University of Minnesota to test new Light Rail electromagnetic scenarios late at night

This is sort of cool. Went out to U students just recently. I am hoping the Green Line is activated ASAP!! Still moar cables to install in downtown St Paul dangit. On with the show!

From: Vice President Pam Wheelock <noreplywheelock@umn.edu>
Date: Mon, Aug 5, 2013 at 4:07 PM

Good afternoon.

I have two important items regarding the Green Line Light Rail Transit line to share with the campus community.

Overnight Train Testing to Begin

Overnight train testing on the Green Line Light Rail Transit line (formerly known as the Central Corridor) will begin this week and is expected to continue until late September. During the testing, trains will operate through the overnight hours and will move through campus at operational speeds. The cooperation and assistance of the entire campus community is needed to maintain safety and to ensure the integrity of the testing.

This testing for Electromagnetic Interference (EMI) and Vibration will occur between 1:00 a.m. and 5:00 a.m. starting Thursday, August 8. During these late night hours, the University will need to limit building operations, and roads and sidewalks will be closed in order to ensure we have the quietest environment possible. This quiet environment is necessary in order to isolate the train vibrations and EMI from the existing background conditions. Please note that these closures and operational limits are ONLY during the late night hours.

More detailed information on the overnight train testing is available in the following .pdf documents:

Overnight Train Testing General Information Fact Sheet
EMI Certification Fact Sheet
Vibration Certification Fact Sheet

Washington Avenue Bridge Closure

In order to complete the final construction items on the Washington Avenue Bridge, the Met Council will close lanes on the vehicular level of the Bridge over the next two weeks. There will be no impacts to the pedestrian level of the Bridge.

The eastbound lane of the Washington Avenue Bridge will be closed from August 12 through August 16. The Metro Transit bus stop at Blegen Hall will be closed. Bus riders will instead use the Cedar/Washington Avenue bus stop.

The westbound lane will be closed from August 18 through August 23. The bus stop for Metro Transit and University of Minnesota Campus Connector at Willey Hall will be closed. Instead, bus riders will use the stop located at the 3rd Street Ramp, west of Cedar Avenue for Metro Transit Buses and the bus stop at the southeast intersection of 19th Avenue and 2nd Street for the University of Minnesota Campus Connector.

More detailed information on the bridge closure is available in the following .pdf documents: Met Council Central Corridor Construction Update

This message was approved by the Vice President for University Services of the University of Minnesota and sent to all Twin Cities students, faculty, and staff.

Massive Minnesota Tar Sands Enbridge Line 67 called out by Rep. Hornstein for invalid Certificate of Need at MN Public Utilities Commission; Utah make total win; Felix & Michigan Cats win vs Enbridge Line 6B today!

Set yr hashtags for #fearlessSummer #summerheat cause it's on! Enbridge is a Canadian corporation trying to nail down a disastrous and indeed genocidal tar sands pipeline from Alberta Canada. This would be bigger than the infamous Keystone XL.

Great starting article based on latest events: Climate activists to fossil fuel industry: ‘If you build it, we will come’ by Camila Ibanez.

On the Minnesota front first: It's a bit of a complicated regulatory story - for a rundown and action items start here: http://tc.indymedia.org/2013/jul/dont-keystone-take-action-stop-enbridge...

Posted just now on OccupyMN.org about this with more detailz, plz check it out - http://www.occupymn.org/as-the-enbridgeresistance-grows-a-minnesota-repr...

See earlier: http://www.ienearth.org/oil-in-your-backyard/ (July 18)

Related lines (but not Line 67) are blockaded outside Leonard MN and the camp is awesome. Follow on fedbook: https://www.facebook.com/EnbridgeBlockade - Background story: http://earthfirstnews.wordpress.com/2013/08/05/red-lake-encampment-battl...

http://www.startribune.com/business/215881221.html

http://www.bemidjipioneer.com/content/state-oks-pipeline-change-over-protests

Fortunately just found out today, State Rep. Frank Hornstein has at least gone on record that the Certificate of Need is total BS. He's a pretty good guy.

enbridge-line-67-hornstein.jpg

Here is a backgrounder on the tar sands world market mechanisms from Al Monaco CEO of Enbridge: http://www.northerngateway.ca/news-and-media/northern-gateway-blogs/trad... indicating Hornstein is indeed correct and Enbridge is lying in the MN Certificate of Need.

/////

In related developments in Utah: Efforts to scatter investors from the potential first US tar sands mine have gotten tons of traction and lots of nifty direct action! http://canyoncountryactioncamp.org/ and on twitter @Peace_Up_ and https://twitter.com/CCRisingTide also https://twitter.com/tarsandsRESIST . Here is the full reportback from @uneditedcamera http://uneditedmedia.com/utah-canyon-country-action-camp/ - please read it!

Just a fantastic video from our dear colleagues! Please pass it on, best direct action in Utah video evar?!

Lol direct action zaps already almost worthless 'penny stock' - take that Capitalist herd navigating betwixt fears & greeds! http://earthfirstnews.wordpress.com/2013/08/06/tar-sands-stock-tanks-after-direct-action-in-utah/ .

TICKER: http://ca.finance.yahoo.com/q?s=USO.V and great headline: http://www.kcsg.com/view/full_story/23284210/article-US-Oil-Sands-stock-drops-13--day-nonviolent-direct-action-shuts-down-mine?instance=eeo_report1 "US Oil Sands stock drops 13% day nonviolent direct action shuts down mine".

/////

In Michigan today something's been going on all day with Michigan Cats! These Lolcats just got the goods with Non Violent Direct Action! On FedBook: https://www.facebook.com/michigancats

main post / live blog: http://www.michigancats.org/daring-aerial-blockade/. on tweeter: https://twitter.com/MichiganCat

This morning, MICATS is taking direct action in the Crane Pond State Game Area to halt expansion of Canadian corporation Enbridge Energy’s tar sands pipeline 6B with an aerial blockade.

LIKE and SHARE if you stand in solidarity with impacted communities, ‪#‎MICATS‬, and all those resisting tar sands infrastructure.

Check out our LIVE updates on our blog! http://www.michigancats.org/

michigancats2.jpg michigancats1.jpg

//////

California Wut? Also via @revfredsmall "Fantastic 7-min interview w/ my 90yr-old mom arrested at #SummerHeat Richmond Chevron @KALW #CrossCurrents (:59-8:00) http://bit.ly/174YUo9 " - San Fran Chronicle Ecuador communities speak out : http://t.co/99cyAfqdPS . via @carriem213: sit in to get arrested vs fossil fuels . DNow snippet about 200 arrested: http://m.democracynow.org/headlines/2013/8/5/35340

Well it is just great to see things firing on so many cylinders on this issue. Good luck everyone!!!

UPDATE: left out a few things. Oglala Lakota president Brewer arrested in human blockade at White Clay Nebraska - http://youtu.be/08qOoZNohSw .

IDAHO: About 100 in Nez Perce Tribe maintain 2.5 hour rolling roadblock despite 40-50 police officers. Moar here: http://bsnorrell.blogspot.com/2013/08/photos-nez-perce-rolling-roadblock... . some more updates here: https://www.facebook.com/bigcountrynewsconnection?hc_location=stream

Money Warz: Emperor Pipeline, Darth Banker, Luke Whistleblower & Chomsky wan Kenobi & The Trans-Pacific Partnership Death Star need yr help!

Here is a fun art project against the evil Trans Pacific Partnership treaty of Doom! Please pass the word or a couple bucks for Money Warz, a street art performance getting the Occupy Wall Street band back together on the 2nd anniversary, Sept 17 2013 - the goal is $1000 or moar... If they can get up to say $4K things could really get epic.

See earlier: July 22nd: Trans Pacific Partnership discussion & community QA with Keith Ellison, IATP & MN Fair Trade Coalition. Malaysia Round starts July 15 | HongPong.com. [I have suggested including to Ellison to post a simple bill that would ban the US trade representative from having secret files - hopefully others can pick up on the idea!]

Fortunately, much of the gear for this project including the Nosferatu mask & around 100 money trooper masks have already been created, but can be creatively extended and remixed for great lulz. Some of the puppets have already been used for great success in Albany and elsewhere - the money troopers of the Didactic Empire were the honor guard for a marriage between a corporation and a politician, which defined corporatism in widely carried stories on corporatism and campaign finance in May 2013.

Here's a blurb:

Hello,

The one percent have a dream - a global corporate coup called the Trans-Pacific Partnership (TPP) - a secret trade deal to be fast tracked into law in October, no debate or amendment. And neither the public nor the media have been permitted to see this NAFTA on steroids - just the 600 corporations that are quietly writing it behind closed doors! This is what plutocracy looks like.

Please support our kickstarter to fund a huge theatrical spectacle in Times Square on the 2nd anniversary of Occupy Wall Street, to force attention and build awareness - while we still can.

Money Warz, a Star Wars parody, presents:

http://www.kickstarter.com/projects/tedword/money-warz-tpp-death-star-ca...

Thank you!

Elliot and Ted

elliotcrown@earthlink.net

http://moneywarz.org

moneywarz-site.png

Check out a few pics of these epic puppets designed and built earlier by Elliot, showing the general visual style of these amusing political icons. They remind me of Heart of the Beast & MayDay in Minneapolis.

fossil.jpg gmo.jpg

This Statue of Liberty is great - I'm near the original plaster cast for it right now!

liberty.jpg

The money troopers guarded Mitt Romney, Obama and the Monopoly Man in Times Square on Election Night 2012.

TS.jpg

I approve the Fossil Fool!

testing-the-gear.jpg

By the way, related predecessor project. Here is the video of the Pyramids at Another End of the World Part One:

And some other related material like the Tax Dodgers which made it into the Cooperstown NY National Baseball Hall of Fame...

tax post o good.jpg tax duo good.jpg bull on a stick uptown.jpg

And see earlier - the thumbnail AP, even Capt. Ray Lewis was there: Anti-fracking groups rally in Albany, urge ban. Anyhow I think the TPP project is definitely worth supporting and would be a good way to reach lots of people through humor.

