aanbieden, zullen met het downloadverbod te maken krijgen. Met die toezeggingen hoopt hij de Kamer alsnog over de streep te kunnen trekken.
Het is volgens Teeven nog niet duidelijk of de Europese Commissie het Nederlandse kabinetsbeleid rond de thuiskopieheffing omarmt. 'We ontvangen daarover tegenstrijdige berichten. Maar we moeten wel haast maken, want veel tijd wordt ons niet gegund.'
Nova Zembla
Volgens Teeven is het belangrijk dat er goede regelgeving komt die het illegaal downloaden tegen gaat. 'Het is mijn taak te voorkomen dat films als Nova Zembla vijf dagen na het verschijnen in de bioscoop al massaal gedownload worden. Dat het downloaden van zo'n film dan geen zuivere koffie is, kan iedereen begrijpen.'
Volgens Teeven is inmiddels bewezen dat het vergroten van het legale aanbod aan muziek, films en games niet werkt. 'Waarom zou je betalen voor legaal aanbod als het ook gratis illegaal kan?' De staatssecretaris benadrukt dat het hem niet te doen is om 'mensen die af en toe een liedje downloaden', maar wel om 'fanatici die illegaal materiaal het net op slingeren.'
D66
Vanmorgen lieten de verschillende partijen weten hoe zij staan tegenover het voorstel van Teeven. Volgens D66 moet het probleem van illegaal downloaden worden aangepakt door het aanbod uit te breiden, bijvoorbeeld met meer diensten als Spotify. Ook is er extra toezicht nodig op de naleving van de Europese regels op dit gebied. De thuiskopieregeling moet worden uitgebreid, vinden de democraten. De partij pleit ook voor een nieuw licentiemodel dat vergelijkbaar is met dat van de horeca en de radio.
Over één kam
De PVV vind het standpunt van D66 onbegrijpelijk. 'Dus D66 is tégen het gratis downloaden, maar steunt een downloadverbod toch niet', aldus Kamerlid Louis Bontes. De PVV vindt de uitspraken van Verhoeven bovendien 'stevig'. 'Je moet niet alle internetters over één kam scheren.' De PVV is tegen het downloadverbod, én tegen de thuiskopieheffing. 'Internet is een grondrecht, daar blijf je vanaf.'
Ook de PvdA keert zich tegen het downloadverbod. 'Het is niet altijd duidelijk wat illegaal is. Soms moet je namelijk ook voor illegaal verspreid materiaal betalen', aldus Kamerlid Pauline Smeets. 'De PvdA is voor een vrij en open internet. Dat staat ook in het coalitieakkoord. We moeten de consument niet allerlei rechtszaken boven het hoofd laten hangen. Laten we de uren van de ambtenaar anders besteden.'
VVD
Alleen de VVD zelf schaart zich achter de staatssecretaris. 'Het auteursrecht valt onder het privaatrecht. Een downloadverbod kan dus gewoon worden ingevoerd,' aldus VVD-Kamerlid Joost Taverne. Bang voor vervolging van consumenten is hij niet. 'Dat hoort bij het privaatrecht.' Wel is de privacy voor de VVD-fractie een punt van zorg.
Maar voor de andere partijen is een downloadverbod geen optie. Volgens Sharon Gesthuizen van de SP is dat niet te handhaven. Haar partij ziet meer heil in een modernisering van de thuiskopieheffing. Dat moet de kosten voor artiesten en producenten kunnen compenseren.
Kwetsbaar
Ook het CDA is het niet met Taverne eens. Een downloadverbod maakt de consument wel degelijk kwetsbaar, meent de partij. Maar als een downloadverbod via het strafrecht geregeld kan worden, valt er voor de christendemocraten wel over te praten. Volgens Teeven kan dat grote problemen geven, omdat dat kan leiden tot grote rechtszaken.
Ondanks alle kritiek is Teeven dus niet bereid om het idee van een downloadverbod te laten varen. Met aanpassingen aan zijn voorstel hoopt hij toch nog voldoende partijen over de streep te kunnen trekken.
Een definitief besluit laat voorlopig nog op zich wachten. Half mei wil de Kamer opnieuw 'stevig' debatteren over deze kwestie. Een meerderheid van de Kamerfracties wil echter op kortere termijn nog eens met Teeven om tafel. Volgens hen is een tweede termijn wenselijk, omdat de discussie nog niet is afgerond.
Wordt vervolgd, dus.
quote:WikiLeaks: The Spy Files
Mass interception of entire populations is not only a reality, it is a secret new industry spanning 25 countries
It sounds like something out of Hollywood, but as of today, mass interception systems, built by Western intelligence contractors, including for ’political opponents’ are a reality. Today WikiLeaks began releasing a database of hundreds of documents from as many as 160 intelligence contractors in the mass surveillance industry. Working with Bugged Planet and Privacy International, as well as media organizations form six countries – ARD in Germany, The Bureau of Investigative Journalism in the UK, The Hindu in India, L’Espresso in Italy, OWNI in France and the Washington Post in the U.S. Wikileaks is shining a light on this secret industry that has boomed since September 11, 2001 and is worth billions of dollars per year. WikiLeaks has released 287 documents today, but the Spy Files project is ongoing and further information will be released this week and into next year.
International surveillance companies are based in the more technologically sophisticated countries, and they sell their technology on to every country of the world. This industry is, in practice, unregulated. Intelligence agencies, military forces and police authorities are able to silently, and on mass, and secretly intercept calls and take over computers without the help or knowledge of the telecommunication providers. Users’ physical location can be tracked if they are carrying a mobile phone, even if it is only on stand by.
But the WikiLeaks Spy Files are more than just about ’good Western countries’ exporting to ’bad developing world countries’. Western companies are also selling a vast range of mass surveillance equipment to Western intelligence agencies. In traditional spy stories, intelligence agencies like MI5 bug the phone of one or two people of interest. In the last ten years systems for indiscriminate, mass surveillance have become the norm. Intelligence companies such as VASTech secretly sell equipment to permanently record the phone calls of entire nations. Others record the location of every mobile phone in a city, down to 50 meters. Systems to infect every Facebook user, or smart-phone owner of an entire population group are on the intelligence market.
Selling Surveillance to Dictators
When citizens overthrew the dictatorships in Egypt and Libya this year, they uncovered listening rooms where devices from Gamma corporation of the UK, Amesys of France, VASTech of South Africa and ZTE Corp of China monitored their every move online and on the phone.
Surveillance companies like SS8 in the U.S., Hacking Team in Italy and Vupen in France manufacture viruses (Trojans) that hijack individual computers and phones (including iPhones, Blackberries and Androids), take over the device, record its every use, movement, and even the sights and sounds of the room it is in. Other companies like Phoenexia in the Czech Republic collaborate with the military to create speech analysis tools. They identify individuals by gender, age and stress levels and track them based on ‘voiceprints’. Blue Coat in the U.S. and Ipoque in Germany sell tools to governments in countries like China and Iran to prevent dissidents from organizing online.
Trovicor, a subsidiary of Nokia Siemens Networks, supplied the Bahraini government with interception technologies that tracked human rights activist Abdul Ghani Al Khanjar. He was shown details of personal mobile phone conversations from before he was interrogated and beaten in the winter of 2010-2011.
How Mass Surveillance Contractors Share Your Data with the State
In January 2011, the National Security Agency broke ground on a $1.5 billion facility in the Utah desert that is designed to store terabytes of domestic and foreign intelligence data forever and process it for years to come.
Telecommunication companies are forthcoming when it comes to disclosing client information to the authorities - no matter the country. Headlines during August’s unrest in the UK exposed how Research in Motion (RIM), makers of the Blackberry, offered to help the government identify their clients. RIM has been in similar negotiations to share BlackBerry Messenger data with the governments of India, Lebanon, Saudi Arabia, and the United Arab Emirates.
Weaponizing Data Kills Innocent People
There are commercial firms that now sell special software that analyze this data and turn it into powerful tools that can be used by military and intelligence agencies.
For example, in military bases across the U.S., Air Force pilots use a video link and joystick to fly Predator drones to conduct surveillance over the Middle East and Central Asia. This data is available to Central Intelligence Agency officials who use it to fire Hellfire missiles on targets.
The CIA officials have bought software that allows them to match phone signals and voice prints instantly and pinpoint the specific identity and location of individuals. Intelligence Integration Systems, Inc., based in Massachusetts - sells a “location-based analytics” software called Geospatial Toolkit for this purpose. Another Massachusetts company named Netezza, which bought a copy of the software, allegedly reverse engineered the code and sold a hacked version to the Central Intelligence Agency for use in remotely piloted drone aircraft.
IISI, which says that the software could be wrong by a distance of up to 40 feet, sued Netezza to prevent the use of this software. Company founder Rich Zimmerman stated in court that his “reaction was one of stun, amazement that they (CIA) want to kill people with my software that doesn’t work.”
Orwell’s World
Across the world, mass surveillance contractors are helping intelligence agencies spy on individuals and ‘communities of interest’ on an industrial scale.
The Wikileaks Spy Files reveal the details of which companies are making billions selling sophisticated tracking tools to government buyers, flouting export rules, and turning a blind eye to dictatorial regimes that abuse human rights.
