Medidas de control total sobre la población

NosTrasladamus

Madmaxista
Desde
19 Abr 2007
Mensajes
6.803
Reputación
12.527
Busted! Two New Fed GPS Trackers Found on SUV | Threat Level | Wired.com

Mientras el Tribunal Supremo se prepara para la vista oral del jueves del caso que podría determinar si las autoridades pueden espiar a ciudadanos americanos con dispositivos GPS sin una orden judicial, un joven en California ha hallado recientemente, no uno, sino dos aparatos de rastreo distintos en su vehículo. El joven halló el primero hace 3 semanas en su todo-terreno. Tras contactar con la revista y permitir tomar fotografías del dispositivo, este fue reemplazado por otro distinto.
Busted! Two New Fed GPS Trackers Found on SUV

The second of two GPS trackers found recently on the vehicle of a young man in California.
Photo: Jon Snyder/Wired.com
As the Supreme Court gets ready to hear oral arguments in a case Tuesday that could determine if authorities can track U.S. citizens with GPS vehicle trackers without a warrant, a young man in California has come forward to Wired to reveal that he found not one but two different devices on his vehicle recently.

The 25-year-old resident of San Jose, California, says he found the first one about three weeks ago on his Volvo SUV while visiting his mother in Modesto, about 80 miles northeast of San Jose. After contacting Wired and allowing a photographer to snap pictures of the device, it was swapped out and replaced with a second tracking device. A witness also reported seeing a strange man looking beneath the vehicle of the young man’s girlfriend while her car was parked at work, suggesting that a tracking device may have been retrieved from her car.

Then things got really weird when police showed up during a Wired interview with the man.

The young man, who asked to be identified only as Greg, is one among an increasing number of U.S. citizens who are finding themselves tracked with the high-tech devices.

The Justice Department has said that law enforcement agents employ GPS as a crime-fighting tool with “great frequency,” and GPS retailers have told Wired that they’ve sold thousands of the devices to the feds.

But little is known about how or how often law enforcement agents use them. And without a clear ruling requiring agents to obtain a “probable cause” warrant to use the devices, it leaves citizens who may have only a distant connection to a crime or no connection at all vulnerable to the whimsy of agents who are fishing for a case.

The invasive technology, for example, allows police, the FBI, the Drug Enforcement Administration and other agencies to engage in covert round-the-clock surveillance over an extended period of time, collecting vast amounts of information about anyone who drives the vehicle that is being tracked.

“A person who knows all of another’s travels can deduce whether he is a weekly church goer, a heavy drinker, a regular at the gym, an unfaithful husband, an outpatient receiving medical treatment, an associate of particular individuals or political groups — and not just one such fact about a person, but all such facts,” wrote U.S. Appeals Court Judge Douglas Ginsburg in a recent ruling that the Supreme Court will be examining this week to determine if warrants should be required for use with trackers.

Greg says he discovered the first tracker on his vehicle after noticing what looked like a cell phone antenna inside a hole on his back bumper where a cable is stored for towing a trailer. The device, the size of a mobile phone, was not attached to a battery pack, suggesting the battery was embedded in its casing.

The first GPS tracker found was slipped into a fabric sleeve, containing magnets, and placed on the underside of the vehicle in the wheel well of the spare tire.
Photo: Jon Snyder/Wired.com

A week later when he was back in San Jose, he checked the device, and it appeared to have been repositioned slightly on the vehicle to make it less visible. It was placed on the underside of the car in the wheel well that holds a spare tire.

Greg, a Hispanic American who lives in San Jose at the home of his girlfriend’s parents, contacted Wired after reading a story published last year about an Arab-American citizen named Yasir Afifi who found a tracking device on his car. Greg wanted to know what he should do with the device.

Afifi believed he was being tracked by authorities for six months before a mechanic discovered the device on his car when he took it into a garage for an oil change. He apparently came under surveillance after the FBI received a vague tip from someone who said Afifi might be a threat to national security. Afifi has filed a suit against the government, asserting that authorities violated his civil liberties by placing the device on his vehicle without a warrant and without suspicion of a crime. His attorney, Zahra Billoo, told Wired this week that she’s requested a stay in her client’s case, pending a ruling by the Supreme Court in the GPS tracking case now before it.

Greg’s surveillance appears to involve different circumstances. It most likely involves a criminal drug investigation centered around his cousin, a Mexican citizen who fled across the border to that country a year ago and may have been involved in the drug trade as a dealer.

“He took off. I think he was fleeing. I think he committed a crime,” Greg told Wired.com, asserting that he himself is not involved in drugs.

Greg says he bought the SUV from his cousin in June, paying cash for it to a family member. He examined the car at the time and found no tracking device on it. A month later, he drove his cousin’s wife to Tijuana. Greg says he remained in Mexico a couple of days before returning to the U.S.

The first GPS tracker, out of its sleeve. Photo courtesy of Greg.

It’s possible the surveillance began shortly after his return, but Greg discovered the device only about three weeks ago during his visit to Modesto. The device was slipped into a sleeve that contained small magnets to affix it to the car.