VIDEO: Minneapolis Rally #Justice4Trayvon #Justice4Terrance

Here is live video from #justice4trayvon #justice4terrance rally Sat night ~12:30AM in Downtown Minneapolis >> http://www.youtube.com/watch?v=8RyjuazWlik&feature=youtu.be (creative commons - interview w Mel Reeves!) - several FB events for Monday >> https://www.facebook.com/events/205300609626208/

https://www.facebook.com/events/610769695620223/

https://www.facebook.com/events/300046336807336/

Minneapolis residents hit the streets after Zimmerman acquitted in Florida murder trial. On Friday there was another march for late Terrance Franklin, killed by Minneapolis Police Department May 10th with five bullets to back of head according to a family member.

Video has several interviews including with Mel Reeves @ 17:20who has called for a rally on Monday at Hennepin Co. Government Center (Peoples Plaza). NOTE I heard earlier it was on SUNDAY but there is NOT a rally at Plaza on Sunday according to Mel.
http://justiceforterrancefranklin.wor...

Upcoming events - several posted: :/
https://www.facebook.com/events/20530...
https://www.facebook.com/events/61076...
https://www.facebook.com/events/30004...

Filmed shortly after midnight Sunday July 14th
CREATIVE COMMONS WITH ATTRIBUTION

Original via here: http://bambuser.com/channel/Hongpong
http://bambuser.com/v/3739301 - please subscribe for more videos.

Canadian First Nations - Shut Down the Tar Sands Highway! Taconite Mercenaries appear in Wisconsin

A network of direct action camps - and indeed a network of networks - continues to spread across North America uniting Natives, First Nations, meddling kids, even ranchers and activists vs corporate exploitation. Mercenaries have appeared in northern Wisconsin to protect dangerous & widely opposed taconite mining operations as well. As Winona LaDuke has highlighted, militarization of the fossil fuel scenario in the US & Canada is moving full speed ahead.

URL: https://www.youtube.com/watch?v=QGTQ2gI3pMk&feature=youtu.be

Published on Jul 8, 2013

http://acfn.com

On July 6, 2013, hundreds of people gathered at the 4th Annual Tar Sands Healing Walk in Fort McMurray Alberta. During the Walk it was announced that a major oil spill occurred on the Athabasca River flowing into the Lake Athabasca in the Indigenous Community of Fort Chipewyan.

Later that evening at the Celebration Feast for the Healing Walk, Gitz Crazyboy of the Athabascan Chipewyan First Nation announced a call for action to stop traffic on Alberta highway 63 on August 24th, 2013.

Highway 63 is the main artery which carries workers to the Tar Sands production sites North of Fort McMurray.

The Youth of the Dene Nation are calling out for support to help them demonstrate to Industry and the Governments that the Tar Sands must be stopped for the sake of the future generations. On August 24th, 2013, join them by coming to the action in Fort McMurray or plan an action in solidarity with their plans.

For more information visit
acfn.com
or call Lionel Lepine
at 780-838-8384

Also: https://www.facebook.com/unistoten?fref=ts

Main site: http://unistotencamp.com/

Related in Minnesota, please follow: https://www.facebook.com/EnbridgeBlockade?fref=ts - going strong for months!

1001655_572371222815411_327085333_n.jpg

The Yinka Dene Alliance issues a cease-and-desist letter to Enbridge, saying their member's territory comprises 25% of the proposed Northern Gateway pipeline route.
BREAKING: The Yinka Dene Alliance warns the Enbridge against trespassing in their traditional territories as they seek temporary permits for drilling and tree removal.

In a news release issued this morning, the Yinka Dene Alliance said it has sent a cease-and-desist letter to Enbridge.

The alliance says its members' territories make up 25 per cent of the proposed pipeline route.

http://www.vancouversun.com/business/first+nations+opposed+pipeline+warn+Enbridge+against/8586827/story.html

‎#idlenomore ‎#enbridge ‎#tarsands

/////

N Wisconsin Mercenaries: Some URLs on the Northern Wisconsin thing: it looks like Iran Contra is breaking out in northern Wisco or something :[

VIDEOS: http://www.indiancountrynews.com/index.php/tv/indian-country-tv-com/13869-hired-guns-in-the-penokee-mountains-6min#.UdpGuZEIcVw.facebook

Join ICTV on a walk into the Penokee Mountains Heritage Park with relatives and grandchildren to take pictures of drill site #6 about 1 mile from the Lac Courte Oreilles Ojibwe Treaty Harvest and Education Camp on Moore Park Road in Iron County Wisconsin. #RFKvisitPenokeeHills photos by Rob Ganson

VIDEO: http://www.youtube.com/watch?v=f6uprpy19TY


tumblr_mpmf8mqcx41s7r7rso1_1280.jpg

http://mountpleasant.patch.com/groups/mike-paczesnys-blog/p/what-exactly-is-happening-at-a-wisconsin-iron-mine-drilling-site mercenaries in wisconsin http://unitedindefenseofthewater.com/ http://www.bluecheddar.net/?p=33877

Also side note - people rising up in California prisons: http://seattlefreepress.org/2013/07/09/california-prison-officials-say-3...

Resistance is fertile!

Backstories & Backbones; Security of US Emergency Alert System (EAS) is crap & spoof zombie apocalypses not very difficult apparently; #OpNSA NSA PRISM tunnel servers may be getting noticed; Joe Naccio & NSA revisited

Oh For Facks Sake. All this big government/police state techno-crap is so often easily hacked in some way, which means the Awesome Emergency Powers of Teh Govmints are easily subverted by the Baba Booey fans of the world, or zombie apocalypses as the case may be. Indeed quite possibly all this NSA crap is starting to get hacked (and not just by activists but cynical commercial weasels) and since it's all backdoored to everything and everyone's mom, everyone gets screwed. Well played. Truth tellers keep publishing before it's too late :/

Much of this is old news but why not batch some of it in one place?

On the newer lulz front at least some people are claiming to poke around including determining which servers run in-between points for PRISM mass surveillance for the NSA. And I don't know anything about these IOActive guys who posted on the EAS hack but they seem worth keeping an eye on….

Before the EAS info, here is a good place to look at alternative, well polished and much open source apps : https://prism-break.org/ - bookmark this and use it when setting up any new computer :)

Emergency Alert System Fail: Also covered in ars technica. See this video's crazy audio message for hacked Montana Emergency Alert System clip from this February: http://gawker.com/5983516/montana-tv-stations-emergency-alert-system-hac...

So more or less a main contractor mailed out the damn master login keys to their products controlling the national Emergency Alert System, exactly the opposite of what you're supposed to do.

Clearly in the event of some adverse network screwing with things, it will probably be a mess. Let's say a Jimmy Carter tries to cut off SAIC and Blackwater, triggering an epic new Iran Contra type Ollie North conspiracy scene -- all these dumb horrible systems like the EAS DASDEC will behave horribly.

/////

http://www.ioactive.com/news-events/ioactive_uncovers_vulnerabilities_in...

Press contact:
Craig Brophy
Global PR Manager, IOActive, Inc.
E: PR@ioactive.com
T: +1 206 462 2291

Press Release

IOActive Uncovers Vulnerabilities in United States Emergency Alerting System

Digital Alerting Systems DASDEC application servers found to be vulnerable to remote attack

Seattle, WA July 8, 2013IOActive, Inc., a leading provider of application security, compliance and smart grid security services, today announced that is has discovered vulnerabilities in the Emergency Alerting System (EAS) which is widely used by TV and radio stations across the United States.

IOActive's principal research scientist, Mike Davis, uncovered the vulnerabilities in the digital alerting systems - DASDEC - application servers. The DASDEC receives and authenticates EAS messages. Once a station receives and authenticates the message, the DASDEC interrupts the broadcast and overlays the message onto the broadcast with the alert tone containing some information about the event. The affected devices are the DASDEC-I and DASDEC-II appliances.

“Earlier this year we were shown an example of an intrusion on the EAS when the Montana Television Network's regular programming was interrupted by news of a zombie apocalypse. Although there was no zombie apocalypse, it did highlight just how vulnerable the system is,” said Mike Davis, principal research scientist for IOActive. “These DASDEC application servers are currently shipped with their root privileged SSH key as part of the firmware update package. This key allows an attacker to remotely log on in over the Internet and can manipulate any system function. For example, they could disrupt a station's ability to transmit and could disseminate false emergency information. For any of these issues to be resolved, we believe that re-engineering needs to be done on the digital alerting system side and firmware updates to be pushed to all appliances.”

The EAS is designed to enable to the President of the United States to speak to US citizens within 10-minutes of a disaster occurring. In the past these alerts were passed from station to station using the Associate Press (AP) or United Press International (UPI) “wire services” which connected to television and radio stations around the US. Whenever the station received an authenticated Emergency Action Notification (EAN), the station would disrupt its current broadcast to deliver the message to the public. On Wednesday 26 June, the Cyber Emergency Response Team (CERT) published an advisory providing details of the vulnerability.

IOActive has also issued its own IOActive Labs Advisory outlining the affected products, the impact and the solution.

About IOActive
Established in 1998, IOActive is an industry leader that offers comprehensive computer security services with specialisations in smart grid technologies, software assurance, and compliance. Boasting a well-rounded and diverse clientele, IOActive works with a majority of Global 500 companies including power and utility, hardware, retail, financial, media, aerospace, healthcare, high-tech, and software development organizations. As a home for highly skilled and experienced professionals, IOActive attracts talented consultants who contribute to the growing body of security knowledge by speaking at such elite conferences as Black Hat, Ruxcon, Defcon, BlueHat, CanSec, and WhatTheHack. For more information, visit www.ioactive.com.

