abonnement Unibet Coolblue Bitvavo
  dinsdag 4 februari 2014 @ 23:56:38 #61
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_136349386
Rondje Scandinavië:

quote:
Read the Snowden Documents From the NSA
Here Uppdrag granskning [Mission: Investigation] the documents leaked by Edwards Snowden and retrieved from Glenn Greenwald that are the basis for the report about Sweden's collaboration with the NSA and the GCHQ.
quote:
In an internal, top-secret document dated 18 April this year, the NSA summarises its relations with Sweden. The document states that since 1954 Sweden has been a part of an intelligence collaboration with what is often called “The Five Eyes”, UKUSA, which refers to the US, UK, Canada, Australia and New Zealand. This is despite the fact that Sweden was officially neutral, an image that has been maintained outwardly for decades by multiple governments of different political persuasions. The document also states that the UKUSA contract was discontinued in 2004 and replaced with bilateral agreements for signals intelligence and wiretapping. As of 2011, the Swedish FRA provides its American partner with extensive access to data from its cable collection.
quote:
quote:
Countries ranging from France to Finland have started responding to NSA revelations in different ways, ranging from new fiber optic cables to government-backed industrial espionage. By 2015, some European countries will start implementing surveillance programs that go even beyond the NSA — and are explicitly meant to protect not only national security, but also economic interests.

Last week, Europe was rocked by the claim that Sweden has been one of the key allies of NSA in a global surveillance program. Sweden may have tapped into the undersea fiber optic cables running under the Baltic sea to deliver massive amounts of intel about countries across Nordic and Baltic regions. According to Wikileaks, Finland has now committed to building a new fiber optic cable to Germany specifically to prevent Sweden from intercepting data and passing it on to NSA. The project is run by Governia, a state-owned company.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 4 februari 2014 @ 23:58:46 #62
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_136349460
quote:
1s.gif Op dinsdag 4 februari 2014 23:51 schreef polderturk het volgende:

[..]

Wat een hypocrisie. En de NSA is geen dief? De NSA steelt geen informatie van honderden miljoenen mensen?
Nee, dit is propaganda, victim blaming en shooting the messenger. Assange is een autistische verkrachter en Glenn Greenwald is een buitenlandse dief.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
pi_136349507
quote:
7s.gif Op dinsdag 4 februari 2014 23:25 schreef Papierversnipperaar het volgende:

[..]

[..]

Het klopt voor geen meter wat hij zegt. Wie gestolen waar verhandelt is hooguit een heler, geen dief. En ook in het Engels is een heler geen "thief".
  woensdag 5 februari 2014 @ 12:55:40 #64
45206 Pietverdriet
Ik wou dat ik een ijsbeer was.
pi_136359344
In Baden-Badener Badeseen kann man Baden-Badener baden sehen.
  woensdag 5 februari 2014 @ 12:59:07 #65
45206 Pietverdriet
Ik wou dat ik een ijsbeer was.
pi_136359468
quote:
7s.gif Op dinsdag 4 februari 2014 23:58 schreef Papierversnipperaar het volgende:

[..]

Nee, dit is propaganda, victim blaming en shooting the messenger. Assange is een autistische verkrachter en Glenn Greenwald is een buitenlandse dief.
Spin, een specifieke manier van propaganda.
In Baden-Badener Badeseen kann man Baden-Badener baden sehen.
  woensdag 5 februari 2014 @ 13:23:16 #66
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_136360335
quote:
quote:
Minister Plasterk van Binnenlandse Zaken en minister Hennis-Plasschaert van Defensie schrijven nu dat Nederland die informatie zelf onderschepte en vervolgens deelde met de NSA. Het kabinet maakt daarmee een flinke draai. In oktober meldde Plasterk nog dat het kabinet zich ervan bewust is dat de NSA telefoongesprekken kan aftappen en dat er met de Amerikanen over de kwestie gesproken werd.

