Thursday 30 January 2014

Rovio Denies Collaborating with NSA, GCHQ

"Rovio Entertainment, the software company behind the mega-popular “Angry Birds” game franchise, denied in an official statement that it knowingly shares data with the NSA, Britain’s GCHQ, or any other national intelligence agency."



'via Blog this'

Web Semantics: a glossary of the key terms in the NSA-GCHQ Snowden leaks | Beyond The Beyond | Wired.com

"“Computer Network Exploitation (CNE)

“The term used by the NSA to refer to efforts to exploit data gathered from its targets."



'via Blog this'

NSA, GCHQ YouTube and Facebook mass spying programs revealed | BGR

"More documents released by NSA whistleblower Edward Snowden detail another bulk data collection spying initiative that consists of monitoring services like Facebook and Google’s YouTube and Blogger in order to accurately observe trends with the general, worldwide population, and even predict certain events. NBC News has obtained a copy of a presentation delivered by GCHQ to the NSA in 2012 that details a “Squeaky Dolphin” mass surveillance program – a real-time user and data collection initiative that monitors YouTube views, Facebook likes and Blogspot or Blogger visits for analysis."



'via Blog this'

Category:Australia - WikiLeaks

"Popular Australia related articles

Is the Internet Filter Australia's Berlin Wall ‎
Australian government secret ACMA internet censorship blacklist, 18 Mar 2009 ‎
Australian government secret ACMA internet censorship blacklist, 6 Aug 2008 ‎
Leaked Australian blacklist reveals banned sites ‎
The coming age of internet censorship ‎
Blood and Honour international Neo-Nazi network messages and passwords, Mar 2009 ‎
A Blacklist for Websites Backfires in Australia ‎
Wikileaks releases NATO report on civilian deaths ‎
Wikileaks cracks NATO's Master Narrative for Afghanistan ‎
Australia secretly censors Wikileaks press release and Danish Internet censorship list, 16 Mar 2009 ‎
Australian government secret ACMA internet censorship blacklist, 11 Mar 2009 ‎
Proposed US ACTA plurilateral intellectual property trade agreement (2007) ‎"



'via Blog this'

WikiLeaks - The Spyfiles #3

"Today, Wednesday 4 September 2013 at 1600 UTC, WikiLeaks released ’Spy Files #3’ – 249 documents from 92 global intelligence contractors. These documents reveal how, as the intelligence world has privatised, US, EU and developing world intelligence agencies have rushed into spending millions on next-generation mass surveillance technology to target communities, groups and whole populations"



'via Blog this'

‘Our views are far apart’: German chancellor slams US, UK over spying — RT News

"Countries spying on their allies sow distrust that could result in less, rather than more security, German Chancellor Angela Merkel has warned. She particularly referred to the surveillance and spying activities by the US and the UK."



'via Blog this'

Facebook - Damien Minton Gallery

"Gary Foley called into the Damien Minton Gallery to check the Persons Of Interest surveillance photos yesterday. The show is on until Saturday. If you get the chance call in. 583 Elizabeth St. Cleveland St. Redfern"



'via Blog this'

'Spying Birds': Hackers deface Angry Birds website following NSA revelations — RT News

"Hackers briefly vandalized the website of popular mobile game Angry Birds after revelations that its users’ data has been leaked to the NSA. But the app’s Finnish maker has hit out at accusations that it is helping spy agencies."



'via Blog this'

Top lawyer to MPs: GCHQ mass surveillance largely illegal — RT News

"A substantial part of the GCHQ’s dragnet snooping program is most likely illegal and was approved by government ministers despite breaching human rights and surveillance laws, a legal analysis requested by British MPs has found, The Guardian reports."



'via Blog this'

EPL product details: DSD Defence Signals Directorate

"Pointsec PC Version 4.3 is a hard disk encryption application. It is a software based security product for the Microsoft Windows based PC platform that employs both boot authentication and transparent disk encryption to provide protection of information resources stored on fixed media in a workstation or laptop. Multiple user authentication mechanisms are supported, including fixed passwords, dynamic/challenge-response authentication, smart cards, and remote help. Successful authentication is required before the operating system is allowed to boot."



'via Blog this'