What's inside the windowless AT&T/NSA spying hub in lower Manhattan?

026v9767-high-res-edit

The windowless, 550'-tall AT&T tower at 33 Thomas Street in lower Manhattan is the building referred to as TITANPOINTE in the NSA documents leaked by Edward Snowden, and was likely the staging point for the NSA's BLARNEY operation, which illegally spied upon communications to and from "International Monetary Fund, the World Bank, the Bank of Japan, the European Union, the United Nations, and at least 38 different countries, including U.S. allies such as Italy, Japan, Brazil, France, Germany, Greece, Mexico, and Cyprus." Read the rest

In 2000, the NSA hacked the Hague-based Organization for the Prohibition of Chemical Weapons

opcw-logo

A reader writes, "According to last week's Shadow Brokers leak, the NSA compromised a DNS server of the Hague-based Organization for the Prohibition of Chemical Weapons in September 2000, two years after the Iraq Liberation Act and Operation Desert Fox, but before the Bush election." Read the rest

Vintage photos show NORAD's construction and operation

norad-guide07
The legendary underground lair of North American Aerospace Defense Command (NORAD) was so secretive that few photos have been published. Russ Kick at Memory Hole was good enough to locate one of 27 libraries in the world with an obscure book titled NORAD Command Post: The City Inside Cheyenne Mountain. The photos he shared will make you want to watch Dr. Strangelove again. Read the rest

One week left! Apply for a Shuttleworth Fellowship

050-056c026d-1c66-4d42-9fae-a8

The Shuttleworth Fellowships hand millions directly to people starting out on a journey to radically transform the world to make it more open; this year, I'm Honourary Steward, meaning I'll help pick the grantees. Read the rest

Lawsuit: mayor's social media blocklists are public records

050-056c026d-1c66-4d42-9fae-a8

Miami Beach mayor Philip Levine has a history of blocking his critics on social media, including Grant Stern, who runs the Photography is Not a Crime group. Read the rest

ACLU asks court to reveal 23 secret surveillance laws

z8clk7bb

The ACLU and the Yale Law School Media Freedom Clinic have filed a motion demanding the release of 23 judgments from the Foreign Intelligence Surveillance Court, a secret, closed courtroom that evaluates surveillance requests from America's spy agencies. Read the rest

Wikileaks: Assange's internet access was cut off by Ecuador

julian_assange_in_ecuadorian_e

Following on their earlier statement that "Julian Assange's internet link has been intentionally severed by a state party," the Wikileaks organization has accused Ecuador of being that state party. Read the rest

Yahoo didn't install an NSA email scanner, it was a "buggy" NSA "rootkit"

national_security_agency_headq

Ex-Yahoo employees have spoken anonymously to Motherboard about the news that Yahoo had built an "email scanner" for a US security agency, likely the FBI or the NSA. These sources -- at least one of whom worked on the security team -- say that in actuality, the NSA or FBI had secretly installed a "rootkit" on Yahoo's mail servers and that this was discovered by the Yahoo security team (who had not been apprised of it), who, believing the company had been hacked, sounded the alarm, only to have the company executives tell them that the US government had installed the tool. Read the rest

Wells Fargo started demanding fraud of its employees in 1998; Illinois cuts Wells off from state business

050-056c026d-1c66-4d42-9fae-a8

Wells Fargo made a habit of firing employees who didn't make unrealistic sales targets, turning a blind eye to the fraud they had to commit in order to keep their jobs (and firing the whistleblowers who reported the fraud). Read the rest

Shadow Regulation: the secret laws that giant corporations cook up in back rooms

shadow

The winner-take-all economy has turned virtually every industry into a cartel (four record labels, two cable companies, two phone operating systems, etc) who operate without fear of competition regulation, allowing representatives of a few companies to gather in closed-door meetings to cook up operating agreements that end up having the force of law. Read the rest

2600 Magazine offers $10K for Trump's tax return

6757856139_a3988deaff_b

2600: The Hacker Quarterly -- a venerable and storied source of hacker mischief and wonder -- has publicly offered a bounty of $10,000 (payable in "dollars, bitcoin... or rubles") for the first look at Donald Trump's tax return. Read the rest

Ex-Wells employees who were fired for NOT committing fraud launch $2.6B lawsuit

050-056c026d-1c66-4d42-9fae-a8

When four named whistleblowers came forward to reveal that they'd been illegally fired from Wells Fargo for reporting that the company was experiencing widespread fraud, it was deja vu all over again: Wells also punished whistleblowers who sounded the alarm during the subprime crisis, and was thus so totally compromised that they needed a $36B taxpayer bailout. Read the rest

California will collect public records for all police use of force, using open source software

animation

There are a handful of states that keep records of police force, but they are incomplete records, and they're maintained on paper; contrast that with URSUS, California's new tool that collects every single use of force, storing it in open, transparent free software maintained by Bayes Impact, a nonprofit. Read the rest

Elizabeth Warren to FBI director: now that investigations are fair game, what about banksters?

050 056c026d-1c66-4d42-9fae-a8e96df290c5-1020x1190

When FBI Director James Comey released detailed notes on the Bureau's investigation into Hillary Clinton's email server, they broke with precedent, specifically, their refusal to release documents explaining why they totally failed to prosecute any of the bankers responsible for tanking the US economy in 2008 and destroying the lives of millions of Americans. Read the rest

Leaked: damning Scott Walker dark money docs that judge ordered destroyed

Kasten_check

Again and again, Wisconsin governor Scott Walker flouted election laws to raise millions from some of the richest executives and biggest corporations in America, illegally laundering the money through the nominally independent, nonprofit Wisconsin Club for Growth -- and now we have all the details, thanks to an enormous leak of documents that a Wisconsin judge ordered destroyed. Read the rest

The DoJ is using a boring procedure to secure the right to unleash malware on the internet

Screen-Shot-2016-06-21-at-4.48.28-PM

The upcoming Rule 41 modifications to US Criminal Justice procedure underway at the Department of Justice will let the FBI hack computers in secret, with impunity, using dangerous tools that are off-limits to independent scrutiny -- all without Congressional approval and all at a moment at which America needs its law-enforcement community to be strengthening the nation's computers, not hoarding and weaponizing defects that put us all at risk. Read the rest

Leaked Stingray manual shows how easy warrantless mass surveillance can be!

Screen-Shot-2016-09-12-at-10.16.46-AM-1000x591

The Intercept has got hold of a set of Harris's super-secretive manuals for their even-more-secret Stingray devices: fake cellular towers used to spy indiscriminately on whole populations by hacking their cellphones into giving up identifying information and more. Read the rest

More posts