////////////

http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02

Advisory (ICSA-13-184-02)

Monroe Electronics DASDEC Compromised Root SSH Key

Original release date: July 03, 2013

OVERVIEW

This advisory provides mitigation details for a vulnerability that impacts the Monroe Electronics DASDEC.

Mike Davis, a researcher with IOActive, reported a compromised root SSH key vulnerability to CERT Coordination Center (CERT/CC). This vulnerability is in Monroe Electronics DASDEC‑I and DASDEC-II appliances. ICS-CERT coordinated with CERT/CC and Monroe Electronics to resolve the vulnerability. Monroe Electronics has produced an update that mitigates this vulnerability.

This vulnerability could be exploited remotely.

AFFECTED PRODUCTS

The following Monroe Electronics products are affected:

  • DASDEC-I
  • DASDEC-II

IMPACT

An attacker who exploits this vulnerability could gain root access to the device and affect the availability, integrity, and confidentiality of the system.

Impact to individual organizations depends on many factors that are unique to each organization. ICS‑CERT recommends that organizations evaluate the impact of this vulnerability based on their operational environment, architecture, and product implementation.

BACKGROUND

Monroe Electronics is a US-based company that maintains offices and research facilities in Lyndonville, New York. Monroe Electronics develops and distributes worldwide electrostatic measuring instruments including electrostatic voltmeters, electrostatic field meters, coulomb meters, and resistivity meters.

The affected products, DASDEC-I and DASDEC-II are emergency alert system (EAS) encoder/decoder (endec) devices that are used to broadcast EAS messages over digital and analog channels. According to Monroe Electronics, DASDEC-I and DASDEC-II are deployed across broadcast radio and television in the communication sector. Monroe Electronics estimates that these products are used primarily in the United States.

VULNERABILITY CHARACTERIZATION

VULNERABILITY OVERVIEW

COMPROMISED ROOT SSH KEYhttp://cwe.mitre.org/data/definitions/321.html, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotea_ixegenr" name="footnoterefa_ixegenr">a

DASDEC-I and DASDEC-II had publicly available firmware images for these devices that included a private SSH key that authorizes remote logins to the devices. For software versions prior to 2.0-2, where the default SSH keys have not already been changed, an attacker can then log into a device with root privileges.

CVE-2013-0137http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0137, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnoteb_ya73jua" name="footnoterefb_ya73jua">b has been assigned to this vulnerability. A CVSS v2 base score of 10.0 has been assigned; the CVSS vector string is (AV:N/AC:L/Au:N/C:C/I:C/A:C).http://nvd.nist.gov/cvss.cfm?version=2&vector=AV:N/AC:L/Au:N/C:C/I:C/A:C, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotec_6n5eegx" name="footnoterefc_6n5eegx">c

VULNERABILITY DETAILS

EXPLOITABILITY

This vulnerability could be exploited remotely.

EXISTENCE OF EXPLOIT

No known public exploits specifically target this vulnerability.

DIFFICULTY

An attacker with a moderate skill level could exploit this vulnerability.

MITIGATION

Monroe Electronics has produced a software update, Version 2.0-2 that resolves this vulnerability. DASDEC users can obtain the DASDEC v2.0-2 software update and release notes by contacting support@digitalalertsystems.com.

ICS‑CERT encourages asset owners to take additional defensive measures to protect against this and other cybersecurity risks.

  • Minimize network exposure for all control system devices. Critical devices should not directly face the Internet.
  • Locate control system networks and remote devices behind firewalls, and isolate them from the business network.
  • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPN is only as secure as the connected devices.

ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT Web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.http://ics-cert.us-cert.gov/content/recommended-practices, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnoted_t8orqgw" name="footnoterefd_t8orqgw">d ICS‑CERT reminds organizations to perform proper impact analysis and risk assessment prior to taking defensive measures.

Additional mitigation guidance and recommended practices are publicly available in the ICS‑CERT Technical Information Paper, ICS-TIP-12-146-01B—Targeted Cyber Intrusion Detection and Mitigation Strategies,http://ics-cert.us-cert.gov/tips/ICS-TIP-12-146-01B, Web site last accessed July 03, 2013." href="http://ics-cert.us-cert.gov/advisories/ICSA-13-184-02#footnotee_wn76bab" name="footnoterefe_wn76bab">e that is available for download from the ICS-CERT Web page (http://ics-cert.us-cert.gov/).

Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS‑CERT for tracking and correlation against other incidents.

///////////

http://www.kb.cert.org/vuls/id/662676

Vulnerability Note VU#662676

Digital Alert Systems DASDEC and Monroe Electronics R189 One-Net firmware exposes private root SSH key

Original Release date: 26 Jun 2013 | Last revised: 02 Jul 2013

Overview

Digital Alert Systems DASDEC and Monroe Electronics One-Net E189 Emergency Alert System (EAS) devices exposed a shared private root SSH key in publicly available firmware images. An attacker with SSH access to a device could use the key to log in with root privileges.

Description

The Digital Alert Systems DASDEC-I and DASDEC-II and Monroe Electronics R189 One-Net/R189SE One-NetSE are Linux-based EAS encoder/decoder (ENDEC) devices that are used to broadcast EAS messages over digital and analog channels. IOActive has reported several security issues affecting these devices. The most severe of these issues is the public disclosure of the default private root SSH key. The less severe issues could also contribute to an attacker's ability to compromise a vulnerable device.

Compromised root SSH key (CVE-2013-0137)
Publicly available firmware images for these devices included a private root SSH key that was authorized to log in to the devices (CWE-798, CWE-321). The fingerprint for the compromised SSH key is 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3. Although this key is not hard-coded, it may be impractical for less technical users to manually disable or change they key prior to firmware version 2.0-2.

Predictable session ID
IOActive reports that the administrative web server uses a predictable, monotonically increasing session ID. This finding is based on running the web server in a test environment. Testing on a variety of firmware versions on devices both at the factory and in the field, Monroe Electronics could not reproduce this finding.

Log information disclosure
Logs available via the web server provide a variety of information about the configuration, operation, and status of the device (CWE-532). Some of the log information is public and may be required by regulation.

Predictable password generation
The dasdec_mkuser script generates passwords in a deterministic way (CWE-341), however these passwords are not for administrative access, and the script is not used for general user account configuration.

Default password
Like many similar devices, the DASDEC and One-Net ENDECs use default administrative credentials. Some sites fail to change the default administrative password and allow unrestricted internet access.

Impact

An attacker with the private key and SSH access can log in to a device with root privileges.

Predictable session IDs could allow an attacker to take control of an existing administrative web session.

Predictable and unchanged default passwords can allow an attacker to log in to a device with root privileges. Devices exposed to the internet are at particularly high risk, for example, see Secure EAS Codecs Prevent Zombie Attacks and US-CERT Alert TA13-175A.

Logs may disclose configuration information that can benefit an attacker.

Solution

Apply an update

On April 24, 2013, Monroe Electronics and Digital Alert Systems released firmware version 2.0-2 that disables the compromised SSH key, provides a simplified user option to install new unique keys, and enforces a new password policy. Monroe Electronics has taken considerable effort to provide update information to DASDEC and One-NetSE users.

DASDEC users can obtain updated firmware and release notes by contacting <support@digitalalertsystems.com>. R189 One-Net users can contact <eas@monroe-electronics.com>.

Disable compromised SSH key

The compromised root SSH key should be disabled immediately, especially if the SSH service is exposed to untrusted networks such as the internet. If SSH connectivity is required, generate, install, and test new SSH keys before disabling the compromised key. The fingerprint for the compromised SSH key is 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3.

Manually inspect SSH keys

To identify a compromised key, examine the authorized_keys file at /root/.ssh/authorized_keys2.dasdec and use the ssh-keygen command to show SSH key fingerprints. The following example shows the fingerprint for the compromised key:

$ ssh-keygen -l -f authorized_keys2.dasdec
1024 0c:89:49:f7:62:d2:98:f0:27:75:ad:e9:72:2c:68:c3 wood@endec1 (DSA)

Note that ssh-keygen only shows the fingerprint for the first key/line in the file. If authorized_keys2.dasdec contains multiple keys (multiple lines, one key per line), it will be necessary to extract each key (line) to a separate file and run the ssh-keygen command on each key/file. These shell scripts can be used to list and test multiple SSH keys in an authorized_keys file:

To generate new SSH keys, use ssh-kegen.

Restrict access

If for some reason you are not able to remove and replace the compromised SSH key, restrict access to the SSH service to highly trusted hosts and networks only. As a general good security practice, restrict access to all services to trusted hosts and networks.

Change default passwords

Change any default passwords, and do not deploy production systems without changing default passwords. Search engines like Shodan can index systems exposed to the internet and default passwords are usually documented and well-known. It is often trivial for an attacker to identify and access systems on the internet using default passwords.

/////

#OpNSA: Some infos has been coming out about possible probing into the NSA PRISM system. Here are copies of some pastebins about all this. Start here: https://twitter.com/Op_NSA . It is indeed branded Anonymous and they said that two anons got searched over the weekend. What's cooking? Will the now-more-infamous NSA Q Group catch these cats?

