Threats to Internet Freedoms (consolidation thread)

Moderators: Elvis, DrVolin, Jeff

Re: Threats to Internet Freedoms (consolidation thread)

Postby vanlose kid » Tue Jun 07, 2011 6:42 am

One in four US hackers 'is an FBI informer'

The FBI and US secret service have used the threat of prison to create an army of informers among online criminals

Ed Pilkington in New York
guardian.co.uk, Monday 6 June 2011 16.12 BST

The underground world of computer hackers has been so thoroughly infiltrated in the US by the FBI and secret service that it is now riddled with paranoia and mistrust, with an estimated one in four hackers secretly informing on their peers, a Guardian investigation has established.

Cyber policing units have had such success in forcing online criminals to co-operate with their investigations through the threat of long prison sentences that they have managed to create an army of informants deep inside the hacking community.

In some cases, popular illegal forums used by cyber criminals as marketplaces for stolen identities and credit card numbers have been run by hacker turncoats acting as FBI moles. In others, undercover FBI agents posing as "carders" – hackers specialising in ID theft – have themselves taken over the management of crime forums, using the intelligence gathered to put dozens of people behind bars.

So ubiquitous has the FBI informant network become that Eric Corley, who publishes the hacker quarterly, 2600, has estimated that 25% of hackers in the US may have been recruited by the federal authorities to be their eyes and ears. "Owing to the harsh penalties involved and the relative inexperience with the law that many hackers have, they are rather susceptible to intimidation," Corley told the Guardian.

"It makes for very tense relationships," said John Young, who runs Cryptome, a website depository for secret documents along the lines of WikiLeaks. "There are dozens and dozens of hackers who have been shopped by people they thought they trusted."

The best-known example of the phenomenon is Adrian Lamo, a convicted hacker who turned informant on Bradley Manning, who is suspected of passing secret documents to WikiLeaks. Manning had entered into a prolonged instant messaging conversation with Lamo, whom he trusted and asked for advice. Lamo repaid that trust by promptly handing over the 23-year-old intelligence specialist to the military authorities. Manning has now been in custody for more than a year.

For acting as he did, Lamo has earned himself the sobriquet of Judas and the "world's most hated hacker", though he has insisted that he acted out of concern for those he believed could be harmed or even killed by the WikiLeaks publication of thousands of US diplomatic cables.

"Obviously it's been much worse for him but it's certainly been no picnic for me," Lamo has said. "He followed his conscience, and I followed mine."

The latest challenge for the FBI in terms of domestic US breaches are the anarchistic co-operatives of "hacktivists" that have launched several high-profile cyber-attacks in recent months designed to make a statement. In the most recent case a group calling itself Lulz Security launched an audacious raid on the FBI's own linked organisation InfraGard. The raid, which was a blatant two fingers up at the agency, was said to have been a response to news that the Pentagon was poised to declare foreign cyber-attacks an act of war.

Lulz Security shares qualities with the hacktivist group Anonymous that has launched attacks against companies including Visa and MasterCard as a protest against their decision to block donations to WikiLeaks. While Lulz Security is so recent a phenomenon that the FBI has yet to get a handle on it, Anonymous is already under pressure from the agency. There were raids on 40 addresses in the US and five in the UK in January, and a grand jury has been hearing evidence against the group in California at the start of a possible federal prosecution.

Kevin Poulsen, senior editor at Wired magazine, believes the collective is classically vulnerable to infiltration and disruption. "We have already begun to see Anonymous members attack each other and out each other's IP addresses. That's the first step towards being susceptible to the FBI."

Barrett Brown, who has acted as a spokesman for the otherwise secretive Anonymous, says it is fully aware of the FBI's interest. "The FBI are always there. They are always watching, always in the chatrooms. You don't know who is an informant and who isn't, and to that extent you are vulnerable."

http://www.guardian.co.uk/technology/20 ... i-informer


*
"Teach them to think. Work against the government." – Wittgenstein.
User avatar
vanlose kid
 
Posts: 3182
Joined: Wed Oct 17, 2007 7:44 pm
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby §ê¢rꆧ » Sun Jun 12, 2011 8:05 am

§

Here's a strange one. I haven't looked into this guy's site or value of his information, but I thought it would be of some interest to those here...

§ § §

Updated: Feds Seize New Domain, Add To “Batshit” Conspiracy Theories by enigmax, published at TorrentFreak

During the last 24 hours Homeland Security seized another domain and put up the copyright infringement notice but now a quite unusual picture is forming. Allegedly an anti-vaccine blogger and claimed “batshit” conspiracy theorist with plenty of enemies had his server hacked and filled with illegal material. This appears to have resulted in his domain being seized for copyright infringement.

Over the past year we’ve grown used to US Immigration and Customs Enforcement seizing piracy and counterfeit product related domains. Yesterday, however, a domain was seized which didn’t appear to sell or offer anything other than information.

Lowellsfacts.com, was a domain operated by anti-vaccine and self-described “medical research” and “truth information” blogger Lowell Hubbs. Others who appear to know the guy much better than us describe him as a deranged “batshit” conspiracy theorist, but since we do file-sharing news here at TorrentFreak and not pharmaceuticals or psychiatric studies, others more knowledgeable than us can decide if that’s a reasonable assessment.

We’re interested in something else; if Lowellsfacts.com was not a site offering unauthorized files or peddling counterfeit products, why would the feds seize it and put up the all too familiar ‘copyright’ notice?

Well, according to Lowell Hubbs himself, he’s the victim of foul play.

“Apparently, as I was told; there are links or hidden links hacked into my site that go to illegal porn and as well likely music down loads or movies, or links to counterfeit something,” Hubbs explains.

“I don’t know what is in there personally, nor how they did it, and I don’t know yet all of what is going on; I am just getting beginning information, by someone who has looked into it and is more knowledgeable than I as to computer systems,” Hubbs adds.

In a later update, Hubbs announced that he had found the problem. He asserts that someone had indeed hacked into this website and put up 17 pages and 70gig of files. He insists, however, that none of this is down to him.

“How in the hell would I have acquired anything like that? For anyone to believe I am responsible for that, I can tell you – you are flatout-insane!” he exclaims.

“Anyone with any common sense looking at this picture, would know the chance of that is zero! Period. Nice try though, just one more attempt to falsely destroy me, and a huge one. There is nothing these people will stop at in attempting to do so. Too much truth.”

If the claims of Hubbs being a conspiracy theorist are true, then this seizure – whether warranted or otherwise – is a gift to his cause, whatever that might be. Whether or not it will be a gift to the big pharmaceutical companies he’s been bad-mouthing for sometime will remain to be seen.

