You are currently browsing the category archive for the ‘PIPA’ category.

Released today, was information that the NSA was tapping Brazil’s Petrobras, the Brazilian oil giant partly owned by the state of Brazil,

These new disclosures contradict statements made as recently as today,  by the NSA denying espionage for economic purposes.  The disclosures were buried in the Snowden documents handed over to the Guardian, and Brazil’s Fanstastico.

“A top-secret presentation dated May 2012 is used by the NSA to train new agents step-by-step how to access and spy upon private computer networks – the internal networks of companies, governments, financial institutions – networks designed precisely to protect information.  The name of Petrobras – Brazil’s largest company – appears right at the beginning, under the title: “MANY TARGETS USE PRIVATE NETWORKS.”   Besides Petrobras, e-mail and internet services provider Google’s infrastructure is also listed as a target. The company, often named as collaborating with the NSA, is shown here as a victim..”

Additional targets include French diplomats, with access to the private network of the Ministry of Foreign Affairs of France; the SWIFT network, the cooperative that unites over ten thousand banks in 212 countries and provides communications that enable international financial transactions. All transfers of money between banks across national borders goes through SWIFT.

Petrobras has two supercomputers, both hacked, used mainly for seismic research – which evaluate oil reserves from samples collected at sea. This is how the company mapped the Pre-salt layer, the largest discovery of new oil reserves in the world in recent years.

The obvious conclusion one must make, is that information regarding the world’s largest potential oil deposits were leaked to US firms, allowing them to get to those exact spots,  before Brazil’s Petrobras could make their claims…

Unfortunately this will remain in the realm of speculation, because the Snowden documents do not describe what information was taken.  They just show evidence that the NSA was inside their computer systems browsing around. On those computers listed by IP’s in the Snowden documents,  were the details of each lot in an auction set for next month opening Brazil’s Libra Field, located in the Bay of Santos, part of the Pre-salt Oil Deposit.

The President of Brazil was also direct target of espionage.  She demanded explanations.  Lastly, another document obtained by Fantastico shows who are the spies’ clients – who gets the information obtained: American diplomats, the intelligence agencies, and the White House. It proves that spying doesn’t have as its sole purpose the fight against terrorism. On this list of objectives are also diplomatic, political and economic information.

In response, James Clapper, Director of National Intelligence stressed “that the collected intelligence is not used “to steal the trade secrets of foreign companies on behalf of – or give intelligence we collect to – US companies to enhance their international competitiveness or increase their bottom line.”

The Brits were much more coy. declaring they do not comment on intelligence-related issues.

 

It is clearer now that the biggest benefactors for the NSA spying were commercial enterprises. The Obama administration went along with the Bush plan and accelerated it, primarily to give American companies a heads up, and keep jobs here.  It worked too.

One can’t argue with success. But one can find how American businesses were co-opted to assist the NSA.  From the Guardian, the following, allegedly from Snowden himself.

• Microsoft helped the NSA to circumvent its encryption to address concerns that the agency would be unable to intercept web chats on the new Outlook.com portal;

• The agency already had pre-encryption stage access to email on Outlook.com, including Hotmail;

• The company worked with the FBI this year to allow the NSA easier access via Prism to its cloud storage service SkyDrive, which now has more than 250 million users worldwide;

• Microsoft also worked with the FBI’s Data Intercept Unit to “understand” potential issues with a feature in Outlook.com that allows users to create email aliases;

• In July last year, nine months after Microsoft bought Skype, the NSA boasted that a new capability had tripled the amount of Skype video calls being collected through Prism;

• Material collected through Prism is routinely shared with the FBI and CIA, with one NSA document describing the program as a “team sport”.

it is revealing that the beneficiaries of the Patriot Act and probably one of the reasons it has been intact long after terrorism faded offshore, are the exact same who are suing each other left and right, using the anti-piracy laws as their barrage.  It appears that laws are not for people anymore; they are for corporations.  It is corporations who want the US to fund listening posts for every American word and sentence.