Volgens de ministers betreft het 'uitdrukkelijk data verzameld
in het kader van de wettelijke taakuitoefening'. Het delen van de informatie is volgens Plasterk en Hennis op rechtmatige wijze gebeurd in het kader van terrorismebestrijding en militaire operaties in het buitenland.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 5 februari 2014 @ 13:36:35 #67
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_136360809
quote:
quote:
A secret British spy unit created to mount cyber attacks on Britain’s enemies has waged war on the hacktivists of Anonymous and LulzSec, according to documents taken from the National Security Agency by Edward Snowden and obtained by NBC News.

The blunt instrument the spy unit used to target hackers, however, also interrupted the web communications of political dissidents who did not engage in any illegal hacking. It may also have shut down websites with no connection to Anonymous.

According to the documents, a division of Government Communications Headquarters Communications (GCHQ), the British counterpart of the NSA, shut down communications among Anonymous hacktivists by launching a “denial of service” (DDOS) attack – the same technique hackers use to take down bank, retail and government websites – making the British government the first Western government known to have conducted such an attack.

The documents, from a PowerPoint presentation prepared for a 2012 NSA conference called SIGDEV, show that the unit known as the Joint Threat Research Intelligence Group, or JTRIG, boasted of using the DDOS attack – which it dubbed Rolling Thunder -- and other techniques to scare away 80 percent of the users of Anonymous internet chat rooms.

The existence of JTRIG has never been previously disclosed publicly.

The documents also show that JTRIG infiltrated chat rooms known as IRCs and identified individual hackers who had taken confidential information from websites. In one case JTRIG helped send a hacktivist to prison for stealing data from PayPal, and in another it helped identify hacktivists who attacked government websites.

In connection with this report, NBC is publishing documents that Edward Snowden took from the NSA before fleeing the U.S. The documents are being published with minimal redactions.

Intelligence sources familiar with the operation say that the British directed the DDOS attack against IRC chat rooms where they believed criminal hackers were concentrated. Other intelligence sources also noted that in 2011, authorities were alarmed by a rash of attacks on government and corporate websites and were scrambling for means to respond.

“While there must of course be limitations,” said Michael Leiter, the former head of the U.S. government’s National Counterterrorism Center and now an NBC News analyst, “law enforcement and intelligence officials must be able to pursue individuals who are going far beyond speech and into the realm of breaking the law: defacing and stealing private property that happens to be online.”

“No one should be targeted for speech or thoughts, but there is no reason law enforcement officials should unilaterally declare law breakers safe in the online environment,” said Leiter.

But critics charge the British government with overkill, noting that many of the individuals targeted were teenagers, and that the agency’s assault on communications among hacktivists means the agency infringed the free speech of people never charged with any crime.

“Targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs,” said Gabriella Coleman, an anthropology professor at McGill University and author of an upcoming book about Anonymous. “Some have rallied around the name to engage in digital civil disobedience, but nothing remotely resembling terrorism. The majority of those embrace the idea primarily for ordinary political expression.” Coleman estimated that the number of “Anons” engaged in illegal activity was in the dozens, out of a community of thousands.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
pi_136360950
quote:
7s.gif Op woensdag 5 februari 2014 13:23 schreef Papierversnipperaar het volgende:

[..]

[..]

Alsof het een het ander uitsluit...
Wees gehoorzaam. Alleen samen krijgen we de vrijheid eronder.
  woensdag 5 februari 2014 @ 13:48:01 #69
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_136361226
ggreenwald twitterde op woensdag 05-02-2014 om 13:40:01 Is NBC News now one of Snowden's criminal "accomplices"? Are they criminally buying stolen property? Speak up, James Clapper & Mike Rogers. reageer retweet
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 5 februari 2014 @ 14:39:00 #70
45206 Pietverdriet
Ik wou dat ik een ijsbeer was.
pi_136363091
quote:
7s.gif Op woensdag 5 februari 2014 13:48 schreef Papierversnipperaar het volgende:
ggreenwald twitterde op woensdag 05-02-2014 om 13:40:01 Is NBC News now one of Snowden's criminal "accomplices"? Are they criminally buying stolen property? Speak up, James Clapper & Mike Rogers. reageer retweet
The NYTimes werd nav de publicatie van The Pentagon Papers ook beschuldigd van heling.
In Baden-Badener Badeseen kann man Baden-Badener baden sehen.
  donderdag 6 februari 2014 @ 17:00:09 #71
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_136406377
quote:
Snowden Still Outwitting U.S. Spies

Sometimes, the three hardest words to say in the English language are: “I don’t know.” For the U.S. intelligence community, those words could be very useful when it comes to Edward Snowden, the NSA-contractor-turned-leaker. Because when it comes to Snowden, the spooks know precious little—despite the over-sized claims made in Congress, allegedly on the spies’ behalf.