How to use the Spy Files
To search inside those files, click one of the link on the left pane of this page, to get the list of documents by type, company date or tag.
To search all these companies on a world map use the following tool from Owni
quote:Hacker group threatens action over bus passenger kidnappings
The hacker group ‘Anonymous’ is planning to take justice into its own hands again.
The group declared war on the drug cartels over the reported murder of social media users in Nuevo Laredo earlier this year.
But Anonymous is now turning its attention to bus companies and Mexico’s federal government.
In an exclusive interview with Action 4 News on Twitter, the group claims little is being done to halt the kidnapping of bus passengers on Mexico’s highways.
There are no official numbers or reports but the group claims thousands have been kidnapped, killed or forced to work against their will in an all-too common scenario.
quote:‘The Pirate Bay Dancing’ Add-On Killls DNS and IP Blockades
Efforts to censor the Internet are increasing in the Western world. In the US lawmakers are currently discussing legislation (SOPA/PIPA) that could take out The Pirate Bay, or disable access to it. In several other countries such as Italy, Finland and Belgium, courts have already ordered Internet Providers to block their users’ access to the site. Demonstrating the futility of these efforts, a small group of developers today releases a browser add-on called “The Pirate Bay Dancing.”
When Homeland Security’s ICE unit started seizing domain names last year, a group called “MAFIAAFire” decided to code a browser add-on to redirect the affected websites to their new domains.
The release went viral and by now more than 200,000 people have installed the add-on. ICE wasn’t happy with this and asked Mozilla to pull the add-on from their site. However, Mozilla denied the request, arguing that this type of censorship may threaten the open Internet.
Today MAFIAAFire delivers a new release that aims to thwart the increasing censorship efforts in countries worldwide. Named “The Pirate Bay Dancing,” the Firefox add-on undoes local DNS and IP blocks by routing users through a series of randomly picked proxies.
The MAFIAAFire team told TorrentFreak that the development of the plugin was partly motivated by SOPA and PIPA, the pending anti-piracy bills in the US.
“DNS and IP blocking is probably the most dangerous part of SOPA/PIPA in terms of ‘breaking the Internet,’ so we tackled that first. We will be going after the other parts of SOPA in later releases but probably not in ‘our usual plugin form’ – the other parts require different solutions that we have already started work on,” we were told.
Although the add-on carries The Pirate Bay in its name it also works with other sites such as Newsbin2 and BTJunkie which are blocked in the UK and Italy respectively. In a broader sense it can also be used to bypass national “firewalls” such as in China, and soon perhaps the US.
Putting the add-on to work only requires two clicks and is completely free.
After the add-on is installed users can specify the websites for which they want it to work, and these sites then trigger a response from the plugin. If someone from Italy for example chooses to unblock The Pirate Bay, the add-on will save this preference and load the site through a proxy on the next visit.
MAFIAAFire is using thousands of proxies which will be rotated constantly, hence the (dirty) dancing. The current version is fully working but TorrentFreak was told that the functionality will be expanded in future releases.
The MAFIAAFire team told TorrentFreak that they were eager to help The Pirate Bay out, as the site’s operators have been an inspiration to them. The Pirate Bay team on their turn will soon feature the add-on on their homepage.
“Saving TPB was a big deal to us, we love the site and how it has stood the test of time while dozens of others fell, bent over or were run over. The MAFIAA have been trying to take down TPB’s sails for years, country by country, this extends its life a little more to give it smooth sailing,” TorrentFreak was told.
“In the bigger picture, other than the US’ SOPA we also have each country experimenting with its own mini-firewall. This makes all those blocks in all those countries, and all the millions the MAFIAA have spent to get to there, useless,” the MAFIAAFire team added.
While the latest MAFIAAFire add-on shows how easy it is to bypass these censorship attempts, supporters of the measures would argue that it will nonetheless stop the vast majority of casual pirates.
The creators of “The Pirate Bay Dancing” are not ignorant of this, but aside from delivering a working product, one of their main goals is to send a signal that censorship is never the right path to take. Judging from the recognition they’ve received so far, they sure have succeeded on that front.
quote:
quote:Worker didn't realize logging on from Russia was problem
CHICAGO — Mystery solved. A reported cyberattack on a water district in central Illinois turned out to be a false alarm set off when an American contractor logged onto the system remotely while vacationing in Russia.
Jim Mimlitz of suburban St. Louis says he hopes he'll be able to laugh about it someday. For now, the contractor is puzzled. Why didn't terrorism investigators pick up the phone and call him? He says he could have straightened out the matter quickly.
Instead, investigators assumed someone had stolen Mimlitz' password and hacked into the system from Russia, causing a water pump to shut down five months later. A blogger spread word of the possible hack, touching off a minor panic.
The truth is, Mimlitz was on vacation with his family in Russia in June. Someone from the Curran Gardner Public Water District near Springfield called his cell phone and asked him to check data on the system. He did, but he didn't mention he was doing so from Russia.
Months later, after the water pump failed, a repairman examining the logs saw a Russian IP address linking to the system with Mimlitz' sign-on. The water district reported that to a state agency and the Illinois Statewide Terrorism and Intelligence Center got involved.
The center released reports about a potential cyber compromise at the water district. The reports were meant to be initial raw reporting and not conclusive. A security consultant and blogger wrote about the reports and released the documents to reporters. The incident was reported as possibly the first successful cyberattack on the U.S. infrastructure.
"A quick and simple phone call to me right away would have defused the whole thing immediately," Mimlitz said. "All I did was I logged on. I tried to help. I looked at some data and gave them my advice."
The story of Mimlitz' vacation was first reported by Wired magazine's Threat Level blog. Mimlitz spoke to The Associated Press on Thursday.
There was no immediate response to requests for comment from the Illinois State Police, which took part in the investigation. A spokesman for the U.S. Department of Homeland Security referred to the department's previous statements saying there was "no evidence to support claims made" in the initial Illinois report "which was based on raw, unconfirmed data and subsequently leaked to the media ..."
Mimlitz has only kind words for the FBI and Department of Homeland Security investigators he met with last week for nearly four hours.
"I was as open as I could be," he said. "I wasn't trying to hide anything. I was just trying to help them find the problem. Even if the end result was not going to be good for me, that wasn't my concern. It was a very productive meeting and they were extremely sharp people."
Mimlitz's company — Navionics Research in Eureka, Mo. — helped set up the system that remotely manages computers controlling machinery in the water district. Security experts have pointed out such Supervisory Control and Data Acquisition systems are vulnerable to hacking.
"I think our system's very secure," Mimlitz said. "It doesn't mean we're not going to keep working on it."
quote:Just released on 11.29.11, INTERNET RISING is a digi-documentary investigating the evolving relationships between the Internet and collective consciousness of humanity. It provokes many questions about ancient and modern paradoxes of life, its pleasures and pains... and the gray area contrasts in between - but most of all it is meant to be an inspiring conversation starter.
INTERNET RISING is a labor of love comprising a rapid fire mashup stream of live interviews all conducted within the web sphere. The film's participants include many profound personalities and key internet influencers ranging from professors, corporate academics, futurists, researchers, writers, bloggers, media creators, activists, gamers, educators, scientists, artists, innovators - real humans, all of whom provide amazing insights into how our state of the world is changing and transforming via various forces of economic, social, geographic, political, philosophical development... all centered around technology's transformative and generative power.
quote:As SOPA/PIPA Still Loom, Techies Already Creating Workarounds
While there's still a fight over whether or not SOPA and PIPA will pass, it seems that people are already working up basic hacks to make the laws obsolete, should they pass. The folks behind MAFIAAFire, the browser plugin designed to route around ICE seizures has created a new offering, dreadfully named "The Pirate Bay Dancing," which will route around any DNS or IP blocking by using a rotating list of proxy servers. If you thought that ICE was upset about MAFIAAFire, you'd have to imagine they won't be at all pleased about this bit of code. Of course, SOPA does have an anti-circumvention clause in there, which would effectively make this plugin illegal. Of course, I can't see how they could possibly enforce something like that. Using a proxy in general is legal. How will they know if you're using a proxy to get around these particular blocks? Either way, it's yet another example of why the MPAA's insistence that DNS blocking remain in the bill shows (yet again) how technically clueless they are. DNS blocking is a total waste of time. It makes the internet less secure. It fragments key pieces of the internet. Breaks the basic agreement of how the internet is supposed to work... And all for what? To create a system that won't actually block much at all?
quote:The Rise of the Geek Lobby
Can Google, Facebook, tech wonks, and Web activists kill the Stop Online Piracy Act?
In a time of legislative gridlock, the Stop Online Piracy Act looked like a rare bipartisan breakthrough. The bill, known as SOPA, promised a brave new Internet—one cleansed of “rogue websites” that hawk pirated songs and movies as well as counterfeit goods. For Congress, the legislation’s goals amounted to a can’t-lose trifecta: uphold justice, protect legitimate businesses (and jobs!), and make the Web safer for law-abiding consumers. Who could be against that?