The only way to fix that, is to divide the corporations Teddy-Roosevelt-style, thereby giving We, the People a little more clout.  …

Like a zombie it may rise again.  But around 2 o’clock yesterday afternoon, members of the Senate confided to US News that in the way as the CISPA  House Bill was passed, “that” bill is dead.  Pieces of it may be pushed through the Senate in an effort to preserve the parts that protect our cyber-structure,  but  those pieces designed  to protect sitting politicians…  consider them tossed.

Mike Rogers (R-Mich.), CISPA’s sponsor, has been pushing for such a bill for years, and has repeatedly insisted this will be the year it becomes law. President Obama vowed to veto it if it passed in an answer given to over 100,000 signings of a White House petition… 300,000 people petitioned Congress to scrap it.

Cybersecurity lobbying has doubled in 2012 alone, outspending privacy groups by a factor of 14 to one. …$55 million to $4 million.

Essentually CISPA was supposed to help with cyber attacks.  If we were attacked by a Stuxnet virus, CISPA would drop all privacy issue restraints and allow anyone connected to security to roam through any and all accounts with impunity….

Like credit card numbers.  Like patient information.  Like pictures of you in the nude. Like your contacts and business associates. Once compromised and if anything were to happen to you, say, information was leaked to your boss, or your spouse, or put inside a newspaper for everyone to read, you could not sue, you would have no recourse and most likely, you would be completely unaware this was going on until a friend happened to see it and let you know….

The sponsor of the bill, wrongly says this is absolutely necessary to protect us from threats.  However, not being able to sue because you were fired because you boss saw a medical file showing you were being treated for cancer,  does little to protect us from Chinese hackers.

And that is the problem.  Furthermore,  so much stuff flows on the internet, that asking providers for specific data, is like asking someone to retrieve a certain molecule of water from a flowing river.  If CISPA passed, the internet would grind to a halt, as every search engine, every server, struggled to filter and organize all their data so if asked, they could legally provide.

It is a bad bill. Yet it’s sponsor keeps bringing it back. and back. and back.  Here is the Fourth Amendment to the US Constitution.  The one CISPA violates.

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

This is the anti-phishing amendment.  If you don’t have any charges to press, and don’t know of any particular evidence in a person’s possession, it is illegal to go to their house when they are not there, and look around for something to pin on them….  yet that is exactly what  CISPA sponsor Mike Rogers bill will do….

It allows Senator Joesph McCarthy hearings to take place without the hearing.

But more odd is how one private company is all over Mr. Roger’s CISPA, there at its inception, its creation, its Reichstag moment, and it’s demise. That private company is the  cybersecurity consulting firm Mandiant…. who is owned and run by Kevin Mandia out of Alexandria  Virginia.  Kevin Mandia was brought in by Mark Rogers to testify as to the dangers our computer system faced.

“China’s economic espionage has reached an intolerable level,” he said at a congressional hearing in October 2011.  As head of the House Intelligence committee  he held a hearing on “Chinese hacking”  and one of those creating the report, was Kevin Mandia who was thanked by Rogers at the hearing’s end.

At the hearing, cyber security groups were in force to testify, but no privacy groups were allowed inside.  The Conversation was one way with the cyber security groups insisting they would only share anonymous information with each other…  Unfortuately that assertion could not be challenged.

But outside the closed hearing, privacy groups are saying  it would let “companies hand over large swaths” of individuals’ private information “to the government, without a warrant.”  Credit card numbers, bank papers, phone contacts….

Rogers argues that is a consequence, not an intent.  No matter the reasoning behind it, CISPA allows it to happen.  Quite possibly thousands or tens of thousands can be looking over your data because you  happen to bank at Bank of America, or shop at Caldor… or Wal*Mart…. when they came under attack….

Then last year’s version was shot down, Rogers was undeterred.

There “appears to be a new level of threat that would target networks from—I’ve got to be careful here—an unusual source,” he said. He joked about how he wanted to share what he knew but couldn’t, because it was classified.  “I look really bad in those orange jumpsuits with the numbers on the back,” he told his audience…..

