Next step in fight against GCSB & TICS Bill announced Monday

6
0

525750_268123539979522_1034971094_n

The next step in the fight against the GCSB & TICS Bill will be announced Monday. This month the enabling legislation of the GCSB powers, the TICS Bill is likely to be forced through Parliament. TICS will apply to all Telecommunications companies and will oblige them to wear the costs of changing their systems to be compatible with the NSA so that our American Corporate Overlords can use backdoors to enter all our communication companies and spy on everything.

For the sake of our democracy, we can not, must not let these laws stand.

The next fight will be announced here on The Daily Blog on Monday.

6 COMMENTS

  1. And it’s still getting worse:
    http://www.nbcnews.com/technology/nsa-foils-much-internet-encryption-8C11083204
    “The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.”
    http://www.theguardian.com/commentisfree/2013/sep/05/government-betrayed-internet-nsa-spying
    http://www.tomsguide.com/us/most-important-nsa-leak,news-17505.html

    We are being utterly betrayed by the very Governments WE OURSELVES have employed and indeed pay for – and it almost certainly has NOTHING to do with protecting us from terrorism.

  2. What happens in Parliament shouldn’t dictate what happens on the Streets. Even when they pass these Bills, we can force them to revoke them. We don’t need an action: we need a series of them. And the powerbase of the popular support must NOT be divided to suit individual agendas.

    We have been clearly taught how to achieve socio-political change via People Power. We need only look to Iceland to see the steps we must take.

    We don’t need to announce & confirm action dates & try to re-spread the word everytime if everyone knows it’ll be every Saturday until they reverse the Bill.

    Persistent, constant, unrelenting and preferably decentralised action such as occurred during the Springbok Tour are the pathway forward to TRULY defeating these Bills and beginning to create a new legal framework forward for our country – one that protects our rights instead of robbing us of them without our consent.

    Those of us pissed off enough about this to put our lives on the line have a far greater vested input than whoever is next Labour leader.

    Those who have turned out so far represent a broad based coalition of the willing.

    If any one political faction is placed above the others that will become the unwilling and the resentful.

    A fact our espionage-obsessed overlords are no doubt fully aware of and already using to their advantage.

    Let all the banners meld to become one. Left, right, young, old, rich, poor, all demographics contain members of the Awakened and there are more of us with every passing day.

    Let’s make Stop the GCSB Bill more than a name.

    Let’s actually stop it.

    • You are more than welcome to start your own movement Suzy, please keep us up to date on its progress. Good luck.

  3. UPDATES:

    More from Snowden: Politicians Spied on at G20 Summits – YouTube [Jun 17, 2013] http://www.youtube.com/watch?v=0mST1JyHSA4

    PUTIN TELLS IT TRUE ! :
    G20 Summit 2013 Putin Press Conference Obama and Putin met for 20 minutes #Syria War – YouTube http://www.youtube.com/watch?v=e8AzPzaNiUg

    The Guardian, Friday 6 September 2013

    Revealed: How US and UK spy agencies defeat internet privacy and security | World news | The Guardian http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

    Revealed: How US and UK spy agencies defeat internet privacy and security
    • NSA and GCHQ unlock encryption used to protect emails, banking and medical records
    • $250m-a-year US program works covertly with tech companies to insert weaknesses into products
    • Security experts say programs ‘undermine the fabric of the internet’

    Through covert partnerships with tech companies, the spy agencies have inserted secret vulnerabilities into encryption software….

    US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden……..

    The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments.

    The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – “the use of ubiquitous encryption across the internet”.

    Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with “brute force”, and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves.

    Through these covert partnerships, the agencies have inserted secret vulnerabilities – known as backdoors or trapdoors – into commercial encryption software.

    The files, from both the NSA and GCHQ, were obtained by the Guardian, and the details are being published today in partnership with the New York Times and ProPublica. They reveal:

    • A 10-year NSA program against encryption technologies made a breakthrough in 2010 which made “vast amounts” of data collected through internet cable taps newly “exploitable”.

    • The NSA spends $250m a year on a program which, among other goals, works with technology companies to “covertly influence” their product designs.