Hubbs’ site is now back up at VacFacts.info and aside from questionable content and quite a lot of cut and pastes, it doesn’t look like a hub of wanton copyright infringement or counterfeiting to us, at least in its current form.

Admittedly there are a multitude of worrying claims about Hubbs on the web (which we aren’t in a position to verify) and he clearly has dozens of enemies and it is feasible that ICE had good reasons to shut him down. That said, Hubbs doesn’t appear to have been informed about why his domain was taken and he’s clearly not under arrest.

So why has ICE seized the domain and put up the copyright notice? If we had some due process, some proper hearings which allow the facts to come out into the open and disputed or confirmed, any claims of copyright infringement could be assessed. As usual the public is in the dark.

Conspiracy theories can be dangerous things, and the information vacuum along with this very strange domain seizure simply throws fuel on the fire.

Update: It seems that Lowell Hubbs has some other conspiracies to think about today. Ars managed to speak with ICE who denied the seizure.

“It’s hard to say definitely what happened here, but it sounds a lot like someone disgusted by Hubbs’ anti-vaccine activism and paranoia hacked into his site, perhaps uploaded some porn just for fun, then pointed the site’s DNS record toward the ICE takedown banner.”
User avatar
§ê¢rꆧ
 
Posts: 1197
Joined: Sun Sep 23, 2007 4:12 pm
Location: Region X
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby JackRiddler » Wed Jul 06, 2011 4:49 pm

Thanks seemslikeadream

Security Grifters Partner-Up on Sinister Cyber-Surveillance Project

by Tom Burghardt / July 5th, 2011

Last week, the White House released its National Strategy for Counterterrorism, a macabre document that places a premium on “public safety” over civil liberties and constitutional rights.

Indeed, “hope and change” huckster Barack Obama had the temerity to assert that the President “bears no greater responsibility than ensuring the safety and security of the American people.”

Pity that others, including CIA “black site” prisoners tortured to death to “keep us safe” (some 100 at last count) aren’t extended the same courtesy as The Washington Post reported last week.

As Secrecy News editor Steven Aftergood correctly points out, the claim that the President “has no greater responsibility than ‘protecting the American people’ is a paternalistic invention that is historically unfounded and potentially damaging to the political heritage of the nation.”

Aftergood avers, “the presidential oath of office that is prescribed by the U.S. Constitution (Art. II, sect. 1) makes it clear that the President’s supreme responsibility is to ‘…preserve, protect, and defend the Constitution of the United States.’ There is no mention of public safety. It is the constitutional order that the President is sworn to protect, even if doing so entails risks to the safety and security of the American people.”

But as our former republic slips ever-closer towards corporate dictatorship, Obama’s mendacious twaddle about “protecting the American people,” serves only to obscure, and reinforce, the inescapable fact that it’s a rigged game.

Rest assured, “what happens in Vegas,” Baghdad, Kabul or Manama–from driftnet spying to political-inspired witchhunts to illegal detention–won’t, and hasn’t, “stayed in Vegas.”

Cyber Here, Cyber There, Cyber-Surveillance Everywhere

Last month, researcher Barrett Brown and the OpMetalGear network lifted the lid on a new U.S. Government-sponsored cyber-surveillance project, Romas/COIN, now Odyssey, a multiyear, multimillion dollar enterprise currently run by defense and security giant Northrop Grumman.

With some $10.8 billion in revenue largely derived from contracts with the Defense Department, Northrop Grumman was No. 2 on the Washington Technology 2011 Top 100 List of Prime Federal Contractors.

“For at least two years,” Brown writes, “the U.S. has been conducting a secretive and immensely sophisticated campaign of mass surveillance and data mining against the Arab world, allowing the intelligence community to monitor the habits, conversations, and activity of millions of individuals at once.”

Information on this shadowy program was derived by scrutinizing hundreds of the more than 70,000 HBGary emails leaked onto the web by the cyber-guerrilla collective Anonymous.

Brown uncovered evidence that the “top contender to win the federal contract and thus take over the program is a team of about a dozen companies which were brought together in large part by Aaron Barr–the same disgraced CEO who resigned from his own firm earlier this year after he was discovered to have planned a full-scale information war against political activists at the behest of corporate clients.”

Readers will recall that Barr claimed he could exploit social media to gather information about WikiLeaks supporters in a bid to destroy that organization. Earlier this year, Barr told the Financial Times he had used scraping techniques and had infiltrated WikiLeaks supporter Anonymous, in part by using IRC, Facebook, Twitter and other social media sites.

According to emails subsequently released by Anonymous, it was revealed that the ultra rightist U.S. Chamber of Commerce had hired white shoe law firm Hunton & Williams, and that Hunton attorneys, upon recommendation of an unnamed U.S. Department of Justice official, solicited a set of private security contractors–HBGary, HBGary Federal, Palantir and Berico Technologies (collectively known as Team Themis)–and stitched-up a sabotage campaign against WikiLeaks, journalists, labor unions, progressive political groups and Chamber critics.

Amongst the firms who sought to grab the Romas/COIN/Odyssey contract from Northrop when it came up for a “recompete” was TASC, which describes itself as “a renowned provider of advanced systems engineering, integration and decision-support services across the intelligence, defense, homeland security and federal markets.”

According to Bloomberg BusinessWeek, TASC’s head of “Cybersecurity Initiatives,” Larry Strang, was formerly a Vice President with Northrop Grumman who led that firm’s Cybersecurity Group and served as Northrop’s NSA Account Manager. Prior to that, Strang, a retired Air Force Lt. Colonel, was Vice President for Operations at the spooky Science Applications International Corporation (SAIC).

Brown relates that emails between TASC executives Al Pisani, John Lovegrow and former HBGary Federal CEO Aaron Barr, provided details that they “were in talks with each other as well as Mantech executive Bob Frisbie on a ‘recompete’ pursuant to ‘counter intelligence’ operations that were already being conducted on behalf of the federal government by another firm, SAIC, with which they hoped to compete for contracts.”

In fact, HBGary Federal and TASC may have been cats-paws for defense giant ManTech International in the race to secure U.S. Government cyber-surveillance contracts. Clocking in at No. 22 on Washington Technology’s “2011 Top 100 list,” ManTech earned some $1.46 billion in 2010, largely derived from work in “systems engineering and integration, technology and software development, enterprise security architecture, intelligence operations support, critical infrastructure protection and computer forensics.” The firm’s major customers include the Defense Department, Department of Homeland Security, the Justice Department and the Defense Advanced Research Projects Agency (DARPA), the Pentagon’s geek squad that is busily working to develop software for their Cyber Insider Threat (CINDER) program.