Last month, the Defense Intelligence Agency (DIA) completed a classified assessment of the damage caused by Snowden’s breach and began briefing the findings to Congress. The report is now driving a new round of claims by senior U.S. officials and members of Congress about what has been called the worst leak in U.S. history.

Director of National Intelligence James Clapper said a week ago that Snowden’s activities have placed the lives of intelligence officers and assets at risk. Sen. Susan Collins, a Republican from Maine, said if one were to stack the documents stolen by Snowden it would be three miles high. On Wednesday, Rep. Mac Thornberry, the Texas Republican who is next in line to be the chairman of the House Armed Services Committee, said the damage done by Snowden “will certainly cost billions to repair.”

But the DIA assessment is based on two important assumptions. First, it assumes that Snowden’s master file includes data from every network he ever scanned. Second, it assumes that this file is already in or will end up in the hands of America’s adversaries. If these assumptions turn out to be true, then the alarm raised in the last week will be warranted. The key word here is “if.”

What the DIA actually knows, according to U.S. officials briefed on its report, is that Snowden fabricated the digital keys—essentially assuming the identity—of multiple senior intelligence officials to gain access to classified intelligence systems well outside of the NSA like the military’s top secret Joint World-Wide Intelligence Communications System. One U.S. intelligence official briefed on the report said the DIA concluded that Snowden visited classified facilities outside the NSA station where he worked in Hawaii while he was downloading the documents he would eventually leak to journalists Glenn Greenwald and Barton Gellman. On Tuesday, Clapper himself estimated that less than 10 percent of the documents Snowden took were from the NSA. The implication was that the other 90 percent were from other spy agencies, and from the American military.

Those findings are important. But they do not necessarily mean the sky is falling. The DIA’s assessment assumed that every classified system Snowden visited was sucked dry of its data and placed in a file. DIA director Gen. Michael Flynn put it this way on Tuesday in testimony before the House Permanent Select Committee on Intelligence: “We assume that Snowden, everything that he touched, we assume that he took, stole.”

The U.S. intelligence official briefed on the report said the DIA was able to retrace the steps Snowden took inside the military’s classified systems to find every site where he rummaged around. “Snowden had a very limited amount of time before he would be detected when he did this, so we assume he zipped up the files and left,” this official said.

Bruce Schneier, a cybersecurity expert and cryptographer who Greenwald has consulted on the Snowden archive, said it was prudent to assume that lest some of Snowden’s documents could wind up in the hands of a foreign government.

The easiest way, he added, would be to go after the journalists who received Snowden’s leaks. “If anybody wants the documents, they go after Greenwald, (Laura Poitras) or Gellman.”

But he also said that this file would likely be encrypted—and that encryption today is powerful enough to be essentially unbreakable. So intelligence services may have the documents without being able to read them.

And those journalists might only have a fraction of what Snowden took. In statements and interviews, Snowden himself has been tight-lipped about any kind of master file that may exist containing everything he took from the U.S. intelligence community. In June, Greenwald told the Daily Beast that he did not know whether or not Snowden had additional documents beyond the ones he gave him. “I believe he does. He was clear he did not want to give to journalists things he did not think should be published.”

Snowden, however, has implied that he does not have control over the files he took. “No intelligence service—not even our own—has the capacity to compromise the secrets I continue to protect,” he wrote in July in a letter to former New Hampshire Republican senator Gordon Humphrey. “While it has not been reported in the media, one of my specializations was to teach our people at DIA how to keep such information from being compromised even in the highest threat counter-intelligence environments (i.e. China). You may rest easy knowing I cannot be coerced into revealing that information, even under torture.”

