NSA

Corbett Report Interview 989 Pearse Redmond Peels the TOR Onion

From Corbett Report:
“The TOR Project promises its users a modicum of privacy protection from would-be information gatherers, both small time crooks and nation-state cyber-security agencies. But do these promises hold up to scrutiny? And who is behind the TOR Project itself? And why did a TOR developer recently doxx a critic on Twitter? Joining us today to dissect this onion stew is Pearse Redmond of Porkins Policy Review.”

Interview 989 – Pearse Redmond Peels the TOR Onion

The TOR Project promises its users a modicum of privacy protection from would-be information gatherers, both smalltime crooks and nation-state cybersecurity agencies. But do these promises hold up to scrutiny? And who is behind the TOR Project itself? And why did a TOR developer recently doxx a critic on Twitter? Joining us today to dissect this onion stew is Pearse Redmond of Porkins Policy Review.
SHOW NOTES:
Tor Project Overview

Charlie Hebdo and Tsarnaev’s Trial: Cui bono?

There are two ways to look at the alleged terrorist attack on the French satirical magazine Charlie Hebdo.
One is that in the English speaking world, or much of it, the satire would have been regarded as “hate speech,” and the satirists arrested. But in France Muslims are excluded from the privileged category, took offense at the satire, and retaliated.

US Social Surveillance Abuse Puts Civil Liberties in Jeopardy

By Vladimir Platov | New Eastern Outlook | January 3, 2015 According to various publications in the American and foreign media, the United States has created a global system of cyber espionage that allows the interception and processing of personal data around the globe in violation of fundamental human rights. Tapped phones, intercepted short messages, […]

Would You Hide Ed Snowden In Your Home?

Ever hear someone bitterly decrying "all Germans" as Nazis? I heard plenty of that growing up in a Jewish community in Brooklyn and later I heard plenty of it when I lived in Amsterdam. But there was always one response that could stop anyone going down that path in their tracks-- something about a family that took a Jew or a resistance fighter in and hid them from the Nazis in their home.

The Koch Brothers’ Party

Most of us know that the NSA is spending billions of our taxpayer dollars to track our every move, though the data is collected and only used if some hired dude, following procedures that look for programmed threats, decides you’re doing something suspicious. We know that companies like Amazon follow your moves on its website so that it can plaster your Internet Protocol (IP) path with purchase recommendations. They use your Tracking Cookies or Browsing history to determine your past inquiries.

Imperialism and the Politics of Torture

The US Senate Report documenting CIA torture of alleged terrorist suspects raises a number of fundamental questions about the nature and operations of the State, the relationship and the responsibility of the Executive Branch and Congress to the vast secret police networks which span the globe – including the United States.
CIA: The Politics of a Global Secret Police Force