Both HBGary Federal and parent company HBGary, a California-based security firm run by the husband-wife team, Greg Hoglund and Penny Leavy, had been key players for the design of malware, undetectable rootkits and other “full directory exfiltration tools over TCP/IP” for the Defense Department according to documents released by the secret-shredding web site Public Intelligence.

Additional published documents revealed that they and had done so in close collaboration with General Dynamics (Project C and Task Z), which had requested “multiple protocols to be scoped as viable options … for VoIP (Skype) protocol, BitTorrent protocol, video over HTTP (port 80), and HTTPS (port 443)” for unnamed secret state agencies.

According to Brown, it appears that Romas/COIN/Odyssey was also big on social media surveillance, especially when it came to “Foreign Mobile” and “Foreign Web” monitoring. Indeed, documents published by Public Intelligence (scooped-up by the HBGary-Anonymous hack) was a ManTech International-HBGary collaboration describing plans for Internet Based Reconnaissance Operations. The October 2010 presentation described plans that would hand “customers,” presumably state intelligence agencies but also, as revealed by Anonymous, corporate security entities and public relations firms, the means to perform “native language searching” combined with “non-attributable architecture” and a “small footprint” that can be “as widely or narrowly focused as needed.”

ManTech and HBGary promised to provide customers the ability to “Locate/Profile Internet ‘Points of Interest’” on “individuals, companies, ISPs” and “organizations,” and would do so through “detailed network mapping” that will “identify registered networks and registered domains”; “Graphical network representation based on Active Hosts”; “Operating system and network application identification”; “Identification of possible perimeter defenses” through “Technology Research, Intelligence Gap Fill, Counterintelligence Research” and “Customer Public Image Assessment.”

The presentation described the social media monitoring process as one that would “employ highly skilled network professionals (read, ex-spooks and former military intelligence operatives) who will use “Non-attributable Internet access, custom developed toolsets and techniques, Native Language and in-country techniques” that “utilize foreign language search engines, mapping tools” and “iterative researching methodologies” for searching “Websites, picture sites, mapping sites/programs”; “Blogs and social networking sites”; “Forums and Bulletin Boards”; “Network Information: Whois, Trace Route, NetTroll, DNS”; “Archived and cached websites.”

Clients who bought into the ManTech-HBGary “product” were promised “Rapid Non-attributable Open Source Research Results”; “Sourced Research Findings”; “Triage level Analysis”; “Vulnerability Assessment” and “Graphical Network and Social Diagramming” via data mining and extensive link analysis.

Undoubtedly, readers recall this is precisely what the National Security Agency has been doing since the 1990s, if not earlier, through their electronic communications intercept program Echelon, a multibillion Pentagon project that conducted corporate espionage for American multinational firms as researcher Nicky Hager revealed in his 1997 piece for CovertAction Quarterly.

Other firms included in Lovegrove’s email to Barr indicate that the new Romas/COIN/Odyssey “team” was to have included: “TASC (PMO [Project Management Operations], creative services); HBGary (Strategy, planning, PMO); Akamai (infrastructure); Archimedes Global (Specialized linguistics, strategy, planning); Acclaim Technical Services (specialized linguistics); Mission Essential Personnel (linguistic services); Cipher (strategy, planning operations); PointAbout (rapid mobile application development, list of strategic partners); Google (strategy, mobile application and platform development–long list of strategic partners); Apple (mobile and desktop platform, application assistance–long list of strategic partners). We are trying to schedule an interview with ATT plus some other small app developers.”

Recall that AT&T is the NSA’s prime telecommunications partner in that agency’s illegal driftnet surveillance program and has been the recipient of “retroactive immunity” under the despicable FISA Amendments Act, a law supported by then-Senator Barack Obama. Also recall that the giant tech firm Apple was recently mired in scandal over reports that their mobile phone platform had, without their owners’ knowledge or consent, speared geolocational data from the iPhone and then stored this information in an Apple-controlled data base accessible to law enforcement through various “lawful interception” schemes.

“Whatever the exact nature and scope of COIN,” Brown writes, “the firms that had been assembled for the purpose by Barr and TASC never got a chance to bid on the program’s recompete. In late September, Lovegrove noted to Barr and others that he’d spoken to the ‘CO [contracting officer] for COIN’.” The TASC executive told Barr that “the current procurement approach” was cancelled, citing “changed requirements.”

Apparently the Pentagon, or other unspecified secret state satrapy told the contestants that “an updated RFI [request for information]” will be issued soon. According to a later missive from Lovegrove to Barr, “COIN has been replaced by a procurement called Odyssey.” While it is still not entirely clear what Romas/COIN or the Odyssey program would do once deployed, Brown claims that “mobile phone software and applications constitute a major component of the program.”

And given Barr’s monomaniacal obsession with social media surveillance (that worked out well with Anonymous!) the presence of Alterian and SocialEyez on the procurement team may indicate that the secret state is alarmed by the prospect that the “Arab Spring” just might slip from proverbial “safe hands” and threaten Gulf dictatorships and Saudi Arabia with the frightening specter of democratic transformation.

Although the email from TASC executive Chris Clair to John Lovegrow names “Alterion” as a company to contact because of their their “SM2 tool,” in all likelihood this is a typo given the fact that it is the UK-based firm “Alterian” that has developed said SM2 tool, described on their web site as a “business intelligence product that provides visibility into social media and lets you tap into a new kind of data resource; your customers’ direct thoughts and opinions.”

This would be a highly-profitable partnership indeed for enterprising intelligence agencies and opaque corporate partners intent on monitoring political developments across the Middle East.

In fact, a 2010 press release, announced that Alterian had forged a partnership with the Dubai-based firm SocialEyez for “the world’s first social media monitoring service designed for the Arab market.”

We’re informed that SocialEyez, a division of Media Watch Middle East, described as “the leading media monitoring service in the Middle East,” offers services in “television, radio, social media, online news and internet monitoring across most sectors including commercial, government and PR.”

That Barr and his partners were interested in bringing these firms to the Romas/COIN table is not surprising considering that the Alterian/SocialEyez deal promises “to develop and launch an Arabic language interface for Alterian SM2 to make it the world’s first Arab language social media monitoring tool.” Inquiring minds can’t help but wonder which three-lettered American agencies alongside a stable of “corporate and government clients, including leading Blue Chips” might be interested in “maximising their social media monitoring investment”?