Some allies of Snowden have speculated that any kind of master file of Snowden documents could only be accessed through a pass code or cryptographic key broken out into pieces controlled by several people in multiple jurisdictions throughout the world. That way. No one government could force a single person to give up access to Snowden’s motherlode.

But these kinds of security measures are not comforting to others. Rep. Mike Rogers, the Republican chairman of the House Permanent Select Committee on Intelligence told two reporters Tuesday that Snowden would be foolish to think he could outsmart Russia’s intelligence agencies.

“If he really believes he has created something the Russian intelligence services can’t get through, then he is more naïve than I think he already is,” Rogers said. “That makes a huge leap of assumption that a guy by the way who has not been quite honest about how he got where he was and what he stole and for what purpose to believe the fact that no one can get to this but me. I don’t believe it.”

In an email to the Daily Beast, Gellman said he was taking many precautions to protect the Snowden archives. “I assume that I am more interesting than I used to be to foreign intelligence services,” he said. “I’m well aware of my responsibility to protect the Snowden archive. The Post and I have taken very considerable measures to secure the material physically and electronically, with the benefit of top-flight expert advice. That’s all I want to say about it.”
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
pi_136406498
Poll: plasterk moet eer aan zichzelf houden en wegwezen.
eens
oneens
kwee nie
Tussenstand:

Ook een poll maken? Klik hier
  vrijdag 7 februari 2014 @ 11:08:39 #73
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_136431614
quote:
IRC network calls for investigations over GCHQ's attack on Anonymous

QuakeNet calls the GCHQ's actions grossly hypocritical...

QuakeNet, one of the oldest IRC networks on the Web, has condemned Britain's GCHQ for their hypocrisy - after it was revealed the agency launched DDoS attacks against IRC servers used by supporters of Anonymous.

The story broke on Wednesday. NBC News reported that the GCHQ's Joint Threat Research Intelligence Group (JTRIG) bragged about using Distributed Denial of Service (DDoS) attacks, during an operation called Rolling Thunder. These attacks were part of a campaign targeting supporters of Anonymous, outlined during a 2012 NSA conference called SIGDEV.

During their presentation, JTRIG says they scared away 80 percent of the server's users. In addition, NBC News also reported that JTRIG visited chat rooms on AnonOps (one of the Anonymous IRC servers) and interacted with users, sometimes spreading malware, in order to collect additional intelligence. Such intelligence led to at least one prison sentence, and additional identification of potential suspects.

As I wrote in my previous post, what the GCHQ did was reprehensible. They've broken their own nation's laws, in order to target people gathered in a single location to express themselves and communicate their thoughts. Adding insult to injury, they gave themselves immunity, so no one will be facing any legal problems because of this.

Yet, as of today, anyone in the U.K. (or U.S. for that matter), who encourages, assists with, or conducts a DDoS attack, for any reason, will face up to 10 years in prison and heavy fines. It's complete hypocrisy.

DDoS is disruptive. In addition to recovery and mitigation costs, even if those costs are just personal time lost due to the act, there's collateral damage to consider. When a server is attacked, and it crashes, everything hosted on it goes down too.

In the case of the GCHQ's attack, not only did the Anonymous IRC server go offline, but websites hosted on the same server went offline as well. In addition, the people paying the bills on the server had to pay bandwidth overage fees because of government sanctioned attack. Moreover, the ISPs that provide the connections to the IRC servers themselves were attacked, and faced problems of their own. By going after Anonymous, the GCHQ also attacked groups of innocent people, in what amounts to nothing more than aggravated censorship.
- See more at: http://blogs.csoonline.co(...)sthash.DJIOVZNb.dpuf

Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 7 februari 2014 @ 15:42:00 #74
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_136440179
quote:
Snowden Docs: British Spies Used Sex and 'Dirty Tricks'

British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”

Documents taken from the National Security Agency by Edward Snowden and exclusively obtained by NBC News describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG) as part of a growing mission to go on offense and attack adversaries ranging from Iran to the hacktivists of Anonymous. According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agency’s goal was to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications.

