background preloader

We’re Being Watched

We’re Being Watched
How Corporations and Law Enforcement Are Spying on Environmentalists By Adam Federman photo illustrations Nadia Khastagir / Design Action In February 2010 Tom Jiunta and a small group of residents in northeastern Pennsylvania formed the Gas Drilling Awareness Coalition (GDAC), an environmental organization opposed to hydraulic fracturing in the region. The group of about 10 professionals – engineers, nurses, and teachers – began meeting in the basement of a member’s home. Since the group had never engaged in any kind of illegal activity or particularly radical forms of protest, it came as a shock when GDAC members learned that their organization had been featured in intelligence bulletins compiled by a private security firm, The Institute of Terrorism Research and Response (ITRR). The tri-weekly bulletins featured a wide range of supposed threats to the state’s infrastructure. The surveillance of even moderate groups like GDAC comes at a pivotal time for the environmental movement. Related:  The Company and FriendsRelation aux autres

» Congress Finally Decides NSA Surveillance Violates the Law Alex Jones “America has no functioning democracy at this moment,” says Jimmy Carter Kurt Nimmo Infowars.com July 18, 2013 Congress has finally decided that massive, unprecedented and unwarranted surveillance of the American people conducted by the National Security Agency is against the law. Members of the Senate Judiciary Committee, which has broad jurisdiction over matters related to federal criminal law, arrived at the conclusion months after the American people reached a similar conclusion. “We never, at any point in this debate, have approved the type of unchecked, sweeping surveillance of United States citizens employed by our government,” said House fixture John Conyers, a Michigan Democrat, during a hearing on the NSA. “If the government cannot provide a clear, public explanation for how its program is consistent with the statute, it must stop collecting this information immediately.” Fourth Amendment, What Fourth Amendment? How so? The Death of John Doe Print this page. Rise of the Control Grid

News - No More Lies - The Honest Intelligence Gathering of World News Untergunther_Presse Untergunther UX Paris, le 3 novembre 2008 Untergunther et l’horloge du Panthéon Les Untergunther constituent un groupe clandestin basé à Paris, dont l'activité consiste à restaurer les parties non-visibles du patrimoine. En septembre 2005, succédant à La Mexicaine De Perforation qui utilisait le Panthéon pour y représenter clandestinement des pièces de théâtre, les Untergunther installent dans les hauteurs du bâtiment un atelier, connu sous le nom de UGWK. Ils y entament par la suite, de leur propre initiative et à leurs frais, la restauration de l'horloge WAGNER du XIXe siècle qui donnait avant-guerre la mesure du temps dans le mausolée dédié aux grands hommes de la nation. Cette horloge monumentale avait été sabotée au cours des années 1960 par un employé du monument, visiblement fatigué d'avoir à remonter le mécanisme une fois par semaine. Néanmoins en septembre 2006, une fois la restauration achevée, ils décident à titre exceptionnel d’en informer l’administrateur, M.

NSA PRISM – The Mother of all Big Data Projects As a data engineer and scientist, I have been following the NSA PRISM raw intelligence mining program with great interest. The engineering complexity, breadth and scale is simply amazing compared to say credit card analytics (Fair Issac) or marketing analytics firms like Acxiom. Some background… PRISM - “Planning Tool for Resource Integration, Synchronization, and Management” - is a top-secret data-mining “connect-the-dots” program aimed at terrorism detection and other pattern extraction authorized by federal judges working under the Foreign Intelligence Surveillance Act (FISA). PRISM allows the U.S. intelligence community to look for patterns across multiple gateways across a wide range of digital data sources. The whole NSA program raises an interesting debate about “Sed quis custodiet ipsos custodes.” The program is called PRISM, after the prisms used to split light, which is used to carry information on fiber-optic cables. Mobile data collection is the new growth area. Like this:

Man Suggests Nature Walk To Observe NSA Spies Threatened Habitat; Has Law Enforcement Visit His Habitat Facebook continues to be an intelligence operative's best friend. Many of its users subvert any sort of expectation of privacy simply by leaving their accounts on the default settings. (This also works out well for Mark Zuckerberg.) Anything set to the public default can and, apparently, will be seen. If you want to make a joke about the NSA, feel free. Normally, Daniel Bangert's Facebook posts tend to be of the serious variety. Few of Bangert's friends took him up on his offer. Bangert's doorbell rang at almost the exact same time. So, how did the local police hear of Bangert's "event?" Not long later, Bangert got another call asking him to report to Central Commissariat 10 of the German federal police. The federal police were less amused by Bangert's post (he was called *gasp* a "smart aleck"), but unable to find anything damning, they resorted to more bureaucratic forms of dissuasion -- suggesting Bangert secure a permit for his "demonstration." So is he planning a repeat?