On Tuesday, Nov. 1, Wired photographer Jon Snyder went to San Jose to photograph the device. The next day, two males and one female appeared suddenly at the business where Greg’s girlfriend works, driving a Crown Victoria with tinted windows. A witness reported to Greg that one of the men jumped out of the car, bent under the front of the girlfriend’s car for a few seconds, then jumped back into the Crown Victoria and drove off. Wired was unable to confirm the story.

The amowing day, Greg noticed that the GPS tracker on his own car had been replaced with a different tracker, this one encased in a clam shell cover attached to a large round magnet to hold the device to the car. The device was attached to a 3.6 VDC Lithium Polymer rechargeable battery.

There was no writing on the tracker to identify its maker, but a label on the battery indicated that it’s sold by a small firm in Farmingdale, New York, called Revanche. A notice on a government web site last June indicates that it was seeking 500 of the batteries and 250 battery chargers for the Drug Enforcement Administration. A separate notice on the same site in 2008 refers to a contract for what appears to be a similar Revanche battery. The notice indicates the batteries work with GPS devices made by Nextel and Sendum.

A spokeswoman with the DEA’s office in San Francisco, however, declined to say if the device on Greg’s vehicle was theirs.

“We cannot comment on our means or methods that we use, so I cannot provide you with any additional information,” said DEA spokeswoman Casey McEnry.

Second GPS tracker with clam shell casing and Lithium Polymer battery.
Photo: Jon Snyder/Wired.com

The second device on Greg’s vehicle appears to be a Sendum PT200 GPS tracker with the factory battery swapped out and replaced with the Revanche battery. The Sendum GPS tracker is marketed to private investigators, law enforcement and transportation security managers and sells for about $430 without the battery. With the factory battery “it will last 7-15 days reporting every hour in a good cellular coverage zone,” according to marketing literature describing it, and it uses CDMA cellular communications and gpsOne location services to determine its location.

When this reporter drove down to meet Greg and photograph the second tracker with photographer Snyder, three police cars appeared at the location that had been pre-arranged with Greg, at various points driving directly behind me without making any verbal contact before leaving.

After moving the photo shoot to a Rotten Robbie gas station a mile away from the first location, another police car showed up. In this case, the officer entered the station smiling at me and turned his car around to face the direction of Greg’s car, a couple hundred yards away. He remained there while the device was photographed. A passenger in the police car, dressed in civilian clothes, stepped out of the vehicle to fill a gas container, then the two left shortly before the photo shoot was completed.

The Obama administration will be defending the warrantless use of such trackers in front of the Supreme Court on Tuesday morning. The administration, which is attempting to overturn a lower court ruling that threw out a drug dealer’s conviction over the warrantless use of a tracker, argues that citizens have no expectation of privacy when it comes to their movements in public so officers don’t need to get a warrant to use such devices.

It’s unclear if authorities obtained a warrant to track Greg’s vehicle. While Greg says he’s committed no crimes and has nothing to hide, the not-so-stealthy police maneuver at his girlfriend’s place of employment makes it look to others like she’s involved in something nefarious, he says. That concerns him.

It concerns attorney Billoo as well.

“For a lot of us, it’s like, Well I’m not selling cocaine, so let them put a tracking device on the car of [a suspect] who is selling cocaine,” Billoo says. “And I’m not a terrorist, so let them put the device on someone [suspected of being] a terrorist. But it shouldn’t be unchecked authority on the part of police officers. If law enforcement doesn’t care to have their authority checked, then we’re in a lot of trouble.”
 

Perdidos

Madmaxista
Desde
3 Nov 2011
Mensajes
295
Reputación
259
La forma de controlar a la población esta en las empresas multinacionales y el sindicalismo vertical. Si tienes algun problema en la empresa te amenazan los propios sindicalistas con que las empresas pueden deslocalizarse. Pues hay que plantar cara exigir que se cumplan los derechos humanos, y si quieren irse a contratar mano de obra esclava pues se les cierra el acceso al mercado. Así se defiende los derechos aqui y en el tercer mundo. Protestar contra las multinacionales y sus fieles lacayos los sindicalistas, que se sientan en el comite de empresa y en el consejo de dirección.
 

NosTrasladamus

Madmaxista
Desde
19 Abr 2007
Mensajes
6.803
Reputación
12.527
La forma de controlar a la población esta en las empresas multinacionales y el sindicalismo vertical.
No mezcles churras con merinas ni trates de intoxicar para arrimar el ascua a tu sardina. Por muy traidores que sean los sindicatos amarillos USO, UGT y CC.OO., la responsabilidad de las corporaciones con la complicidad de los estados y nuestros representantes corruptos en todo lo que está pasando es infinitamente superior y de naturaleza muy distinta. Las empresas multinacionales no permiten que haya sindicatos. Yo he trabajado en multinacionales americanas dirigidas en españa por miembros del Opus Dei y en donde estaba totalmente erradicado el sindicalismo. Al primero que pretendía montar un comité de empresa lo largaban en cuestión de segundos costase lo que costase... y muchas otras empresas trabajan igual... el gobierno no se atreve a meterles mano por dos motivos a) son estadounidenses b) emplean a miles de trabajadores... :ouch:

Si pretendes ensuciar este hilo para desahogar tus paranoias políticas/antisindicales te invito a que vayamos a discutirlo a política. Esto es para otra cosa: discutir y denunciar el uso que hacen los estados de la tecnología para restringir las libertades, reprimir a los disidentes (reales o potenciales) y controlarnos como a ganado...
 