A lonely few, at first. When the legislation was introduced in the House last month by Rep. Lamar Smith (R-Texas), a smattering of civil libertarians and techno-wonks quickly raised objections. They were drowned out, though, by a cadre of influential backers: movie studios, record labels, pharmaceutical companies, the U.S. Chamber of Commerce, and even the national police and firefighters unions. After the bill hit the House on Oct. 26, members of both parties broke out their co-sponsorship pens. By the time it reached committee, two dozen representatives had signed on, from dyed-in-blue Democrats like Florida’s Debbie Wasserman Schultz to security-hawk Republicans like Peter King of New York. A similar (though less sweeping) bill, the PROTECT IP Act, racked up some 40 co-sponsors in the Senate, prompting the record industry to boast that it was among the most popular bipartisan bills of the year.
But something happened on the way to easy passage and the flourish of the president’s signature: The Internet fought back. The groundswell started with open-Internet stalwarts like the Electronic Frontier Foundation and the Center for Democracy & Technology. As they have before, the non-profits picked apart the bill’s perceived oversights and omissions. This time, though, their message—that the law would fundamentally damage the Internet’s culture of openness—resonated loudly outside the world of tech wonkdom.
Advertisement
In theory, SOPA enlists Internet service providers and advertising networks to filter out the “worst of the worst” sites, most of them based offshore. EFF and its cohorts argue, however, that there is little protection for legitimate sites that might get swept up along with the rogues. Worse, the law appears to disregard some of the “safe harbor” provisions established in the 1998 Digital Millennium Copyright Act, which has protected sites such as YouTube as long as they take down copyrighted content upon request. SOPA targets any sites that “enable or facilitate” copyright infringement, a sweeping category that could be interpreted to include YouTube, Flickr, WikiLeaks, or even Google. Opponents have said the bill would result in a government-curated “Internet blacklist” or “great firewall of America.” Various provisions have also provoked concern over domain name security and privacy. Critics are predicting lawsuits galore.
As these critiques began to mount, the open-Internet groups were joined by a growing coalition of SOPA haters. Popular websites with an open-source orientation, like Mozilla and Wikimedia, helped launch an “American Censorship Day” campaign to encourage Internet folk to get involved, and liberty-loving media outlets like BoingBoing symbolically censored their own homepages to draw attention to the bill. Most significantly, the big Silicon Valley tech firms waded in. Google, Facebook, AOL, eBay and others took out a full-page New York Times ad arguing that the bill would stifle innovation. At the same time, anti-SOPA fury took hold on social media, spread in part by the Twitter hashtag #DontBreakTheInternet. Social media platforms such as Tumblr prompted users to call their representatives in Washington. In one day, 87,000 people did.
Suddenly the bill had opponents in Congress. As of October, Sen. Ron Wyden of Oregon and Rep. Zoe Lofgren of California, both Democrats, were among the only ones on record opposing it. But by Thanksgiving, representatives from libertarian-leaning Ron Paul to Tea Party Republican (and Obama scourge) Darrell Issa to House minority leader Nancy Pelosi had adopted anti-SOPA stands. “Need to find a better solution than SOPA,” Pelosi tweeted, adding the #DontBreakTheInternet hashtag.
Campaigns to save the Internet from nefarious legislation aren’t anything new. In the 1990s, the Digital Millennium Copyright Act and the Communications Decency Act, an anti-Internet porn bill, both sparked opposition. But the tools of dissent were more limited back then—websites could post blue ribbons advocating “free speech online,” but their users couldn’t mobilize and spread the word on Twitter or Facebook. More recently, a push for the FCC to adopt net neutrality laws inspired some online activism but didn’t arouse nearly as much passion. Perhaps that’s because it didn’t run afoul of the “cute cat” maxim—the idea that people will rebel against any regulation that might prevent them from sharing cat pictures. SOPA, some fear, could do just that.
What should we call this ad hoc association of Silicon Valley businesses, venture capitalists, law professors, civil libertarians, and avid Internet users? Julian Sanchez of the Cato Institute told me he’d brand it a “populist technocratic coalition,” which is somehow both oxymoronic and apt. Leslie Harris, president of the Center for Democracy & Technology, says it calls to mind the old buzzword Netizens. My preferred term: the geek lobby.
Just because the geek lobby has awoken doesn’t mean it will win. Rep. Smith, undeterred by the backlash, has scheduled his bill for markup by the House Judiciary Committee on Dec. 15, and he still has plenty of support. The anti-SOPA coalition may have found its voice on the web, but at the last hearing, on Nov. 16, Smith called five witnesses in favor of the bill while allowing just one opponent to speak. The opponent was a representative of Google, which has significantly boosted its spending on lobbying of late.
While Silicon Valley is just learning to play the lobbying game, its foes in Hollywood are old pros. Southern California’s favorite industry outspends Northern California’s by a ratio of 10 to 1. That’s because the entertainment industry has always depended on Washington’s enforcement of copyright laws. The Internet companies are just beginning to realize the extent to which they, too, are at lawmakers’ mercy.
Rep. Lofgren, who represents part of Silicon Valley, told me that her constituents have already made a couple of rookie mistakes in their anti-SOPA campaigning. The flood of calls to Congress came as many members were looking ahead to the Thanksgiving recess, and many went to district offices rather than offices in the Capitol. For all the fury on Facebook and Twitter, Lofgren says, the backlash against SOPA has registered as “a blip” in Congress so far. “Eighty-seven thousand (phone calls), that’s a start,” she says. “But remember when President Bush was pushing for immigration reform in the Senate? The anti-immigration people melted the system with the number of calls. That killed immigration reform” for years afterward, she explained. That could still happen with SOPA, she says, but it hasn’t yet.
How the fight in Congress plays out will reveal how far the geek lobby has come—and perhaps, how far it still has to go to establish itself as a defender of the values the Internet was built on. “This is a seminal moment,” says Leslie Harris. “I think when we look back in a couple of years we’ll see that this really cemented a way of defending the net on the policy side that’s transformative.” Meanwhile, some tech wonks, such as Jonathan Zittrain of Harvard’s Berkman Center for Internet & Society, say the bill as written is so extreme that it looks more like an opening bid in a negotiation than anything that could plausibly gain passage. But if the anti-SOPA campaign doesn’t keep up the pressure, it just might become the law of the land.
quote:South Korea boosts review of social media
Seoul (CNN) -- South Korea plans to intensify the review of its social networking sites and smart phone applications to combat a surge in "illegal and harmful" information, government officials said.
The Korea Communications Standards Commission said it will reshuffle departments to make way for a review team that will oversee new media content.
Review of Internet content has been in place since 2008, but the commission said the move will boost effectiveness and meet growing demands.
Social media users and civic groups decried the Thursday announcement, saying it clamps down on freedom of expression.
"This is an authoritarian and anachronistic abuse of power that strips people of their freedom of expression and political freedom by blocking their eyes and ears," one of South Korea's largest civic organizations, People's Solidarity for Participatory Democracy, said in a news release.
Critics say the government is using the new measure to clamp down on opposition voices with the upcoming general and presidential elections next year.
"It's to block out any voices calling on people to participate in the presidential elections next year," Twitter user bbohea929 wrote.
Another user, csoaea, said "it feels like we've gone back 30 years."
The number of illegal and harmful postings on social networking sites has increased rapidly since 2008 and is expected to grow, according to the government's standards commission.
Cases deemed illegal for obscenity last year and this year were 41 and 45 respectively, while those violating national security jumped from 28 to 159, according to the commission.
The commission vowed to limit its scope to obscene content deemed inappropriate for minors and that which violates the law.
However, the legal boundaries are ambiguous and include defamation, national security and inciting fear, a major concern for critics.
The standards commission called the concerns "groundless" and said the new process will not influence the formation of public sentiment in the cyber world.
quote:ACNUR hacked. Obamas login exposed!
The team Sector 404 consisting of the hackers
PHANTOM, RAWR, IO93, V, ZD4P50N, SPECTRUS, ANONGUS, FIBO, HACKW32, ADREX,NEKA, JJ, & ESCUADRON SPY PEOPLE Y HACKERSMX219
managed a SQL-Injection in the official website by ACNUR, also known as UNHCR, the official UN agency for refugees. They published Obamas login name and password hash, as well as his personal cell phone number. Furthermore Wildt Dirks ans Schaffsteins logins were exposed. You can find the whole description and the log at http://pastebin.com/4kAf776r
quote:2011 The Year of the Hacktivist: When Anonymous Finally Grew-Up
Read through the International Business Times hind-sight look at hacktivism in the year 2011, as it runs through the key points that changed Anonymous from a "hacktivist" collective into a global political movement.
In a year plagued by cyber-crime, the name Anonymous has been at the forefront of nearly every debate, with what was originally taken as little more than a small group of tantruming teenagers, growing into, debatably, one of the most powerful political movements in the world.
quote:Bivings Corp- Ended By Anonymous
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
#OpMonsanto
#Anonymous
#AntiSec
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
Operation End Monsanto is still very much up and running. Pwnage will continue indefinitely.
First Victim: Bivings Corporation
Bivings Corp is(was) a PR firm of 15+years that worked with some very high profile clients, Monsanto used them heavily.
