Wikileaks docs reveal that governments use malware for surveillance The latest round of documents published by Wikileaks offers a rare glimpse into the world of surveillance products. The collection—which Wikileaks calls the Spy Files—includes confidential brochures and slide presentations that companies use to market intrusive surveillance tools to governments and law enforcement agencies. A report that Wikileaks published alongside the documents raises concern about the growing use of mass surveillance tools that indiscriminately monitor and analyze entire populations. The details revealed by Wikileaks echo a recent report by The Wall Street Journal (WSJ) that discussed the surveillance industry. The documents published by Wikileaks include 287 files that describe products from 160 companies. "[The surveillance industry] is, in practice, unregulated. Surveillance products revealed in the Spy Files cover a wide range of different communication technologies. Wikileaks has organized the documents by type, company, and date.
Tree Style Tab The Surveillance Catalog - The Wall Street Journal As the Internet has grown to handle more data, monitoring companies have had to keep up. Interception now can mean taking all the traffic from the Internet backbone and funneling it through devices that inspect the packets of data, determine what is inside them, and make decisions about whether to copy them for law enforcement. CRTC rejects Bell usage-based internet billing plan - Politics Small companies selling internet services will likely be paying for download speed under a decision announced by Canada’s telecommunications regulator. The companies, which buy their internet services from larger established providers such as Rogers and Bell, were fighting an application to the CRTC by Bell to charge more to wholesale customers. The CRTC's decision, announced Tuesday, gives established providers two options for charging independent internet service providers — a flat rate or a rate based on capacity and the number of users. Bell had asked to be able to charge based on the total volume of internet data used by its wholesale customers. The capacity rate model charges based on the speed of the service — meaning the small ISPs will be paying for the size of the pipe, not the amount of data that flows through the pipe. The CRTC requires Bell and Rogers to allow the smaller companies to use their internet infrastructure and regulates the price which they can charge for it.
FOIA Documents Show FBI Illegally Collecting Intelligence Under Guise of “Community Outreach” December 1, 2011 FBI Storing Information on Activities Protected by the First Amendment, Memos Obtained by ACLU Show Make a Difference Your support helps the ACLU stand up for human rights and defend civil liberties. Give Now FOR IMMEDIATE RELEASE CONTACT: (212) 549-2666; firstname.lastname@example.org NEW YORK – The FBI has been illegally using its community outreach programs to secretly collect and store information about activities protected by the First Amendment for intelligence purposes, according to FBI documents released today by the American Civil Liberties Union. “The trust that community outreach efforts aim to create is undermined when the FBI exploits these programs to gather intelligence on the very members of the religious and community organizations agents are meeting with,” said Michael German, ACLU senior policy counsel and a former FBI agent. FOIA documents showing instances of inappropriate intelligence gathering include:
The Sad Truth [Pic] Some have said that Jobs had no significant impact on them. Here are a few things they might have forgotten… -Do you listen to music? He changed the music industry forever and for better. There are also more subtle effects- rising standards of living both at home and around the world. I'm always befuddled by the idea that somehow if a wealthy person doesn't give to charity that it's a black mark on his character. The thoughtless and clueless proponents of the signage that prompted these comments, seek to both disparage the man and callously (and hypocritically) ride his coattails for publicity. SpyFiles: Revelations of a Billion-Dollar Mass Surveillance Industry Today Wikileaks releases nearly 1,100 internal documents, sales brochures and manuals for products sold by the manufacturers of systems for surveillance and the interception of telecommunications. These new leaks reveal a mass surveillance industry that’s now worth $5 billion a year, with technologies capable of spying on every telephone and Internet network on a national scale. The flagships of this market are called Nokia-Siemens, Qosmos, Nice, Verint, Hacking Team, Bluecoat and Amesys. The documents detailing their interception capabilities will be progressively released online by Wikileaks. OWNI, who worked in partnership with the Washington Post, The Hindu, L’Espresso, the German channel ARD and The Bureau of Investigative Journalism in this operation which has been dubbed the Spy Files, has attempted to present an overview of this new type of industry, by creating an interactive map and a dedicated site, SpyFiles.org. Amesys is a manufacturer of equipment.