#OpNSA claiming to have doxed some NSA officials and posting their phone numbers on interwebs. Something big may be taking off here -- if it turns out to be a honeypot there still better be lulz!

statement here:

Twitter: http://www.twitter.com/op_nsa

IRC: https://webchat.anonops.com/?channels…

Transcript below:

Greetings Citizens of the World, we are Anonymous. It is understood that the recent exposé of the national security agency has angered you. Anger caused by the realization that your own elected representatives promised to vote for your best interests but changed their minds when the price was right, in favor of increased surveillance on your normal everyday life. You hate them for voting your freedom and privacy away, and you have every right to. There are those that say you have nothing to fear if you have nothing to hide, but these are the same people who won’t tell you any of their own personal information upon your request. Complacent cowards like these have made it easier for this enormous surveillance operation to come to fruition. Eventually enough legislation will pass in favor of the evolving police state that will make every citizen a potential terrorist by default, and the NSA is at the core of it all. But you wonder to yourself, what can be done about all of this injustice and corruption? The answer is simple. Raise your voice so loud that no one can ignore it. Create such an overwhelming public outcry that the government and the media will be forced to acknowledge the issue. We need to show those directly responsible for all of this that there will be consequences for betraying us, and it will be the last time they do. In accordance with this we will be initiating stage two of operation national security agency and releasing the personal information of one politician each week that slandered Edward Snowden as a criminal and was involved with supporting the NSA and PRISM. We will make visible to everyone the depth of their violations against our freedom, privacy and well-being. We will expose the precise amount of money it took for them to turn their backs on us and we will show them how it feels to have their privacy abused and their personal information mined, collected and analyzed. But we won’t stop there. Since this affects not just Americans but everyone around the world, it is only right that we give this information as much exposure as possible. Spam the emails of your local representatives voicing your opposition to these surveillance measures along with president obama. Spread flyers regarding the NSA’s data mining and organize protests to inform the public. We will all need to work together in spreading this information as far and wide as we can so that the world is fully aware of what has been orchestrated at their expense. We are all in this together and have an obligation to awaken the masses to see how their rights are being stripped away one by one leaving themselves, their friends, their family and their children vulnerable to government manipulation and control. This will spark an awakening that cannot be stopped.

We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
Expect us.

This one is interesting, I don't know why anyone would trust any VPN in particular tho :/

/////

http://pastebin.com/BzN9aUkq By: luminary on Jun 29th, 2013 | OpNSA VPN services.

Want to defeat PRISM?

Do you like the idea of free internet usage?

Well here is a list of Virtual Private Network providers recommended by Anonymous.

These services claim explicitly in their Terms of Service that they don't keep connection

logs on their customers, though it's always best to do some SERIOUS digging into a company's

history before you commit your freedom.

If you don't plan on doing anything illegal and you're merely trying to avoid snoopers

or circumvent censorship, free VPNs will likely suffice, but if you're going for a more

shady flavor of activism, don't leave home without these.

All of these accept Bitcoin, so that's a very helpful attribute. Bitcoin is a highly secure

payment method used if you don't want people to know who you are when you buy things over the internet.

BTGuard VPN

Private Internet Access VPN

Air VPN

PRQ VPN

Mullvad VPN

///////

http://pastebin.com/TpGTHDSy By: luminary on Jul 7th, 2013 | syntax: None | size: 2.45 KB | hits: 2,365 | expires: Never

PRETENTIOUS MINIATURE PRESS RELEASE:

Greetings, National "Security" Agency -- and our followers whom we love so much:

This may look like a small release, but it's actually huge. See, we hacked the NSA yet again because we just love doing that. These are DNS tunnels that are sending encrypted data to and from the PRISM databases. We have the IP's of those servers. If you crash these servers with DDoS, you literally render PRISM "broken". We are also planning to release some of that data (which we have access to) if we can decrypt it. So anyway. Hit these -- you hit PRISM. And die in the Matrix, you die in real life, etc etc.

SLIGHTLY TECHNICAL INFORMATION THAT MEANS NOTHING TO A LOT OF PEOPLE:

ns3-194.akamaiedge.net 56923 IN A 23.61.199.194

lar7.akamaiedge.net 64613 IN A 222.122.64.131

la11.akamaiedge.net 90000 IN A 213.254.238.131

lac1.akamaiedge.net 90000 IN A 193.108.88.1

la6.akamaiedge.net 70352 IN A 96.7.50.192

ns6-194.akamaiedge.net 90000 IN A 95.100.168.194

ns7-194.akamaiedge.net 90000 IN A 96.7.49.194

lar2.akamaiedge.net 84886 IN A 2.16.40.192

la1.akamaiedge.net 53942 IN A 184.26.161.192

lar6.akamaiedge.net 54809 IN A 195.59.44.137

la7.akamaiedge.net 39448 IN A 96.17.144.197

ns5-194.akamaiedge.net 35282 IN A 184.85.248.194

la3.akamaiedge.net 39672 IN A 96.7.251.131

Acquired by:

Restless

R00tsh3ll - @r00tsh3ll1 (twitter)

Intro Written and Info PASTED by:

Luminary - @aluminary (twitter)

PS:

There's TONS more information to release. We're going through some folders to see what we can and can't release before July 11th, 2013 (DDoS day). There's more to come. For those that have been asking for "proof of a hack", we're releasing some more as we go, but remember: this is the NSA. We have to be very careful about what goes public before we're done actually UTILIZING that information. For those that are understanding of this, you are the people that will receive the best information first! ^___^

//////

http://pastebin.com/X3siNZRC By: luminary on Jul 8th, 2013 | syntax: None | size: 3.64 KB | hits: 120 | expires: Never

Tor Tutorial

By: @aluminary

Greetings, faithful supporters of Anonymous and haters of PRISM. We are Anonymous, and for a moment, we're going to take time off from destroying things we don't like and teach you how to secure yourself and hide your identity while online. Naturally, this will be a benefit to you in the long run. Most people have no doubt heard of “TOR”, or “The Onion Router”. In basic terms, Tor is a routing network that sends all of your internet traffic through many different nodes all scattered about around the world. So imagine you've got a message you want to pass to a friend who's standing 100 meters from you. Whereas your standard internet traffic would be like walking over to your friend and handing him that note, Tor puts many different people between you two. So rather, in this situation, you'd hand the note to one of those people, they'd pass it to a random person, who'd pass that on, again and again until it gets to your friend. This allows the actual source of the traffic to be hidden after it comes through the exit node. Fortunately, Tor is very easy to acquire.

It can be downloaded from here: https://www.torproject.org/

For windows users, that download comes with the Tor browser bundle, which, when used, routes all of your traffic through a series of nodes as mentioned previously. Likely Linux users will know how to properly configure a client or program to use Tor, so we won't waste their time.

Once downloaded, that package will come with Vidalia Control Panel, an .exe file which acts as a sort of mothership. Once opened, a socks5 proxy server will begin running on local host. Your computer is the only computer on the network that will be able to use it unless others are also running Tor. The Tor browser will begin running on its own, so all you'll really need to do once in that browser is simply start searching away like a pro. If you want to verify your privacy because of paranoia, you can visit cmyip.com while using the Tor browser and be assured that your real IP is in fact hidden.

Tor itself is generally considered trust worthy. The thing is, even if nodes are run by undesirable parties, not only would said parties have to own that node, but they'd have to own the entire random path to... well... backtrace you. A downside of this entire thing, though, is that Tor is a high latency network. Because your traffic is being routed all around, it's also a bit slower. You will certainly notice slower internet speeds in applications using Tor (regular browsers not on the proxy won't be any slower). Then again, such a trivial matter is certainly worth the amount of protection Tor will offer you. Tor is a widely used and completely free project available at the aforementioned link.

Remember though, nobody is completely invincible. And human error can play into your traffic, or worse, your identity, being revealed. If, however, you take precautions to make sure Tor is operating and so forth, you will be fine. One more downside of Tor – that is one of the reasons a lot of us use VPN services – is that it's blocked in a lot of places. Because it's so easy and so anonymous, many websites, services, IRCs and networks will block Tor Exit Nodes to eliminate or crack down on abuse. In these cases, you'll probably need special permission to use the Tor server, as is the case with the AnonOps IRC network, which is one widely used meeting place for Anons.

Stay Anonymous. Stay safe.

Keep it up and defeat PRISM. Together, we are strong.

Together, we are Legion.

Twitter: https://twitter.com/op_nsa

IRC: webchat.anonops.com

channel: #opnsa.

^^You cannot use Tor with webchat. J/s

/////////////

Something ought to be said here ^ about the importance of other tracking links in browsers, time attacks, recent tor vulnerabilities that have come up etc. More caution and other layers are pretty surely necessary. Stuff like Ghostery to block various web tracker bugs for example.

A recent tor security example, you would need to keep javascript shut off to be safer from this, as but one example http://tedjonesweb.blogspot.com/2013/06/torbroker-security-vulnerability...

Another recent discussion http://seclists.org/fulldisclosure/2013/Jul/31

"I run 5 tor nodes. I can tell that 5 nodes on the network are save for me. Trust tor. I will not run dsniff or tcpdump. Its save. I will never abuse the logins you gave me for free. Afk now, that one guy is surfing on xhamster, nice video choice" -- "Alex"

Lol well put I suppose. Concise anyway.

Good tor network data source http://torstatus.blutmagie.de/

Router name agentAdrianLamo is doing well lol http://torstatus.blutmagie.de/router_detail.php?FP=ba7385668e2386246f2fb...

Tor vuln paper http://www.syverson.org/tor-vulnerabilities-iccs.pdf

http://www.blackhatlibrary.net/Tor

also for listserv activity https://lists.torproject.org/pipermail/tor-censorship-events/

Tor activity very much logged by NSA as shown recently http://nakedsecurity.sophos.com/2013/06/24/using-tor-and-other-means-to-...

Anyway it's just a normal hesitation in pointing out that Tor or given VPNs are not magically perfect for sure. There are merits to both technologies but magic boxes they are not! Of course one should assume the FBI is listening closely to IPs like webchat.anonops.com etc. 141.101.120.67 & 141.101.120.66

//////

For more on the Op_NSA situation check out

https://twitter.com/Op_NSA

https://twitter.com/aluminary

https://twitter.com/dickfacerax

///////

Email encryption in general:

For basics of encrypting email see Riseup.net: https://help.riseup.net/en/encrypting-email-with-thunderbird

Cryptome.org has had interesting stuff about PGP keys lately as well! http://cryptome.org/2013/07/mining-pgp-keyservers.htm & many posts on PGP keys registered to assorted federal departments! 2013-0744.htm 2013-0746.htm 2013-0741.htm etc

///////

More backstories and Backbones:

Here is a possible explanation of the Company A / B / C listings in the NSA Inspector General report. MCI, AT&T & Sprint:

Date: Wed, 03 Jul 2013 16:05:20 -0400
From: "James M. Atkinson" <jmatk[at]tscm.com>
Organization: Granite Island Group
To: TSCM-L Mailingin List <tscm-l2006[at]googlegroups.com>
Subject: Presidents Surveillance Program of 14 September 2001

On September 14, 2001 the NSA initiated a program on eavesdropping of all or the telephone and internet traffic of all U.S. Citizens, and concealed this quite unlawful program under many layers of secrecy, not because it as in the interests of national security, but rather to hide the violation of the Fourth Amendment.