Última edición:

NosTrasladamus

Madmaxista
Desde
19 Abr 2007
Mensajes
6.803
Reputación
12.527
ATENCION A ESTO, SEÑORES: :8::8::8:

Video - Stewart Baker on Why Privacy Is Going Away - WSJ.com

Stewart Baker, the former assistant secretary for Homeland Security, talks with WSJ's Julia Angwin about the need for balancing privacy rights with security concerns and explains why privacy may one day be a luxury available to the privileged and the rich.

Stewart Baker, el anterior secretario adjunto del Departamento de Seguridad Interior (el equivalente en USA al Ministerio del Interior) habla con Julia Angwin del Wall Street Journal sobre la necesidad de contrapesar el derecho a la intimidad con la preocupación por la seguridad y explica por qué la intimidad podría un día ser un lujo al alcance de los privilegiados y los ricos
La industria de la seguridad y el espionaje que está haciendo un pingüe negocio al extender el uso de sus productos y tecnologías del ámbito gubernamental y militar al uso de las mismas por parte de las corporaciones en connivencia con el gobierno (fascismo) y contra la población civil...
REcientemente el Wall Street Journal ha publicado un catálogo de productos para intercepción de comunicaciones y espionaje de la población a través de internet obtenido en una feria dedicada a la seguridad y el espionaje celebrada en Washington:

Document Trove Exposes Surveillance Methods - WSJ.com

The Surveillance Catalog - The Wall Street Journal

By JENNIFER VALENTINO-DEVRIES, JULIA ANGWIN and STEVE STECKLOW

Documents obtained by The Wall Street Journal open a rare window into a new global market for the off-the-shelf surveillance technology that has arisen in the decade since the terrorist attacks of Sept. 11, 2001.
The techniques described in the trove of 200-plus marketing documents, spanning 36 companies, include hacking tools that enable governments to break into people's computers and cellphones, and "massive intercept" gear that can gather all Internet communications in a country. The papers were obtained from attendees of a secretive surveillance conference held near Washington, D.C., last month.

Intelligence agencies in the U.S. and abroad have long conducted their own surveillance. But in recent years, a retail market for surveillance tools has sprung up from "nearly zero" in 2001 to about $5 billion a year, said Jerry Lucas, president of TeleStrategies Inc., the show's operator.

Critics say the market represents a new sort of arms trade supplying Western governments and repressive nations alike. "The Arab Spring countries all had more sophisticated surveillance capabilities than I would have guessed," said Andrew McLaughlin, who recently left his post as deputy chief technology officer in the White House, referring to the Middle Eastern and African nations racked by violent crackdowns on dissent.

The Journal this year uncovered an Internet surveillance center installed by a French firm in Libya and reported that software made by Britain's Gamma International UK Ltd., had been used in Egypt to intercept dissidents' Skype conversations. In October, a U.S. company that makes Internet-filtering gear acknowledged to the Journal that its devices were being used in Syria.

Companies making and selling this gear say it is intended to catch criminals and is available only to governments and law enforcement. They say they obey export laws and aren't responsible for how the tools are used.

Trade-show organizer Mr. Lucas added that his event isn't political. "We don't really get into asking, 'Is this in the public interest?'" he said.

TeleStrategies holds ISS World conferences world-wide. The one near Washington, D.C., caters mainly to U.S., Canadian, Caribbean and Latin American authorities. The annual conference in Dubai has long served as a chance for Middle Eastern nations to meet companies hawking surveillance gear.

Many technologies at the Washington-area show related to "massive intercept" monitoring, which can capture vast amounts of data. Telesoft Technologies Ltd. of the U.K. touted its device in its documents as offering "targeted or mass capture of 10s of thousands of simultaneous conversations from fixed or cellular networks." Telesoft declined to comment.

California-based Net Optics Inc., whose tools make monitoring gear more efficient, presented at the show and offers a case study on its website that describes helping a "major mobile operator in China" conduct "real-time monitoring" of cellphone Internet content. The goal was to help "analyze criminal activity" as well as "detect and filter undesirable content," the case study says.

Net Optics' CEO, Bob Shaw, said his company amows "to the letter of the law" U.S. export regulations. "We make sure we're not shipping to any countries that are forbidden or on the embargo list," he said in an interview.

Among the most controversial technologies on display at the conference were essentially computer-hacking tools to enable government agents to break into people's computers and cellphones, log their keystrokes and access their data. Although hacking techniques are generally illegal in the U.S., law enforcement can use them with an appropriate warrant, said Orin Kerr, a professor at George Washington University Law School and former computer-crime attorney at the Justice Department.

The documents show that at least three companies—Vupen Security SA of France, HackingTeam SRL of Italy and Gamma's FinFisher—marketed their skill at the kinds of techniques often used in "malware," the software used by criminals trying to steal people's financial or personal details. The goal is to overcome the fact that most surveillance techniques are "useless against encryption and can't reach information that never leaves the device," Marco Valleri, offensive-security manager at HackingTeam, said in an interview. "We can defeat that."

