Posts Tagged ‘intrusion’

77487244144d79ee3b64624d31081943

 

‘Cards Against Humanity’ Creator Just Pledged To Buy and Publish Congress’s Browser History

 

Full list of BRIBES:

Here’s how much Comcast paid members of Congress to sell your browser history

KAKISTOCRACY: Rule by the worst.

1832676-6

Why Google May Be More ‘Evil’ than the NSA

TV-dvr-spy-camera

 

Classic Colbert.  Enjoy the police state.

 

 

what-do-you-think-of-national-security-leaker-edward-snowden-poll

A Manifesto for the Truth
by , November 04, 2013

[This article by Edward Snowden was published Sunday in Der Spiegel.]

In a very short time, the world has learned much about unaccountable secret agencies and about sometimes illegal surveillance programs. Sometimes the agencies even deliberately try to hide their surveillance of high officials or the public. While the NSA and GCHQ seem to be the worst offenders – this is what the currently available documents suggest – we must not forget that mass surveillance is a global problem in need of global solutions.

Such programs are not only a threat to privacy, they also threaten freedom of speech and open societies. The existence of spy technology should not determine policy. We have a moral duty to ensure that our laws and values limit monitoring programs and protect human rights.

Society can only understand and control these problems through an open, respectful and informed debate. At first, some governments feeling embarrassed by the revelations of mass surveillance initiated an unprecedented campaign of persecution to surpress this debate. They intimidated journalists and criminalized publishing the truth. At this point, the public was not yet able to evaluate the benefits of the revelations. They relied on their governments to decide correctly.

Today we know that this was a mistake and that such action does not serve the public interest. The debate which they wanted to prevent will now take place in countries around the world. And instead of doing harm, the societal benefits of this new public knowledge is now clear, since reforms are now proposed in the form of increased oversight and new legislation.

Citizens have to fight suppression of information on matters of vital public importance. To tell the truth is not a crime.

Translated by Martin Eriksson. This text was written by Edward Snowden on November 1, 2013 in Moscow. It was sent to SPIEGEL staff over an encrypted channel.

 

ps

Additional Guardian Summary of NSA Spying Story:

NSA FILES: DECODED

 

 

Internet_map_1024

What I’ve been saying since the mid 90s:

NY Review of Books:

“For the moment, however, the crucial monetary driver is not what the Internet will be worth, it’s the spread between what it costs to buy personal information (not much) and how much can be made from it. When Wall Street puts a value on Facebook or Google and other masters of the online universe, it is not for the services they provide, but for the data they collect and its worth to advertisers, among others. For these Internet companies, the convenience of sending e-mail, or posting high school reunion pictures, or finding an out-of-the-way tamale stand near Reno is merely bait to lure users into offering up the intimacies of their lives, often without realizing how or where or that those intimacies travel.”

“…it was reported in Der Spiegel that “it is possible for the NSA to tap most sensitive data held on these smart phones, including contact lists, SMS traffic, notes and location information about where a user has been.”

 

Speaks for itself…

der-spiegel-big-brother

network-03072011

I’ve been writing about this stuff for decades, and readers here should already know this stuff.  Hopefully they’re God damned mad about it and not going to take it anymore.

There’s a reason I cite George Orwell over and over again.

Washington Post:

U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program

“The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post.”