These are the "initial three backbones" that the NSA tapped into (with the consent of the companies, each of whom gave the NSA full, unrestricted access):

The attached PDF file is a list of all of the funds spent by the program... do the math, and closely observe the date ranges (they perfectly match up, to the day with all of the dates in the Snowden document leaks).

MCI COMMUNICATIONS SERVICES INCORPORATED/MCI TELECOMMUNICATIONS CORPORATION
AMERICAN TELEPHONE & TELG COMPANY/AT&T
SPRINT COMMUNICATIONS COMPANY

In the IG report these aforementioned companies at listed at Company A, B, and C.

There are four additional companies (and others) to include Verizon, Nextel, Microsoft, Yahoo, Google, and so on.

See also procurement code: DAAB0701DH802 for Booze Allen Hamilton (Snowdens employer)

The project and procurement code as: DXXXXX01XXXXX

The program office as listed at:

2011 CRYSTAL DRIVE STE 911 (One Crystal Park Bldg "Crystal City 2" see also: http://cryptome.org/rummy-op2.htm)
ARLINGTON , VA , 22202-3732
USA

19.1 Billion Dollar Series of Contract initiated on the same day that the president authorized the Presidents Surveillance System for the NSA, and ending on the day it as shutdown.

Using a DUNS# of 790238638

The persons name under whom this was all listed is:

GRAFTON THOMAS BIGLOW
1312 Rhode Island Ave NW
Washington, DC 20005
(202) 483-8707

At the same address is:
Hope L Biglow

Grafton Bigelow is also listed at various addresses in:
414 Second
Cape May, NJ and West Cape May, NJ
(609) 884-4346

Plus several addresses in:
Hyattsville, MD
West Palm Beach, FL

But, the name Grafton Biglow also turns up:

FEDERAL PROCUREMENT DATA CENTER
7th & D Street SW, Room 5652
Washington, DC 20407
Director: Mr. Graffton Biglow
Fax: (202) 401-1546
Internet e-mail: grafton.biglow[at]gsa.gov

Curious coincidence.

Hopefully he had his own phone checked for bugs.

Maybe they can use the "Nuremberg defense"or claim "Befehl ist Befehl"

Very, very carefully look at the attached document, and take very deep and very slow breathes as you read it.

The bottom line is the Rainmaker system captured and indexed 1.17 racks per day of communications, bridging all major service providers, all fiber optic choke points, and eavesdropping mostly on U.S. Citizens (unlawfully) in what is called a "General Warrant" which is explicitly prohibited under U.S. Law.

The President of the United State is just a fucking moron, and utter and complete moron.

--- FUCK THE PIGS ---

-jma

--
James M. Atkinson. President and Sr. Engineer
"Leonardo da Vinci of Bug Sweeps and Spy Hunting"
http://www.linkedin.com/profile/view?id=15178662

Granite Island Group          http://www.tscm.com/
(978) 546-3803                jmatk[at]tscm.com
(978) 381-9111


Presidents-Spy-Program-Sept14-2001.pdf (342pp, 679KB)

/////////

The NSA Naccio Qwest case!

So there have been interesting developments. This bit about the contract hookups reminds me of Qwest's former CEO Joseph Naccio.

Here is what Naccio filed while fighting charges -- unlike virtually every white collar weasel ever, he ultimately got convicted of insider trading, no doubt with only the finest SIGINT available. Redacted PDF :: http://www.wired.com/images_blogs/threatlevel/files/512.pdf

http://www.denverpost.com/breakingnews/ci_22918125/former-qwest-ceo-joe-nacchio-moved-halfway-house - April 2013 he is getting out of jail soon with enormous fines as well. Many posts at Denver Post.

Nacchio, who turns 64 in June, was convicted in 2007 on 19 counts of illegal insider trading connected to his sale of $52 million in Qwest stock. A federal jury in Denver found that he sold the shares based on nonpublic information about the company's deteriorating financial condition.

Lucrative secret contracts indeedly doodley.

http://usatoday30.usatoday.com/news/washington/2006-05-10-nsa_x.htm 5-11-2006

The NSA, which needed Qwest's participation to completely cover the country, pushed back hard. ...

... the agency suggested that Qwest's foot-dragging might affect its ability to get future classified work with the government.

//////

Oct 15 2007: WSJ story: http://webcache.googleusercontent.com/search?q=cache:http://online.wsj.com/article/SB119240248793758652.html

Nacchio Alleges Reprisal

Qwest Ex-CEO Says Firm Denied Pacts After Spurning NSA

By

DIONNE SEARCEY

and

EVAN PEREZ

Contentions from former telecommunications executive Joseph Nacchio that the government retaliated against his company because he didn't comply with National Security Agency requests could add to the renewed debate over the NSA's secret surveillance of telephone records.

Once-classified documents that were unveiled in the insider-trading case of Mr. Nacchio, the former chief of Qwest Communications International Inc., Q +1.60% suggest the U.S. government didn't offer lucrative contracts to the company after Mr. Nacchio refused to cooperate with what the documents call "improper government requests" in February 2001. The documents, submitted as part of Mr. Nacchio's defense in the insider-trading case, don't elaborate on the government requests. Mr. Nacchio has said in the past he didn't comply when asked by the NSA for access to the private phone records of Qwest customers.

Mr. Nacchio in April was convicted in federal court in Denver of insider trading for selling $52 million of stock in the spring of 2001 as Qwest's outlook was deteriorating. He was sentenced to six years in prison but remains free pending his appeal. His attorneys suggested in pretrial filings that Mr. Nacchio believed the company was about to win secret government contracts that would keep it in the black, despite warnings from his executive team that the company was in financial trouble. The judge at his trial didn't allow much of the classified defense, and Mr. Nacchio's appeal disputes that decision. The latest revelations were in pretrial briefs filed months ago that were unsealed last week.

A spokesman for the Director of National Intelligence office, which oversees the NSA and other intelligence agencies, declined to comment on the allegations in the court filings.

The revelations emerge as the White House is in negotiations with Congress on long-term changes to the 1978 Foreign Intelligence Surveillance Act. Democrats, and some Republicans, in Congress are at odds with the Bush administration's demand that lawmakers preserve the secrecy of the NSA program by granting telecommunications companies immunity from lawsuits for any aid they gave to the government surveillance without a court order.

The administration has balked at giving Congress documents detailing the legal justifications for the NSA program, and says that the secrecy is necessary to protect national security.

Speaking on Fox News channel yesterday, House Majority Leader Steny Hoyer (D., Md.) restated his position that Democrats were willing to pass such immunity, if the administration turned over documents about the NSA program.

Write to Dionne Searcey at dionne.searcey@wsj.com and Evan Perez at evan.perez@wsj.com

///////////

The Daily Caller is trying to get this narrative bounced again: http://dailycaller.com/2013/06/13/jailed-qwest-ceo-claimed-that-nsa-retaliated-because-he-wouldnt-participate-in-spy-program/

CBS news in 2009: http://www.cbsnews.com/2100-250_162-1616326.html

Naccio's argument was not allowed in open court. Of course that Denver judge also had the NSA all over his phone too I would hazard to guess.

But who cares what the NSA does to judge's phones anyway? (see NSA whistleblower Russ Tice specifying NSA space asset surveillance vs Justice Alito for example)

Don't forget Israel re NSA contractors: read up on James Bamford on Israeli contractors & the NSA: http://www.wired.com/threatlevel/2012/04/shady-companies-nsa/ . A few salient snippets on the pervasive role of the spinoff companies of Israel's NSA equivalent, Unit 8200:

Like Narus, Verint was founded by in Israel by Israelis, including Jacob “Kobi” Alexander, a former Israeli intelligence officer. Some 800 employees work for Verint, including 350 who are based in Israel, primarily working in research and development and operations, according to the Jerusalem Post. Among its products is STAR-GATE, which according to the company’s sales literature, lets “service providers … access communications on virtually any type of network, retain communication data for as long as required, and query and deliver content and data …” and was “[d]esigned to manage vast numbers of targets, concurrent sessions, call data records, and communications.”

In a rare and candid admission to Forbes, Retired Brig. Gen. Hanan Gefen, a former commander of the highly secret Unit 8200, Israel’s NSA, noted his former organization’s influence on Comverse, which owns Verint, as well as other Israeli companies that dominate the U.S. eavesdropping and surveillance market. “Take NICE, Comverse and Check Point for example, three of the largest high-tech companies, which were all directly influenced by 8200 technology,” said Gefen. “Check Point was founded by Unit alumni. Comverse’s main product, the Logger, is based on the Unit’s technology.”

According to a former chief of Unit 8200, both the veterans of the group and much of the high-tech intelligence equipment they developed are now employed in high-tech firms around the world. “Cautious estimates indicate that in the past few years,” he told a reporter for the Israeli newspaper Ha’artez in 2000, “Unit 8200 veterans have set up some 30 to 40 high-tech companies, including 5 to 10 that were floated on Wall Street.” Referred to only as “Brigadier General B,” he added, “This correlation between serving in the intelligence Unit 8200 and starting successful high-tech companies is not coincidental: Many of the technologies in use around the world and developed in Israel were originally military technologies and were developed and improved by Unit veterans.”