Representatives of HackingTeam said they tailor their products to the laws of the country where they are being sold. The firm's products include an auditing system that aims to prevent misuse by officials. "An officer cannot use our product to spy on his wife, for example," Mr. Valleri said.

Mr. Valleri said HackingTeam asks government customers to sign a license in which they agree not to provide the technology to unauthorized countries.

Vupen, which gave a presentation at the conference on "exploiting computer and mobile vulnerabilities for electronic surveillance," said its tools take advantage of security holes in computers or cellphones that manufacturers aren't yet aware of. Vupen's marketing documents describe its researchers as "dedicated" to finding "unpatched vulnerabilities" in software created by Microsoft Corp., Apple Inc. and others. On its website, the company offered attendees a "free Vupen exploit sample" that relied on an already-patched security hole.

Vupen says it restricts its sales to Australia, New Zealand, members and partners of the North Atlantic Treaty Organization and the Association of Southeast Asian Nations. The company says it won't sell to countries subject to international embargoes, and that its research must be used for national-security purposes only and in accordance with ethical practices and applicable laws.

The documents for FinFisher, a Gamma product, say it works by "sending fake software updates for popular software." In one example, FinFisher says intelligence agents deployed its products "within the main Internet service provider of their country" and infected people's computers by "covertly injecting" FinFisher code on websites that people then visited.

The company also claims to have allowed an intelligence agency to trick users into downloading its software onto BlackBerry mobile phones "to monitor all communications, including [texts], email and BlackBerry Messenger." Its marketing documents say its programs enable spying using devices and software from Apple, Microsoft, and Google Inc., among others. FinFisher documents at the conference were offered in English, Arabic and other languages.

A Google spokesman declined to comment on FinFisher specifically, adding that Google doesn't "tolerate abuse of our services."

An Apple spokeswoman said the company works "to find and fix any issues that could compromise [users'] systems." Apple on Monday introduced a security update to iTunes that could stop an attack similar to the type FinFisher claims to use, namely offering bogus software updates that install spyware.

Microsoft and Research In Motion Ltd., which makes BlackBerry devices, declined to comment.

The documents discovered in Egypt earlier this year indicated that Gamma's Egyptian reseller was offering FinFisher systems there for about $560,000. Gamma's lawyer told the Journal in April that it never sold the products to Egypt's government.

Gamma didn't respond to requests for comment for this article. Like most companies interviewed, Gamma declined to disclose its buyers, citing confidentiality agreements.

Privacy advocates say manufacturers should be more transparent about their activities. Eric King of the U.K. nonprofit Privacy International said "the complex network of supply chains and subsidiaries involved in this trade allows one after the other to continually pass the buck and abdicate responsibility." Mr. King routinely attends surveillance-industry events to gather information on the trade.

At the Washington and Dubai trade conferences this year, which are generally closed to the public, Journal reporters were prevented by organizers from attending sessions or entering the exhibition halls. February's Dubai conference took place at a time of widespread unrest elsewhere in the region. Nearly 900 people showed up, down slightly because of the regional turmoil, according to an organizer.

Presentations in Dubai included how to intercept wireless Internet traffic, monitor social networks and track cellphone users. "All of the companies involved in lawful intercept are trying to sell to the Middle East," said Simone Benvenuti, of RCS SpA, an Italian company that sells monitoring centers and other "interception solutions," mostly to governments. He declined to identify any clients in the region.

In interviews in Dubai, executives at several companies said they were aware their products could be abused by authoritarian regimes but they can't control their use after a sale. "This is the dilemma," said Klaus Mochalski, co-founder of ipoque, a German company specializing in deep-packet inspection, a powerful technology that analyzes Internet traffic. "It's like a knife. You can always cut vegetables but you can also kill your neighbor." He referred to it as "a constant moral, ethical dilemma we have."
—Paul Sonne contributed to this article.

Write to Jennifer Valentino DeVries at jennifer.valentino-devries@wsj.com, Julia Angwin at julia.angwin@wsj.com and Steve Stecklow at steve.stecklow@wsj.com

Read more: Document Trove Exposes Surveillance Methods - WSJ.com
Se han asustado con las revueltas de la gente ante las medidas de expolio neoliberal y la represión y el totalitarismo corporativo (fascismo) mediante las cuales están intentando imponerlas y quieren aprobar una ley de censura de internet estilo "Gran Cortafuegos Chino" a nivel mundial con una ley llamada S.O.P.A. (la excusa es luchar contra la mal llamada "piratería" pero servirá para ejercer la censura sobre páginas web de forma indiscriminada)...

¿Qué es SOPA? Infográfico para 'dummies'

 
Última edición:

tae

Madmaxista
Desde
14 May 2010
Mensajes
1.655
Reputación
4.542
Microsoft crea un «Gran Hermano» para empresas con tecnología Kinect
En el caso de que algún trabajador tenga un comportamiento fuera de las normas, alerta al departamento de recursos humanos

Microsoft ha solicitado en Estados Unidos la patente para un sistema que controla el comportamiento de los empleados en sus ordenadores, llamadas telefónicas y conducta gestual. Para ello, emplea la tecnología del popular sensor Kinect. En el caso de que algún trabajador tenga un comportamiento fuera de las normas, alerta al departamento de recursos humanos.