Both PowerPoint presentations describe “Effects” campaigns that are broadly divided into two categories: cyber attacks and propaganda operations. The propaganda campaigns use deception, mass messaging and “pushing stories” via Twitter, Flickr, Facebook and YouTube. JTRIG also uses “false flag” operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain’s adversaries.

In connection with this report, NBC is publishing documents that Edward Snowden took from the NSA before fleeing the U.S., which can be viewed by clicking here and here. The documents are being published with minimal redactions.

The spy unit’s cyber attack methods include the same “denial of service” or DDOS tactic used by computer hackers to shut down government and corporate websites.

Other documents taken from the NSA by Snowden and previously published by NBC News show that JTRIG, which is part of the NSA’s British counterpart, the cyber spy agency known as GCHQ, used a “denial of service” (DDOS) attack to shut down Internet chat rooms used by members of the hacktivist group known as Anonymous.

Read the first NBC report on JTRIG and the Snowden documents.

Read an earlier exclusive NBC report on the Snowden documents.

Civil libertarians said that in using a DDOS attack against hackers the British government also infringed free speech by individuals not involved in any illegal hacking, and may have blocked other websites with no connection to Anonymous. While GCHQ defends the legality of its actions, critics question whether the agency is too aggressive and its mission too broad.

Eric King, a lawyer who teaches IT law at the London School of Economics and is head of research at Privacy International, a British civil liberties advocacy group, said it was “remarkable” that the British government thought it had the right to hack computers, since none of the U.K.’s intelligence agencies has a “clear lawful authority” to launch their own attacks.

“GCHQ has no clear authority to send a virus or conduct cyber attacks,” said King. “Hacking is one of the most invasive methods of surveillance.” King said British cyber spies had gone on offense with “no legal safeguards” and without any public debate, even though the British government has criticized other nations, like Russia, for allegedly engaging in cyber warfare.

But intelligence officials defended the British government’s actions as appropriate responses to illegal acts. One intelligence official also said that the newest set of Snowden documents published by NBC News that describe “Effects” campaigns show that British cyber spies were “slightly ahead” of U.S. spies in going on offense against adversaries, whether those adversaries are hackers or nation states. The documents also show that a one-time signals surveillance agency, GCHQ, is now conducting the kinds of active espionage operations that were once exclusively the realm of the better-known British spy agencies MI5 and MI6.

According to notes on the 2012 documents, a computer virus called Ambassadors Reception was “used in a variety of different areas” and was “very effective.” When sent to adversaries, says the presentation, the virus will “encrypt itself, delete all emails, encrypt all files, make [the] screen shake” and block the computer user from logging on.

But the British cyber spies’ operations do not always remain entirely online. Spies have long used sexual “honey traps” to snare, blackmail and influence targets. Most often, a male target is led to believe he has an opportunity for a romantic relationship or a sexual liaison with a woman, only to find that the woman is actually an intelligence operative. The Israeli government, for example, used a “honey trap” to lure nuclear technician Mordechai Vanunu from London to Rome. He expected an assignation with a woman, but instead was kidnapped by Israel agents and taken back to Israel to stand trial for leaking nuclear secrets to the media.

The version of a “honey trap” described by British cyber spies in the 2012 PowerPoint presentation sounds like a version of Internet dating, but includes physical encounters. The target is lured “to go somewhere on the Internet, or a physical location” to be met by “a friendly face.” The goal, according to the presentation, is to discredit the target.

A “honey trap,” says the presentation, is “very successful when it works.” But the documents do not give a specific example of when the British government might have employed a honey trap.

An operation described in the 2010 presentation also involves in-person surveillance. “Royal Concierge” exploits hotel reservations to track the whereabouts of foreign diplomats and send out “daily alerts to analysts working on governmental hard targets.” The British government uses the program to try to steer its quarry to “SIGINT friendly” hotels, according to the presentation, where the targets can be monitored electronically – or in person by British operatives.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 7 februari 2014 @ 16:41:02 #75
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_136442006
quote:
quote:
One of the three reporters at the center of NSA contractor Edward Snowden’s leaks is planning to enter the country that charged Snowden with espionage. Glenn Greenwald plans to “force the issue” by returning to the United States despite the possibility that he may be arrested.