PEW PEW PEW
bai
admin@dev-monsantouk.bivings.com
PASSWORD: surekha1
dev-monsantouk.bivings.com/admin "Maintain Monsanto Documents"
http://devmonsantouk.bivings.com
Site Database hacked/dumped
hundreds of emails stolen viewable on i2p eepsite (opmonsanto satori wiki)
Database of Monsanto documents acquired by Anonymous
Servers rooted
Site defaced:
http://tinypic.com/view.php?pic=20hoso2&s=7
TANGO DOWN: Permanently
http://devmonsantouk.bivings.com
1 week after we pwned them:
"Our Cyber Infrastructure has recently been put under attack. We are evaluating the extent of the intrusion, and apologise for any downtime and issues this may cause you. It is not yet determined what the motives behind the attack are, or what, if any data has been compromised. We will continue to keep you up to date, and sicerely apologise for any inconvenience."
A few days later:
"The Bivings Group Hands Over the Reins to The Brick Factory"
Bivings corp shuts down all servers, liquidates assets, and some former employees move on to start a new company, "The brick factory".
This is after 15+years of running marketing campaigns and helping some of the most corrupt corporations on the planet, as well as several governmental agencies, cover up their dirt.
We accidently the entire Bivings Group Corporation
That is how you do it, gentlemen.
Also
Random database of Monsanto employee's/associates, and others. Can be used for SE:
https://pastee.org/nf6c5
quote:Anti-Piracy Group Blackmails ISPs to Censor The Pirate Bay
After a court ordered two of the largest Belgian Internet service providers to prevent their users accessing The Pirate Bay, the local anti-piracy outfit is now urging other ISPs to do the same. Internet providers who refuse to give in to this request within 10 days will be taken to court, a threatening letter explains. The blackmailing tactic seems to have worked, as one of the smaller ISPs has already disabled access to The Pirate Bay.
Late September the Antwerp Court of Appeal ordered Belgian ISPs Belgacom and Telenet to initiate DNS blockades of 11 domains connected to The Pirate Bay.
The Belgian Anti-Piracy Federation (BAF) applauded the verdict, which they see as a landmark decision opening the door to further censorship attempts. And indeed, without hesitation the group is putting the verdict to work in their favor.
NURPA, a Belgian advocacy group which promotes and protects the digital rights of citizens, has learned that BAF has sent a threatening letter to various Belgian ISPs. The group has managed to obtain a copy which they published on their site today.
In the letter, BAF mentions the recent verdict against the two Belgian Internet providers, which they say confirms The Pirate Bay is responsible for copyright infringement on a massive scale. To extend the ruling, the anti-piracy group is demanding that other ISPs also begin banning the site’s domains.
“To ensure an optimal effect, this measure should be implemented by all Internet service providers, not just by Belgacom and Telenet,” the anti-piracy group writes.
The ISPs have ten days to comply, BAF adds, or else the group will take them to court.
“Failing a satisfactory response from you within the time limit, the BAF will begin legal proceedings against you,” BAF threatens.
The letter from BAF was supposedly sent last week, and already appears to have had some effect. The Belgian ISP BASE – which ironically has a “freedom of speech” banner prominently listed on its site – has quietly started blocking subscriber access to The Pirate Bay.
BAF’s letter and BASE’s response are criticized by NURPA, who fear that BAF will continue to push for more censorship measures based on false claims.
“These practices of censorship, which are justified by imaginary losses and imposed by blackmail, show the urgent need for legislation on Net Neutrality in order to establish a legal framework for fair protection of fundamental rights on the Internet,” NURPA spokesman André Loconte told TorrentFreak.
Even if BAF manages to convince all Belgian ISPs to block the 11 Pirate Bay domains, it is doubtful that it will have much of an effect. Previously, a Pirate Bay spokesperson told TorrentFreak that these measures only yield the opposite results.
“This will just give us more traffic, as always. Thanks for the free advertising,” we were told.
And he appears to be right.
A few days after the verdict was announced The Pirate Bay registered depiraatbaai.be, a new domain not covered by the court order. Today, just a few weeks later, this domain is already the 124th most-visited in Belgium, on its way to enter the top 100.
Indeed, the years of legal procedures and subsequent blackmailing are easily circumvented by registering a $15 domain.
quote:* Suggesting that the company could manipulate Google results to "drown" out negative coverage of human rights violations and child labour;
quote:Zuckerberg’s Private Photos Revealed in Facebook Security Flap (Updated)
A security flaw in Facebook reveals your private photos, reports Launch. Like these formerly private photos of company founder, amateur butcher, and generally creepy human being Mark Zuckerbeg, showing off his dinner both alive and deep fried.
quote:Downloadverbod alleen bij grote schade
Internetters die films en muziek downloaden zonder daarmee grote schade aan te richten, hoeven niet bang te zijn dat producenten hen voor de rechter gaan slepen. Alleen fanatieke downloaders krijgen last van het downloadverbod dat staatssecretaris Fred Teeven (Veiligheid en Justitie) wil instellen.
Dat zei Teeven vandaag in de Tweede Kamer. De Kamer is tegen een downloadverbod omdat mensen die slechts mondjesmaat liedjes van internet halen, hier ook last van krijgen. Door een bedrag vast te stellen, wil Teeven een onderscheid maken tussen kleine en grote downloaders.
Overleg
Teeven wil de komende tijd met betrokken partijen gaan overleggen over waar de grens tussen kleine en grote schade gaat liggen. Hij wilde daar vandaag nog niets over zeggen.
De Kamer had ook geklaagd over de salarissen van bestuurders van auteursrechtenorganisaties als Buma/Stemra. Teeven kondigde aan te regelen dat ze niet meer mogen verdienen dan 130 procent van het salaris van de minister-president.
Bestuurslid
Het college van toezicht dat zich bezighoudt met deze organisaties buigt zich nu over de kwestie van het bestuurslid Jochem Gerrits van Buma/Stemra, die ontslag nam nadat hij in opspraak was gekomen. In een uitzending van PowNews was te horen hoe hij een componist voorstelde te helpen bij het innen van auteursrechten als Gerrits zelf een deel van de opbrengst kreeg.
De Tweede Kamer sprak er schande van, maar Teeven ziet voor zichzelf geen rol weggelegd in de kwestie. Wel zei hij niet volledig uit te sluiten dat er sprake is van strafbare feiten. Het Openbaar Ministerie zou dan nog in actie kunnen komen als het toezichtscollege klaar is met zijn werk.
Met dank aan OldJeller.quote:Privacy is een grondrecht. Het ongestoord kunnen doen en laten zonder dat anderen hier ongewenst kennis van kunnen nemen.
Dagelijks is in het nieuws te lezen dat er aan onze privacy getornd wordt, of dat er weer gevoelige gegevens op straat zijn beland door verlies van een document of usb-stick. Dat er wat mis is, is duidelijk. Dat er wat aan gedaan moet worden ook.
Improve Your Privacy is opgericht om je de middelen aan te reiken om jouw privacy beter te waarborgen en je te informeren over het laatste nieuws op privacygebied.
quote:Operation Payback - Avenge Assange
STATUS: FIRING!
UPDATED Web LOIC
http://pastebin.com/5SWGvyfk
Firing now! by 404
#OpVisa #OpPayback #Wikileaks
It's been one year since WikiLeaks Banking Blockade by Visa & Mastercard.
A year ago, our Anonymous brothers & sisters showed support to Wikileaks in Operation Payback - Avenge Assange.
So we decided to celebrate the anniversary - the Anonymous way.
Target: http://ww
Method: ddos
WebLoic: http://pastebin.com/hwwukmZV - some might still work
UPDATED Web LOICUPDATED Web LOIC
http://pastebin.com/5SWGvyfk
Time: 12/07/11 22.00 CET
Countdown timer: http://www.onlinehttps://forums.eveonline.com/default.aspx?g=posts&t=34808&p=3-stophttps://forums.eveonline.com/default.aspx?g=posts&t=34808&p=3watch.com/countdown-timer/
WARNING: JOIN ONLY IF YOU KNOW WHAT IS DDOS & HOW TO BE ANONYMOUS. PROTECT YOURSELF! http://gawker.com/5714715/dickileaks-condom-has-a-terrible-slogan
We are Anonymous.
We are lame ddosers.
We do not forget.
We do not forgive.
We are legion.
Expect us.
# Noi siamo Anonymous. # Noi non dimentichiamo. # Noi non perdoniamo. # Aspettateci, Sempre.
Somos Anonymous. Somos Legión. No perdonamos. No olvidamos. Espérennos.
Jammer dat er met bedragen gewerkt gaat worden.quote:
Een typisch geval van slechte wetgeving die door compromissen nog slechter word.quote:Op donderdag 8 december 2011 01:19 schreef Bakakame het volgende:
[..]
Jammer dat er met bedragen gewerkt gaat worden.
Lastig vast te stellen hoeveel "schade" iemand daadwerkelijk aan een ander toebrengt door downloaden.
