White House proposal would ease FBI access to records of Internet activity. The Obama administration is seeking to make it easier for the FBI to compel companies to turn over records of an individual's Internet activity without a court order if agents deem the information relevant to a terrorism or intelligence investigation.
(FBI access to e-mail and web records raises fears) The administration wants to add just four words -- "electronic communication transactional records" -- to a list of items that the law says the FBI may demand without a judge's approval. Government lawyers say this category of information includes the addresses to which an Internet user sends e-mail; the times and dates e-mail was sent and received; and possibly a user's browser history. It does not include, the lawyers hasten to point out, the "content" of e-mail or other Internet communication. (FBI and Department of Justice join forces, investigate Wikileaks) (Facebook hits 500 million users, but at what cost?)
Stewart A. (NSA whistleblower now works at Apple store) Privacy concerns. Oath of office. An oath of office is an oath or affirmation a person takes before undertaking the duties of an office, usually a position in government or within a religious body, although such oaths are sometimes required of officers of other organizations.
Such oaths are often required by the laws of the state, religious body, or other organization before the person may actually exercise the powers of the office or any religious body. It may be administered at an inauguration, coronation, enthronement, or other ceremony connected with the taking up of office itself, or it may be administered privately.
USA PATRIOT Act. Het moment dat de USA PATRIOT Act wordt getekend door George W.
Daniel Ellsberg at Google. Introducing the New Cybersecurity Coordinator. Macon Phillips December 22, 2009 07:30 AM EDT Today the White House announced the President’s new White House Cybersecurity Coordinator, Howard Schmidt.
President Barack Obama greets his new White House Cyber Security Chief Howard A. Schmidt in the Cross Hall of the White House. December 17, 2009. Habeas Corpus Act. Langston Hughes. Langston Hughes in 1936.
Let America be America Again by Langston Hughes. Top Secret America. The Washington Post (PostTSA) Top Secret America: Interactive map. NSA National Security Agency. Former NSA executive Thomas A. Drake may pay high price for media leak. F or seven years, Thomas A. Drake was a senior executive at the nation's largest intelligence organization with an ambition to change its insular culture. He had access to classified programs that purported to help the National Security Agency tackle its toughest challenges: exploiting the digital data revolution and countering terrorism.
Today, he wears a blue T-shirt and answers questions about iPhones at an Apple store in the Washington area. He is awaiting trial in a criminal media leak case that could send him to prison for 35 years. In his years at the NSA, Drake grew disillusioned, then indignant, about what he saw as waste, mismanagement and a willingness to compromise Americans' privacy without enhancing security. He first tried the sanctioned methods -- going to his superiors, inspectors general, Congress. Drake, 53, may pay a high price for going nuclear.
An NSA spokeswoman declined to comment for this article, saying the agency cannot discuss an ongoing criminal case. National Counterterrorism Center (NCTC) Counterterrorism Calendar. Defense Security Service (DSS) Internet Homepage - Flash Version. Truth About the Polygraph. An FBI backdoor in OpenBSD? Robert McMillan: An bit more information fr... FBI-backdoors in veiligste BSD-variant. Spies and Spooks: The (Mis)Adventures of the CIA - Photo Essays. Obama threatens to veto greater intelligence oversight - Glenn Greenwald. One of the principal weapons used by the Bush administration to engage in illegal surveillance activities — from torture to warrantless eavesdropping — was its refusal to brief the full Congressional Intelligence Committees about its activities.
Instead, at best, it would confine its briefings to the so-called “Gang of Eight” — comprised of 8 top-ranking members of the House and Senate — who were impeded by law and other constraints from taking any action even if they learned of blatantly criminal acts. Pelosi Deadlocks Over Intelligence Oversight Bill. Nancy Pelosi and Barack Obama are unlikely political foes, but the House Speaker is in the middle of an ugly fight with the President — as well as the CIA and powerful House and Senate Democrats and Republicans — about Congress's watchdog powers over the U.S. intelligence services.
Bucking a veto threat by Obama and overruling a deal among the White House, Republicans and two Democratic committee chairmen, Pelosi is pushing to dramatically expand congressional oversight of the CIA and other intelligence agencies. At issue is Congress's ability to monitor the intelligence programs deemed most sensitive and closely held by the Executive Branch. And the battle is turning into the biggest confrontation yet over Executive power between the liberal House Speaker and a White House that has moved steadily to the center on national security matters. National Security Letter Recipient Can Speak Out For First Time Since FBI Demanded Customer Records From Him. August 10, 2010.