    • The secrecy of their capabilities against encryption is closely guarded, with analysts warned: “Do not ask about or speculate on sources or methods.”

    • The NSA describes strong decryption programs as the “price of admission for the US to maintain unrestricted access to and use of cyberspace”.

    • A GCHQ team has been working to develop ways into encrypted traffic on the “big four” service providers, named as Hotmail, Google, Yahoo and Facebook.

    “For the past decade, NSA has lead [sic] an aggressive, multi-pronged effort to break widely used internet encryption technologies,” stated a 2010 GCHQ document. “Vast amounts of encrypted internet data which have up till now been discarded are now exploitable.”

    An internal agency memo noted that among British analysts shown a presentation on the NSA’s progress: “Those not already briefed were gobsmacked!”

    Funding for the program – $254.9m for this year – dwarfs that of the Prism program, which operates at a cost of $20m a year, according to previous NSA documents. Since 2011, the total spending on Sigint enabling has topped $800m. The program “actively engages US and foreign IT industries to covertly influence and/or overtly leverage their commercial products’ designs”, the document states. None of the companies involved in such partnerships are named; these details are guarded by still higher levels of classification.

    Among other things, the program is designed to “insert vulnerabilities into commercial encryption systems”. These would be known to the NSA, but to no one else, including ordinary customers, who are tellingly referred to in the document as “adversaries”.

    “Project Bullrun deals with NSA’s abilities to defeat the encryption used in specific network communication technologies. Bullrun involves multiple sources, all of which are extremely sensitive.” The document reveals that the agency has capabilities against widely used online protocols, such as HTTPS, voice-over-IP and Secure Sockets Layer (SSL), used to protect online shopping and banking

    It is used by the NSA to “to leverage sensitive, co-operative relationships with specific industry partners” to insert vulnerabilities into security products. Operatives were warned that this information must be kept top secret “at a minimum”.

    A more general NSA classification guide reveals more detail on the agency’s deep partnerships with industry, and its ability to modify products. It cautions analysts that two facts must remain top secret: that NSA makes modifications to commercial encryption software and devices “to make them exploitable”, and that NSA “obtains cryptographic details of commercial cryptographic information security systems through industry relationships”.

    The agencies were supposed to be “selective in which contractors are given exposure to this information”, but it was ultimately seen by Snowden, one of 850,000 people in the US with top-secret clearance.A 2009 GCHQ document spells out the significant potential consequences of any leaks, including “damage to industry relationships”.

    #### The following: Just to Refresh about NSA “MANUAL”

    [WARNING : R18 reading Contents may disturb the reader]
    ~1. WARNING !!! NASA – The End Of The World Leaked Document 2013 ON NASA WEBSITE! ! ! [ Jul 14, 2013] – [36 MIN]YouTube http://www.youtube.com/watch?v=Ae1WUOUFdTs

    …….[More INFO @ http://www.stopthecrime.net/%5D

    Download & READ THE WHOLE NASA Document here:

    ~2. Silent Weapons For Quiet Wars Document – Full Read – YouTube http://www.youtube.com/watch?v=s_38tsQ4p0I

    Pg16…Social Welfare Programme Pg:35-37…Diversion, the Primary Strategy Pg36…Medias Role

    Pg38…ENERGY SOURCE – IRS Pg39….Politicians Role

    Pg42….Enforcement of Fathers …..Pg43…Womens Conditioning….

    ~3. QUICK SUMMARY: NASA DOCUMENT REVEALS PLAN TO KILL OFF MANKIND,IN USE NOW – YouTube http://www.youtube.com/watch?v=MISUnX–Pok

    G20 Summit 2013: Obama Press Conference #Syria War | Part 2 – YouTube http://www.youtube.com/watch?v=ozvLzUnw500

    …from Grandmothers connecting the dots….

    • An interesting extract from The Guardian article shows how the NSA operates in telecommunication companies around the world –

      ‘To help secure an insider advantage, GCHQ also established a Humint Operations Team (HOT). Humint, short for “human intelligence” refers to information gleaned directly from sources or undercover agents.

      This GCHQ team was, according to an internal document, “responsible for identifying, recruiting and running covert agents in the global telecommunications industry.” ‘

      http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

Comments are closed.