Daarnaast vind ik 't ook moeilijk in te schatten of ik zelf in de categorie kleine of grote downloaders val, dus ben benieuwd hoe ze dat oplossen. Eerste stap lijkt me immers zorgen dat burgers van zichzelf weten of ze strafbaar bezig zijn of niet en van daaruit kunnen besluiten te stoppen en "te beteren" of door te gaan met risico op een straf.
quote:Rupert Murdoch Lobbies Congress To Restrict Internet
WASHINGTON -- News Corp. honcho Rupert Murdoch threw his weight behind Congress' attempt to restrict the Internet, personally lobbying leaders on Capitol Hill Wednesday for two measures that purport to combat piracy.
Murdoch's media empire is among some 350 large corporations that have come out in favor of the Stop Online Piracy Act in the House, as well as the Protect IP Act in the Senate.
Both measures would require Internet operators to police activity online, and would mandate Internet giants like Google and AOL (the parent company of The Huffington Post and an opponent of the bills) and credit card companies to take down sites that have content deemed to be in violation of copyright rules.
The battle has pitted huge content generators like Disney and the motion picture industry against their online competitors, with each side reportedly spending some $90 million on lobbying efforts.
Supporters say the measures will help curb theft and preserve the integrity of the Internet. Opponents charge that the measures amount to censorship that will stifle innovation and impose higher costs on consumers.
News Corp. owns 20th Century Fox films and many television franchises such as "The Simpsons." The firm has long lobbied on the issue, donating to members on both sides of the aisle.
The personal intervention of Murdoch shows how high the stakes are. Sources confirmed to HuffPost that the media magnate was pushing for the two bills, and that he met with Senate Minority Leader Mitch McConnell (R-Ky.).
Murdoch's presence comes as high-profile opponents, such as Google's Eric Schmidt, have been ramping up their public efforts to kill the bills.
Dit is dan wel weer fijn nieuwsquote:De nieuwe privacyregels waaraan de Europese Commissie werkt, gaan veel verder dan de huidige. Dat blijkt uit een uitgelekt concept. Gebruikers krijgen meer rechten en bedrijven kunnen hoge boetes krijgen als ze inbreuk maken op de privacy.
quote:Canadian Songwriters Want to Legalize File-Sharing
While most of the major entertainment industry companies wage war against BitTorrent sites, the Songwriters Association of Canada prefers to embrace file-sharing. Speaking with TorrentFreak, vice president Jean-Robert Bisaillon says that the Internet has revived the music business. Sharing music is part of people’s nature and the songwriters want to legalize file-sharing, while compensating the artists whose works are shared.
With prominent members such Bryan Adams, Eddie Schwartz, Randy Bachman and Carole Pope among its ranks, the Songwriters Association of Canada (SAC) is the voice of more than 1,500 Canadian artists.
In common with many of the groups tied to the music industry, SAC has a strong opinion about file-sharing. But unlike most of the others, they don’t want to shutter sites that allow people to share copyrighted music. Quite the opposite.
SAC believes that consumers should have access to all the music in the world, something that only file-sharing sites provide today. So instead of shutting these sites down the songwriters association wants to legalize file-sharing, while compensating the artists whose works are shared.
“People have always shared music and always will. The music we share defines who we are, and who our friends and peers are. The importance of music in the fabric of our own culture, as well as those around the world, is inextricably bound to the experience of sharing,” SAC writes in a detailed proposal.
According to the association, file-sharing should be framed as an opportunity rather than a threat to the music industry. To prove this point, SAC is trying to convince other stakeholders that it’s a good idea to monetize file-sharing through some sort of licensing system for consumers.
“Music file-sharing is a vibrant, open, global distribution system for music of all kinds, and presents a tremendous opportunity to both creators and rights-holders. Additionally, once a fair and reasonable monetization system is in place, all stakeholders including consumers and Internet service providers will benefit substantially.”
“By monetizing behavior rather than any specific technology, music creators and rights-holders will lay the foundations for a business model that can continue for decades rather than attempting the almost impossible task of trying to monetize the ever shortening cycle of changing technology,” SAC writes.
With the above, the Association indirectly criticizes the rigid stance of the major labels and the RIAA when it comes to technical innovation. Whether it’s the invention of radio, the cassette tape or file-sharing, they continuously view new technology as a threat instead of something that could help to expand the popularity of music.
To learn more about the ambitious proposal TorrentFreak got in touch with SAC vice president Jean-Robert Bisaillon, who told us that he hopes to make other key players in the music industry aware of the power and value of sharing.
“We think the practice [of file-sharing] is great and unstoppable. This is why we want to establish a regime that allows everyone to keep on doing it without stigmatizing the public and, instead, find a way for artists and rights holders to be fairly compensated for the music files that are being shared,” Bisaillon told us.
“Other positive aspects include being able to find music that is not available in the commercial realm offer, finding a higher quality of digital files, being able to afford music even if you are poor and being able to discover new artists or recommend them to friends.”
SAC’s vice president further notes that not everything the big labels do is in the best interest of musicians and artists. While Bisaillon recognizes that many artists still depend on these companies, he and other songwriters don’t necessarily agree with all their practices.
“The big labels will try to control the market as long as they can and as long as they think the market will generate revenue even if the revenue is the result of legal action. They will try to hook up with whichever commercial endeavor they think might help maintain their control in the marketplace even if this means unfair remuneration for content providers,” Bisaillon says.
“In parallel they will try to discourage any option that may diminish their control even if this means using threats or disinformation. They have the money and contacts to lobby governments in support for their vision. We see our role as developing and providing alternate means of access to music that are good for consumers and creators alike.”
According to Bisaillon the Internet is a blessing, perhaps not for the big music labels, but certainly for musicians and consumers.
“Music is much better off with the Web. The internet network allows for musical discovery despite distance and time of the day. It has sparked collaborations between musicians unimaginable before. It has helped artists to book international tours without expensive long-distances charges and postal delays we knew before,” he told us.
“The Internet has dramatically increased the private non-commercial sharing of music, which we support. All that is missing a means to compensate music creators for this massive use of their work.”
To make this final step SAC is actively talking to all the stakeholders involved, including consumer groups, rights holders and content providers to make their file-sharing license reality.
Although this final step may turn out to be a giant leap for most of the parties involved, it is essential that a prominent association of artists sees the upside to file-sharing. This is a welcome contrast to the repressive stance we are used to hearing from the RIAA and CRIA.
While the “monetize file-sharing” proposal is not necessarily ideal as it has many challenges of its own, SAC’s stance does touch the essence of the ‘problem’. Instead of adding restrictions, the music industry should find ways to give consumers unlimited access to all the music in the world for a fair price.
Zekerquote:Op donderdag 8 december 2011 11:23 schreef Bakakame het volgende:
http://tweakers.net/nieuw(...)e-privacyregels.html
[..]
Dit is dan wel weer fijn nieuws
quote:India to ban 'offensive' Internet material
India on Tuesday vowed to ban offensive material from the Internet after Facebook, Google and other major firms told the government they were unable to screen content before it was posted.
Communications Minister Kapil Sibal said talks with the Internet giants had failed to come up with a solution following complaints that he had lodged three months ago over "unacceptable" images.
"My aim is that insulting material never gets uploaded," Sibal told reporters in New Delhi. "We will evolve guidelines and mechanisms to deal with the issue.
"They will have to give us the data, where these images are being uploaded and who is doing it."
Sibal said the government supported free speech and was against censorship but that some material on the Internet was so offensive that no one would find it acceptable.
He said he had shown some of the worst images to the Internet companies, who had said they could not control all distribution.
"Three months back we saw that Google, Yahoo!, Facebook had images which could be an insult to Indians, especially religious-minded people," Sibal said.
"We told them to find a way that such insulting images are not uploaded. We gave them some time... but there was no response."
Sibal said the firms had shown that their "intention was not to cooperate" and that they had explained they were only "platforms" on which people could display material.
"I feel that this in principle was not correct but it is very clear that we will not allow such insults to happen. We are thinking and will take the next step," he said. "We will not allow our cultural ethos to be hurt."
Facebook, which has 25 million users in India, released a statement saying it "recognised the government's interest in minimising the amount of abusive content" online and would continue to communicate over the issue.
Google confirmed Monday's meeting with Sibal but made no further comment, while Yahoo! and Microsoft were not immediately available.
Sibal showed some of the offending material to journalists, including fake images of naked politicians and religious figures.
He added that "sometimes when asked for data in respect to terrorists... there is hesitation (by Internet companies) to provide that data."
The Hindustan Times on Tuesday said the Internet companies had rejected Sibal's appeal for screening, saying a huge volume of information was uploaded on to the Internet and that they were not responsible for judging its content.
The paper added that Sibal had earlier complained about a site that targeted Sonia Gandhi, the influential president of the ruling Congress party.
Congress spokesman Abhishek Manu Singhvi said the government was only acting "in respect of absolutely illegal, defamatory, pornographic or other similar kind of material".
BlackBerry maker RIM has been embroiled in a similar wrangle with India over access to encrypted email and instant message services that the government says could be used by extremists to plot attacks.
India has more than 110 million Internet users out of a population of 1.2 billion, according to latest research, with the figure likely to jump to 600 million in the next five years.
Sibal's call for Internet screening quickly attracted a storm of criticism on Twitter, with many users expressing anger over any attempt to restrict usage.
quote:Anonymous Hackers Hit Toronto Web Sites
More than 50 businesses' Web sites were redirected to the Occupy Toronto site.