Pentagon creates 'cyber command' for waging online warfare. America has confirmed that it will be creating a new Pentagon "cyber command" to bring together the country's various hi-tech military units under one roof.
US defence secretary Robert Gates ordered the formation of the group earlier today, following a period of debate over the best way to defend the country from attacks over the internet. The command - which will unite a string of organisations run by the army, navy, air force - plans to tie them together into a single, coherent group that is able to both defend the United States from information warfare and strike out at hostile nations if necessary. The Department of Defence said that the group is set to begin operating later this year, and plans to be fully operation by October 2010. FBI to Wikipedia: Remove our seal. The FBI's seal, shown here in a photograph, is the subject of a legal dispute between the bureau and Wikipedia.
The FBI threatens Wikipedia with legal action over the use of its sealWikipedia says it will not remove the FBI seal from an entry on the federal agencyFBI claims website duplicated its seal without permission, in violation of federal law (CNN) -- The U.S. Federal Bureau of Investigation has threatened Wikipedia with legal action if the online encyclopedia doesn't remove the FBI's seal from its site. The seal is featured in an encyclopedia entry about the FBI. Wikipedia isn't backing down, however. UK Home Page. AIVD - Home. AIVD faalde rond Irak - Binnenland - Telegraaf.nl [24 uur actueel, ook mobiel] [binnenland] AIVD-affaire: een lekkend stel. Advocaat wil Balkenende laten getuigen in AIVD-zaak. Rechtbank weigert premier als getuige. AIVD-werknemer Heleen S. en haar partner Hans H. stonden deze week voor de rechtbank wegens schending van het staatsgeheim. De rechters wilden een politiek proces voorkomen en weigerden premier Balkenende als getuige.
Vrijspraak voor AIVD'ers. House Passes Cybersecurity Bill - The Caucus Blog. Update | 12:46 p.m.
The House today overwhelmingly passed a bill aimed at building up the United States’ cybersecurity army and expertise, amid growing alarm over the country’s vulnerability online. Bipartisan Policy Center. Sprint fed customer GPS data to cops over 8 million times. Christopher Soghoian, a graduate student at Indiana University's School of Informatics and Computing, has made public an audio recording of Sprint/Nextel's Electronic Surveillance Manager describing how his company has provided GPS location data about its wireless customers to law enforcement over 8 million times. That's potentially millions of Sprint/Nextel customers who not only were probably unaware that their wireless provider even had an Electronic Surveillance Department, but who certainly did not know that law enforcement offers could log into a special Sprint Web portal and, without ever having to demonstrate probable cause to a judge, gain access to geolocation logs detailing where they've been and where they are.
The fact that federal, state, and local law enforcement can obtain communications "metadata"—URLs of sites visited, e-mail message headers, numbers dialed, GPS locations, etc. Yahoo Issues Takedown Notice for Spying Price List. Yahoo isn’t happy that a detailed menu of the spying services it provides law enforcement agencies has leaked onto the web. Shortly after Threat Level reported this week that Yahoo had blocked the FOIA release of its law enforcement and intelligence price list, someone provided a copy of the company’s spying guide to the whistleblower site Cryptome. The 17-page guide describes Yahoo’s data retention policies and the surveillance capabilities it can provide law enforcement, with a pricing list for these services. Cryptome also published lawful data-interception guides for Cox Communications, SBC, Cingular, Nextel, GTE and other telecoms and service providers.
Cryptome. Virgin Media becomes the first UK ISP to test a filesharing moni. 27 November '09, 12:28am Follow. S.3480: Protecting Cyberspace as a National Asset Act of 2010 - OpenCongress Summary Creates the Office of Cyberspace Policy and National Center for Cybersecurity and Communications to set standards and coordinate cybersecurity efforts within the government. Protecting cyberspace comes at a cost. New Bill Would Let Obama Police Internet for National Security R. Senate Committee on Homeland Security and Governme. Cyber War - The Aurora Project. Cyber attacks are criminal. Britain joins cyber-security race. Fake femme fatale shows social network risks.