Recent comments by government officials have made the situation even more tenuous such as House Intelligence Committee Chairman Mike Rogers who called Greenwald “a thief” who was “selling” national security secrets based on Greenwald’s freelance work. An accusation that came after Director of National Intelligence James Clapper referred to Greenwald and other journalists as “accomplices” of Snowden’s leaks.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 7 februari 2014 @ 18:36:24 #76
339669 JerryWesterby
Keep rocking in the free world
pi_136446312
Maar leest iemand dit artikel? Of is het tijd om dit artikel te versnipperen.
The 'physical world' is a postulated explanatory framework which abstracts certain properties (physical properties) from our experience and thinks of them as objectively existing.
  vrijdag 7 februari 2014 @ 18:37:20 #77
339669 JerryWesterby
Keep rocking in the free world
pi_136446336
Oftewel, graag in je eigen woorden, met eventueel verwijzing naar het artikel.
The 'physical world' is a postulated explanatory framework which abstracts certain properties (physical properties) from our experience and thinks of them as objectively existing.
  vrijdag 7 februari 2014 @ 19:28:08 #78
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_136448130
quote:
0s.gif Op vrijdag 7 februari 2014 18:37 schreef JerryWesterby het volgende:
Oftewel, graag in je eigen woorden, met eventueel verwijzing naar het artikel.
Nee, altijd verwijzing naar het artikel. En de quote lijkt mij verder voldoende.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 7 februari 2014 @ 19:53:06 #79
339669 JerryWesterby
Keep rocking in the free world
pi_136449084
Nee, liever in je eigen woorden. Het is een forum, geen prikbord.
The 'physical world' is a postulated explanatory framework which abstracts certain properties (physical properties) from our experience and thinks of them as objectively existing.
pi_136449181
quote:
0s.gif Op vrijdag 7 februari 2014 19:53 schreef JerryWesterby het volgende:
Nee, liever in je eigen woorden. Het is een forum, geen prikbord.
ik lees liever gewoon het bronartikel, zijn eigen bewoordingen interesseren me niet.
dus goed bezig papierversnipperaar ^O^
blablablablablablablablablablablablablabla
  vrijdag 7 februari 2014 @ 20:08:03 #81
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_136449590
quote:
0s.gif Op vrijdag 7 februari 2014 19:55 schreef Schunckelstar het volgende:

[..]

ik lees liever gewoon het bronartikel, zijn eigen bewoordingen interesseren me niet.
dus goed bezig papierversnipperaar ^O^
Dank u wel. O+

quote:
0s.gif Op vrijdag 7 februari 2014 18:36 schreef JerryWesterby het volgende:
Maar leest iemand dit artikel?
Je hebt antwoord op je vraag.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 7 februari 2014 @ 20:16:05 #82
339669 JerryWesterby
Keep rocking in the free world
pi_136449793
Ja, het antwoord is Schunckelstar.
The 'physical world' is a postulated explanatory framework which abstracts certain properties (physical properties) from our experience and thinks of them as objectively existing.
  vrijdag 7 februari 2014 @ 20:23:07 #83
339669 JerryWesterby
Keep rocking in the free world
pi_136449974
Bedankt.
The 'physical world' is a postulated explanatory framework which abstracts certain properties (physical properties) from our experience and thinks of them as objectively existing.
pi_136496314
Wat een eikels zeg. In plaats van het afluisterprogramma af te bouwen, willen ze het juist uitbreiden.

http://www.nu.nl/tech/3696240/nsa-kan-bellen-niet-bijhouden.html

quote:
'NSA kan het bellen niet bijhouden'

De Amerikaanse geheime dienst NSA verzamelt lang niet alle telefoongegevens in de Verenigde Staten, zoals wordt gedacht. De dienst kan de explosieve stijging van het aantal mobiele gesprekken namelijk niet bijhouden.

