Posts Tagged ‘4th amendment’

web18-cellphonetexting-1160x768

 

The Supreme Court’s Groundbreaking Privacy Victory for the Digital Age

635996390877601764-803273367_snowden

Politicians Who Complain About Trump’s Authoritarian Tendencies Just Gave Him 6 Years To Warrantlessly Spy On Americans

Over on the Senate side, things were even more ridiculous. Senator Jeff Flake voted for cloture, helping to end (the already non-existing) debate on such surveillance, and blocking any amendments. And then, the very next morning, went on the Senate floor to slam the President, compare him to Stalin, and warn that our democracy may not survive. Again, this was mere hours after Senator Flake voted to give more surveillance powers to the President he was about to compare to Stalin.

Or how about Dianne Feinstein? It may be no surprise that Feinstein voted to continue and expand surveillance — she has a long history of doing exactly that. But just about an hour before voting for cloture, Feinstein herself introduced an amendment that would have required a warrant to search the corpus of data collected under 702. And then she voted to block that amendment from even being voted on.

…Trump has been loudly denouncing McCaskill for months as she’s facing a tough reelection campaign. And her response was to deny any further debate or amendments and to vote to give Trump more surveillance powers.

…These are not the only ones.

NSA-Seal--43798

 

NSA SECRETLY HELPED CONVICT DEFENDANTS IN U.S. COURTS, CLASSIFIED DOCUMENTS REVEAL

google_watching_you_independent_newspaper_24_may_20071

 not a single English-language newspaper wants to cover or even acknowledge the story

The Collapse of Media and What You Can Do About It

The report revealed that during his development of the core code behind the Google search engine as a Stanford University postgraduate student, Sergey Brin received seed-funding from a CIA and NSA-run research program, the Massive Digital Data Systems (MDDS). The confirmation came from a former manager of the MDDS, Dr. Bhavani Thuraisingham, who is now the Louis A. Beecherl distinguished professor and executive director of the Cyber Security Research Institute at the University of Texas, Dallas.

This was not necessarily unusual — the intelligence community has long been involved in Silicon Valley for all sorts of obvious reasons. What’s interesting is that you probably never knew about how this worked in relation to Google. And that says a great deal about the way the global media industrial complex operates.

tyranny-alert1

 

DHS planning to collect social media info on all immigrants

cia-linux-hacking-tool-malware

 

Wikileaks Reveals CIA Malware that Hacks & Spy On Linux Computers

Wikileaks-CIA-738241.jpg

WikiLeaks publishes ‘biggest ever leak of secret CIA documents’

The 8,761 documents published by WikiLeaks focus mainly on techniques for hacking and surveillance

This is not really new, except for the specifics. Backdoor security holes have plagued corporate America since forever.

This is why I’m not interested in the slightest in the much touted “Internet of Things.” They will be able to infiltrate every aspect of your life. They are already in your cars, which have the same types of vulnerabilities.

“The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the internet to a covert CIA server.”

More:

CIA’s UMBRAGE Allows Agency To Carry Out ‘False Flag’ Cyber Attacks

 

85% of world’s smart phones ‘weaponized’ by CIA
The majority of the world’s smartphones have been “weaponized,” according to WikiLeaks, which revealed in its latest leak that the CIA went to extreme measures to utilize the Android OS for spying.

Google’s Android operating system, used in 85 percent of the world’s smart phones, including Samsung and Sony, was found to have 24 ‘zero days’ – the code name used by the CIA to identify and exploit vulnerabilities…