En 1984, la popular antiutopía imaginada por George Orwell, el «Gran Hermano» se encargaba de vigilar para el Partido a todos los ciudadanos a través de una telepantalla. Se trataba de un dispositivo de entrada y salida que recogía información, además de funcionar como televisor. De esta forma, era capaz de actuar si alguien sacaba los pies del tiesto.

Parece que dicha idea será llevada a la oficina gracias a la tecnología de Kinect y una patente en trámite de Microsoft. «Los comportamientos de la organización pueden ser monitorizados, analizados e influenciados por un sistema de comunicación multi-modal», según muestra la solicitud de la patente presentada en la US Patent & Trademark Office, la oficina de patentes y marcas de los Estados Unidos.

Por tanto, al adoptar esta tecnología, las conductas podrían ser controladas al milímetro y proporcionar información de comportamiento a nivel individual y de organización, con el objetivo de influir de forma más efectiva en la conducta dentro de la oficina.

Algunos de los datos facilitados gracias a este nuevo sistema serían el tiempo dedicado al correo, a navegar por Internet o a los procesadores de texto. El análisis de estos datos resulta bastante comprensible dentro de una empresa. Sin embargo, otros comportamientos que recoge el sistema podrían ser excesivos, como las conversaciones que se producen dentro de la oficina, la gestualidad, así como el uso de la ropa para una reunión de negocios.

Microsoft asegura en la patente que este sistema, que utiliza la tecnología de Kinect, es todo parabienes. De esta forma, el gigante de Redmond dice que con él los empleados pueden confiar más en sí mismos, mostrarse más felices y seguir en la línea con lo que el departamento de recursos humanos considera como buenas prácticas.

Lo que es seguro es que el sistema planteado por Microsoft facilitaría el trabajo para el departamento de recursos humanos a la hora de realizar la evaluación de los empleados de manera «más sencilla y rápida».

Mientras, los trabajadores recibirían un correo electrónico con los resultados, para así tener un margen de mejora y mostrar sus aspiraciones, en el caso de tenerlas. Así, uno podría presentar una actitud diferente en las semanas antes de la evaluación y no corresponderse con las conductas habituales que mantiene en su oficina por ejemplo por una llamada de vídeo a las seis de la mañana.

Microsoft crea un «Gran Hermano» para empresas con tecnología Kinect - ABC.es
 

GeneralTaylor

Madmaxista
Desde
4 Ago 2010
Mensajes
3.425
Reputación
4.185
No hay mejor método de control de la población que el que describían en 1984.

Dios no quiera que lleguemos nunca a eso, preferiría estar muerto.
 

NosTrasladamus

Madmaxista
Desde
19 Abr 2007
Mensajes
6.803
Reputación
12.527
Carrier IQ: Software espía en todos los teléfonos móviles (ó por qué están promoviendo y poniendo al alcance de todo el mundo los "smartphones"): :8::mad:

Desarrollador de 25 años muestra el software espía instalado en Android, blackberry, nokia, htc, samsung...


Trevor Eckhart denunció la semana pasada que en ciertos dispositivos Android, BlackBerry, Nokia, HTC y otros, se activa el software CarrierIQ (tipo rootkit) sin el consentimiento de los usuarios para la monitorización de todo tipo de información: login, teclas pulsadas, ubicación, programas instalados, búsquedas encriptadas,... Carrier IQ quiso que Eckhart se retractase y lo amenazó con acciones legales y demandas multimillonarias... Su disculpa: un video donde muestra cómo funciona el software espía que puede afectar a millones de móviles.
Los de Carrier IQ quisieron demandarle y Eckhart recurrió al consejo legal de la Electronic Frontier Foundation (EFF) y se echaron atrás (supongo que no les conviene "remover esa hez") el software graba cada pulsación de teclado, cada mensaje de texto, cada búsqueda que se hace en google (incluso si es bajo http cifrado, https), visitas de páginas web, etc, asociándola al número de teléfono, hora y posición geográfica y manda esa información a los servidores de Carrier IQ sin el consentimiento ni conocimiento del usuario. Además no se puede desactivar. Y la transmisión de la información se hace tanto si se está conectando por 3G ó WiFi

Researcher’s Video Shows Secret Software on Millions of Phones Logging Everything | Threat Level | Wired.com
Researcher’s Video Shows Secret Software on Millions of Phones Logging Everything

<iframe width="420" height="315" src="http://www.youtube.com/embed/T17XQI_AYNo" frameborder="0" allowfullscreen></iframe>

The Android developer who raised the ire of a mobile-phone monitoring company last week is on the attack again, producing a video of how the Carrier IQ software secretly installed on millions of mobile phones reports most everything a user does on a phone.

Though the software is installed on most modern Android, BlackBerry and Nokia phones, Carrier IQ was virtually unknown until 25-year-old Trevor Eckhart of Connecticut analyzed its workings, revealing that the software secretly chronicles a user’s phone experience — ostensibly so carriers and phone manufacturers can do quality control.

But now he’s released a video actually showing the logging of text messages, encrypted web searches and, well, you name it.