Et si les rôles des hommes et des femmes étaient inversés dans la pub ? La réclame tombe parfois, trop souvent, dans des travers sexistes. Les femmes sont soumises et un peu bêtes, les hommes virils et dominateurs. Trois étudiants de l'université canadienne de Saskatchewan, Sarah Zelinski, Kayla Hatzel et Dylan Lambi-Raine, se sont mis en tête pour un cours sur le genre d'inverser les stéréotypes des publicités dans une vidéo mise en ligne sur YouTube (et déjà vue plus de 800 000 fois depuis début avril). En introduction, ils compilent une sélection de campagnes anciennes et récentes où les femmes ne sont que des objets dédiés au plaisir des hommes. «Ces standards de beauté mis en avant affectent la manière dont les hommes et les femmes perçoivent le corps féminin, écrivent-ils, entre 2000 et 2009, il y a eu une augmentation de 36% des opérations d'augmentation mammaire.» (Parodie d’une pub Burberry, extraite de la vidéo. Ils jugent également que les «hommes sont aussi victimes des clichés». (Parodie d’une pub Calvin Klein, extraite de la vidéo.

Play With An MIT Tool That Visualizes How The NSA Can Map Your Relationships The CrunchGov Essential is a scannable roundup of technology’s influence on the day’s big issues. Below a feature post, we present the most thoughtful, outrageous, and inspiring stories told through the web’s best content. Sign up for the morning newsletter here. The brainiacs at MIT created a cool visualization program to map how the National Security Agency can understand your relationships based on who you contact via email and how often. Readers can link their Gmail accounts to MIT’s “Immersion” tool here. 1. 2. There has been lots of ink spilled over why meta-data is potentially more invasive than the content of emails, and this new tool drives the point home in a very personal way. The Essential — 4 Items — IRS Publishes SSNs, Snowden Says Germany Spying, Snowden Was Right To Flee, News Stations Make Twitter Mistakes, Too 1. –The IRS accidently published tens of thousands of Social Security numbers. 2. 3. 4.

New studies: ‘Conspiracy theorists’ sane; government dupes crazy, hostile Recent studies by psychologists and social scientists in the US and UK suggest that contrary to mainstream media stereotypes, those labeled “conspiracy theorists” appear to be saner than those who accept the official versions of contested events. The most recent study was published on July 8th by psychologists Michael J. Wood and Karen M. Douglas of the University of Kent (UK). Entitled “What about Building 7? The authors were surprised to discover that it is now more conventional to leave so-called conspiracist comments than conventionalist ones: “Of the 2174 comments collected, 1459 were coded as conspiracist and 715 as conventionalist.” Perhaps because their supposedly mainstream views no longer represent the majority, the anti-conspiracy commenters often displayed anger and hostility: “The research… showed that people who favoured the official account of 9/11 were generally more hostile when trying to persuade their rivals.”

10 distorsions cognitives qui entretiennent des émotions négatives Le terme distorsion cognitive a été introduit en 1967 par le psychiatre américain Aaron T. Selon son modèle, les distorsions cognitives sont des façons de traiter l'information qui résultent en erreurs de pensée prévisibles ayant souvent pour conséquence d'entretenir des pensées et des émotions négatives. Elles contribuent ainsi aux troubles émotionnels tels que la dépression et l'anxiété ainsi qu'aux troubles de la personnalité. Dans son travail avec des personnes atteintes de dépression, Beck a identifié six erreurs systématiques de pensée : La pensée « tout ou rien » ou « noir ou blanc » Penser de façon dichotomique (polarisée) sans nuance : tout ou rien, noir ou blanc, jamais ou toujours, bon ou mauvais…. Par la suite (1980), le psychologue David Burns a identifié quatre autres distorsions : Le raisonnement émotionnel Prendre pour acquis que des états émotifs correspondent à la réalité. D'autres distorsions ont par la suite été identifiées telles que : Psychomédia Tous droits réservés.

NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar | Threat Level Alexander runs the nation’s cyberwar efforts, an empire he has built over the past eight years by insisting that the US’s inherent vulnerability to digital attacks requires him to amass more and more authority over the data zipping around the globe. In his telling, the threat is so mind-bogglingly huge that the nation has little option but to eventually put the entire civilian Internet under his protection, requiring tweets and emails to pass through his filters, and putting the kill switch under the government’s forefinger. “What we see is an increasing level of activity on the networks,” he said at a recent security conference in Canada. In its tightly controlled public relations, the NSA has focused attention on the threat of cyberattack against the US—the vulnerability of critical infrastructure like power plants and water systems, the susceptibility of the military’s command and control structure, the dependence of the economy on the Internet’s smooth functioning.

Why "Nothing to Hide" misrepresents online privacy A legal research professor explains to Michael P. Kassner why we should think long and hard before subscribing to the "Nothing to Hide" defense of surveillance and data-gathering. A colleague stopped me in the hallway at work last week, "Hey, I read your article; and I'm not worried. Towards the end of the week, I received a call from my friend, a security analyst who I emailed earlier in the week about the responses I was getting. After the usual guy-geek gossip, my friend told me about Daniel J. The essay turned out to be exactly what I needed: The nothing-to-hide argument pervades discussions about privacy. That alone reassured me that my concerns were not mine alone. Government PoV Next in the essay, the professor sheds light on how governments view "Nothing to Hide": In Britain, for example, the government has installed millions of public-surveillance cameras in cities and towns, which are watched by officials via closed-circuit television. Privacy pundits PoV So do you have curtains?

Related: