Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

July 27 2012

ignominy
"This is ironic, the Commission is conducting a public consultation on net neutrality, and they already censor a part of the internet to access their site", finds FFII President Benjamin Henrion.
European Commission net neutrality consultation excludes TOR users

June 30 2012

ignominy

The US is massively expanding surveillance of all Americans — taking fingerprints and iris scans on the slightest pretext, including people stopped for speeding.

The goal is clear: a system of total surveillance that would be great for repression of democracy.

Political Notes - Richard Stallman
Reposted byjotbebrightbytesofiascoloredgrayscale

June 23 2012

ignominy

Up in the sky, it's a plane -- a spy plane. And it -- and Google and Apple -- are watching you.

The technology giants are in a maps race, attempting to win the lion's share of the mobile and computer-based mapping market. And this has led to a spyplane race, as both companies are using "military-grade spy planes" to photograph American urban areas, a practice that's attracted interest from United States senators, according to Reuters.

Sen. Chuck Schumer, D-NY, sent a strongly-worded letter to the two companies on Monday. Schumer wrote that the Silicon Valley giants are engaging in "an unprecedented invasion of privacy" by using technology capable of recording pocket-sized objects, the news wire reported.

Google, Apple Use "Military-grade Spy Planes" for Map Apps 

June 22 2012

ignominy

In a frightening example of how the state is tightening its grip around the free Internet, it has emerged that You Tube is complying with thousands of requests from governments to censor and remove videos that show protests and other examples of citizens simply asserting their rights, while also deleting search terms by government mandate.

The latest example is You Tube’s compliance with a request from the British government to censor footage of the British Constitution Group Lawful Rebellion protest,  during which they attempted to civilly arrest Judge Michael Peake at Birkenhead county court.

Peake was ruling on a case involving Roger Hayes, former member of UKIP, who has refused to pay council tax, both as a protest against the government’s treasonous activities in sacrificing Britain to globalist interests and as a result of Hayes clearly proving that council tax is illegal.

Consciousness TV | Government Orders YouTube To Censor Protest Videos
Reposted bywychucholowa wychucholowa

June 18 2012

ignominy

New HTTP Error Code Proposed to Signal Internet Censorship

Tim Bray, a leading Android developer at Google, has proposed the creation of a new HTTP status code in order to indicate that a webpage is unavailable due to legal restrictions. The suggested HTTP code: 451 is meant to give Internet service providers the ability to serve users with more transparency. The name of the error code 451 is an allusion to the novel Fahrenheit 451 by the late Ray Bradbury, in which all books are supposed to be banned and subsequently burned by state “firemen.”

This Week In Internet Censorship: Alarming Internet Decree in Vietnam, Arrests in Oman, and a Tribute to Ray Bradbury | EFF
Reposted bydarksideofthemoonkrekkbitstackermikeybertAluslawnecrowxrstchybanielolufobafh666ncmsnymph02mydafsoup-01TamahlagaczlachundmachchallahareyouboredsvvatITkultur

June 08 2012

ignominy

Robert Grenier, former CIA official, says that Obama's lax approach to drone bombings against unidentified targets is only making more enemies.

The US is attacking people who come to rescue the victims of a drone bombing.

This tactic was used by other terrorists too.

Drone bombings make more enemies. Stallman archives
Reposted bybigbear3001 bigbear3001

June 04 2012

ignominy
The Cyber Security Act would set up “cybersecurity exchanges” to receive and distribute cybersecurity threat indicators. There would be one Lead Federal Cybersecurity Exchange, appointed by the Department of Homeland Security, but other ones might also be created. Existing federal agencies can be designated as cybersecurity exchanges, including military and intelligence agencies like the National Security Agency. The Department of Homeland Security could appoint itself as the Lead Federal Cybersecurity Exchange.
(...)
Senator Wyden, talking about a similar provision in CISPA, noted “They would allow law enforcement to look for evidence of future crimes, opening the door to a dystopian world where law enforcement evaluates your Internet activity for the potential that you might commit a crime.” The CSA suffers the same ‘future crime’ flaw.
FAQ About the Lieberman-Collins Cyber Security Act | EFF
Reposted bybigbear3001 bigbear3001

May 28 2012

ignominy
Canada’s C-30 surveillance bill is much like the FBI’s recently revealed effort to force Internet communications providers such as Skype and Facebook to provide “back doors” for eavesdropping. In some cases, the Canadian legislation would allow police to obtain user data without a warrant.
C-30 surveillance bill in Canada seeks live wiretap of Internet communications.
Reposted byjotbe02mydafsoup-01krekkmynniasofiasbrightbytemondkroete
ignominy
Hundreds of words to avoid using online if you don't want the government spying on you

(...)The intriguing the list includes obvious choices such as 'attack', 'Al Qaeda', 'terrorism' and 'dirty bomb' alongside dozens of seemingly innocent words like 'pork', 'cloud', 'team' and 'Mexico'.

Released under a freedom of information request, the information sheds new light on how government analysts are instructed to patrol the internet searching for domestic and external threats.

REVEALED: Hundreds of words to avoid using online if you don't want the government spying on you | Mail Online
Reposted bybrightbyteSpinNE555mondkroete

March 24 2012

ignominy

Two weeks ago the New York District Attorney’s sent a subpoena to Twitter, seeking information about the account belonging to Jeffrey Rae.

Rae himself received an email, which included a copy of a subpoena from the DA requesting data from his account.

“You are commanded to appear before the criminal court of the County of New York as a witness in a criminal action prosecuted by the People of the State of New York against Jeffery Rae,” the subpoena reads.

It also says the activist must “produce” in court all tweets that came from his account, @jeffrae, from September 15 to October 31 of last year, "as a witness in a criminal action.”

Legal gray area emerges in social media privacy

Now the OWS protesters are sure authorities want to use social media data as evidence against them to stop the movement against “corporate greed”.

Twitter sticks together with OWS protesters — RT

March 03 2012

ignominy

March 01 2012

ignominy

The gun works by listening in with a directional microphone, and then, after a short delay of around 0.2 seconds, playing it back with a directional speaker. This triggers an effect that psychologists call Delayed Auditory Feedback (DAF), which has long been known to interrupt your speech (you might’ve experienced the same effect if you’ve ever heard your own voice echoing through Skype or another voice comms program). According to the researchers, DAF doesn’t cause physical discomfort, but the fact that you’re unable to talk is obviously quite stressful.

Speech jammer, in a librarySuffice it to say, if you’re a firm believer in free speech, you should now be experiencing a deafening cacophony of alarm bells. Let me illustrate a few examples of how this speech-jamming gun could be used.

New speech-jamming gun hints at dystopian Big Brother future | ExtremeTech
ignominy
Every time you use social networks you become mere product – it’s an idea we will all have to get used to.  So, should we give up worldly goods and hide in a Tibetan monastery till the end of our days, or start putting up a fight to protect our privacy? In the latest in a long series of scandals over social networks that profit from our private data, the UK-based DataSift firm has announced that is has bought every tweet posted since January 2010. The business intelligence and data-mining platform will be the first company to offer the archive for sale.
Privacy betrayed: Twitter sells multi-billion tweet archive — RT
Reposted byareyoubored areyoubored

February 21 2012

ignominy

Jotform.com, the domain name of a business providing hosting for online forms, has been seized by the Secret Service, essentially gutting the company’s business.

The Wednesday seizure of JotForm.com, with the assistance of the domain name’s registrar, GoDaddy, disabled about 2 million JotForm.com forms, said Aytekin Tank, the site’s founder. The embeddable forms are hosted by the company and let sites quickly put up contact and sign-up forms online.

GoDaddy told Wired it took the site down at the request of law enforcement.

Tank has informed its “hundreds of thousands of users” in a blog post to alter their form URLs to jotform.net, which should revive a customer’s hosted forms.

“They have disabled the DNS without any prior notice or request,” Tank said of GoDaddy. “They have told us the domain name was suspended as part of an ongoing law enforcement investigation.”

(...)
The agency did not immediately respond to Wired’s request for comment.
Secret Service Seizes JotForm.com, Nuking Millions of Online Forms (Updated) | Threat Level | Wired.com
Reposted bysofias02mydafsoup-01mondkroetebrightbyte

February 20 2012

ignominy
Le 15 février, le compte officiel et certifié sur Twitter de Nicolas Sarkozy était créé quelques heures avant sa déclaration de candidature. Le 16 février, Twitter censurait le compte @_nicolassarkozy. Ce compte parodique existait depuis  septembre 2010. Son caractère parodique était inéquivoque. Il ne violait donc pas les conditions générales d'utilisation de Twitter, qui précisent qu'en cas de compte parodique, la mention précisant le caractère caricatural ou parodique du compte doivent figurer dans l'intitulé de celui-ci. Les archives récupérées de ce compte montrent qu'il respectait absolument cette exigence du contrat Twitter.
Twitter Censure 5 Comptes Non Favorables à Nicolas Sarkozy

February 17 2012

ignominy

The case of Hamza Kashgari, a young Saudi journalist who has just been deported from Malaysia to face trial on charges of blasphemy, is one that should frighten and disgust anyone who cares about freedom of speech or religion.

His supposed offence was to have tweeted part of an imaginary conversation with the prophet Muhammad. "I have loved things about you and I have hated things about you and there is a lot I don't understand about you," he wrote; and: "I will not pray for you."

(...)

But the really chilling fact about this story is that his persecutors are the online commenters in Saudi. Some 30,000 tweets, mostly condemning him, came within 24 hours. A Facebook group has been set up to demand Kashgari's punishment (and Facebook has not taken it down). There are 20,000 members already. Some bloggers, it's true, have defended him; but they too have been threatened by the more orthodox contingent.

The bloodlust faced by the 'blaspheming' Saudi journalist | Andrew Brown | Comment is free | guardian.co.uk
ignominy

Twitter has clarified that it does not store names from address books, only email addreses and phone numbers.  The company initially told the Times that names were among the types of data it gathered from users'mobile contacts lists.

When users activate the service's "Find friends" feature, "the email addresses and phone numbers in your address book will be shared with Twitter," wrote Carolyn Penner, Twitter's spokesperson.  "Later, if one of your contacts signs up for Twitter with one of those email addresses and chooses to be discoverable by the address, we can connect you two."

Twitter stores full iPhone contact list for 18 months, after scan - latimes.com
ignominy

Each and every one of us is living in a sci-fi novel, and this spills into real life into a million different ways ... like the way that Hollywood location scouts and real estate agents now routinely use unmanned drone aircraft. Unmanned aerial vehicles (UAVs) have gone from military operations in Iraq and Afghanistan to simply becoming a routine movie industry tool. The FAA isn't too sure about how to deal with the drones of Hollywood.

And neither is the LAPD.

This past January, the Los Angeles Police Department issued a highly unusual warning against the use of drones by real estate agencies. The LAPD sent a letter to the California Association of Realtors, a trade group, warning that Realtors “who hire unmanned aircraft operators to take aerial photographs for marketing high-end properties” were in violation of FAA rules and local motion picture filming ordinances. Users were warned that the LAPD's Air Division intends to prosecute violators in the near future. However, the letter appears to be hot air: Unmanned aircraft flying at heights under 400 feet are currently unregulated by the FAA.

Unmanned Drones Go From Afghanistan To Hollywood | Fast Company

February 16 2012

ignominy

Tomorrow, some users with many subscribers will be notified through their profile of the option to verify their identity, Facebook confirmed with me. There’s no way to volunteer to be verified, you have to be chosen. These users will be prompted to submit an image of a government-issued photo ID, which is deleted after verification. They’ll also be given the option to enter an “alternate name” that can be used to find them through search and that can be displayed next to their real name in parentheses or as a replacement.

Facebook Launches Verified Accounts and Pseudonyms | TechCrunch

February 15 2012

ignominy
While the Terrorism Act 2006 authorizes British law enforcement agencies to order certain material to be removed from websites, lawmakers on the Home Affairs Committee stated that “service providers themselves should be more active in monitoring the material they host.” Their report raises serious concerns that political and religious speech will be suppressed. Security expert Peter Neumann who testified before the Committee asked why websites like YouTube and Facebook can’t be as “effective at removing . . . extremist Islamist or extremist right-wing content” as they are at removing sexually explicit content or copyrighted material that violates their own terms of service.
Members of UK Parliament Recommend Censoring Online Extremism | Electronic Frontier Foundation
Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!

Schweinderl