Eckhart labeled the software a “rootkit,” and the Mountain View, California-based software maker threatened him with legal action and huge money damages. The Electronic Frontier Foundation came to his side last week, and the company backed off on its threats. The company told Wired.com last week that Carrier IQ’s wares are for “gathering information off the handset to understand the mobile-user experience, where phone calls are dropped, where signal quality is poor, why applications crash and battery life.”

The company denies its software logs keystrokes. Eckhart’s 17-minute video clearly undercuts that claim.

In a Thanksgiving post, we mentioned this software as one of nine reasons to wear a tinfoil hat.

The video shows the software logging Eckhart’s online search of “hello world.” That’s despite Eckhart using the HTTPS version of Google which is supposed to hide searches from those who would want to spy by intercepting the traffic between a user and Google.

Cringe as the video shows the software logging each number as Eckhart fingers the dialer.

“Every button you press in the dialer before you call,” he says on the video, “it already gets sent off to the IQ application.”

From there, the data — including the content of text messages — is sent to Carrier IQ’s servers, in secret.

By the way, it cannot be turned off without rooting the phone and replacing the operating system. And even if you stop paying for wireless service from your carrier and decide to just use Wi-Fi, your device still reports to Carrier IQ.

It’s not even clear what privacy policy covers this. Is it Carrier IQ’s, your carrier’s or your phone manufacturer’s? And, perhaps, most important, is sending your communications to Carrier IQ a violation of the federal government’s ban on wiretapping?

And even more obvious, Eckhart wonders why aren’t mobile-phone customers informed of this rootkit and given a way to opt out?
 

1929

Madmaxista
Desde
3 Feb 2009
Mensajes
791
Reputación
989
Prison Planet.com » ‘Indefinite Detention’ Bill Passes Senate 93-7

The Doors - The End (Apocalypse Now Remix) - YouTube

El Senado la aprueba 93-7 la ley sobre la "detención indefinida"

Estadounidenses han sido completamente despojados de todos sus derechos bajo la Sección 1031
Paul Joseph Watson

Prisión Planet.com
Viernes, 2 de diciembre 2011

El Senado ayer por la noche convertio en ley el poder de los militares de EE.UU. para detener a un ciudadano estadounidense por tiempo indeterminado sin cargos, juicio y sin ningún control en absoluto con el paso del S. 1867, la Ley de Autorización de Defensa Nacional.

Una enmienda que intentaba bloquearla fue rechazada y la ley final fue aprobada 93-7.
Otra modificación introducida por el presidente del Comité de Inteligencia del Senado Dianne Feinstein intentó introducir una enmienda que prohibiera hacerlo en suelo estadounidense fue rechazado debido a que se queria evitar que "los militares deambularan nuestras calles en busca de sospechosos de terrorismo", también fracasó, a pesar de que Feinstein votara a favor de la ley de igual manera.
Feinstein fue capaz de incluir una enmienda en gran parte simbólica la cual afirma que "nada en el proyecto de ley modifica la legislación vigente relativa a la detención de los EE.UU. Los ciudadanos y los extranjeros legales", pero esta medida no tiene sentido de acuerdo con el congresista republicano Justin Amash, un feroz crítico del proyecto de ley .
"Algunos han afirmado que sueño. Enmienda de Feinstein, S Amdt 1456, protege los derechos de los ciudadanos estadounidenses y Conserva el proceso constitucional. Por desgracia, no lo hace. Esto no es más que palaberia inteligentemente redactada ,sin sentido ", escribió Amash Su página de Facebook.

Aunque la Casa Blanca ha amenazado con vetar la ley, el hecho de que abogados de la administración Obama afirmaran ayer su respaldo al asesinato patrocinados por el estado de los EE.UU. Los ciudadanos sugieren lo contrario. No votar por el proyecto de ley, o en otras palabras, la defensa del juramento de proteger la Constitución, se ha descrito una y otra vez como "un suicidio político".
"El proyecto de ley pone a la autoridad militar de detención es esteroides y lo peor de todo es que lo hace permanente, los ciudadanos estadounidenses y otros están en mayor medida en riesgo de ser encerrados por los militares sin cargos ni juicio", dijo Christopher Anders, abogado senior legislativa para la American Civil Liberties Union.
Como Spencer Ackerman destaca el proyecto de ley viola totalmente la enmienda sexta, ya que permite a los ciudadanos americanos indefinidamente ser encerrados, incluso en centros de detención extranjeros, sin ningún tipo de cargos o pruebas. Un estadounidense sólo tiene que ser declarado un terrorista y que pueden ser secuestrados en las calles y nunca volverlo .a ver.
"La detención de mandato del uso indefinido por parte de una detención militar en el campo del terrorismo no se limita a los extranjeros . Es confuso, ya que dos de las distintas secciones del proyecto de la ley aparece que se contradicen entre sí, pero a juicio de la Universidad de Texas, Robert 'Chesney - una autoridad imparcial sobre la detención militar - "EE.UU. Los ciudadanos están incluidos en la concesión de poder de detención ", escribe Ackerman.
*********************
 

clapham

Madmaxista
Desde
9 Ene 2011
Mensajes
4.120
Reputación
11.851
Lugar
Kampuchea
En el mundo viven 7 mil millones de personas .
De ellas casi 2500 millones entre India y China . Luego como 500 en Africa y 1000 millones en el mundo arabe .
En el I mundo no viven mas que mil millones .