Members of Anonymous recently redirected the Web sites of more than 50 Toronto businesses to the Occupy Toronto Web site.
"They also took down the Canadian version of the popular Craigslist website and obtained a number of 'valuable' emails they plan on using later if things don’t go their way," writes Softpedia's Eduard Kovacs.
"'The city of Toronto are fools to think that we would remove the city hall Web site off the Internet. We clearly indicated that we are removing Toronto from the Internet. We are offering to keep the peace as of now, but if you decide to declare war in any possible way, then you shall be prepared,' Anonymous said in a video statement," Kovacs writes.
Go to "Anonymous Takes Down More Than 50 Toronto Websites, Not 'Occupy Toronto'" to read the details.
kunnen ze brussel nu ,eventjes onder handen nemen voor ons hele hebben en houden van brussel is,quote:
Het artikel gaat verder.quote:DHS abruptly abandons copyright seizure of hip-hop blog
A bizarre attempt by the U.S. Department of Homeland Security to seize the domain name of a hip-hop blog accused of copyright infringement ended today with the government abruptly abandoning the lawsuit.
Government officials initially trumpeted the seizure of the music blog, DaJaz1.com, and 81 others as an example of the law prevailing over pirates. Attorney General Eric Holder warned at the time that "intellectual property crimes are not victimless," and Immigration and Customs Enforcement director John Morton proclaimed that "today, we turn the tables on these Internet thieves."
The only problem? It turns out that Holder's and Morton's claims appear to have been, well, exaggerated.
That started to become apparent when Dajaz1's editor, who's known as Splash, showed the New York Times e-mail messages from record label employees sending him unreleased songs. ICE had claimed that the music was "unauthorized."
Then ICE treated the case as practically top-secret, filing all the court documents under seal, says Andrew Bridges, a partner at the Fenwick and West law firm in San Francisco who's representing Dajaz1 pro bono.
"They kept getting extension after extension from the court under seal without showing me any papers whatsoever," Bridges told CNET today.
What's unusual here is that normally, U.S. law strongly discourages efforts to censor Web sites before a full trial can be held. That's called "prior restraint," and the U.S. Supreme Court ruled in the Pentagon Papers case that even top-secret national defense information did not qualify for temporary, pre-trial censorship.
But in the DaJaz1 case, a series of allegations of dubious reliability offered in an ICE affidavit were enough to censor a popular music blog -- which had been featured on MTV News a few months earlier -- for over a year.
In fact, the four songs listed by newly-minted ICE agent Andrew Reynolds in the affidavit -- by Jamie Foxx, Chris Brown, Nelly, and Reek Da Villian -- all appear to have been sent to DaJaz1 for promotional purposes. (There's a parallel: Court documents in Viacom's lawsuit against Google showed that studio representatives surreptitiously uploaded copyright clips to the video sharing site for promotional purposes.)
Making the case even more unusual, Bridges said, is that routine procedural documents were all kept under seal. "Why did the government feel the need to keep secret the fact of its repeated extensions of time to file the forfeiture proceeding?" he says.
Homeland Security did not respond to CNET's request for comment.
quote:LAPD Info Posted by 'Anonymous' Hackers in Response to Occupy L.A. Raid
Not everyone's buying L.A. Mayor Antonio Villaraigosa and LAPD Chief Charlie Beck's glowing review of police performance during last week's raid of Occupy L.A.
A hacker group under Twitter handle @CabinCr3w just published the personal information of about two dozen LAPD officers on Tumblr. The crew has been badgering various police departments across America for what many suspect to have been an orchestrated joint crackdown on Occupy Wall Street.
An unnamed member of the crew tells KPCC reporter Tami Abdollah in a chat room that "the bay knows us from OpBART" ...
... or, the attack on BART for censoring cellular communication between officer-involved-shooting protesters.
That would make them part of superstar hacker group Anonymous, whose offshoot LulzSec likewise published the personal information (including cell numbers) of a handful of Arizona law enforcement earlier this year. That hit was a statement against racial profiling and harsh immigration policing.
The LAPD, on the other hand, have come under fire for their treatment of the nearly 300 protesters they detained and jailed in the wee hours of December 1.
"It all comes from those [LAPD] actions, and how the protesters are now being treated like criminals for practicing a fundamental right," the hacker tells KPCC.
LAPD Commander Andy Smith admits to the Los Angeles Times that "It's a creepy thing to do, but what they did doesn't appear to be against the law." Still, the first incarnation of the leak, reportedly posted December 5, has been removed from Sticky Paste, and the owner of that site denies taking it down.
(A list of every LAPD command staffer's email, however, is still up on Sticky Paste.)
As of yesterday morning, police were "investigating who may be behind the site," the Times reported. To that, the hacker group snapped, "Funny that @LAPD is "looking" for who posted their info... not like we hid that we did it. Y U NO EXPECT US?"
The original Sticky Paste leak listed some names of officers' family members, including children. However, the Tumblr sequel censors itself in this regard, saying, "we will not release family names."
Another strange factor: Some of the officers listed have been retired for years, and had nothing to do with the raid.
Update, 9:30 a.m.: This is getting good. The hacker group has begun bickering with LAPD homicide detective Sal LaBarbera, who launched a "cops on Twitter" debate this fall when he Tweeted a photo of a dead body, along with some casual commentary.
twitter:AnonymousPress twitterde op vrijdag 09-12-2011 om 01:10:58CENSORED? RT @CulturalHistory: @AnonymousPress You know every so often when I try to RT some of your stuff twitter will say you don't exist. reageer retweet
twitter:AnonymousPress twitterde op vrijdag 09-12-2011 om 01:20:36WTF?! RT @laraste: @AnonymousPress Yes, you are absolutely censored from my stream. I can't retweet your stuff if it includes # o c c u p y reageer retweet
quote:Salarissen medewerkers Radboud Universiteit op straat
Studenten van de Radboud Universiteit Nijmegen hebben ontdekt dat het interne netwerk kampte met een beveiligingsprobleem. Door de lek lagen de salarissen van medewerkers op straat. Ook was er toegang tot de adressen van personeel en studenten.
Volgens Tweakers.net. bracht de onderwijsinstelling het nieuws zelf naar buiten, maar wil de universiteit er verder weinig over kwijt. Ook niet hoe de studenten achter het lek zijn gekomen.
Volgens een mededeling op de site van de Radboud Universiteit gaat was het niet mogelijk wijzigingen aan te brengen in de blootgelegde data. De studenten hebben vervolgens zelf de universiteit ingeseidn, waarna het lek is gedicht.
'De universiteit bedankt de studenten voor hun inzet en voor de zorgvuldige wijze waarop ze het informatielek hebben aangekaart', meldt de Radboud Universiteit.
quote:Russians fight Twitter and Facebook battles over Putin election
Protests against president's party escalate across social media with flood of automated counterattacks and alleged hacking
Russians have flooded Facebook and Twitter as they organise unprecedented protests against Vladimir Putin's United Russia party. But they are not alone. Thousands of Twitter accounts appear to have been created with the sole purpose of drowning out opposition voices by flooding the service's hashtag search function.
The automated attacks have dumped a blizzard of meaningless tweets with hashtags such as #Navalny, on which tweets about Alexei Navalny are collated, making it impossible to follow the flow of news about the arrested opposition leader. Many of the so-called "Twitter bots" have now been shut down.
The flood of fake tweets came after liberal websites, including the LiveJournal blogging platform, the website for radio station Ekho Moskvy and weekly journal Bolshoi Gorod , were shut down by distributed denial of service attacks on Sunday, the day of Russia's disputed parliamentary vote.
The website for Golos, an independent election monitor, was also shut down. Golos employees complained this week that their email had been hacked and inaccessible for several days. On Friday, tabloid Life News published employees' private emails, detailing correspondence with the US development agency – presented as "proof" that the group was acting on foreign orders to disrupt the Russian election.
The most interesting hack attack, however, came via a more antiquated instrument – the telephone. On Thursday, the liberal Yabloko party and newspaper Novaya Gazeta said their telephone lines had been paralysed by endless calls featuring a recorded female voice: "Putin is very good. Putin loves you. Putin makes your life happy. Love Putin and your life will fill with meaning. Putin does everything for you. Remember, Putin does everything just for you. Putin is life. Putin is light. Without Putin, life has no meaning. Putin is your protector. Putin is your saviour." Over and over again.
quote:Monsanto PR Firm Reportedly ‘Ended’ by Anonymous
It seems that Monsanto may be having a rough week.
Not only was the company hit by a press release declaring them the worst company of 2011, but a group of Anonymous hackers claim to have actually completely disrupted the operations of a PR firm which manages Monsanto’s own PR.
The hackers infiltrated the PR firm, known as The Bivings Group, citing “15+years of running marketing campaigns and helping some of the most corrupt corporations on the planet, as well as several governmental agencies, cover up their dirt.”
The hackers claimed to have succeeded in bringing down The Bivings Group on December 5th.
Going by information released by Anonymous, Bivings Group shut down all of their servers and liquidated their assets after the infiltration, while former employees moved on to start ‘The Brick Factory’, a new PR firm. The hackers actions are obviously driven by the PR firm’s decision to help run marketing campaigns for corrupt corporations like Monsanto.