Foto: Getty

Dat meldt de Washington Post vrijdag.

De NSA zou minder dan 30 procent van de telefoontjes registreren, aldus huidige en vroegere functionarissen. Het nieuws slaat een behoorlijk hiaat in de algemene opvatting dat de NSA vrijwel al het binnenlandse telefoonverkeer in Amerika bijhoudt.

Tegelijkertijd rijst in de VS de vraag of het programma van de NSA wel goed genoeg is en of er geen belangrijke gegevens gemist worden in de strijd tegen terrorisme.

In 2006 verzamelde de NSA volgens de berichten nog bijna al het telefoonverkeer in de VS. Afgelopen zomer was dat gezakt naar minder dan een derde. De VS neemt maatregelen om de NSA weer naar het oude niveau te helpen.
  maandag 10 februari 2014 @ 16:29:34 #85
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_136552977
Glenn Greenwald heeft zijn nieuwe project in de lucht:

quote:
quote:
The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes an unreliable tactic that results in the deaths of innocent or unidentified people.
en dan krijg je daar achteraan:

quote:
Boehoehoe we willen meer bevoegdheden. :'(
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 11 februari 2014 @ 17:49:27 #86
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_136594158
quote:
quote:
Jacob Appelbaum is one of the leading US computer security activists and, along with Laura Poitras, a confidant of former NSA contractor Edward Snowden. DW spoke to Appelbaum about the NSA and living in exile.
quote:
I feel like a human being in exile. But I don't wear that on my sleeve as a victim, I'm just tired of it. You know, detained at airports, having my property stolen, stuff like that and I thought, well, maybe I should live in Europe for a while.
Al die Amerikanen in ballingschap: Glenn Greenwald, Snowden, Applebaum. Al die buitenlanders die niet naar Amerika durven: Assange, Birgitta Jónsdóttir, Rob Gongrijp.

Land of the Free. :')

[ Bericht 36% gewijzigd door Papierversnipperaar op 11-02-2014 18:00:41 ]
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 11 februari 2014 @ 18:20:15 #87
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_136595114
quote:
quote:
About a year ago, Lissounov joined a hackathon sponsored by his employer, BitTorrent Inc., a company that seeks to transform the peer-to-peer protocol into a legitimate means of file-sharing for both consumers and businesses, and in a matter of hours, he slapped together a new BitTorrent tool that let him quickly and easily send encrypted photos of his three children across dodgy Eastern European network lines to the rest of his family. The tool won first prize at the hackathon, and within a few more months, after Lissounov honed the tool alongside various other engineers, the company delivered BitTorrent Sync, a Dropbox-like service that lets you seamlessly synchronize files across computers and mobile devices.

The difference is that, thanks to the BitTorrent protocol, which connects machines without the help of a central server, the service isn’t controlled by Dropbox or any other organization, including BitTorrent itself. This means it could be less vulnerable to surveillance by the NSA and other government organizations, and that seems to have struck a chord with many people across the net. Each month, according to BitTorrent, about 2 million people now use Sync, including not only individuals but businesses looking for simpler, safer, and more secure ways of sharing data across systems. “It immediately proved magical,” says BitTorrent CEO Eric Klinker.

Klinker believes his ten-year-old company’s fortunes are closely tied to this new tool. But beyond that, Sync is part of a larger trend towards internet services that are operated not by a central commercial company, but by independent machines spread across the internet. This includes everything from the bitcoin digital currency to open source tools that seek to replace social networking services like Twitter. They all do very different things, but the common denominator is that they put more control in the hands of the people — and less in the hands of corporations and governments.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
pi_136601774
quote:
7s.gif Op maandag 10 februari 2014 16:29 schreef Papierversnipperaar het volgende:
Glenn Greenwald heeft zijn nieuwe project in de lucht:

[..]

[..]

en dan krijg je daar achteraan:

[..]

Boehoehoe we willen meer bevoegdheden. :'(
The view from nowhere.
  woensdag 12 februari 2014 @ 15:48:20 #89
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_136628320
quote:
quote:
The European parliament is to ditch demands on Wednesday that EU governments give guarantees of asylum and security to Edward Snowden, the National Security Agency whistleblower.

