6 Oct 2017
2017/10/04 – Warrantless wiretapping reform legislation circulates on Capitol Hill – The Hill
The House Judiciary Committee on Wednesday is circulating a hotly-anticipated proposal to reform the National Security Agency’s controversial warrantless wiretapping program.
Good to hear. It would be even better to investigate possible wiretapping violations that may have occurred. A copy of the legislation is at the link.
8 Mar 2017
NSA Whistleblower Backs Trump Up on Wiretap Claims – U.S. News and World Reports
President Donald Trump is “absolutely right” to claim he was wiretapped and monitored, a former NSA official claimed Monday, adding that the administration risks falling victim to further leaks if it continues to run afoul of the intelligence community.
“I think the president is absolutely right. His phone calls, everything he did electronically, was being monitored,” Bill Binney, a 36-year veteran of the National Security Agency who resigned in protest from the organization in 2001, told Fox Business on Monday. Everyone’s conversations are being monitored and stored, Binney said.
With regards to FISA…
The judges on the FISA court are “not even concerned, nor are they involved in any way with the Executive Order 12333 collection,” Binney said during the radio interview. “That’s all done outside of the courts. And outside of the Congress.”
“That’s not the main collection program for NSA,” Binney said.
Important Reference… AT&T Helped U.S. Spy on Internet on a Vast Scale – NY Times
6 Mar 2017
Not exactly the idea on how to use survival skills…
How a mythical ‘hermit’ criminal hid in the woods for decades – New York Post
In “The Stranger in the Woods: The Extraordinary Story of the Last True Hermit,” author Michael Finkel investigates the ways Christopher Knight, who disappeared in 1986 at age 20, was able to survive on his own in the forest — physically, emotionally and psychologically. By his own account, Knight went 27 years without ever talking to another human being. Upon his arrest, Knight became a national media story.
He had a two-burner camp stove, a gas line, a wash area, a bathroom consisting of two logs and a hole in the ground, and a bed (that stolen mattress!) with a fitted sheet and Tommy Hilfiger pillowcases. He painted his coolers and garbage cans in camouflage. He spent his days eating, cleaning and thinking, and his nights breaking and entering.
3 Mar 2017
Medical Devices Are the Next Security Nightmare – Wired
As hackers increasingly take advantage of historically lax security on embedded devices, defending medical instruments has taken on new urgency on two fronts. There’s a need to protect patients, so that attackers can’t hack an insulin pump to administer a fatal dose. And vulnerable medical devices also connect to a huge array of sensors and monitors, making them potential entry points to larger hospital networks. That in turn could mean the theft of sensitive medical records, or a devastating ransomware attack that holds vital systems hostage until administrators pay up.
Medical devices with these features—like wireless connectivity, remote monitoring, and near-field communication tech—allow health professionals to adjust and fine tune implanted devices without invasive procedures. That’s a very good thing. But those conveniences also create potential points of exposure.
Just understand that anything this is wirelessly accessible is vulnerable to hackers. I am not sure how often this happens, but manufacturers need to do their best to protect consumers.
2 Mar 2017
Mike Pence ‘used private email while Indiana governor – and was hacked’ – UK Telegraph
Mike Pence, the US Vice President, reportedly used a private email account to conduct public business as governor of Indiana, at times discussing sensitive matters and homeland security issues, and the account was hacked last summer.
Indiana law does not prohibit public officials from using personal email accounts, the Star said.
“As Governor, Mr. Pence fully complied with Indiana law regarding email use and retention. Government emails involving his state and personal accounts are being archived by the state consistent with Indiana law, and are being managed according to Indiana’s Access to Public Records Act.”
The Swamp is trying its best to get something to stick.
15 Dec 2016
More states confirm suspected cyberattacks sourced to DHS
Channel 2 Investigative Reporter Aaron Diamant has learned two more states’ election agencies have confirmed suspected cyberattacks linked to the same U.S. Department of Homeland Security IP address as last month’s massive attack in Georgia.
The two states reporting the suspected cyberattacks were West Virginia and Kentucky.
I wonder if there are any Russians working for DHS…
9 May 2016
1,650 Pages of George W. Bush’s Skull and Bones Records Are Set to Be Publicly Released
Mark your calendars: In July, the National Archives intends to publicly release over 1,000 pages of records from the George W. Bush administration pertaining to Skull and Bones, the Yale secret society that counts both the former president and his former president father as members.
A brief Skull and Bones primer for the uninitiated: the society, founded in 1832, meets in a windowless brick building on Yale’s campus known as “The Tomb.” Members are sworn to silence about what goes on inside, and are bound by tradition to leave the room whenever a non-Bonesman mentions the group’s name in their presence. Despite this shroud of secrecy, rumors have leaked out about occult-style rituals and Busch Light-soaked traditional college parties alike. In addition to the Bushes, the society counts Time magazine founder Henry Luce, conservative icon William F. Buckley, and U.S. Secretary of State John Kerry, W.’s 2004 presidential opponent, as members.
For those of you who get into this secret society vibe.