Power Loves the Dark | Police Nationwide Are Secretly Exploiting Intrusive Technologies With the Feds’ Complicity
In Chicago, for instance, the police notoriously opposed the release of dashcam video in the shooting death of Laquan McDonald, citing the supposed imperative of an “ongoing investigation.” After more than a year of such resistance, a judge finally ordered the video made public. Only then did the scandal of seeing Officer Jason Van Dyke unnecessarily pump 16 bullets into the 17-year-old’s body explode into national consciousness.
Here are some of the women who worked to preserve the free and open Internet. (The list is long and revealing, while men are getting the recognition and awards.) By Marvin Ammori Slate’s Future Tense September 22, 2015 Federal Communications Commission Commissioner Mignon Clyburn listens to a fellow commissioner speak during an FCC hearing on […]
Flawed intelligence and the limits of drone technology The Obama administration has portrayed drones as an effective and efficient weapon in the ongoing war with al Qaeda and other radical groups. Yet classified Pentagon documents obtained by The Intercept reveal that the U.S. military has faced “critical shortfalls” in the technology and intelligence it uses […]
The UN Green Fund, designed, essentially to help balance climate debt, is currently capitalized at $10 billion in pledges from rich countries. That’s barely a drop in the bucket, as Matthews points out: in 2013 alone, rich countries emitted 13 billion tons—or $520 billion worth—of carbon debt. BY BRIAN MERCHANT Motherboard September 9, 2015 Aerial View […]
“I felt like it destroyed my soul,” Bryant told Motherboard. “For the longest time.”
LaForge: All this coldblooded recklessness severely and permanently endangers human, animal and environmental health, because radiation in the body in cumulative doses attacks the gene pool in multi-generational perpetuity.
Just Security: The Patriot Act’s Sunset is the Perfect Chance to Make the FISA Court More Like a Real Court
The collection of Americans’ personal information by intelligence agencies is one of the most intrusive powers the executive branch can exercise. Such programs require a strong check in the form of robust judicial review. By Elizabeth Goitein, Faiza Patel Just Security CommonDreams.org April 14, 2015 The collection of Americans’ personal information by intelligence agencies is one of […]
From the article: As these technologies continue to gain traction, it becomes necessary to consider how they fare in terms of transparency, accountability, and their contribution to world peace.
Glenn Greenwald | What’s Scarier: Terrorism, or Governments Blocking Websites in its Name? – The Intercept
Greenwald: There can be no doubt that such new criminal laws are specifically intended to ban ideas these governments dislike.
AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.
New reporting by The Intercept, based on documents leaked by whistleblower, reveals how spy agencies hacked world’s largest SIM card manufacturer. ‘One of the biggest Snowden stories yet,’ says journalist Glenn Greenwald
“Democracy is about participation…we take risks. We dare,” he said. “Sometimes we do right and sometimes we do wrong, even if we intended to do right.” He suggested that expressing disagreement with the government is the right course of action when its behavior is perceived as“morally unjustifiable.”
You know, all of that money the company spent that required most of us to hand over tax break after tax break. By Walter Einenkel DailyKos February 2, 2015 It’s not you, it’s them. Subscribe or “Follow” us on RiseUpTimes.org. Rise Up Times is also on Facebook! Check the Rise Up Times page for posts from this blog and […]
The NSA whistleblower’s lawyer says the secret software can be remotely activated to watch the user. By Andrew Griffin / The Independent Alternet.org January 21, 2015 The iPhone has secret spyware that lets governments watch users without their knowledge, according to Edward Snowden. The NSA whistleblower doesn’t use a phone because of the secret software, […]
the aim of being able to use the net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money.
Let us resist attempts to use this tragic moment as an opportunity to advance law enforcement surveillance powers. Freedom of speech can only thrive when we also have the right to privacy. BY JILLIAN YORK EFF.org January 12, 2015 Following a terrorist attack, it is not uncommon to hear calls from politicians and government officials for […]
[The film] features interviews with his family and friends as well as the internet luminaries who worked with him. The film tells his story up to his eventual suicide after a legal battle, and explores the questions of access to information and civil liberties that drove his work.” By Dan Colman openculture.com June 29, 2014 Published […]
The debate over the FCC’s latest proposals to protect net neutrality has raged for nearly a year. Net neutrality activists have regularly held loud protests at FCC meetings and flooded the FCC’s public comment inbox with millions of letters and comments. At one point, the sheer number of comments overloaded and shut down the agency’s server.