One week after the hackers infiltrated their system, The Bivings Group reportedly stated:
. Our Cyber Infrastructure has recently been put under attack. We are evaluating the extent of the intrusion, and apologise for any downtime and issues this may cause you. It is not yet determined what the motives behind the attack are, or what, if any data has been compromised. We will continue to keep you up to date, and sicerely apologise for any inconvenience.
Sometimes it is hard to see what is wrong and what is right, though it is quite apparent that Monsanto is a corporation with no regard for human health or the planet. This isn’t the only example of resistance against corrupt companies like Monsanto, and it certainly won’t be the last.
Regardless of whether or not the attack will be considered to be in the right by some anti-Monsanto activists, one thing is clear: Monsanto’s own crimes against public health and the environment trump any form of cyber attack in terms of wrongdoing.
quote:Anonymous Mexico casts first stone in "Operation Safe Roads"
Roughly 11 days ago, Anonymous Mexico announced the new operation, #Opcarreterasseguras in Spanish, via social media and video. The hackivists seek to highlight “the thousands of kidnappings, murders and rapes that bus passengers fall prey to by organized crime elements on Mexican highways,” according to a press release.
Anonymous Mexico listed its demands in an accompanying video, which focused on security concerns like GPS tracking and silent alarms that would alert authorities when a bus was in the process of being hijacked. The deadline for those demands to be met was Dec. 10.
As the clock struck at midnight, Anonymous Mexico followed through with its promised cyber attacks on three bus companies: Transpais, Estrella Blanca, and Autobuses Del Oriente.
The press release announcing the cyber strike stated those involved were “also attacking several insurance companies as well as government websites, but we will allow the press to do their investigative reporting in order to report on it.”
At time of publication, the website for bus company Autobuses Del Oriente was the only site down, possibly due to a DDoS attack.
Update:
“We did not expect them to meet our demands so quick. It will take time but I feel they didn't believe us” wrote a spokesperson for the operation, in a private Twitter message to the Daily Dot. The spokesperson went on to write the attack would continue for "24 hours straight."
“For example ADO operates in 13 Mexican states. Right now you can’t buy a ticket online because we downed them. They are losing money right now. We believe these actions repeatedly will teach them that safety is profitable,” added the spokesperson, before linking to their blogspot.
quote:News HBGary CEO Says Anonymous Hack Made Him Money: Begging for Round 2?
In an interview with Network World, HBGary’s CEO and founder Greg Hoglund bragged that the Anonymous attack on HBGary Federal earlier this year actually brought them business. Will this precipitate a second round with the hacking collective?
Earlier this year, HBGary Federal CEO Aaron Barr spoke publicly about his intent to infiltrate Anonymous. The hacking collective bristled at Barr’s declaration and hacked his email, which contained communications with Bank of America about how to neutralize WikiLeaks; which, at the time, was said to be sitting on a treasure trove of incriminating documents from some major bank, commonly thought to be BofA.
Barr attempted damage control by chatting with Anonymous members in an Internet Relay Chat (IRC), but HBGary Federal was publicly humiliated and Barr was eventually forced to resign.
However, HBGary founder and CEO Greg Hoglund, who had created HBGary Federal to contract with the U.S. government, stated in an interview published this morning in Network World that the Anonymous attack did not ruin HBGary. Instead, it created a degree of sympathy for the company and brought them business.
In a sense, it seems as if Hoglund was thanking Anonymous. In another sense, however, it could be interpreted as Hoglund asking for a second round with Anonymous.
That said, much of the various nodes of Anonymous have, in recent months, shifted their gaze to working as publicity engines for and participants in the Occupy movement. As hacker anthropologist and NYU professor Gabriella Coleman told us in a recent interview, “Some Anons have gotten quite involved [in Occupy] on the ground in different cities, lending a helping hand.”
In other words, perhaps Hoglund’s boasts are of little interest to Anonymous now.
But, one can’t help wondering if Round 2 of the Anonymous vs. HBGary battle is heating up.
SPOILEROm spoilers te kunnen lezen moet je zijn ingelogd. Je moet je daarvoor eerst gratis Registreren. Ook kun je spoilers niet lezen als je een ban hebt.Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
quote:Recognizably Anonymous
How did a hacker group that rejects definition develop such a strong visual brand?
quote:Six or eight people, Housh reckons, hashed out a press release. It read like the script to a movie trailer, so somebody proposed turning it into a video, combing Archive.org to dig up images of rolling clouds and ominous background music available under a Creative Commons license. They kept fiddling with the ending of the script, using Anonymous-associated phrases already in circulation. Another contributor proposed a conclusion: “We are Anonymous. We are legion. We do not forgive, we do not forget.” Pause. “Expect us.”
“Everyone in the channel erupts,” Housh recalls. “Like ‘Oh my god. You’ve done it. You have done it! We win this game.’ ” The script was fed into AT&T text-to-speech software, and became the video’s creepy voice-over. Next the group created a Web site. For a logo, they considered imagery that had been floating around 4Chan and elsewhere, including the headless suit-man. Someone—Housh says the person wishes to remain anonymous—suggested imposing that image over a U.N.-style globe logo. Then a question mark was added where the figure’s head should be. In what seems like a missed opportunity, the Anonymous logo did not appear anywhere in the video. “We weren’t branding experts or anything,” Housh explains.
quote:https://en.wikipedia.org/(...)up/Affected_articles
Wikipedia:Bell Pottinger COI Investigations
It emerged in early December 2011 that accounts operated by Bell Pottinger, a British PR firm, had been extensively editing Wikipedia to further their clients' interests. This page attempts to identify and remove these edits.
So far, eleven accounts are confirmed to have been operated by the firm, and several more cannot be confirmed but have suspicious editing records. The list is probably not complete - please let us know on the discussion page if you have found others.
The affected articles are listed below, grouped into clusters by topic. It should not be considered a list of clients, and there may be false positives.
quote:FloridaFamilyJUSTtheBeginning
Florida Family Association feels the need to put hate at the forefront of what it stands for.
Your hatred, bigotry and fear mongering towards Gays, Lesbians and most recently
Muslim Americans has not gone unnoticed!
Anonymous will not stand for hate and divisive vitriol to be spread across our country and whenever we can...we will stop it...
FFA you managed to use your power to influence Lowe's to follow you into your racist stupor and they too will answer for that...
For now, you will answer to it..as well as your unfortunate followers having personal information shared with the world so everyone can know how racist and hateful you all are.
I am going to assume most of the people who receive your newsletter, email you and make donations are potentially part of the 99%. They are likely lower middle class people who have been mislead by all of your bullshit and god talk...therefor they too are unwitting victims. So I will NOT share all of the Credit Card information I got.
I am though reading the emails and getting information on those who did donate to make sure they are not worthy of the scorn of Anonymous as well...if i find information such as anyone being a part of other hate groups such as the Klan or anything similar all bets are off for those people.
Also, I am looking for you Steve Ensley...and I will find you.
I want all of your followers to know though their information is NOT SAFE in your hands until you address your security issues.
http://floridafamily.org/(...)no=%Inject_Here%1171
EMAIL & IP ADDRESSES OF THOSE WHO GET YOUR NEWSLETTER :
quote:Secular progressives are fundamental socialists, who are hostile toward Christianity and traditional American values. They are committed to dramatically changing America to look like the godless, socialistic Western Europe.
quote:Copyright Regime vs. Civil Liberties
One of my first large keynotes, in 2007, was called Copyright Regime vs. Civil Liberties. In the 15-minute original keynote at OSCON, I outlined all the civil liberties that were at risk because of enforcement of the copyright monopoly, and that the copyright industry brutally understood these liberties needed to be killed to preserve their business. What was fringe paranoia five years ago is now becoming the law of the land.
The keynote in question shows how the copyright monopoly is fundamentally incompatible with horizontal unmonitored digital communication, and therefore, with the Internet and private communications as very concepts.
quote:At the same time in the United States, China and Iran are held as shining examples of countries which still have a working freedom of speech despite having given the copyright industry the privileges they want. (Even I could not have made this up; it is just too far out) And to applause from the Senate, no less. This was in the SOPA/PIPA debate, and I would have a hard time finding a better example of how completely incompatible the copyright monopoly is with fundamental rights.
Het artikel gaat verder.quote:WikiLeaks: A tale of two worlds
WikiLeaks, 4Chan and Anonymous are examples of how rogues can thrive against the will of empire.
Melbourne, Australia - There is something eerie about the WikiLeaks logo (see above). It works as a sort of graphic manifesto, an image of dense political content stating a notion of ample consequences. A cosmic sandglass encloses a duplicated globe seen from an angle that puts Iraqi territory at the centre.
Inside this device the upper and darker planet is exchanged, drip by drip, for a new one. The power of the image lies in the sense of inexorability it conveys, alluding to earthly absolutes like the flow of time and the force of gravity: a bullish threat that grants the upper world no room for hope. The logo narrates a gradual apocalypse, and by articulating this process of transformation through the image of the leak, WikiLeaks defines itself as the critical agent in the destruction of the old and the becoming of the new world.