Resumiendo :

El ser humano es una especie animal que se esta reproduciendo por encima de las posibilidades de su habitad natural
Suecia, Finlandia y Dinamarca . Por que la gente vive alli de PM. ? porque se reproducen menos que lo que su habitad natural soporta .
Y porque son mas listos .
En cambio, en Africa, en China y sobretodo en el mundo fiel a la religión del amor se reproducen como ratas .
Y como las fronteras estan cerradas pues pasa lo que pasa . Cada pais es una mini olla a presion .
Los arabes lo tienen dolido , muy dolido .
Que riqueza tienen los arabes ? NADA . Solo petroleo . Y el dinero de ese Petroleo a donde va ? A Londres , Suiza , a Nueva York .
El ganado fiel a la religión del amor no tiene mas que turbantes y camellos y claro...su poblacion va en aumento .
Cuando el punto de equilibrio se rompa empezara el canivalismo .
Trankilos , que aun falta mucho ...( o no )
 

1929

Madmaxista
Desde
3 Feb 2009
Mensajes
791
Reputación
989
TSA screenings aren't just for airports anymore - latimes.com

TSA screenings aren't just for airports anymore

Roving security teams increasingly visit train stations, subways and other mass transit sites to deter terrorism. Critics say it's largely political theater.


A Transportation Security Administration behavior-detection officer patrols a train station in Charlotte, N.C. (Brian Bennett, Los Angeles Times / December 11, 2011)
ALSO

N.Y. lawmakers ask TSA for passenger advocates at airports

TSA to expand faster security check program

TSA's airport body scanners still raising health concerns


By Brian Bennett, Washington Bureau
December 20, 2011, 5:03 p.m.
Reporting from Charlotte, N.C.—

Rick Vetter was rushing to board the Amtrak train in Charlotte, N.C., on a recent Sunday afternoon when a canine officer suddenly blocked the way.

Three federal air marshals in bulletproof vests and two officers trained to spot suspicious behavior watched closely as Seiko, a German shepherd, nosed Vetter's trousers for chemical traces of a bomb. Radiation detectors carried by the marshals scanned the 57-year-old lawyer for concealed nuclear materials.

When Seiko indicated a scent, his handler, Julian Swaringen, asked Vetter whether he had pets at home in Garner, N.C. Two mutts, Vetter replied. "You can go ahead," Swaringen said.

The Transportation Security Administration isn't just in airports anymore. TSA teams are increasingly conducting searches and screenings at train stations, subways, ferry terminals and other mass transit locations around the country.

"We are not the Airport Security Administration," said Ray Dineen, the air marshal in charge of the TSA office in Charlotte. "We take that transportation part seriously."

The TSA's 25 "viper" teams — for Visible Intermodal Prevention and Response — have run more than 9,300 unannounced checkpoints and other search operations in the last year. Department of Homeland Security officials have asked Congress for funding to add 12 more teams next year.

According to budget documents, the department spent $110 million in fiscal 2011 for "surface transportation security," including the TSA's viper program, and is asking for an additional $24 million next year. That compares with more than $5 billion for aviation security.

TSA officials say they have no proof that the roving viper teams have foiled any terrorist plots or thwarted any major threat to public safety. But they argue that the random nature of the searches and the presence of armed officers serve as a deterrent and bolster public confidence.

"We have to keep them [terrorists] on edge," said Frank Cilluffo, director of the Homeland Security Policy Institute at George Washington University in Washington. "We're not going to have a permanent presence everywhere."

U.S. officials note that digital files recovered from Osama bin Laden's compound in Pakistan after he was killed by U.S. Navy SEALs in May included evidence that the Al Qaeda leader had considered an attack on U.S. railways in February 2010. Over the last decade, deadly bombings have hit subways or trains in Moscow; Mumbai, India; Madrid; and London.

But critics say that without a clear threat, the TSA checkpoints are merely political theater. Privacy advocates worry that the agency is stretching legal limits on the government's right to search U.S. citizens without probable cause — and with no proof that the scattershot checkpoints help prevent attacks.

"It's a great way to make the public think you are doing something," said Fred H. Cate, a professor at the Indiana University Maurer School of Law, who writes on privacy and security. "It's a little like saying, 'If we start throwing things up in the air, will they hit terrorists?' ''

Such criticism is nothing new to the TSA.

The agency came under fresh fire this month when three elderly women with medical devices complained that TSA agents had strip-searched them in separate incidents at John F. Kennedy International Airport. Lenore Zimmerman, 84, said she was ordered to pull down her pants after she refused to pass through a full body scanner because she was afraid the machine would interfere with her heart defibrillator.

TSA officials denied the women were strip-searched, but they announced plans to create a toll-free telephone number for passengers with medical conditions who require assistance in airport screening lines. TSA officials said they also are considering a proposal by Sen. Charles E. Schumer (D-N.Y.) to designate a passengers advocate at every airport.

The TSA's viper program hasn't drawn that kind of attention, although it is increasingly active.