Pentagon “Manhunters” in the House

On an even more sinister note, the inclusion of Archimedes Global on the Romas/COIN team should set alarm bells ringing.

Archimedes is a small, privately-held niche security firm headquartered in Tampa, Florida where, surprise, surprise, U.S. Central Command (USCENTCOM) has it’s main headquarters at the MacDill Air Force Base. On their web site, Archimedes describes itself as “a diversified technology company providing energy and information solutions to government and businesses worldwide.” The firm claims that it “delivers solutions” to its clients by “combining deep domain expertise, multi-disciplinary education and training, and technology-enabled innovations.”

While short on information regarding what it actually does, evidence suggests that the firm is chock-a-block with former spooks and Special Forces operators, skilled in the black arts of counterintelligence, various information operations, subversion and, let’s be frank, tasks euphemistically referred to in the grisly trade as “wet work.”

According to The Washington Post, the firm was established in 2005. However, although the Post claims in their “Top Secret America” series that the number of employees and revenue is “unknown,” Dana Priest and William M. Arkin note that Archimedes have five government clients and are have speared contracts relating to “Ground forces operations,” “Human intelligence,” Psychological operations,” and “Specialized military operations.”

Brown relates that Archimedes was slated to provide “Specialized linguistics, strategy, planning” for the proposed Romas/COIN/Odyssey project for an unknown U.S. Government entity.

Based on available evidence however, one can speculate that Archimedes may have been chosen as part of the HBGary Federal/TASC team precisely because of their previous work as private contractors in human intelligence (HUMINT), running spies and infiltrating assets into organizations of interest to the CIA and Joint Special Operations Command (JSOC) throughout the Middle East, Central- and South Asia.

In 2009, Antifascist Calling revealed that one of Archimedes Global’s senior directors, retired Air Force Lt. Colonel George A. Crawford, published a chilling monograph, Manhunting: Counter-Network Organizing for Irregular Warfare, for the highly-influential Joint Special Operations University (JSOU) at MacDill Air Force Base in Tampa.

JSOU is the “educational component” of United States Special Operations Command (USSOCOM). With a mission that touts its ability to “plan and synchronize operations” against America’s geopolitical adversaries and rivals, JSOU’s Strategic Studies Department “advances SOF strategic influence by its interaction in academic, interagency, and United States military communities.”

Accordingly, Archimedes “information and risk” brief claim they can solve “the most difficult communication and risk problems by seeing over the horizon with a blend of art and science.” And with focus areas that include “strategic communications, media analysis and support, crisis communications, and risk and vulnerability assessment and mitigation,” it doesn’t take a rocket scientist to infer that those well-schooled in the dark art of information operations (INFOOPS) would find a friendly home inside the Romas/COIN contract team.

With some 25-years experience “as a foreign area officer specializing in Eastern Europe and Central Asia,” including a stint “as acting Air and Defense Attaché to Kyrgyzstan,” Crawford brings an interesting skill-set to the table. Crawford writes:

Manhunting–the deliberate concentration of national power to find, influence, capture, or when necessary kill an individual to disrupt a human network–has emerged as a key component of operations to counter irregular warfare adversaries in lieu of traditional state-on-state conflict measures. It has arguably become a primary area of emphasis in countering terrorist and insurgent opponents. (George A. Crawford, Manhunting: Counter-Network Organization for Irregular Warfare, JSOU Report 09-7, The JSOU Press, Hurlburt Field, Florida, September 2009, p. 1)

Acknowledged manhunting masters in their own right, the Israeli settler-colonial security apparat have perfected the art of “targeted killing,” when they aren’t dropping banned munitions such as white phosphorus on unarmed, defenseless civilian populations or attacking civilian vessels on the high seas.

Like their Israeli counterparts who come highly recommended as models of restraint, an American manhunting agency will employ similarly subtle, though no less lethal, tactics. Crawford informs us:

When compared with conventional force-on-force warfare, manhunting fundamentally alters the ratio between warfare’s respective firepower, maneuver, and psychological elements. Firepower becomes less significant in terms of mass, while the precision and discretion with which firepower is employed takes on tremendous significance, especially during influence operations. Why drop a bomb when effects operations or a knife might do? (Crawford, op. cit., p. 11, emphasis added)

Alongside actual shooters, “sensitive site exploitation (SSE) teams are critical operational components for Pentagon “manhunters.” We’re told that SSE teams will be assembled and able to respond on-call “in the event of a raid on a suspect site or to conduct independent ‘break-in and search’ operations without leaving evidence of their intrusion.” Such teams must possess “individual skills” such as “physical forensics, computer or electronic exploitation, document exploitation, investigative techniques, biometric collection, interrogation/debriefing and related skills.”

As if to drive home the point that the target of such sinister operations are the American people and world public opinion, Crawford, ever the consummate INFOOPS warrior, views “strategic information operations” as key to this murderous enterprise. Indeed, they “must be delicately woven into planned kinetic operations to increase the probability that a given operation or campaign will achieve its intended effect.”

Personnel skilled at conducting strategic information operations–to include psychological operations, public information, deception, media and computer network operations, and related activities–are important for victory. Despite robust DoD and Intelligence Community capabilities in this area, efforts to establish organizations that focus information operations have not been viewed as a positive development by the public or the media, who perceive government-sponsored information efforts with suspicion. Consequently, these efforts must take place away from public eyes. Strategic information operations may also require the establishment of regional or local offices to ensure dissemination of influence packages and assess their impact. Thus manhunting influence may call for parallel or independent structures at all levels…” (Crawford, op. cit., pp. 27-28, emphasis added)

While we do not as yet have a complete picture of the Romas/COIN/Odyssey project, some preliminary conclusions can be drawn.

“Altogether, then,” Brown writes, “a successful bid for the relevant contract was seen to require the combined capabilities of perhaps a dozen firms–capabilities whereby millions of conversations can be monitored and automatically analyzed, whereby a wide range of personal data can be obtained and stored in secret, and whereby some unknown degree of information can be released to a given population through a variety of means and without any hint that the actual source is U.S. military intelligence.”

Although Brown’s initial research concluded that Romas/COIN/Odyssey will operate “in conjunction with other surveillance and propaganda assets controlled by the U.S. and its partners,” with a firm like Archimedes on-board, once information has been assembled on individuals described in other contexts as “radicals” or “key extremists,” will they subsequently be made to “disappear” into the hands of “friendly” security services such as those of strategic U.S. partners Bahrain and Saudi Arabia?

