Archive

Posts Tagged ‘hackivists’

CIA whistleblower Speaks candidly of the right of Information


Posted on June 09, 2013 by Akashma Online News

by Marivel Guzman

Edward Snowden Whistle blower Proud citizen

Laura Poitras, an American documentary film director and producer,  made public her video interview with Edward Snowden CIA leaker of the bomb shell Prims spying program taking place in the US since 2007,  and Anonymous made binpasted a series of documents exposing even further 35 countries spying programs including Gig and Prism.

When people speaks of free speech, we speak passionately about a subject matter, or an issue that interest us.  It is not only about yelling in the street of what I like to say or what I love to do, but about what everyone’s right to say what they like and and defending everyone’s audacity to do thing. The audacity to be let to do what they like. Not necessarily speaking hate language that insult others, or walking naked in the street expressing my willingness to take the world with clean face, with  no makeup, no disguises of any kind. Free speech is more than just that.

Free speech encompasses absolutely everything. No matter how outrageous you think it is. No matter how insulting it sounds for some. No matter how immoral looks like to others. Free speech is about freedom, and freedom has no boundaries. The world of the free. The state of feeling free, the domain of freedom.

When whistle-blowers uncover information that needs to be made public because it is in the best interest of the people, then they are exercising their right of free speech. If this contravene their contract with the agency that contracted them, they have the right to quit, or the agency has the right to terminate the subject that had broken the contract. Should be easier as that.

We live in a free society where censorship is against the law, where spying is against the law, where invasion of privacy is against the law. We live in a free society in all the extent of the word.
So, why is the big deal when a person speaks rightfully his mind?
Why it is a big deal? When a person disclosure information he deems important to the others to know. Should be in the free exercise of his domain of freedom of speech. On this terrain our free society is walking in a thin line of interpretations, a shaky ground of definitions, where laws are interpreted to convenience, where laws are enacted to convenience of certain groups.

Our free society, it is not more free than  a dog in a leash. A dog that has the freedom to eat from its bowl when it choses to, to bark at its pleasure, to drink from his water when thirsty, to enter his mini jail shelter anytime it wants to,  and to walk the three meters around his post.

Is this what free society looks like to you?, hypothetically speaking we have the protection of the constitution of the United States of America. Why when it comes to expose dirty secrets of the people ruling our government, free speech become treasonous act?

Snowden, a former CIA technical assistant, said he had been working at the super-secret NSA as an employee of defense contractor Booz Allen Hamilton and decided to break his silence after becoming disenchanted with Obama, whom he said had continued the policies of predecessor George W. Bush.

Snowden speaks in a video interview with Glenn Greenwald  from his Hong Kong’s hotel, saying that he chose Hong Kong for being an autonomous territory that is famous for its protests in the street and free speech, he said.

The Guardian and the Washington Post recently published a ‘leaked’ information from a CIA whistleblower, news that went viral around the globe for their controversial content.

In their initial reporting neither of the two newspapers disclosed the source of their information, but three days later a video has emerged with the Self Proclaim CIA leaker, Edward Snowen, a 29 years old former technical assistant for the Central Intelligence Agency being interviewed by Gleen Greenwald for a film by Laura Poitras an American documentary film director and producer.

Snowden said that he came public with this information because he does not want to live this way, he went on to say that when you are in a position of privileged access like a system administrator, you are exposed to disturbing things, and recognized that this things need to be known by the public. National Security Agency takes information from where ever it can, and spying is one way to do it, he says.

I think that the public its own an explanation of the motivation behind the people who makes this disclosure that are outside of the democratic model, when you are subverting the power of the government, that is a fundamentalist dangerous thing to do democracy, Snowden said.

Responding as why he decided to come public as a whistleblower,  that people working for the government, continuously do this things in secret, he said. When the government wants to benefit from a secret action that it took. It is a kind of given to its officials the mandate to tell the press about this, this thing or that thing just to have the public in our side, he said.

He said that he is just another guy without special skills and he thinks that the public is the ones that needs to decide on important issues not the government. He said that he is willing to go in the record to prove the authenticity of these documents.
“I did not change this, I did not modify the story, this is the truth, this is whats happening, you should decide whether we should be doing this”

Also Anonymous posted in Pastebin on Friday a series of documents exposing Gig and Prism programs, both programs saying that 35 countries are spying on their citizens,

