Wednesday, May 7, 2014

To ensure the Internet is open to all on an equal basis we must act now to prevent mega-corporations from destroying Internet Freedom.

It is time for escalating actions against the FCC before their vote on May 15th to end net neutrality.
What Should Be Done?

John Nichols writes in the Nation:

“A free and open Internet is essential to modern democracy. But that freedom and openness will be maintained only if Americans use their great democratic voice to demand it.”

It is up to us to prevent the further corporatization of the Internet and to keep it free, equal and open to all. It will take more than our voices, it will taking our bodies stopping the machine of corporatocracy. What are our demands?
Reject the proposal. This is the Obama FCC. Obama appointed three Democrats and two Republicans to the Commission, as required by law. The political apparatus of the Democratic Party needs to demand this proposal be rejected.
Reclassify broadband Internet access as a telecommunications service that can be regulated in the public interest. Under President Bush the Internet was redefined as an “information service” limiting the FCC’s ability to regulate in the public interest. This decision needs to be reversed so the FCC can properly regulate the Internet.Wheeler opposes this but said in response to opposition to his proposal that reclassification is on the table.
Put in place net neutrality regulations. The Commission should act consistently with President Obama’s campaign position – net neutrality. Acting opposite of what the people voted for undermines the democratic legitimacy of government on the critical issue Internet freedom.
Read more

Petitions:

http://www.popularresistance.org/internet-for-the-wealthy/

http://act.credoaction.com/sign/verizon_netneutrality?akid=10524.7284604.mFMHOz&rd=1&t=2

http://other98.com/we-want-net-neutrality-not-corporate-takeover/

https://www.dailykos.com/campaigns/785

http://act.sumofus.org/go/4400?t=2&akid=5203.2777050.OJJfIW

Sunday, March 9, 2014

NSA has a 50-page catalog of exploits for software, hardware, and firmware


Cory Doctorowboingboing

A Snowden leak accompanying today's story on the NSA's Tailored Access Operations group (TAO) details the NSA's toolbox of exploits, developed by an NSA group called ANT (Advanced or Access Network Technology).
The ANT division doesn't just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on.



ANT's catalog runs to 50 pages, and lists electronic break-in tools, wiretaps, and other spook toys. For example, the catalog offers FEEDTROUGH, an exploit kit for Juniper Networks' firewalls; gimmicked monitor cables that leak video-signals; BIOS-based malware that compromises the computer even before the operating system is loaded; and compromised firmware for hard drives from Western Digital, Seagate, Maxtor and Samsung.
Many of the exploited products are made by American companies, and hundreds of millions of everyday people are at risk from the unpatched vulnerabilities that the NSA has discovered in their products.
This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this "Persistence" and believe this approach has provided them with the possibility of permanent access.
Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.
Basically, don't buy American (or Samsung) if you want your privacy. It's what Snowden's revelation has been saying for months, if you recall my previous journal on it.
I'll conclude with some tools for encryption. What you do with this information is up to you.
First, install HTTPS Everywhere to your browser. For the moment, they are only available for Firefox, Chrome, and Opera.
Encryption Works" a guide written by former EFF Staff Technologist Micah Lee for the Freedom of the Press Foundation (an EFF client)
CyanogenMod adopted TextSecure to protect the text messages of its ten million users against mass surveillance
crypto parties teaches people about adopting encryption tools

In which Jacob Applebaum discusses US dragnet surveillance, including the revelation of NSA's intent to implant surveillance firmware to US electronic products.