We’re reminded that “Barr was also at the center of a series of conspiracies by which his own company and two others hired out their collective capabilities for use by corporations that sought to destroy their political enemies by clandestine and dishonest means.”

Indeed, “none of the companies involved,” Brown writes, have been investigated; a proposed Congressional inquiry was denied by the committee chair, noting that it was the Justice Department’s decision as to whether to investigate, even though it was the Justice Department itself that made the initial introductions. Those in the intelligence contracting industry who believe themselves above the law are entirely correct.”

Brown warns that “a far greater danger is posed by the practice of arming small and unaccountable groups of state and military personnel with a set of tools by which to achieve better and better ‘situational awareness’ on entire populations” while simultaneously manipulating “the information flow in such a way as to deceive those same populations.”

Beginning, it should be noted, right here at home…
[/quote]
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby §ê¢rꆧ » Sun Aug 07, 2011 8:15 pm


Aug. 4 [2011] (Bloomberg) -- Wendy Seltzer, Fellow at Princeton University's Center for Information Technology Policy, talks with Bloomberg Law's Lee Pacchia about a new approach between Internet Service Providers and content providers to curb online copyright infringement.
User avatar
§ê¢rꆧ
 
Posts: 1197
Joined: Sun Sep 23, 2007 4:12 pm
Location: Region X
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby JackRiddler » Fri Aug 26, 2011 5:21 pm

An old thread I missed in the roundup above, now updated:

Civilian spies on the internet; police state 2.0; Jihad Jane
http://rigorousintuition.ca/board2/view ... =8&t=27464
Started March 11, 2011
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby JackRiddler » Sun Aug 28, 2011 6:50 pm


http://www.salon.com/opinion/greenwald/ ... rveillance

Friday, Aug 19, 2011 07:20 ET

A prime aim of the growing Surveillance State

By Glenn Greenwald

Several weeks ago, a New York Times article by Noam Cohen examined the case of Aaron Swartz, the 24-year-old copyright reform advocate who was arrested in July, after allegedly downloading academic articles that had been placed behind a paywall, thus making them available for free online. Swartz is now being prosecuted by the DOJ with obscene over-zealousness. Despite not profiting (or trying to profit) in any way -- the motive was making academic discourse available to the world for free -- he's charged with "felony counts including wire fraud, computer fraud, unlawfully obtaining information from a protected computer and recklessly damaging a protected computer" and "could face up to 35 years in prison and $1 million in fines."

The NYT article explored similarities between Swartz and Bradley Manning, another young activist being severely punished for alleged acts of freeing information without any profit to himself; the article quoted me as follows:


For Glenn Greenwald . . . it also makes sense that a young generation would view the Internet in political terms.

"How information is able to be distributed over the Internet, it is the free speech battle of our times," he said in interview. "It can seem a technical, legalistic movement if you don't think about it that way."

He said that point was illustrated by his experience with WikiLeaks -- and by how the Internet became a battleground as the site was attacked by hackers and as large companies tried to isolate WikiLeaks. Looking at that experience and the Swartz case, he said, "clearly the government knows that this is the prime battle, the front line for political control."


This is the point I emphasize whenever I talk about why topics such as the sprawling Surveillance State and the attempted criminalization of WikiLeaks and whistleblowing are so vital. The free flow of information and communications enabled by new technologies -- as protest movements in the Middle East and a wave of serious leaks over the last year have demonstrated -- is a uniquely potent weapon in challenging entrenched government power and other powerful factions. And that is precisely why those in power -- those devoted to preservation of the prevailing social order -- are so increasingly fixated on seizing control of it and snuffing out its potential for subverting that order: they are well aware of, and are petrified by, its power, and want to ensure that the ability to dictate how it is used, and toward what ends, remains exclusively in their hands.

The Western World has long righteously denounced China for its attempts to control the Internet as a means of maintaining social order. It even more vocally condemned Arab regimes such as the one in Egypt for shutting down Internet and cell phone service in order to disrupts protests.

But, in the wake of recent riots in London and throughout Britain -- a serious upheaval to be sure, but far less disruptive than what happened in the Middle East this year, or what happens routinely in China -- the instant reaction of Prime Minister David Cameron was a scheme to force telecoms to allow his government the power to limit the use of Internet and social networking sites. Earlier this week, when San Francisco residents gathered in the BART subway system to protest the shooting by BART police of a 45-year-old man, city officials shut down underground cell phone service entirely for hours; that, in turn, led to hacking reprisals against BART by the hacker collective known as "Anonymous." As the San-Fransisco-based Electronic Frontier Foundation put it on its website: "BART officials are showing themselves to be of a mind with the former president of Egypt, Hosni Mubarak." Those efforts in Britain and San Fransisco are obviously not yet on the same scale as those in other places, but it illustrates how authorities react to social disorder: with an instinctive desire to control communication technologies and the flow of information.

The emergence of entities like WikiLeaks (which single-handedly jeopardizes pervasive government and corporate secrecy) and Anonymous (which has repeatedly targeted entities that seek to impede the free flow of communication and information) underscores the way in which this conflict is a genuine "war." The U.S. Government's efforts to destroy WikiLeaks and harass its supporters have been well-documented. Meanwhile, the U.S. seeks to expand its own power to launch devastating cyber attacks: there is ample evidence suggesting its involvement in the Stuxnet attacks on Iran, as well as reason to believe that some government agency was responsible for the sophisticated cyber-attack that knocked WikiLeaks off U.S. servers (attacks the U.S. Government tellingly never condemned, let alone investigated). Yet simultaneously, the DOJ and other Western law enforcement agencies have pursued Anonymous with extreme vigor. That is the definition of a war over Internet control: the government wants the unilateral power to cyber-attack and shut down those who pose a threat ot it, while destroying those who resists those efforts.

There have literally been so many efforts over the past several years to heighten surveillance powers and other means of control over the Internet that it's very difficult to chronicle them all. In August of last year, the UAE and Saudi Arabian governments triggered much outrage when they barred the use of Blackberries on the ground that they could not effectively monitor their communications (needless to say, the U.S. condemned the Saudi and UAE schemes). But a month later, the Obama administration unveilled a plan to "require all services that enable communications -- including encrypted e-mail transmitters like BlackBerry, social networking Web sites like Facebook and software that allows direct 'peer to peer' messaging like Skype" to enable "back door" government access.