What has become manifest since late November 2010, with the release of what is now known as "The US Embassy Cables", is that the narrative implicit in the WikiLeaks logo, that of a world disjunct, describes a greater struggle against the global power held diffusely by transnational corporations and enforced by governments around the world. This power is under attack by a relatively new actor that can be called, for now, the autonomous network.
The conditions that allow the network to challenge the power of governments and corporations can be traced to the origin of the Internet and the Cold War zeitgeist that made the network we know possible. It was only because Cold War strategists had to narrate to themselves the unfolding of convoluted thermonuclear apocalypse scenarios, a dark art that peaked with Herman Kahn's surreal book On Thermonuclear War, that a computer network with the characteristics of the internet was implemented.
"I loved this concept of the purest things in the universe being unowned. The early Internet was so accidental, it also was free and open in this sense. "
- Apple co-founder Steve Wozniak
The idea of imminent apocalypse was so extraordinary that it allowed for the radical thinking that over a decade evolved into the TCP/IP computer protocol suite, a resilient network protocol that makes the end user of the network its primary agent. The design philosophy of the internet protocols represents a clean break from the epistemes and continuums that had historically informed the evolution of Western power, as traced by Foucault and Deleuze from sovereign societies to disciplinary societies to societies of control.
Steve Wozniak has written, "I was also taught that space, and the moon, were free and open. Nobody owned them. No country owned them. I loved this concept of the purest things in the universe being unowned. The early internet was so accidental, it also was free and open in this sense".
To produce a commons is indeed an accident for Empire. Dismissed as a never-meant-for-the-masses autonomous zone, by and for the military and academia, it was allowed to evolve out of control. But this accident that happened because of daydreaming an extreme future never stopped happening.
It evolved.
At some point it gained an accessible graphic interface, and spilled all over the globe. By then it was too late to disarm what is now the increasingly contentious coexistence of two worlds, as the WikiLeaks logo registers. One world is a pre-apocalyptic capitalistic society of individualism, profit and control; the other a post-apocalyptic community of self-regulating collaborative survivors. The conflict arises from an essential paradox: Because the web exists, both worlds need it in order to prevail over the other.
The "cyber war" announced so spectacularly (in the Debordian sense) in the days following WikiLeaks' US Embassy Cables release is not really about the DDoS (Distributed Denial-of-Service), "denial of service" attacks that barely obstructed access to the MasterCard website for a few hours. If anything, the ephemerality of the disturbance leaves the sensation that Anonymous, the group that launched it, is far from being a structural threat. What journalists around the world have failed to narrate is the tale of a network that increasingly challenges, bypasses and outcompetes the global corporate-government complex. This is a struggle about the obsolescence of the very idea of the nation-state, and an almost unanimous coalition of governments, led by the US, fighting furiously to regain control by exerting legal, financial, symbolic and, perhaps most concerning, technical violence on their adversary.
Wat ik al vaker heb geroepen: We moeten overheden en multinationals irrelevant maken.quote:What is interesting is that WikiLeaks, after all, is still up and running. Someone still hosts it (poetically, a hosting company located in a Cold War-era anti-nuclear bunker), and their fund-raising channels have diversify to bypass the embargo (with partial success). WikiLeaks is an example of how a rogue can still thrive against the will of Empire, supported by an emerging ecology of more autonomous actors. MasterCard, PayPal and Amazon don't need to be shut, just bypassed or outcompeted. As the autonomous ecology matures, it allows for more complexity. This is where the war stands to be won: in the building of autonomous structures of all sorts (structures that bypass and outcompete existing ones) on top of other new structures until the entire old world is unnecessary.
Met dank aan Stephan1237quote:Op maandag 12 december 2011 15:56 schreef Stephan1237 het volgende:
Weblog GeenStijl heeft ontdekt dat vanaf het kantoor van auteursrechtenwaakhond Buma Stemra illegaal materiaal wordt gedownload van internet. De organisatie strijdt sinds jaar en dag tegen illegaal downloaden van beschermde materialen, maar maakt zich er volgens GeenStijl zelf ook schuldig aan.
De bloggers baseren zich op de website Youhavedownloaded.com. Daar wordt bijgehouden vanaf welk IP-adres bepaalde bestanden met bijvoorbeeld films worden gedownload. Een IP-adres is het digitale adres van iemands internetverbinding, dat valt te koppelen aan huisadressen.
GeenStijl vulde het IP-adres van het hoofdkantoor van Buma Stemra in en ontdekte dat via hun verbinding een aflevering van een Amerikaanse tv-serie is gedownload, en het spel Battlefield 3.
GeenStijl vindt dat pikant, omdat slechts 4 tot 6 procent van de wereldwijd via internet gedownloade bestanden via de genoemde site wordt bijgehouden. Mogelijk dat er meer bestanden zijn gedownload via de verbinding van Buma Stemra. (ANP/Redactie)
Bron : http://www.ad.nl/ad/nl/55(...)-zelf-illegaal.dhtml
En wie gaat Buma/Stemra voor de rechter slepen
quote:KLPD gebruikt ‘afluister-software’ op computers verdachten
Het Korps Landelijke Politiediensten (KLPD) gebruikt software die op afstand kan worden geïnstalleerd op de computer van verdachten. Daarmee kan vertrouwelijke communicatie zoals een skypegesprek worden gevolgd. Dat bleek vanavond uit antwoorden van minister van Justitie Ivo Opstelten op vragen van D66, GroenLinks en SP.
Half oktober ontstond er ophef in Duitsland over het gebruik van ‘Bundestroyaner-software’ door de politie. Die bleek veel meer te kunnen dan wettelijk toegestaan. Zo maakt de Bundestroyaner het mogelijk op afstand de microfoon van een geïnfecteerde computer aan te zetten en gesprekken in de huiskamer af te luisteren.
Ook werd betwijfeld of het wel alleen verdachten waren waarbij de Duitse politie meekeek. De software zou onder andere via e-mail op computers terechtkomen. De producent, het Duitse softwarebedrijf Digitask, verklaarde tegen nrc.next dat de software ook aan een Nederlandse overheidsdienst is verkocht.
Welke dienst wilde het bedrijf niet zeggen. Dat lijkt nu het KLPD te zijn geweest. Opstelten noemt alleen de Unit Landelijke Interceptie van de dienst, die voor de hele politie werkt, als gebruiker van dit soort software.
De minister schrijft dat die alleen wordt gebruikt na goedkeuring door een officier van justitie. Functionaliteiten die in strijd zijn met de wet worden volgens Opstelten onklaar gemaakt.
quote:Voice-over-internet companies win EU backing in dispute with mobile carriers
EU ministers call for checks on telecom operators that penalise the smooth functioning of services such as Skype
Voice-over-internet companies complaining that mobile and landline internet providers penalise the smooth functioning of their services got backing from EU ministers on Tuesday, who called for the European Commission and regulators to check on telecom operators that do so.
The move gives leverage to complaints about mobile carriers around the world that have blocked internet telephony services such as Skype.
A report by the Voice over Internet Protocol (VoIP) association, VON Europe, whose members include both Google and Skype-owner Microsoft, says Vodafone Group restricts access to web-based calls on pay-as-you-go deals, while some mobile providers do not allow VoIP at all, including France Telecom's Orange, Bouygues, Germany's E-Plus and its parent group, Dutch provider KPN.
It points to the example of the French operator SFR which sells "internet access" packages for Apple's iPad which specifically ban voice-over-internet (VoIP) and peer-to-peer use, while labelling it "unlimited". In the UK, only Three and O2 allow VoIP-based use of the iPad on their mobile internet packages.
"In other words, ISPs do have incentives to discriminate between players operating at the application and content layers," notes VON Europe's report. "Internet service providers can act as monopolists by shaping traffic in a way that departs from the application providers', content/service providers' or users' interests."
Ministers urged the pan-European regulator and the European Commission to monitor mobile companies' traffic management to ensure they do not hamper "net neutrality", meaning that all services are treated equally.
The regulator, BEREC, says infringements of "net neutrality" – in which some internet traffic such as voice calls is blocked in favour of other data – are infrequent, but ministers are concerned that some services are being throttled.
That in turn could stifle the development of brand new services because carriers and telecoms companies would defend older models, but put Europe at a disadvantage compared with countries that better implement net neutrality.
In the US, the Federal Communications Commission (FCC) recommended a number of rules to enforce net neutrality on fixed, though not mobile, companies at the end of 2010. But mobile carrier Verizon Communications challenged even that weak approach in October.
BEREC will publish a joint report from regulators in the 27 EU member states in February on whether telecom firms respect the principle of net neutrality.
Microsoft's Skype service says it is either blocked or overpriced by mobile operators, who see its low-cost service as a threat to their business. Skype's customer base is forecast to reach 150 million by 2016, according to Juniper Research.
The Netherlands passed a law in October banning mobile firms from charging customers extra for web-based call services.
twitter:AnonCircle twitterde op dinsdag 13-12-2011 om 18:55:00CNN tells us what it thinks we want to hear... http://t.co/4JgmFogN #Anonymous #OWS reageer retweet
Forum Opties | |
---|---|
Forumhop: | |
Hop naar: |