The parliament's civil liberties committee is to vote on more than 500 amendments to the first ever parliamentary inquiry into the NSA and GCHQ scandal, a 60-page report that is damning about the scale and the impact of mass surveillance.

But there is no consensus on an amendment proposed by the Greens calling on EU governments to assure Snowden of his safety in the event that he emerges from hiding in Russia and comes to Europe.

Amid what key MEPs have described as intense pressure from national governments on parliament – from the Conservatives and their allies, from the mainstream centre-right and from social democrats – the asylum call has no chance of passing.

"The amendment asking for asylum won't go through," said Claude Moraes, the British Labour MEP who is the principal author of the report. "That was a red line for the right. There was never going to be a realistic majority for that."

The proposed change to the report would have read: "[Parliament] calls on EU member states to drop criminal charges, if any, against Edward Snowden and to offer him protection from prosecution, extradition or rendition by third parties, in recognition of his status as whistleblower and international human rights defender."

Instead the report will call for international protection for whistleblowers without mentioning Snowden by name. Another amendment calling on the Americans not to prosecute Snowden is also unlikely to be adopted, parliamentary sources said.

"The only reason for this whole thing is Snowden and now he doesn't get mentioned. It's ridiculous," said Jan-Philip Albrecht, a German Green and co-author of the amendment.

The failure to make Snowden-specific demands comes amid wrangling over whether the whistleblower will and should be able to testify to the committee.

His lawyers told leading MEPs last week that he was prepared to testify via video from Moscow and questions have been sent to him. While the Conservatives opposed allowing him to testify on the NSA furore, parliamentary leaders have backed the idea by a majority.

But they are still arguing over the format of the testimony - whether live or pre-recorded video or in written answers to submitted questions. They are to meet next week to try to settle the issue.

The Americans are strongly opposed to Snowden testifying and MEPs say there has been enormous pressure from EU governments on the parliament to drop or dilute the report, which is to go before the full chamber in March.

"There has been a huge amount of pressure in the past few weeks," said Moraes. "From the member states. Most have not been friendly. They regard all this as a national competence and nothing to do with us."
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 12 februari 2014 @ 17:50:01 #90
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_136634055
quote:
quote:
The logic of the Utah campaign is straightforward. Running the data center requires a lot of water – some 1.7m gallons daily, the activists estimate – to cool the anticipated 100,000 square feet of powerful computers and support equipment the NSA needs for storing a tremendous amount of data. The Wall Street Journal estimated this to be in the range of exabytes or even zettabytes (an exabyte is a billion gigabytes.)

Making it illegal to supply the water will cripple the data center, already beset with electrical problems, before it opens and complicate the NSA’s plans for expanding its storage capacity. For an agency that hoovers up a wide swath of the data communicated across the internet, not to mention the phone records of Americans that it can store for up to five years, it’s a problem.

But Utah is only the latest of about a dozen states to consider measures designed to restrict the NSA’s activities.

In the NSA’s home state of Maryland, eight lawmakers are backing a bill to stymie the provision of water and electricity to the agency’s Fort Meade headquarters. A similar measure, based off an initiative Maherrey’s organization calls the 4th Amendment Protection Act, has been introduced in California, Arizona, Oklahoma, Indiana, Mississippi, Washington state and Vermont.

“The provision of resources like water and electricity is a no-brainer in a state’s plenary authority,” said Buttar.

Four other states – Kansas, New Hampshire, Alaska and Missouri – are considering a related measure to prevent the sharing of NSA-derived data without a warrant.

The campaign faces unfavorable odds. The 4th Amendment Protection Act in Mississippi was referred to the state senate rules committee on 20 January, where it died on 4 February.

“I know it’s not going to pass in every state,” Maharrey said. But in Utah particularly, “we’re going to push it as hard as we can.”
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
abonnement Unibet Coolblue Bitvavo
Forum Opties
Forumhop:
Hop naar:
(afkorting, bv 'KLB')