This year, the Obama administration began demanding greater power to obtain Internet records without a court order. Meanwhile, the Chairwoman of the DNC, Rep. Debbie Wasserman-Schultz, is sponsoring a truly pernicious bill that would force Internet providers "to keep logs of their customers’ activities for one year." And a whole slew of sleazy, revolving-door functionaries from the public/private consortium that is the National Security State -- epitomized by former Bush DNI and current Booz Allen executive Adm. Michael McConnell -- are expoiting fear-mongering hysteria over cyber-attacks to justify incredibly dangerous (and profitable) Internet controls. As The Washington Post's Dana Priest and William Arkin reported in their "Top Secret America" series last year: "Every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications." That is a sprawling, out-of-control Surveillance State.

One must add to all of these developments the growing attempts to stifle meaningful dissent of any kind -- especially civil disobedience -- through intimidation and excessive punishment. The cruel and degrading treatment of Bradley Manning, the attempted criminalization of WikiLeaks, the unprecedentedly harsh war on whistleblowers: these are all grounded in the recognition that the technology itself cannot be stopped, but making horrific examples out of those who effectively oppose powerful factions can chill others from doing so. What I tried to convey in my NYT interview was that the common thread in the Swartz and Manning persecutions -- as well as similar cases such as the two-year prison term for non-violent climate change protester Tim DeChristopher, the FBI's ongoing investigation of pro-Palestinian peace activists, and even the vindictive harassment of White House/DADT protester Dan Choi -- is the growing efforts to punish and criminalize non-violent protests, as a means of creating a climate of fear that will deter similar dissent.

It is not hard to understand why the fears driving these actions are particularly acute now. The last year has seen an incredible amount of social upheaval, not just in the Arab world but increasingly in the West. The Guardian today documented the significant role which poverty and opportunity deprivation played in the British riots. Austerity misery -- coming soon to the U.S. -- has sparked serious upheavals in numerous Western nations. Even if one takes as pessimistic a view as possible of an apathetic, meek, complacent American populace, it's simply inevitable that some similar form of disorder is in the U.S.'s future as well. As but one example, just consider this extraordinary indicia of pervasive American discontent, from a Gallup finding yesterday (click on image to enlarge):

Image

The intensely angry "town hall" political protests from last August, though wildly misdirected at health care reform, gave a glimpse of the brewing societal anger and economic anxiety; even Tea Party politicians are now being angrily harangued by furious citizens over growing joblessness and loss of opportunity as Wall Street prospers and Endless Wars continue. This situation -- exploding wealth inequality combined with harsh austerity, little hope for improvement and a growing sense of irreversible national decline -- cannot possibly be sustained for long without some serious social unrest. As Yale Professor David Bromwich put it in his extraordinarily thorough analysis of the "continuities" in what he calls "the Bush-Obama presidency":

The usual turn from unsatisfying wars abroad to happier domestic conditions, however, no longer seems tenable. In these August days, Americans are rubbing their eyes, still wondering what has befallen us with the president’s "debt deal" -- a shifting of tectonic plates beneath the economy of a sort Dick Cheney might have dreamed of, but which Barack Obama and the House Republicans together brought to fruition. A redistribution of wealth and power more than three decades in the making has now been carved into the system and given the stamp of permanence.

Only a Democratic president, and only one associated in the public mind (however wrongly) with the fortunes of the poor, could have accomplished such a reversal with such sickening completeness.


Economic suffering and anxiety -- and anger over it and the flamboyant prosperity of the elites who caused it -- is only going to worsen. So, too, will the refusal of the Western citizenry to meekly accept their predicament. As that happens, who it is who controls the Internet and the flow of information and communications takes on greater importance. Those who are devoted to preserving the current system of prerogatives certainly know that, and that is what explains this obsession with expanding the Surveillance State and secrecy powers, maintaining control over the dissemination of information, and harshly punishing those who threaten it. That's also why there are few conflicts, if there are any, of greater import than this one.


-- Glenn Greenwald

We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Postby wintler2 » Sat Sep 17, 2011 8:31 pm

eyeno wrote:
http://online.wsj.com/article/SB10001424053111903285704576562294116160896.html

Congress contemplates draconian punishment for Internet lies
Should Faking a Name on Facebook Be a Felony?

By ORIN S. KERR

Imagine that President Obama could order the arrest of anyone who broke a promise on the Internet. So you could be jailed for lying about your age or weight on an Internet dating site. Or you could be sent to federal prison if your boss told you to work but you used the company's computer to check sports scores online. Imagine that Eric Holder's Justice Department urged Congress to raise penalties for violations, making them felonies allowing three years in jail for each broken promise. Fanciful, right?

Think again. Congress is now poised to grant the Obama administration's wishes in the name of "cybersecurity."

The little-known law at issue is called the Computer Fraud and Abuse Act. It was enacted in 1986 to punish computer hacking. But Congress has broadened the law every few years, and today it extends far beyond hacking. The law now criminalizes computer use that "exceeds authorized access" to any computer. Today that violation is a misdemeanor, but the Senate Judiciary Committee is set to meet this morning to vote on making it a felony.

The problem is that a lot of routine computer use can exceed "authorized access." Courts are still struggling to interpret this language. But the Justice Department believes that it applies incredibly broadly to include "terms of use" violations and breaches of workplace computer-use policies.

Breaching an agreement or ignoring your boss might be bad. But should it be a federal crime just because it involves a computer? If interpreted this way, the law gives computer owners the power to criminalize any computer use they don't like. Imagine the Democratic Party setting up a public website and announcing that no Republicans can visit. Every Republican who checked out the site could be a criminal for exceeding authorized access.

If that sounds far-fetched, consider a few recent cases. In 2009, the Justice Department prosecuted a woman for violating the "terms of service" of the social networking site MySpace.com. The woman had been part of a group that set up a MySpace profile using a fake picture. The feds charged her with conspiracy to violate the Computer Fraud and Abuse Act. Prosecutors say the woman exceeded authorized access because MySpace required all profile information to be truthful. But people routinely misstate the truth in online profiles, about everything from their age to their name. What happens when each instance is a felony?

Enlarge Image
kerr
kerr
Getty Images

In 2010, the Justice Department charged a defendant with unauthorized access for using a computer to buy tickets from Ticketmaster. Ticketmaster's website lets anyone visit. But its "terms of use" only permitted non-automated purchases, and the defendant used a computer script to make the purchases.

In another case, Justice has charged a defendant with violating workplace policies that limited use to legitimate company business. Prosecutors claimed that using the company's computers for other reasons exceeded authorized access. The Ninth Circuit Court of Appeals recently agreed.