Anonymous had obtained and binpasted some documents that “they” do not want you to see, they said, and much to “their” chagrin, we have found them, and are giving them to you, anonymous said.
“These documents prove that the NSA is spying on you, and not just Americans.  They are spying on the citizens of over 35 different countries.
These documents contain information on the companies involved in GiG, and Prism.
Whats GiG you might ask? well…
 The GIG will enable the secure, agile, robust, dependable, interoperable data sharing environment for the Department where warfighter, business, and intelligence users share knowledge on  a global network that facilitates information superiority, accelerates  decision-making, effective operations, and Net-Centric transformation.
Like we said, this is happening in over 35 countries, and done in cooperation with private businesses, and intelligence partners world wide.
We bring this to you, So that you know just how little rights you have.  Your privacy and freedoms are slowly being taken from you, in closed door meetings, in laws buried in
bills, and by people who are supposed to be protecting you.
Download these documents, share them, mirror them, don’t allow them to make them disappear.  Spread them wide and far.  Let these people know, that we will not be silenced, that we will not be taken advantage of, and that we are not happy about this unwarranted, unnecessary, unethical spying of our private lives, for the monetary gain of the 1%.”  Anonymous
Published on Jun 9, 2013
Laura Poitras made the video public in the interest of society. She published it under the Fair Use Notice Act.

 

Copyright © 2013 Praxis Films / Laura Poitras
FAIR USE NOTICE: This video contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in an effort to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material in this video is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.

To close this article let me remind you of a guy name Pellicano, is serving a 15 years sentence for wiretapping people in behalf of his clients. Does Mr Pellicano did something worse that our US government did with PRISM Spying Program?… I don’t think so. What do you think?.

“to find me guilty “means just about every other private eye in the country is also a criminal enterprise, And maybe even some of these journalists out there.” Anthony Pellicano in his trial for wiretapping and racketing.

Laura Poitras
Director/Producer/Cinematographer

Laura PoitrasLaura Poitras was nominated for an Academy Award®, an Independent Spirit Award and an Emmy for My Country, My Country (POV 2006). She received a Peabody Award and was nominated for an Emmy and an Independent Spirit Award for Flag Wars (POV 2003), made with Linda Goode Bryant. Poitras is the recipient of a Guggenheim Fellowship and a Media Arts Fellowship from the Rockefeller Foundation/Tribeca Film Institute. She has attended the Sundance Institute’s Documentary Edit and Story Lab as both a fellow and creative advisor. She is currently working on the third part of a trilogy about America post 9/11. Before making documentaries, Poitras worked as a professional chef. She lives in New York City.

Operation Israel #OPISRAEL


Posted on April 06, 2013 by Akashma Online News

By Marivel Guzman

UPDATED: Newly released information End of the page

Operation Israel

Anonymous had sent a warning for Israel to stop its attacks against the people of Gaza. A video had emerged announcing the biggest attack ever planned in history against Israel servers.

Hackers have threatened to disrupt Internet operations in Israel in a major cyber attack planned for Sunday, Facebook Event announced

As a part of operation code named OpIsrael, notorious hacking group Anonymous and similar collectives from Indonesia, and Albania had in recent days been exchanging information, via social media and other websites, on Israeli the government and corporate websites they plan to target.

On Thursday, Anonymous warned that it was poised to launch “the largest internet battle in the history of mankind,” Gulf News reports.

“We will once again be fighting for freedom. Freedom from tyranny, oppression, persecution, and from annihilation,” the group warned in a Facebook posting.

According to the report, in a YouTube video, Anonymous said that Israel had “crossed a line in the sand” by threatening to sever all Internet and telecommunications links out of the Gaza Strip.

Israeli radio reported that a number of large organizations had closed their websites to prevent hackers from sabotaging them.

Remember people are risking his/her freedom to hack in behalf of Palestine, all we need to do is share wide the information, a social media page said.
The web site said , “You do not need to be hacker, or need to carry any cyber attacks, but the distribution of the information is imperative to send a strong message to Zionist Entity of Israel and its supporters.”

This is a translation of the invitation event in a social media page:

Hello all. Here you had been invited for all those who want to contribute to #OPISRAEL ! Should be fair to cyber attack?.
OPIsrael as an  organization, but  is also in collaboration with other foreign groups and Albanian groups that had planned to undertake cyber attacks against the Jewish state servers.

The cyber attacks are to be carried out against Israeli servers, they said, but Israel government servers are the main target, the group said
Remember Israel had been continuously attacking the innocent population of Gaza and West bank. And when we say attacking, they are killing, burning alive, torturing innocent, they added.
They said, “Our cyber attacks will be carried out with the purpose of sending a message to Israel that the world is united to help Palestinians to regain their land and their freedom.”
“This is a boycott against Israel apartheid State, remember that only a world united can defeat a tyrant”,  they said.

By the day brake Sunday #OpIsrael campaign have hit around 700 Israeli websites  including high-profile government systems such as Israeli President’s official website and the Foreign Ministry. Official sources of Israel State reported around 44 million unique attacks on government websites, principal websites of the country suffered DDoS attacks and hacker also obtained personal data related to Israeli officials.