In Tennessee in October, a viper team used radiation monitors and explosive-trace detectors to help state police inspect trucks at highway weigh stations throughout the state. Last month in Orlando, Fla., a team set up metal detectors at a Greyhound bus station and tested passengers' bags for explosive residue.

In the Carolinas this year, TSA teams have checked people at the gangplanks of cruise ships, the entrance to NASCAR races, and at ferry terminals taking tourists to the Outer Banks.

At the Charlotte train station on Dec. 11, Seiko, the bomb-sniffing dog, snuffled down a line of about 100 passengers waiting to board an eastbound train. Many were heading home after watching the Charlotte Panthers NFL team lose to the Atlanta Falcons after holding a 16-point lead.

No one seemed especially perturbed by the TSA team.

"It's probably overkill," said Karen Stone, 26, after a behavior-detection officer asked her about the Panthers game and her trip home to Raleigh.

"It's cool," said Marcus Baldwin, 21, who was heading home to Mebane, near Burlington, where he waits tables to help pay for computer technology classes. "They're doing what our tax money is paying them to do."

"I'm mostly curious," said Barbara Spencer, 75, who was heading home to Chapel Hill after watching her grandson perform in a Christmas play. She asked the officers whether a terrorist threat had required the extra security. No, they replied.

Vetter, the lawyer, had attended the game with his son, Noah. They jogged for the train after Seiko had finished his sniff, but Vetter had bigger worries on his mind. "The Panthers blew it," he said.
 

Fenol

Madmaxista
Desde
20 Oct 2011
Mensajes
153
Reputación
207
En España la medida de control poblacional más peligrosa es el proceso de negrificación judaizante que llevan a cabo los lacayos del Grupo PRISA entre los niños y la juventud más indefensa: Los 40 Principales, Máxima FM y demás basura mainstream.

Y La Sexta y derivados.
 

mamendurrio

Madmaxista
Desde
19 Jun 2013
Mensajes
2.530
Reputación
2.238
Lugar
Lugar de tránsito hacia lo próximo.
- El oro también se tiene que declarar a hacienda.


El control al que se esta sometiendo a la sociedad empieza a hacerse un poquito insufrible, más que nada porque empiezan a implantarse con excusas de seguridad etc, autoatentados o vaya usted a saber, huelgas de controladores, estados de alarma, coincidiendo con la final del mundial o las semifinales o los cuartos.


Tanto control debe llevar a algún lado. ¿Tanto miedo tienen las élites de los pobres plebeyos?.
El control se inició con el comienzo de la "civilización".
Fué a partir de ese momento en que la mayoría de los ciudadanos fueron sometidos a pagar por existir y a esclavizarse en un trabajo para poder comer y vivir.
Antes de eso, durante 2 millones de años no era así. Pero nos metieron este cancer, que de paso se está cargando el planeta, como progreso, aunque al final, salta a la vista, es sólo una aberración perfilada para permitir que unos pocos puedan vivir de los demás. A los que hay que controlar por todos los medios (adictos al consumo, etc.)
 

corocota2

Cuñado nija
Desde
15 May 2014
Mensajes
509
Reputación
241
Yo creo que esto es segun la legalidad que haya.

En USA habia y usaban la Common Law, que es el tipo de leyes de la Constitucion.
Y lo que regula las instituciones en general es la Ley Civil, o privada.

El estado US en general un estado es una empresa privada, o corporacion, pero en el caso de los US es una corporacion registrada en Delawere, y fue comprada en el anno 1933, despues de su bancarrota por la FED.


En realidad al igual que en todas partas hay 2 tipos de leyes:

Leyes publica, o la ley natural, ley de la tierra, common law, o Derecho Natural (principios del derecho y todos los arts de la Constitucion donde se pone: Reconoce),
aqui el ejemplo:

Common Law Community Training Manual | Welcome to ITCCS.ORG and The International Tribunal into Crimes of Church and State

Y luego la ley del Almirantazgo, que da codigos y numeros a todo.
La ley del Almirantazgo es aquella que se usa dentro de los estados...es una ley privada, e intenta confundir con la dualidadÖ Ley=para todos (publica)=justa.

La constitucion viene de Constituire, creo que latin y era cuando se constituian empresas maritimas. Este concepto se adapto al Derecho Civil.

Corporatio/Empresa/Cuerpo Legal/Persona Legal= son lo mismo, y la definicion de dichas palabras, son iguales, y por tanto es lo mismo su uso, simplemente cambia el nombre y su uso, pero se podrian usar en lo mismo:
Corporacion publica de aguas de valencia.
Empresa publica de aguas de valencia.
Cuerpo Legal (grupo de leyes o normas. p. ej de una empresa)... de la Empresa publia de aguas de valencia.
Persona Aguas de Valencia.

Luego con la Common Law, se puede juzgar a cualquiera, sin necesidad de la intervencion de abogados, jueces, y leyes privadas. Simplemente basandose en verdad y no en escritos bonitos pero falsos.

busquen por Jordan Maxxwell en youtube.
 

Lynx

Madmaxista
Desde
28 Dic 2013
Mensajes
7.454
Reputación
7.904
Multas por montar en tu coche a tres cuñados si usais el tweet.