Then, almost as if on cue for this spring legislative session, in February 2013. the New York Times announced it had been hit by Chinese hackers, followed shortly by the Washington Post and Wall Street Journal. Then Twitter, Facebook, and Microsoft. Their stories differed, as did the severity of the attacks, but everybody agreed: These hacks were sophisticated, and they all seemed to come from China…..

You probably remember the headline, just before the House vote on CISPA….

A cybersecurity firm had found the source of those attacks. In no uncertain terms, the firm claimed to have traced the hacking operation to a single, 12-story building outside of Shanghai: People’s Liberation Army (PLA) Unit 61398. Hiding in plain sight, the report said, was a dedicated hacking operation run by the Chinese government…..

And the firm that released it? Mandiant, whose CEO advised Rogers that day.

Mandiant’s report, backed by pages of data and years of research, relies on a few simple pieces of evidence. A loose coalition of similarly styled hacks all stem from the same source, codenamed APT1 (short for “Advanced Persistent Threat”). Mandiant traced the vast majority of the attacks to China—Shanghai, specifically—and noted that Unit 61398 was uniquely capable of sustaining such a sophisticated operation.

What was just said, was that these hack were traced to Shanghai and in Shanghai there is this building so they had to come from there…

Not so fast, says the head of another cyber-security agency. Jeff Carr, CEO of a different cybersecurity firm, Taia Global. He has a different explanation.

“Mandiant provided lots of facts about the PLA, and they provided a lot of facts about how APT1 works, I’m not disputing those.What I’m disputing is the conclusion that they drew. They created a table: In one column was characteristics of the PLA, the other was APT1, and they seemed to believe that the only possible conclusion was that the PLA is APT1. Well, that’s not the only possible conclusion.”   Those other possibilities include Russia, Israel, and France, which the U.S. has acknowledged engages in cyber-espionage. It could also include Ukraine, Taiwan, or Germany. Or “APT1 could just be a group of professional hackers that are stealing information and selling it,” Carr said. “In fact, that makes more sense to me because of the lack of operation security that’s been exhibited by these guys.”

The fact that most hackers’ Internet protocol (IP) addresses trace back to China doesn’t mean much. Those are easy to fake—heck, moderately sophisticated Internet pirates fake theirs all the time to avoid getting caught. China, indignant, countered the Mandiant report, partially on those lines.   “As we all know, hacker attacks almost always steal IP addresses. It is common practice online,” China’s Department of Defense announced after Mandiant’s report, though it also said it traced a million hacks on its own network to the U.S., via those attackers’ IP addresses.

What that says in plain language was that a million hacks came from the US into the Chinese system and then went back to the US.  A million hacks came from the US … just before CISPA was to be voted upon.    And you have this very cozy relationship with the sponsor of the CISPA bill and a cyber security firm which announced earlier that China was one day going to do massive hacks into the United States….

It worked.  It fooled Democrat John Carney.  He voted for CISPA.

“China is like the boogeyman to promote [CISPA],” cyber security specialist Carr added. “If you increase the fear around China, and then you wave CISPA, hopefully you will attract more movement to simply pass that—some blind attempt to heighten security.”

Bottom line is that CISPA would allow private companies (like Facebook, or your Internet service provider) to share your emails, text messages, or stored files with the government for “cybersecurity purposes,” and it would trump the existing laws that allow you to sue those companies for privacy violations.

All you know is that you got fired without cause and escorted out of your building…..

Sharing information is a flawed concept….   It is absolutely the wrong way to thwart an attack.  Such that it appears the main thrust of the bill is to access information, NOT thwart a cyber attack…

To thwart a cyber attack, one must take this approach….

“The solution is to assume your network is going to be breached, and you need to be able to identify what’s of value on that network, and segregate it and monitor it in real time. If somebody does gain access, and they’re accessing it from an IP address you don’t recognize or at a time of day where they shouldn’t be, you can immediately lock down that file. It’s known as data protection.    “It’s like the TSA. You tried to bring a bomb aboard in your shoe, so from now on we’ll just have everybody take off their shoes. 