The law even goes beyond criminal law. It allows civil suits filed by private parties. As a result, federal courts have been flooded with silly disputes. In one recent case, an employer sued a former employee for excessive Internet usage from work. The alleged offense: visiting Facebook and sending personal emails. In another case, a company posted "terms of use" on its website declaring that no competitors could visit—and then promptly sued a competitor that did.

Remarkably, the law doesn't even require devices to be connected to the Internet. Since 2008, it applies to pretty much everything with a microchip. So if you're visiting a friend and you use his coffeemaker without permission, watch out: You may have committed a federal crime.

Until now, the critical limit on the government's power has been that federal prosecutors rarely charge misdemeanors. They prefer to bring more serious felony charges. That's why the administration's proposal is so dangerous. If exceeding authorized access becomes a felony, prosecutors will become eager to charge it. Abuses are inevitable.

Real threats to cybersecurity must be prosecuted. Penalties should be stiff. But Congress must narrow the Computer Fraud and Abuse Act before enhancing its penalties. There's no reason to make breaching a promise a federal case, and certainly not a felony crime.

Mr. Kerr, a former federal prosecutor, is professor of law at George Washington University School of Law.
"Wintler2, you are a disgusting example of a human being, the worst kind in existence on God's Earth. This is not just my personal judgement.." BenD

Research question: are all god botherers authoritarians?
User avatar
wintler2
 
Posts: 2884
Joined: Sun Nov 12, 2006 3:43 am
Location: Inland SE Aus.
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby JackRiddler » Fri Nov 18, 2011 1:33 pm

(link cites in original)


http://wonkette.com/456454/congressiona ... ore-456454

Congressional Support Grows For Bill To Shut Down Any Website


http://www.youtube.com/watch?feature=pl ... 5mKLcWhr9E

There’s suddenly a whole lot of “bipartisan support” for a supposed anti-piracy law that will actually let the U.S. Government force American Internet providers to shut down all access to any website immediately. Why might that be a popular idea, in Congress, right about now? And why are these anti-government Republicans like Congressman Lamar Smith of Texas behind such a heavy handed Big Brother off-switch on the entire Internet? And why is Joe Biden apparently strongly against such legislation, even though the Obama Administration supports it fully? Oh, right, because Biden is talking about how other countries shouldn’t do what the United States is about to do.

The conveniently rare bipartisan supporters of the SOPA/Protect IP censorship bills claim it’s to protect Republican interests such as “Hollywood movie studios” and “Hollywood media companies,” but in fact the “Protect IP” and “SOPA” bills actually let the government order any website accused of illegal distribution of intellectual property to be shut down by all American Internet service providers. Hey, is there a Kuwaiti guy putting a spam link to his Russian movie download site in the comments of, say, OccupyWallSt.org? Well just shut down OccupyWallSt.org, it’s that easy.

We’ve written about this before, and it just keeps getting worse. The interesting thing is that Google and Facebook and other such Internet giants are against the law, they say because there’s so much insane potential for abuse that a big Internet company would suddenly be forced to have a whole division to shut down sites as fast as whatever government agency demands it.

Bloomberg reports tonight:

[Lamar] Smith’s Stop Online Piracy Act is aimed at foreign sites dedicated to pirated material, but Web giants such as Google and Facebook and telecommunications firms say his proposal goes too far, making them responsible for shutting down bad actors.

And how, exactly, does it go “too far,” you might be wondering? By creating a government “Internet blacklist” no different than China’s infamous “Great Firewall” that blocks anything critical of the Chinese government, along with whatever else the censors don’t want you looking at. This is how, for example, the #OWS protests are all but invisible on the Chinese Internet. But in China, it’s top down — the government does the actual administering of the Internet blacklist and the nation’s domain name servers. The typically American twist is that the government will demand that “free enterprise” do the dirty work, just as it did during the Bush Jr. wiretapping scandals we’ve all apparently completely forgotten.

Here’s a calm assessment from yesterday’s New York Times op-ed page:

The solutions offered by the legislation, however, threaten to inflict collateral damage on democratic discourse and dissent both at home and around the world.

The bills would empower the attorney general to create a blacklist of sites to be blocked by Internet service providers, search engines, payment providers and advertising networks, all without a court hearing or a trial. The House version goes further, allowing private companies to sue service providers for even briefly and unknowingly hosting content that infringes on copyright — a sharp change from current law, which protects the service providers from civil liability if they remove the problematic content immediately upon notification. The intention is not the same as China’s Great Firewall, a nationwide system of Web censorship, but the practical effect could be similar.

When the NYT is suggesting a bipartisan law being rushed through Congress to an eager president for signing is actually a Chinese-style “Great Firewall” to suppress people, well …. we guess you should “write your representative and senator” on the way to the pitchfork and gasoline store.

We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby Nordic » Fri Nov 18, 2011 6:07 pm

Thanks for posting that. Its been almost completely under the radar. This thing looks like its gonna pass, and the internet as we know it is going to go bye-bye.

This site quite likely included, if anyone ever notices.
"He who wounds the ecosphere literally wounds God" -- Philip K. Dick
Nordic
 
Posts: 14230
Joined: Fri Nov 10, 2006 3:36 am
Location: California USA
Blog: View Blog (6)

Re: Threats to Internet Freedoms (consolidation thread)

Postby Simulist » Sat Nov 19, 2011 12:18 am

Congressional Support Grows For Bill To Shut Down Any Website

And why wouldn't "congressional support" grow for that?

Congress isn't ruled by "the people," but by every big check written to its "elected" membership.
"The most strongly enforced of all known taboos is the taboo against knowing who or what you really are behind the mask of your apparently separate, independent, and isolated ego."
    — Alan Watts
User avatar
Simulist
 
Posts: 4713
Joined: Thu Dec 31, 2009 10:13 pm
Location: Here, and now.
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby Stephen Morgan » Sat Nov 19, 2011 5:54 am

Of course real criminal sites stay anonymous, and any site shut down can just spring back up.
Those who dream by night in the dusty recesses of their minds wake in the day to find that all was vanity; but the dreamers of the day are dangerous men, for they may act their dream with open eyes, and make it possible. -- Lawrence of Arabia
User avatar
Stephen Morgan
 
Posts: 3736
Joined: Thu Apr 19, 2007 6:37 am
Location: England
Blog: View Blog (9)

Re: Threats to Internet Freedoms (consolidation thread)

Postby wintler2 » Sat Nov 19, 2011 8:06 am

OT but:
.. one of Archimedes Global’s senior directors, retired Air Force Lt. Colonel George A. Crawford, published a chilling monograph, Manhunting: Counter-Network Organizing for Irregular Warfare, for the highly-influential Joint Special Operations University (JSOU) at MacDill Air Force Base in Tampa. ..

