Stephen Colbert, as "Stephen Colbert" gave the closing keynote speech at the 2014 RSA Conference in San Francisco. While this speech has not been made officially available, it has been posted in its entirety to YouTube. Part 1, Part 2
[total length <20m] [warning - audience video of conference hall video screens -- content overcomes video shortcomings]
posted by hippybear
on Mar 10, 2014 -
The Day We Fight Back
is a protest against mass surveillance. "The SOPA and PIPA protests were successful because we all took part, as a community. As Aaron Swartz put it, everybody "made themselves the hero of their own story." We can set a date, but we need all of you, the users of the Internet, to make it a movement. [more inside]
posted by aniola
on Feb 11, 2014 -
Passweird - Passwords too gross to steal.
This website will create for you a password that is not only secure*, but is also so utterly repulsive that not even the most hardened criminal, identity thief, NSA agent, or jealous boyfriend would ever want to use it. *ish, but probably not. Don't use these for real.
posted by Rock Steady
on Dec 30, 2013 -
Der Spiegel reports on the NSA's "plumbers" at the Office of Tailored Access Operations, who collect and deploy exploits to infiltrate computers and even redirect shipments so they can install malware and hardware backdoors on electronics ordered by those they are targeting.
Jacob Appelbaum [AKA ioerror] reports
on the NSA's 'catalog', which ranges from $30 monitor cables that send back screenshots, to exploits for network security hardware from Cisco and Huawei, to backdoored BIOS code and firmware for all major hard drive manucfacturers.
While some of the NSA's malware requires physical access or proximity, much of it is remotely installable over the Internet.
At the 30c3 conference in Hamburg,
Appelbaum gives an in-depth talk about the NSA's Tailored Access Operations hacking activities
and its 'interdiction' process, whereby computers are tampered with during shipping or as part of a 'black-bag' operation.
Appelbaum, a Wikileaks affiliate who has reported on documents leaked by Edward Snowden, has been personally targeted
by such operations, as have his family members.
posted by anemone of the state
on Dec 30, 2013 -
Edward Snowden has delivered the UK Channel 4's Alternative Christmas Message
Together, we can find a better balance. End mass surveillance. And remind the government that if it really wants to know how we feel, asking is always cheaper than spying.
This address follows Monday's interview
with the Washington Post in which he explains his motives for releasing information he collected while working for the NSA.
posted by Joe in Australia
on Dec 24, 2013 -
Once upon a database query, while I pondered weak security,
And many avenues of access via backdoor,
While I nodded, nearly napping, suddenly there came a wiretapping,
As of some one gently sniffing, sniffing at our server's door.
“‘Tis some hacker,” I muttered, “tapping at our server door
Or just a virus, nothing more.” -- The NSA Raven
posted by Chocolate Pickle
on Dec 11, 2013 -
The Men Who Leaked The Secrets
To the likes of Brooks, Snowden was a disconcerting mystery; Glenn Greenwald, though, got him right away. "He had no power, no prestige, he grew up in a lower-middle-class family, totally obscure, totally ordinary," Greenwald says. "He didn't even have a high school diploma. But he was going to change the world – and I knew that." And, Greenwald also believed, so would he. "In all kinds of ways, my whole life has been in preparation for this moment," he says. [more inside]
posted by the man of twists and turns
on Dec 10, 2013 -
Curious as to what various legal and intelligence agencies can do with the data they are now currently collecting? They are collecting cell phone locations, there are currently license plate scanning vehicles in many larger cities, and Google Maps will gladly integrate with your location mapping systems to show you what type of business is at your coordinates. All state criminal databases are now nationally available. So the ACLU would like you to know what is going to happen
in the possible near future.
posted by Purposeful Grimace
on Dec 9, 2013 -
Facebook, Google, Yahoo, Microsoft, Apple, LinkedIn and Aol have all teamed up to oppose
widespread government surveillance. In an open letter to the US president and members of congress, the companies urge
the government to reform
its digital spy apparatus.
reactions at the Guardian.