#OPIsrael Event Planned for Sunday announced in a facebook page

April 6, 2013 4:22 a:m

Defaced by Anonymous Albania 4 #OpIsrael http://הצעות-ביטוח.co.il/ http://insuranceoffers.co.il/ http://visionimprovement.co.il/ http://t-pool.co.il/ http://www.mpi.co.il/ http://misradneto.co.il/ http://levechad.org/ http://www.kahane.co.il/ http://inof.co.il/ http://hottam.co.il/ http://agreements.co.il/ http://alzheimer.org.il/

April 6, 2013 4:42 a:m

33 Israel websites defaced

Leaked Info Click on your own risk

Israel cyberspace attacked by Procoderz Team Albania and Kosova Hackers Security.

Operation Israel the devastating hacking rampage continues and becoming more and more venturesome for the Israeli cyber space. In the last week of March, it was dangerous hacker collective group Anonymous who called the operation also dubbed #OpIsrael, where the hacker group vows to erase Israel from the Internet. Muslim liberation Army and Kosova Hacker Security added their effort to the collective Anonymous

The biggest attack as of now has been the Israeli Foreign Ministry’s international development program, titled Mashav. Anonymous announced on Twitter they’ve hacked into the program’s database, with the website remaining inaccessible at the moment. Server Leaks

List of confirmed Israel websites disrupted by #OPIsrael

Can Comment Crew, Anonymous and Luzsec endarger Capitalism?

February 22, 2013 1 comment

Posted on February 20, 2013 by Akashma Online News

by Marivel Guzman

The New York Times released yesterday a special report on ‘Comment Crew’, a group of hackers from China. The U.S. government knew about them since 2005. But Obama Administration is keeping its mouth shut regarding ‘Comment Crew’. According to The New York Times, Comment Crew was tracked down to a white tall building in Shanghai, China.

On the outskirts of Shanghai, in a run-down neighborhood dominated by a 12-story white office tower, sits a People’s Liberation Army base for China’s growing corps of cyber warriors.

The building off Datong Road is the headquarters of P.L.A. Unit 61398. A growing body of digital forensic evidence -confirmed by U.S. intelligence officials who say they have tapped into the activity of the unit for years – leaves little doubt that an overwhelming percentage of attacks on U.S. corporations, organizations and government agencies originate in and around the white tower. The New York Times

Hackivists around the world as they are widely known, are a group of hackers that serve social interest for the general public. The corporate world, and the governments see them as cyber criminals, crimes that can landed them in jail for 100 years if the governments wanted to, or 5 years or less if they take a plea. There had been all types of arrests on the hacker community, but there are many types of hackers and common criminals as well.

David Thomas known as El Mariachi was a common criminal and not a hackivist. His activities and crimes can not even be considered to be the work of a hacker, this type of crime does not involve hacking into computers. They have a gang working together, people that work in banks, or in places where there is a database to be extracted, but not by means of hacking. See Hakcers Wars

Attorney General Eric Holder promises the Justice Department will play a "pivotal role" in thwarting efforts by WikiLeaks or any other organization to extract data illegally from U.S. companies.(Credit: White House)

Attorney General Eric Holder promises the Justice Department will play a “pivotal role” in thwarting efforts by WikiLeaks or any other organization to extract data illegally from U.S. companies.
(Credit: White House)

Madiant Security Firm reports(SPT&SPT1) speak of serious threat coming from China, “they have the evidence”, Madiant said. Why then the U.S. government insist on looking the other way. In the latest White House public release, Obama Administrations blames Wikileaks, Anonymous, and Luzsec as a threat to the U.S. and its American corporations.

White House warns of dangers posed by WikiLeaks, LulzSec, other ‘hacktivists’

New Obama administration strategy says organizations such as WikiLeaks and hacking group LulzSec may conduct “economic espionage against U.S. companies. Attorney General Eric Holder at press conference, February 20

The recent published 74 pages report of Mandiant security firm amount of information is impressive, they give an scope of  the type of activities ‘Comment Crew’ is interested in: APT1 Exposing One of China’s Cyber Espionage Units. (APT-Advanced Persistent Threat) Mandiant_APT1_Report

On 2004 Mandiant started tracking the groups APT, that according to this security firm amount to 20 or so of these groups. In 2010 Mandiant published the first report on these Chinese groups, APT Report.

“The Chinese government may authorize this activity, but there’s no way to determine the extent of its involvement. Now, three years later, we have the evidence required to change our assessment” .Mandian said

This issues needs to be taken very seriously and not just like another paper published. There are serious consequences and ramifications to this report.
There is no news that all the governments have an army of cyber warriors, but the interesting point on this report is the deep of the insertion of ‘Comment Crew’ into the U.S. government databases. Remember this group is in China, where more of the illegal cyber activity occurs apart from Indonesia where there are more than 65,000 known hackers.