A Non-Designer's Guide to Making Attractive Presentation Slides The key there is to make data meaningful and simplified. Presentations are just that, presentations. If they want a report, hand out print-outs and in the presentation make notes on where to find elaborations in the print out. Furthermore, provide a link to a PDF of the report on the company network so that anyone who lost the paper handout can get back to it without bothering you. Seriously, you have to assert that Reports and Presentations serve two different functions and if they don't like it, they can do the "presentation" themselves next time. Be nice about it :-) but also be assertive >:D You're gonna be best served making a PPT template in your free time and just making reports when you are assigned them. But, if your report is just 2-5 pages, go ahead and put the data on the slides. The key is to use visual cues instead of writing things out. Also, don't forget Title Slides, They make is very easy to see what follows and convey very clearly that the last section has ended.
Police employ Predator drone spy planes on home front - latimes.com Reporting from Washington — Armed with a search warrant, Nelson County Sheriff Kelly Janke went looking for six missing cows on the Brossart family farm in the early evening of June 23. Three men brandishing rifles chased him off, he said. Janke knew the gunmen could be anywhere on the 3,000-acre spread in eastern North Dakota. Fearful of an armed standoff, he called in reinforcements from the state Highway Patrol, a regional SWAT team, a bomb squad, ambulances and deputy sheriffs from three other counties. He also called in a Predator B drone. As the unmanned aircraft circled 2 miles overhead the next morning, sophisticated sensors under the nose helped pinpoint the three suspects and showed they were unarmed. But that was just the start. "We don't use [drones] on every call out," said Bill Macki, head of the police SWAT team in Grand Forks. The drones belong to U.S. Congress first authorized Customs and Border Protection to buy unarmed Predators in 2005. In an interview, Michael C.
What I learned as a nude model - Life stories My naked pelvis was 3 feet away from an 80-year-old grandfather wearing a sweater vest. Men who attend art classes must be the world’s primary consumers of sweater vests; it’s like they’re in Joseph Gordon Levitt costumes all the time. The muscle in my leg twitched as the old man squinted at me, stared at his drawing and then turned to the instructor. “I can’t get it,” he said. “I just can’t quite do the lines of the elbow.” No surprise there. These are anatomical parts 80-year-old men will not admit they don’t know how to draw: everything else. After a few weeks, this man, or any number like him, would come up to me on a break and tell me, very tentatively, that I reminded him of his dead wife, or an old girlfriend, or a nurse in Korea. Though there were times when knowing what to say was tricky, like when one man shuffled over and informed me that I reminded him of a “good time girl named Samantha from the old Times Square.” It’s not that I particularly loved being naked.
Listening in on Libya: communication breakdown The involvement of a French company, Amesys (purchased by Bull in 2010) in the Libyan telecommunications surveillance scandal was successfully proven by OWNI last June, then, this week, by the Wall Street Journal, the BBC, and finally, the Figaro. But Amesys and Bull head honchos refuse to respond to our calls and still haven’t officially reacted. Last Tuesday, the day after the WSJ published its article, Amesys‘ website abruptly shut down. Bull’s personalities, who would normally be aware of the subject, are accustomed to using the silent treatment. Bull’s CEO Philippe Vannier was Crescendo Technologies’ Director-in-Chief, the holding that bought up I2E and that became Amesys. Hoping to keep their hands clean, the Elysée and the Defense minister went so far as to create a Sovereign France Strategy. What sort of country is interested in being able to listen to everyone. All of Amesys’ activities strictly abide international, European, and French laws. Illustrations: Flickr CC binnyva.
Most Popular DIY Projects of 2011 2011 proved to be a great year for all things DIY, from repurposed and updated technology to computer building to cool things you can make for your own enjoyment. Here's a look at our most popular do-it-yourself projects and posts this year. P Top 10 Ways to Turn Your Retired Gadgetry into the Technology of the FutureP With the rapid progression of technology each year, it's easy to accumulate a pile of obsolete gadgets that you just can't bear to get rid of. Top 10 Space-Saving Household ProjectsP Whether you live in a tiny apartment or just have too much stuff, there's likely a lot of space you aren't using, like your walls, your ceilings, or the nooks and crannies in your furniture. How to Build a Hackintosh Mini for a Less Expensive, Faster MacP We've shown you how to build a Hackintosh with enough power to rival a Mac Pro, but for those of you who want a still powerful Mac on a budget you can build a Hack Mini. Turn Photo Negatives Into Artsy, Personalized LampsP There you have it.