posted by brina
on Dec 9, 2013 -
"In 1967, The Public Interest
, then a leading venue for highbrow policy debate, published a provocative essay by Paul Baran
, one of the fathers of the data transmission method known as packet switching [and agent of RAND
]. Titled “The Future Computer Utility,"
the essay speculated that someday a few big, centralized computers would provide 'information processing … the same way one now buys electricity. Highly sensitive personal and important business information will be stored in many of the contemplated systems … At present, nothing more than trust—or, at best, a lack of technical sophistication—stands in the way of a would-be eavesdropper.' To read Baran’s essay (just one of the many on utility computing published at the time) is to realize that our contemporary privacy problem is not contemporary. It’s not just a consequence of Mark Zuckerberg’s selling his soul and our profiles to the NSA. The problem was recognized early on, and little was done about it... It’s not enough for a website to prompt us to decide who should see our data. Instead it should reawaken our own imaginations. Designed right, sites would not nudge citizens to either guard or share their private information but would reveal the hidden political dimensions to various acts of information sharing." -- MIT Technology Review on The Real Privacy Problem
posted by Potomac Avenue
on Nov 12, 2013 -
How would you, as a junior analyst in S2C41, the branch of the Signals Intelligence Directorate, navigate the millions of records logged daily, in order to find the nugget to get you noticed?
“EVILOLIVE, MADCAPOCELOT, ORANGECRUSH, COBALTFALCON, DARKTHUNDER: the names are beguiling. But they don’t always tell us much, which is their reason for existing: covernames aren’t classified, and many of them – including the names of the NSA’s main databases for intercepted communications data, MAINWAY, MARINA, PINWALE and NUCLEON – have been seen in public before, in job ads and resumés posted online.” Daniel Soar sorts through the possibilities in the London Review of Books
, 24 Oct 2013. (See also William Arkin's blog on codenames) [more inside]
posted by zbsachs
on Nov 4, 2013 -
Freedom of Information
. The New Yorker
looks behind the scenes at The Guardian
under current editor Alan Rusbridger, including the investigation of the News of the World
phone hacking scandal (previously
), overseeing the release of US diplomatic cables obtained by Wikileaks (previously
), and the continuing reporting on NSA material obtained by Edward Snowden (previously
posted by figurant
on Oct 10, 2013 -
Tired of having all your posts and emails read by people you don't know? Aware that Congress will do nothing to change domestic spying; your president will not to stop it. And technology seemingly unable to restore privacy? Well here is your chance to Occupy NSA
posted by Postroad
on Oct 3, 2013 -
NSA mathematician Roger Barkan's take on NSA survellance of Americans. "As someone deep in the trenches of NSA, where I work on a daily basis with data acquired from these programs, I, too, feel compelled to raise my voice. Do I, as an American, have any concerns about whether the NSA is illegally or surreptitiously targeting or tracking the communications of other Americans? The answer is emphatically, "No."
posted by markkraft
on Sep 18, 2013 -
If the NSA is able to break through banks' computer security, does that mean it solved the prime factorization problem?
The New York Times reported
recently that “the agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems.” Since banks' encryption codes rely on the fact that nobody knows how to find the prime factors of really large numbers, it could mean that the NSA has found a way to do that. Or it could mean that the NSA has simply gotten lots of banks to give up their information, or found other ways around their encryption. But if they've cracked this long-standing math problem, might the secret leak? What would be the effects?
posted by Sleeper
on Sep 12, 2013 -
DJ Hennessy Youngman follows up CVS BANGERS [prev.]
with his new Soundcloud mix, NSA BANGERS.
NSA BANGERS is an audio landscape full of paranoia, espionage, epic snooping, unhealthy obsession, and the stress of being a contemporary type human being. Basically, NSA BANGERS is the soundtrack of Freedom! And Freedom is expensive y'all! Apparently, it like, costs your Freedom!
posted by porn in the woods
on Sep 2, 2013 -
"Making journalism harder, slower and less secure
, throwing sand in the gears, is fully within the capacity of the surveillance state. It has the means, the will and the latitude to go after journalism the way it went after terrorism... Only if they can turn a mostly passive public into a more active one can journalists come out ahead in this fight. I know they don’t think of mobilization as their job, and there are good reasons for that, but they didn’t think editors would be destroying hard drives under the gaze of the authorities, either! Journalism almost has to be brought closer to activism to stand a chance of prevailing in its current struggle with the state." [more inside]
posted by felch
on Aug 27, 2013 -