Equally troubling is the issue of corruption. Kobi Alexander, the founder and former chairman of Verint, is now a fugitive, wanted by the FBI on nearly three dozen charges of fraud, theft, lying, bribery, money laundering and other crimes. And two of his top associates at Comverse, Chief Financial Officer David Kreinberg and former General Counsel William F. Sorin, were also indicted in the scheme and later pleaded guilty, with both serving time in prison and paying millions of dollars in fines and penalties.

Anyway that's enough stuff for now. Figure better to get a hard reference of it for those interested!

Mysterious Parastoo apparent Iranian hacker group claims UAV flight inside USA; Redhack Turkish hackers on the Move, accused "cyber terrorist organization"

A few linxors on hacker stories both Turkish and Iranian. Pretty mysterious, not sure what to make out of it… Another post via Cryptome.

SOURCE: Parastoo Claims Launch of Second UAV in US

FOR IMMEDIATE RELEASE
FROM : PARASTOO
TO : DOD
RE : http://en.wikipedia.org/wiki/Iran_Air_Flight_655
HANDLE: OP655, PRE-RELEASE

PARASTOO IS SPEAKING. 

YOU NEED TO BE INFORMED THAT WE HAVE SUCCESSFULLY LAUNCHED A SECOND 
UAV FLIGHT ON U.S SOIL. THE RESULTS OF THIS OP WILL BE PUBLISHED 
TIMELY AFTER OUR RELEASE REGARDING THE JFK OP, DURING THE UPCOMING 
SO-CALLED GENEVA-2. OP655 TOOK PLACE OVER A DESERTED AREA IN 
MARYLAND, FAR FROM CIVIL OR MILITARY BASES FOR THE PURPOSE OF THIS 
DEMO.

BOTH UAV USED IN THESE OPS ARE MADE IN U.S POWERED BY iDIRECT SYSTEM, 
WHICH WE MENTIONED IN OUR PREVIOUS MESSAGES. U.S NAVY USS VINCENNESE 
WAS INSIDE IRANIAN TERRITORY WHEN FIRED MISSILE TO A CIVILIAN PLANE 
RESULT IN 299 DEATH AMONG THEM 66 CHILDREN. LATER, THE CAPTAIN 
RECEIVED A MEDAL FOR HIS HEROIC OPERATION. 

TO HONOR THAT EVENT WITH A PROPER MEDAL BASED ON OUR STANDARDS, OP655 
FULL RELEASE WILL HAVE A BONUS: TECHNICAL DETAILS OF RQ-170. 

BESIDES THE GENEVA-2, WE HAVE SET DATES FOR FUTURE RELEASES ACCORDING 
TO A LIST OF DATES IMPORTANT RESISTANT FIGURES HAVE BEEN TARGETED AND 
ASSASSINATED BY THE ONLY REGIME WHO GET TO ENJOY A 6-DECADES DURABLE 
"LICENSE TO KILL" [1] WHILE SUCKING UP FINANCIAL BLOOD OUT OF U.S 
CITIZENS [2], WHO HAVE TO DEAL WITH THEIR OWN HONORABLE MEDAL 
CARRYING OFFICIALS LIKE JAMES CLAPPER WHO JUST EMBARRASSED HIMSELF 
ONCE AGAIN [3].

WHILE YOU ARE ENJOYING WATCHING A BIT OF UAV FUN FLYING OVER MONSTER 
FLEETS [4] WE WOULD LIKE TO REMIND YOU NO MATTER WHERE YOU ARE,EVEN 
INSIDE PROTECTED CUBES IN MARYLAND OR THE MOST NUCLEAR-POWER 
DEPENDENT AREA -- VIRGINIA, YOU ARE NOT ANONYMOUS. EXPECT US.

03 JULY 2013
P.

1:http://www.telegraph.co.uk/news/worldnews/middleeast/israel/
7254807/Mossads-licence-to-kill.html

2:http://www.spacedaily.com/reports/Israel_seeks_5B_in_US_loans_
to_buy_arms_999.html

3:http://www.techdirt.com/articles/20130701/12494623683/james-
clapper-admits-he-lied-to-congress-even-his-excuse-is-
misleading.shtml

4:http://f.lui.li/get_680_c87d.html

And via here: f.lui.li/get_680_c87d.html loaded this video, looks like a UAV watching an aircraft carrier apparently.

In late November 2012: Anti-Israel hackers leak nuclear watchdog email addresses • The Register

Troll-Hackers? Is This Nuclear Agency Under Cyber Threat by Familiar Iranian Hacker Group? | SiliconANGLE

The Hacker News - Security in a Serious way: Parastoo - Hackers break into International Atomic Energy Agency servers - The Hacker News

Full release from 25 Nov 2012: Parastoo Hacks IAEA && PARASTOO - 1 - Pastebin.com

Feb 26 2013: Parastoo claims hack of contractor linked to nuclear data | Washington Free Beacon: "Parastoo also stole more than 450,000 credit card records from some of IHS’s largest commercial clients, including Pepsi and BMW."

Feb 28 2013: Iranian Hacker Bullies VP Joe Biden, Credibly Threaten to Commandeer US Drones, Leak IHS Jane’s CBRN Documents | SiliconANGLE - note that some of the released material may have a trojan according to this.

Some absolutely shocking threats and claims have emerged from a fairly new hacking group on the scene. DefCon’s “y3ti” tipped us off to the group that calls themselves Parastoo that first emerged at the end of last year. Their latest chilling release confirms their earlier claims with an incredible stash of sensitive intelligence that was announced on a series of Iranian activist sites and later found on world-wide filesharing sites. The bounty is big, the targets are bigger, and the list of items they have hacked is staggering. Among this data and the statements– nuclear intelligence, military information, satellite images, national infrastructure intelligence, and a thinly veiled threat on the vice-president of the United States Joe Biden.

March 9 2013: Parastoo IAEA Mossad via Cryptome. This may be related?

IN TECHNICAL PART OF OUR LAST MESSAGE WE TALKED
ABOUT HOW PARASTOO GOT INTO C4ISR SYSTEMS BELONG
TO NATO AND USED A VSAT-BASED ATTACKS TO CONTROL
AND "PARASTOOJACK" A DRONE , LONG TIME AGO .
NOW THAT WE SLOWLY ARE WORKING THROUGH THE ROUTE
AND PARASTOOS , CYBER RESISTANCE GROUPS , AND
PEOPLE WHO ARE TIRED OF IMPERIALISTIC SHIT
BEING FED US AS POLITICS FOR A LONG TIME , IN
OUR NEXT MESSAGE WE WILL RELEASE A VIDEO OF HOW
THE ATTACH TO IDIRECT-CONTROLLED C4ISR SYSTEM
HAPPENED AND HOW PARASTOO BROKE INTO A FIPS 140-2
SECURE SATCOM ON THE MOVE . IT DEMONSTRATES , IN
A LIMITED WAY THAT PUBLIC WWW CAN HANDLE , WHAT
DID WE MEAN BY "AN EASY SPORT" IN OUR LAST MESSAGE .
IDIRECT DAYS ARE OVER FOR A LONG TIME , AND NOW
WE ARE CLOSING ITS FILE FOR GOOD , GIVE A BIT DATA
ABOUT THE JFK TEST AND TRY TO SPEAK "SERIOUSLY" TO
VICE PRESIDENT OF ANOTHER COUNTRY . DO NOT SUPPORT
ZIONIST-LED PLOTS. IT IS "SERIOUS" .

/////

On the Turkish front, #occupygezi and protesters have been supported by Redhack, an apparently older Turkish communist-sympathetic hacker group with sturdy skilz at defeating Turkish government websites.

RedHack_EN (RedHack_EN) on Twitter - English language outlet. Turkish: RedHack ★ (TheRedHack) on Twitter

e6f34b9e9e0be5e07dae99a483ee24fb.jpeg

#RedLeaks RedHack Belgeleri.. Kizil Hackerlar - 1997-2013

RedHack - Wikipedia, the free encyclopedia

Documentary about Redhack: RED! Movie Turkish (İngilizce Subtitled) - YouTube - trailer here. lots of RedHack related video clips here.

RED-656x437.jpg

Red!, the world's agenda hacktivizm issues of weight and center of each year is increasing cyber-activism. It carries out actions in particular RedHack'in Anonymous'un and Turkey. At the same time contributing to the documentary ICT, academics, lawyers and politicians hacktivizmin through politics, explores the relationship between ethics and law. BSM-Independent Film Center, Red! founded an independent film exhibition and distribution network. Film screenings held across Turkey. documentary Who, Dr. Free Uçkan / Author-scholar Gökhan Ahi-IT Law Expert Professor. Dr. Aslı Tunç-Head of the Department at Istanbul Bilgi University Media Alper Stone-ODP Co-Chairman Dr. Rabun Kosar - Bogazici university for Data Processing Center Manager Özgür Murat-Lawyer -Attorney Bilgütay Durna Ilhan Cıhaner-MP - Former Republican Attorney General Ayhan Erdoğan-Attorney Asst. Assoc. Dr. Erkan Saka-Istanbul Bilgi University, Department of Communication

RED! « Independent Cinema Center: The movie RED! produced by BSM – Independent Cinema Center, focuses on two subjects that gain globally more and more attraction every year: cyber activism and hacktivism. In the movie, these subjects are principally treated through Anonymous and RedHack. At the same time, the movie examines the relations between hacktivism and politics, ethic and law.

This documentary does not conceal being biased. It approachs cyber activism and hacktivism from a class struggle perspective. Considering the cyber world as a new battlefield, the movie examines how the cyber struggle can be linked to the class struggle.

490-249.jpg

REDHACK Voice of the oppressed! - Tumblr

July 4 2013: RedHack Identified as “Cyber Terrorist Organization” - Bianet / English - Bianet

July 5 2013: Turkish Police Name RedHack a Cyber Terrorist Organization

July 4 2013: Redhack members face virtual terrorism charges for pro-Gezi tweets

A report recently prepared by the National Police Department into the recent nationwide Gezi Park protests has stated that members of the Socialist hacker group RedHack (Kızıl Hackerlar) committed virtual terrorism by inciting people to commit criminal acts in the tweets posted on the account “@TheRedHack” during the protests.