But, as for now these details are all for naught ….

CISPA’s gone, one more round, CISPA’s gone…..

This is going to my hard core Republican friends. Why are you still supporting Romney?

1) You know he is not going to win.
2) You know as the election heats up, his Bain Capital experience will make Republicans untouchable for decades.
3) You can’t pin down where Romney stands on anything.
4) He tied his dog to a car.
5) He stands with black people and says “Who let the dogs out, woof, woof.”

Most of you are telling me, “I certainly can’t vote for Obama. I guess I’m not voting for President this time.”

Let’s say, just for argument sakes there was a presidential candidate out there who says to have good government you need: …………………

1. Become reality driven. Don’t kid yourself or others.
Find out what’s what and base your decisions and actions
on that.

2. Always be honest and tell the truth. It’s extremely
difficult to do any damage to anybody when you are
willing to tell the truth–regardless of the
consequences.

3. Always do what’s right and fair. Remember, the more
you actually accomplish, the louder your critics become.
You’ve got to learn to ignore your critics. You’ve got to
continue to do what you think is right. You’ve got to
maintain your integrity.

4. Determine your goal, develop a plan to reach that
goal, and then act. Don’t procrastinate.

5. Make sure everybody who ought to know what you’re
doing knows what you’re doing. Communicate.

6. Don’t hesitate to deliver bad news. There is always
time to salvage things. There is always time to fix
things. Henry Kissinger said that anything that can be
revealed eventually should be revealed immediately.

7. Last, be willing to do whatever it takes to get your
job done. If you’ve got a job that you don’t love enough
to do what it takes to get your job done, then quit and
get one that you do love, and then make a difference.

Honesty. Integrity. Principal.

Sounds good so far. Let us say just for argument, he had chief executive experience. Let us say just or argument that he once ran a state, one of the fifty in this union. Let us say while governor, this is what he did…..

During his tenure, New Mexico experienced the longest period without a tax-increase in the state’s entire history.

1) He cut the rate of government growth in half,

2) Left the New Mexico state government with a budget surplus and 1000 fewer employees (without firing anyone),

3) Privatized half of the prisons in the state,

4) Brought a state-wide school voucher system to New Mexico.

5) Vetoed 750 bills (more than all the vetoes of the other 49 Governors in the country at that time, combined) with only 2 overrides, earning him the nickname Gary “Veto” Johnson.

6) In 1999, Johnson became the highest-ranking elected official in the United States to advocate the legalization of drugs.

7) Shifted Medicaid to managed care.

ISN’T THAT WHAT YOU WANT? ISN’T THAT WHAT WE NEED?

Can you not think of a better way to show your lack of enthusiasm over a wealthy capitalist buying his way to the top of your ticket, by voting for someone who has character, who does what you’ve always wanted, a doer, not a talker?

And to think…. you were simply just going to throw your vote away.

His name is Gary Johnson. He is the new party’s candidate for President.

Remember Republicans. It is your values that are important. If your party has given up and moved on from your values, don’t think you have to be loyal to the word…. “Republican”… What you have to be loyal too, is yourself. Always. Never lie to yourself.

You don’t need to waste your vote on Romney. You probably need to find more about this guy, Gary Johnson, and then throw your support behind him.

Don’t worry it is not one of the two parties on whose ticket he is running. Remember, at one point in time, the Republican Party was a once a third party too. One that went mainstream because of its core values, its principles resonated with everyday American People.

Finally, we see the picture…

We were rather curious as to why MegaUpload would be the target, especially since it seemed to be a legitimate company.

But this explains it… They were breaking up the monopoly that Record companies currently have over their artists…

We hear about the wealth of our entertainers… But hidden is how much more, the record companies are scamming off the entertainers products… We buy a U2 album, we think we are helping U2… they only get 1%… Universal takes the other 99%

Obviously, artists would like to perform for another venue. Obviously Universal would like to prevent that from happening.

MagaUpload was immune from both SOPA and PIPA bills.. That is because both bills excluded from control, any site with a .org, or .com in the suffix.

MegaUpLoad.com was therefore exempt…. because it is NOT a foreign registered site, but as a .com, is actually registered here, meaning SOPA and PIPA would not apply…

In the last few days and months, Megaupload had announced plans to help artists make more money… and had announced that very successful and famous music producer Swizz Beatz had become CEO of Megaupload. Beatz is also married to recording superstar Alicia Keys and was responsible for getting all those RIAA artists to endorse Megaupload. All indications were that the company was clearly building a legitimate system for artists to make money and fans to get content. And it seemed that many artists clearly supported the site.

At the same time there are huge questions about why the government is involved here. Megaupload is currently engaged in a lawsuit in the US — and contrary to claims of SOPA/PIPA supporters, the company seemed more than willing to appear in court to deal with civil copyright claims.

Here is the timeline for the DOJ takedown….

Early 2011″ – “The FBI contacted New Zealand Police in early 2011 with a request to assist with their investigation into the Mega Conspiracy.” said Detective Inspector Grant Wormald of OFCANZ
28-OCT-2011 – [1] MegaUpload labelled a ‘rogue’ site by MPAA.
09-DEC-2011 – [2] MegaUpload releases a music video with RIAA artists endorsing MegaUpload.
10-DEC-2011 – [3] UMG doesn’t like the video. Has it removed from YouTube.
12-DEC-2011 – [4] MegaUpload files suit against UMG on the grounds that UMG cannot remove the content as MegaUpload holds the copyright, not UMG.
16-DEC-2011 – [5] UMG says “So what? We can take down whatever we want!” and “You can’t touch us. This isn’t DMCA. We didn’t take it down because of copyright. We took it down because we can.”
21-DEC-2011 – [6] MegaUpload labelled a “rogue” site by the USTR.
28-DEC-2011 – [7] MegaUpload wants an explaination from UMG.
19-JAN-2012 – [8] MegaUpload shut down by Feds
20-JAN-2012 – [9] New Zealand arrests in US led global copyright infringement investigation of Megaupload.com and related sites

So who is in charge of our Justice System? Certainly not WE, the People……

It is funny, … often the most profound statements are in an aside that the author slipped into the article…..

From the New York Times……

“He helped devise a strategy that called for his coalition to line up a strong array of legislative sponsors and supporters behind two similar laws — the Stop Online Piracy Act in the House, and the Protect I.P. Act in the Senate — and then to move them through the Congress quickly before possible opposition from tech companies could coalesce.”

Translated: how can we trick Congress into passing this law before the American People find out….

Wouldn’t it be nice if campaign contributions could ONLY come from individual donors who were actually human?

Nothing…….

If someone downloads a Hollywood movie or television series…. is that a loss of profit for a Movie studio?

They would like you to think so…

But most people download movies because they do not have the money to otherwise spend.

Therefore, they would never buy that product …. If it were not available, they would just do without…..

Today, everyone has access to a computer. There is no market for movies copyied on CD and sold on the black market. There is no money in downloaded movies. They are worthless entities…

What the availability of downloaded movies actually do, is to effectively market that product.

How often have you been in a group of strangers with time to kill and get stuck searching cable for a movie?

Do you trust the reviews, obviously slanted so you pick their product, or do you listen to other people and pick one that they have seen and say is good?

You know that answer.

One day soon it will be proven. The reason profits of movies studios and the entertainment industries are up, is because of the ability to “globally” upload movies on the internet…. More people now (or did) have access to “Hollywood” across this globe than ever before… Theoretically, even if one out of ten viewers later buys the product after testing it, that is a boon for movie moguls. Don’t ever think anyone in the Third World will buy without first testing.

Without such glowing reviews from our peers, when it comes to fluffy entertainment, …. we will prefer to spend our hard money on more worthwhile causes.

As a concerned citizen, I am beginning to accept that a boycott of Hollywood until charges against MegaUpload are dismissed … is exactly the precise action that is needed…..

After all, “Hollywood Jobs are at stake.”…..