Available bibliotecapleyades.net & Scribed(subscr.).
TL;DR - nothing eyepopping from my scan, general thrust:
.. Industrial-age and information-age warfare have become cost-prohibitive and politically untenable. Theoretically, the United States could reverse the polarity of warfare by officially adopting manhunting doctrine as a core element of defense policy. Manhunting has the potential to form the basis for national security, as highly trained teams disrupt or disintegrate human networks or seize threatening weapons. Much as nuclear capabilities underpinned national security for the last 60 years, an institutionalized manhunting capability might form the foundation of U.S. national security strategy for the 21st century.


Does have an appendix listing centuries of US manhunting/counterinsurgency ops, recent history is more heavily whitewashed but still visible.
"Wintler2, you are a disgusting example of a human being, the worst kind in existence on God's Earth. This is not just my personal judgement.." BenD

Research question: are all god botherers authoritarians?
User avatar
wintler2
 
Posts: 2884
Joined: Sun Nov 12, 2006 3:43 am
Location: Inland SE Aus.
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby JackRiddler » Sat Nov 19, 2011 12:40 pm

.

Ha, forgot this one in the master list for the OP (or maybe it was from later)...

A priceless juxtaposition (if it weren't so common)
viewtopic.php?f=8&t=32361&p=425424
FBI announces relaxation of domestic surveillance rules and authority to violate rights of non-suspects in fishing expeditions on the same day that State Department announces initiative to get communications technologies to dissidents in countries like Iran and China that will allow them to evade their nations' surveillance programs. Should American dissidents ask the State Department to help us get around FBI spying? Should the FBI raid the State Department for dispensing technology that may one day aid terrorists?
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby eyeno » Mon Nov 21, 2011 2:33 am

Newspaper Publisher Caves, Agrees Excerpts of Articles Do Not Infringe Copyright
Righthaven Case Ends in Victory for Fair Use


EFF
https://www.eff.org/press/releases/righ ... y-fair-use

In a victory for fair use, the publisher of the Las Vegas Review-Journal, Stephens Media, filed papers yesterday conceding that posting a short excerpt of a news article in an online forum is not copyright infringement. The concession will result in entry of a judgment of non-infringement in a long-running copyright troll case that sparked the dismissal of dozens of baseless lawsuits filed by Righthaven LLC.

The case began when the online political forum Democratic Underground -- represented by the Electronic Frontier Foundation (EFF), Fenwick & West LLP, and attorney Chad Bowers -- was sued by Righthaven for a five-sentence excerpt of a Review-Journal news story that a user posted on the forum with a link back to the newspaper's website. Democratic Underground countersued, asking the court to rule that the excerpt did not infringe copyright and is a fair use of the material, and brought Righthaven-backer Stephens Media into the case.

The Court dismissed Righthaven's infringement case because it did not own the article, but Democratic Underground's counterclaim against Stephens Media continued. After initially attempting to defend the bogus assertion of copyright infringement, Stephens Media has now conceded it was incorrect.


"I knew the lawsuit was wrong from the start, and any self-respecting news publisher should have, too," said Democratic Underground founder David Allen. "I'm glad that they have finally admitted it."

"This concession comes after more than a year of needless litigation," said EFF Senior Staff Attorney Kurt Opsahl. "Stephens Media never should have authorized Righthaven to file this suit in the first place, and should never have wasted our client's and the court's time with its attempts to keep Righthaven's frivolous claim alive for the last year."

The original lawsuit against Democratic Underground was dismissed earlier this year, when Judge Hunt found that Righthaven did not have the legal authorization to bring a copyright lawsuit because it had never owned the copyright in the first place. Righthaven claimed that Stephens Media had transferred copyright to Righthaven before it filed the suit, but a document unearthed in this litigation -- the Strategic Alliance Agreement between Righthaven and Stephens Media -- showed that the copyright assignment was a sham, and that Righthaven was merely agreeing to undertake the newspaper's case at its own expense in exchange for a cut of the recovery. In addition to dismissing Righthaven's claim, Judge Hunt sanctioned Righthaven with fines and obligations to report to other judges its actual relationship with Stevens Media.

Righthaven has filed hundreds of copyright cases based on its sham copyright ownership claims. Despite several attempts by Righthaven and Stephens Media to re-write their Strategic Alliance Agreement, half a dozen judges have ruled against the scheme to turn copyright litigation into a business.

"This is a hard fought and important victory for free speech rights on the Internet," said Laurence Pulgram, the partner who led the team at Fenwick & West, LLP in San Francisco. "Unless we respond to such efforts to intimidate, we'll end up with an Internet that is far less fertile for the cultivation and discussion of the important issues that affect us all."

Democratic Underground's motion for summary judgment:
https://www.eff.org/sites/default/files ... /dumsj.pdf

Stephens Media's consent to the motion:
https://www.eff.org/sites/default/files ... sponse.pdf
User avatar
eyeno
 
Posts: 1878
Joined: Wed Nov 24, 2010 5:22 pm
Blog: View Blog (0)

Re: Threats to Internet Freedoms (consolidation thread)

Postby eyeno » Sat Nov 26, 2011 11:42 pm

Senator Joe Lieberman Asks Google for a Terrorist Flagging Button on Blogger
November 26th, 2011

lol

Via: The Verge:

Well, Joe’s at it again, and this time, it really is as embarrassing as it sounds. The Senator has taken pen to paper and written a letter to Google asking that its blogging platform Blogger be equipped with a flagging feature… for terrorists. This is largely because Jose Pimental, a man suspected of attempting to build a pipe bomb to attack the US military hosted his blog on Blogger. Now, there are a lot of terrible Blogger blogs to be sure, but is this really the best way to deal with such a problem?

Talking Points Memo acquired the letter and published it earlier today. “Pimentel’s Internet activity — both his spreading of bomb-making instructions links and his hate-filled writings — were hosted by Google” writes Lieberman, going on to add that, unlike YouTube, “Blogger’s Content Policy does not expressly ban terrorist content nor does it provide a ‘flag’ feature for such content.”

Google has not yet responded to Senator Lieberman’s request for the Blogger kill switch.

Research Credit: noncompliant

http://cryptogon.com/?p=26171
User avatar
eyeno
 
Posts: 1878
Joined: Wed Nov 24, 2010 5:22 pm
Blog: View Blog (0)

PreviousNext

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 166 guests