The National Police Department launched a large-scale investigation into the online activities of Redhack during the Gezi Park protests and determined the identities of the members of the group from their IP addresses. The Sabah daily reported on Thursday that the National Police Department is seeking legal action against Redhack.

The police department stated in its report that Redhack posted many tweets that invited people to attend the protests and incited people to commit crimes during the Gezi Park protests. The police department also included some tweets posted on the Redhack account in the report. A tweet posted on June 14 states, “People from around the country will be on the streets as of 2.00 p.m.” In another tweet posed on June 15, Redhack stated: “We are protesting for a fair, non-exploitative and classless world, for brotherhood and freedom. If they are so brave, they can stop us.” In other tweet, again posted on June 15, Redhack stated: “They [Justice and Development Party (AK Party) government] provides people with free transportation or food for their rallies, but they give us tear gas, police batons and police attack car. Do you continue to be silent?”

According to the Sabah report, Prosecutor Muammer Akkaş will launch an investigation into Redhack based on the police report. The prosecutor will reportedly investigate members of Redhack on charges of virtual terrorism.

RedHack | Cyber War News - a great many lulz on this category:

Turkish Police Informant Files Leaked By Red Hack - July 16 2012. "only way we will stop publishing these files is if so called gov’t sponsored “lamers” stop attacking journalists."

As you may be all aware, our actions are continuing non-stop since February. From that time our first action was against Ankara Security Headquarters and as a result seven innocent people got arrested and they are still imprisoned. The only evidence against them is a PlayStation Cd’s. The dominant powers then decided to transfer the investigation about us to a prosecutor who once managed the Sivas case to drop due to time-frame elapsed, where 33 intellectuals and artists got killed by mob of bigots. Despite this we didn’t stop and we were investigated by National Intelligence Agency (MIT) and complaint was made to Interpol. For disinformation reasons various news was made about us. We still did not stop. Ministry of Interior was hacked twice, 95% of police forces in Turkey were hacked, and other Ministry sites were hacked time to time. Lately we were declared “terrorists” after Ministry of Foreign Affairs was hacked where we have leaked document. All of a sudden cyber teams established against us have mushroomed up. Those couldn’t stop us with help of imperial powers such as USA, EU, Russia or China created “cyber counter-guerrillas” and created sites to vilify us. Also the government, that sees us as terrorists supported these people to attack other countries. They have tried various games to alienate people against us.

Very recently attacks started against opposition journalists that makes objective news and lawyers specialises on internet. With the helping hand of the government those fake sites published personal details of these freedom defenders and very harsh/degrading threats were made to them. Just today another dirty “cyber government” attack was made against Birgun (OneDay) newspaper. This must be the very “Cyber Army” that was established against us by establishments such as TUBITAK, TIB and BTK. One of their employee quite recently announced that they will use a different approach against us, this must be it. They will brand those fighting for the truth as a terrorist but will unleash their lamers against journalists, lawyers. This must be their so called “different approach”.

As these conditions were set by them and freedom defender’s details are published with the help of government, we have taken a decision. Since they are attacking those people fighting for freedom, we will not let them walk alone. Starting from the beginning, we will publish all the leaked documents we have managed to gather, uncensored.

We will only stop when they cease to treat these lamers with double standard and treat them as equal as us.

Tomorrow we will start to publish an uncensored police informants file of 70mb.

Since we are a “terrorist” and those who publish details of innocent people are heroes, then we will act with the language they understand. We won’t play the inoffensive any longer.

The choice is yours; either put the leash on these corrupted lamers that lacks knowledge of code or face the consequences.

Lastly, we will not let those take sides with us be alone. We have plenty of jokes and they are funny but they are all real.

We don’t ACQUIT We HACK!

We won’t embarrass those trust us and walks with us, we won’t leave them alone halfway through this struggle.

If we get arrested one day, we will defend our actions. Because bourgeois terrorists cannot judge us.

RedHack (Red Hackers Association)

Central Committee

14th July 2012

Hacking for the People!

Also recently June 29th 2013: RedHack Erases Public Debt and Renames Primary School in Instanbul | 40 Oz of Bad Karma

Google Translate- RedHack, Provincial Supervisor hacked

Intelligence documents about bomb plots leaked: This time the 'bomb' mails

Istanbul Special Provincial Administration Hacked by REDHACK - Hackers News Bulletin

Anyway, classic stuff. Bonus points to redhack for a much more well crafted public image than Parastoo!

/// UPDATE 3AM: On another LulzCluster altogether, keep an eye on https://twitter.com/op_nsa for another wave of possible NSA data drops. For apparently new hawt NSA hax0rd0x See http://pastebin.com/bBuS9aH5
http://pastebin.com/raw.php?i=bk3yqHue for supposed new NSA leak pastebins including email addresses at nsa.gov and suspiciously obscure British domains, one can only hope MI6 municipal council weasel-moles are flushed trololol!
Also: Hello to @redhack_en posting this story: https://twitter.com/RedHack_EN/status/353780921373171712 A good day to you from Minnesota, Cheers! ///

Information Operations & Solicitation for US Propaganda Disruption Ideas: Radio Free Asia

Radio Free Asia and its parent organization the Broadcasting Board of Governors are pretty shady entities. I can't resist cross posting this odd appeal for "Open Tech Fund" from RFA…

SOURCE Cryptome.org - Solicitation for US Propaganda Disruption Ideas

Date: Tue, 02 Jul 2013 12:20:37 +0100
From: Dan Meredith <meredithd[at]rfa.org>
Organization: Open Technology Fund
To: cryptography[at]randombit.net
Subject: [cryptography] Open Solicitation for Concept Notes: Open Technology
        Fund

Hello cryptographers,

We are excited to share that the Open Technology Fund (OTF) at Radio Free Asia's (RFA) ongoing solicitation of concept notes is open and receiving proposals. We seek to fund disruptive technology projects that advance global Internet freedom and human rights online. If you are interested in submitting a concept note for our consideration, the process begins by completing our short online form:

https://opentechfund.org/submit.

More information about our full proposal process can be found on our website:

https://opentechfund.org/submit/guide.

OTF utilizes public funds to support Internet freedom projects. We support projects that develop open and accessible technologies promoting human rights and open societies. We strive to advance inclusive and safe access to global communication networks.

Created in 2012, OTF is an RFA program supported by funds from the Broadcasting Board of Governors (BBG). The BBG’s mission is to inform, engage, and connect people around the world in support of freedom and democracy. RFA’s mission is to provide accurate and timely information to the people of Asia who lack adequate protections for freedom of expression, free speech, and a free press.

In a globally interconnected society, creating and protecting freedom of expression, free speech, and a free press requires cross-border technology tools that enable the exercise of human rights within repressive societies for the global population. OTF strives to incubate and support projects creating these tools around the world. More information on our program can be found at

https://opentechfund.org/about.

If you have any questions, please send them our way by emailing otf[at]rfa.org.

We look forward to your submission.
--
Dan Meredith
pgp 0x36377134
_______________________________________________
cryptography mailing list
cryptography[at]randombit.net

http://lists.randombit.net/mailman/listinfo/cryptography

/////

Here is some more material on the Radio Free Asia / Broadcasting Board of Governors apparatus via alternative journalist Wayne Madsen, who himself is under a bit of pressure from nasty bloggers for reporting on EU NSA surveillance and other unorthodox stories….

George Soros’s and the Neo-Cons’ Control of Washington’s Propaganda Program > Strategic-Culture.org - Strategic Culture Foundation - April 25 2012

An examination of the current 2013 budget for the U.S. government’s Broadcasting Board of Governors (BBG) that oversees the International Broadcasting Board (IBB) and which determines the slant taken by the U.S. government’s propaganda efforts on radio, television, and, increasingly on the Internet, illustrates the head-lock that George Soros and neo-conservative “soft power projection” interests have on the official state-sponsored information disseminated by the U.S. government to a global audience.

The new propaganda bias of such IBB-controlled outlets such as the Voice of America, Radio Free Asia, and Radio Free Europe should comes as no surprise, considering that former CNN chairman and chief executive officer Walter Isaacson laid down the gauntlet after he assumed the chairmanship of the Broadcasting Board of Governors in 2009 by calling for the United States to aggressively challenge what he termed anti-American “propaganda” emanating from such international broadcasters as RT (the former Russia Today), Iran’s Press TV, and China’s CCTV. Isaacson walks in lock-step with the goals of Soros and the Council on Foreign Relations as the head of the politically-connected Aspen Institute. Isaacson stepped down from his broadcasting chairmanship position in January 2012.

The priorities for U.S. propaganda include stepping up efforts to effect political change in what are termed the five remaining “Communist” countries in the world through Cold War-era dissemination of “news” and other content via the Voice of America (VOA), the Office of Cuba Broadcasting (OCB) , and “grantee” organizations RFE/RL (Radio Free Europe/Radio Liberty), Inc., and Radio Free Asia (RFA). Soros’s Open Society Institute holds a predominant role in the administration of the “grantee” broadcast arms, which were originally operated by the Central Intelligence Agency (CIA) before de facto control was passed to Soros after the collapse of communism in Europe. The targeted five remaining communist nations are China, Cuba, North Korea, Laos, and Vietnam.

The BBG claims that America’s propaganda efforts reach a global audience of 187 million people and that the 59 language broadcasts to over 100 nations costs less than a mere $5 million per year. The BBG budget request contains all the Soros code phrases in describing America’s “highest standards of journalistic independence, ethics, and objectivity” and support of “democracy, civil society, and transparent institutions around the world.”

Check in there for more infos. It's a nasty Soros pass thru fo sho! … Also check out LittleSis.org for more crowdsourced, cited info on these kinds of orgs and players..

For more on these projects see also: Projects | Open Technology Fund

Updates | Open Technology Fund

Home · globaleaks/GlobaLeaks Wiki · GitHub

Trans Pacific Partnership discussion & community QA with Keith Ellison, IATP & MN Fair Trade Coalition. Malaysia Round starts July 15

I was glad to help publish live video from a panel and community discussion about the controversial and incredibly dangerous Trans Pacific Partnership secret treaty now being developed by corporate weasels and a trade representative unit of the White House, with almost all of Congress barred from reviewing the document.

tpp_0.jpg

US Rep. Keith Ellison (DFL-MN5) spoke out against the TPP as a secret process saying it should be occurring in public. Josh Wise from MN Fair Trade Coalition did a great job emceeing the panel and covering a lot of detailed ground including the intellectual property leaked provisions of the draft treaty of doom. (FB MN Fair Trade)

One of them, Jim Harkness, was from the Institute for Agriculture and Trade Policy, which has achieved a lot of laudable changes in trade for small communities around the world, and non-gazillionaires in general. Unedited Video URL: http://www.youtube.com/watch?v=__Nmry3Hm_0

Full video unedited. Sorry about the bad sound sync. This video is licensed: CREATIVE COMMONS WITH ATTRIBUTION. Please Remix!! :)

Also I was able to get in the last question on the QA, proposing Rep. Ellison should post a bill to US Congress that would make it illegal for the trade representative to hold any secret documents longer than one month, which would neatly solve the authoritarian secret treaty problem, and enable all Americans to participate in US diplomatic policy processes on a far more equal basis than the current situation :)TPP_WhySoSecret.jpg

Mon., July 1, 6:00 pm - 7:30 pm

Minneapolis Regional Labor Federation

312 Central Avenue

2nd Floor

Minneapolis, Minnesota

FB: Keith Ellison explains the TPP: The largest corporate power grab you've never heard of!

LINX:U.S. Senator calls for more transparency around the Trans-Pacific Partnership | OpenMedia.ca

Home | Our Fair Deal

Senator Warren Presses White House to Release Pacific Trade Text - Businessweek

Time for transparency - why don’t Canadian representatives have same access to crucial TPP drafts as their U.S. counterparts? | OpenMedia.ca

Canada’s two-tier approach to trade talks: Geist | Toronto Star

Digital Rights Groups Shut Out of Secret TPP Negotiations | Electronic Frontier Foundation

Trans Pacific Partnership Agreement | Electronic Frontier Foundation

Take Action - petition

Reassess Trans-Pacific Partnership Agreement - Columnist - New Straits Times

The BRAD BLOG : Rep. Grayson Warns About Details of Classified 'Trans-Pacific Partnership' Agreement

Trans-Pacific Partnership (TPP): 18th Round of TPP Negotiations Set for Kota Kinabalu, Malaysia -- July 15-24, 2013 | Office of the United States Trade Representative - OFFICIAL SITE

Warren on Trans-Pacific Partnership: If people knew what was going on, they would stop it | The Raw Story

LEAKED DOCS FROM LAST JUNE: U.S. trade proposal would let corporations overrule laws | The Raw Story

Alan Grayson On Trans-Pacific Partnership: Obama Secrecy Hides 'Assault On Democratic Government' - way to go Alan! Glad he's throwing some punches on this crap.

Obama-Backed Trans-Pacific Partnership Expands Corporate Lawsuits Against Nations for Lost Profits | Democracy Now! - JUNE 6 2013

The Obama administration is facing increasing scrutiny for the extreme secrecy surrounding negotiations around a sweeping new trade deal that could rewrite the nation’s laws on everything from healthcare and Internet freedom to food safety and the financial markets. The latest negotiations over the Trans-Pacific Partnership (TPP) were recently held behind closed doors in Lima, Peru, but the Obama administration has rejected calls to release the current text. Even members of Congress have complained about being shut out of the negotiation process. Last year, a leaked chapter from the draft agreement outlined how the TPP would allow foreign corporations operating in the United States to appeal key regulations to an international tribunal. The body would have the power to override U.S. law and issue penalties for failure to comply with its rulings.

We discuss the TPP with two guests: Celeste Drake, a trade policy specialist with the AFL-CIO, and Jim Shultz, executive director of the Democracy Center, which has just released a new report on how corporations use trade rules to seize resources and undermine democracy. "What is the biggest threat to the ability of corporations to go into a country and suck out the natural resources without any regard for the environment or labor standards? The threat is democracy," Shultz says. "The threat is that citizens will be annoying and get in the way and demand that their governments take action. So what corporations need is to become more powerful than sovereign states. And the way they become more powerful is by tangling sovereign states in a web of these trade agreements."

The Trans-Pacific Partnership Agreement & copyright. "Many of the same special interests that pushed for legislation like SOPA and PIPA have special access to this forum—including privileged access to the text as well as US negotiators."


newTPP map cropped.jpg

Lots more info:: Trans-Pacific Partnership

Anyway leave it there for now. BIG DEAL, PEOPLE!! This is from the "secret government" if anything is, and will supersede whole swaths of the Constitution and assorted natural rights of people around much of the world Shock doctrine par excellence.

Comrades from Cairo speak out: Fight the System

It's moving full speed in Egypt right now. Difficult but Inspiring as always! Jadaliyya Coverage of Egypt on 30 June 2013 // Millions of Egyptians turn out nationwide for anti-Morsi rallies; 7 dead in violence - Politics - Egypt - Ahram Online. Incredible pics: These Pictures Show Just How Massive The Protests In Egypt Have Become - Business Insider. BBC News - Egypt crisis: Mass protests over Morsi grip cities

//// NSA Bonus: chaser story about Wayne Madsen NSA material briefly published then yanked by Guardian! The Guardian Revealed Wayne Madsen NSA Scoop - Business Insider. Anger! LOL: June 30-July 1, 2013 -- NSA's joint operations with European nations. - Wayne Madsen Report. PDFs at link. Madsen ain't always right but I'm pretty sure he published the NSA code names STELLAR WIND and PINWALE first… BTW finally getting Pinwale flowcharts: Washington Post Publishes 4 New NSA PRISM Slides. FBI Data Intercept Technology Unit… ////

Via RoarMag: From Taksim and Rio to Tahrir, we can smell the tear gas | ROAR Magazine

Photo credit unclear...

TahrirComrades.jpg

From Taksim to Tahrir, from Bulgaria to Brazil, we fight the same struggle against oppressive state structures that benefit only a tiny wealthy elite.

Open letter by the Egyptian activist collective ‘Comrades from Cairo’.

To you at whose side we struggle,

June 30 will mark a new stage of rebellion for us, building on what started on January 25 and 28, 2011. This time we rebel against the reign of the Muslim Brotherhood that has brought only more of the same forms of economic exploitation, police violence, torture and killings.

References to the coming of “democracy” have no relevance when there is no possibility of living a decent life with any signs of dignity and decent livelihood. Claims of legitimacy through an electoral process distract from the reality that in Egypt our struggle continues because we face the perpetuation of an oppressive regime that has changed its face but maintains the same logic of repression, austerity and police brutality. The authorities maintain the same lack of any accountability towards the public, and positions of power translate into opportunities to increase personal power and wealth.

June 30 renews the Revolution’s scream: “The People Want the Fall of the System”. We seek a future governed neither by the petty authoritarianism and crony capitalism of the Brotherhood nor a military apparatus which maintains a stranglehold over political and economic life nor a return to the old structures of the Mubarak era. Though the ranks of protesters that will take to the streets on June 30 are not united around this call, it must be ours — it must be our stance because we will not accept a return to the bloody periods of the past.

Though our networks are still weak we draw hope and inspiration from recent uprisings especially across Turkey and Brazil. Each is born out of different political and economic realities, but we have all been ruled by tight circles whose desire for more has perpetuated a lack of vision of any good for people. We are inspired by the horizontal organization of the Free Fare Movement founded in Bahía, Brazil in 2003 and the public assemblies spreading throughout Turkey.

In Egypt, the Brotherhood only adds a religious veneer to the process, while the logic of a localized neo-liberalism crushes the people. In Turkey a strategy of aggressive private-sector growth, likewise translates into authoritarian rule, the same logic of police brutality as the primary weapon to oppress opposition and any attempts to envision alternatives. In Brazil a government rooted in a revolutionary legitimacy has proven that its past is only a mask it wears while it partners with the same capitalist order in exploiting people and nature alike.

These recent struggles share in the fight of much older constant battles of the Kurds and the indigenous peoples of Latin America. For decades, the Turkish and Brazilian governments have tried but failed to wipe out these movements’ struggle for life. Their resistance to state repression was the precursor to the new wave of protests that have spread across Turkey and Brazil. We see an urgency in recognizing the depth in each other’s struggles and seek out forms of rebellion to spread into new spaces, neighborhoods and communities.

Our struggles share a potential to oppose the global regime of nation states. In crisis as in prosperity, the state — in Egypt under the rule of Mubarak, the Military Junta or the Muslim Brotherhood — continues to dispossess and disenfranchise in order to preserve and expand the wealth and privilege of those in power.

None of us are fighting in isolation. We face common enemies from Bahrain, Brazil and Bosnia, Chile, Palestine, Syria, Turkey, Kurdistan, Tunisia, Sudan, the Western Sahara and Egypt. And the list goes on. Everywhere they call us thugs, vandals, looters and terrorists. We are fighting more than economic exploitation, naked police violence or an illegitimate legal system. It is not rights or reformed citizenship that we fight for.

We oppose the nation-state as a centralized tool of repression, that enables a local elite to suck the life out of us and global powers to retain their dominion over our everyday lives. The two work in unison with bullets and broadcasts and everything in between. We are not advocating to unify or equate our various battles, but it is the same structure of authority and power that we have to fight, dismantle, and bring down. Together, our struggle is stronger.

We want the downfall of the System.

Comrades from Cairo

Syndicate content