The war on words started last year when U.S. Rep. Mike Rogers accused China of cyber espionage. There are serious consequences when you speaking publicly acting as a representative of the U.S. government. Specially is your adversary is China, known to buy U.S. debt and owning trillions of dollars of it.

China’s economic espionage has reached an intolerable level and I believe that the United States and our allies in Europe and Asia have an obligation to confront Beijing and demand that they put a stop to this piracy. Beijing is waging a massive trade war on us all, and we should band together to pressure them to stop. Combined, the United States and our allies in Europe and Asia have significant diplomatic and economic leverage over China, and we should use this to our advantage to put an end to this scourge. — U.S. Rep. Mike Rogers, October, 2011

Chinese Defense Minister on January, 2013 responded to such charges, saying that it is unprofessional and groundless to accused the Chinese Military of launching cyber attacks without conclusive evidence.

Why will China want to steal American Corporate secrets? Isn’t the U.S. government sent our corporations and its secrets to China a decade ago? The American Corporations become greedy and exchanged security for cheaper operational costs. They moved to China.

Made in China

100 % of Microsoft Hardware – Read the Microsoft Hardware – The China Connection

SMT and DIP PCB Assembly, Mother Boards and circuits.

Modems, speakers, microphones, cameras, video cameras

PCB Assembling Network Board

Networking PCBA

CISCO and Linksys Routers, Modems, Network adapters Where Linksys products are make?

When we think communication, we think Internet. Most of our communication gadgets come from China. How hard will be to install mini dropping devices inside every product that China produce?.

Beijing, China—November 14, 2006: IBM Chairman, President and CEO Samuel J. Palmisano (left) and Dr. Zhou Ji (right), Minister of the Ministry of Education, People’s Republic of China, at the launch of a major initiative to bring IBM’s global information technology services expertise and capabilities to China in support of the country’s increased focus on developing its services industry. Sam Palmisano before a sign “What makes us special? IBM China” magnifying-glass Sunil Mittal being recognised by Samuel J. Palmisano and President APJ Abdul Kalam India President APJ Abdul Kalam, Samuel J. Palmisano and IBMers lighting the lamp magnifying-glass Samuel J. Palmisano shaking hands with IBMers magnifying-glass

2006-2010: Remaking IBM into a globally integrated enterprise

IBM was clear on its strategy; making it a reality took a lot of work. The transformation took place in phases that often overlapped. From 2006 to 2008, IBM expanded its presence in Asia, Latin America and Eastern Europe, and today nearly half of its employees are in emerging markets. The company set up a network of global delivery centers in India, China, Brazil and other countries. By standardizing processes and outputs across its large, diverse client base, IBM could deliver quality services to its IT and business process outsourcing clients consistently, with the right skills, in the right place—wherever that would be. Projects could be staffed more quickly, delivering greater value to clients sooner.

Sharing resources

The model of shared services caught on. Global procurement was centralized in China.
Beijing, China—November 14, 2006: IBM Chairman, President and CEO Samuel J. Palmisano (left) and Dr. Zhou Ji (right), Minister of the Ministry of Education, People’s Republic of China, at the launch of a major initiative to bring IBM’s global information technology services expertise and capabilities to China in support of the country’s increased focus on developing its services industry.

Dell will consider transferring its factories to central and western China if wages in coastal areas continue to rise. However, the company supports higher wages for workers in coastal areas, said Amit Midha, the president of Dell in Greater China and South Asia, on June 21, 2010
Several electronic manufacturers including Foxconn have previously decided to move factories to inland regions. In 2009, Taiwan Hon Hai Group, the parent company of Foxconn, established a joint venture for producing laptop computers with Hewlett-Packard in Chongqing.

Taiwan Quanta Computer, another major laptop contract manufacturer, also established factories in Chongqing in early 2010.

Cyber espionage and cyber warfare has everything to do with China, theoretically speaking. If People Liberation Army controls every aspect of the life in China, including people jobs, habitat, and food. Chances are, that China government is taking advantage of  the greed of American Corporations. Pay back time for the years of abusing the people of China. The government of China allowed for a whole decade to use their people as slaves workers for American companies.

While this phenomenon of jobs transfer was going to China, American Corporate world was enjoying a steady raise in their profits, and China as Imperial power, become stronger, controlling the price of the dollar, monopoly of products made in China, buying American debt, accelerated production of weapons of all calipers and strategically straightening its power in the world.

For China the ‘One Child Policy” paid off.  On the backs of their citizens the Chinese Imperial Power Become a World Power.

Read on this issue Negligence at home while giving away our power in the name of greed and slavery: The mentality that everything could be made in China grew to a devastating proportions for United States.

We the United States of North America sent our manufacturers to China, even some of the Military gadgets were to be made in China, critical technology for the Defense Department was even ‘Made In China’.

%d bloggers like this: