+ Reply to Thread
Page 38 of 50 FirstFirst 1 28 38 48 50 LastLast
Results 741 to 760 of 1000

Thread: Edward Snowden: the whistleblower behind the NSA surveillance revelations

  1. Link to Post #741
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    65
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,818 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    Mass surveillance is fundamental threat to human rights, says European report

    Tuesday 27th January 2015 at 07:44 By David Icke





    THE GUARDIAN......

    Mass surveillance is fundamental threat to human rights, says European report

    Europe’s top rights body says scale of NSA spying is ‘stunning’ and suggests
    UK powers may be at odds with rights convention

    The Guardian, Monday 26 January 2015 14.30 GMT



    Intelligence agencies may be hoovering up data on a massive scale.
    Intelligence agencies and their allies may be hoovering up data on a
    massive scale. Photograph: Fleix Clay, Graeme Robertson, Getty Images

    Europe’s top rights body has said mass surveillance practices are a
    fundamental threat to human rights and violate the right to privacy
    enshrined in European law.

    The parliamentary assembly of the Council of Europe says in a report
    that it is “deeply concerned” by the “far-reaching, technologically
    advanced systems” used by the US and UK to collect, store and analyse
    the data of private citizens. It describes the scale of spying by the US
    National Security Agency, revealed by Edward Snowden, as “stunning”.

    Read more....

    http://www.theguardian.com/world/201...council-europe



    Edward Snowden speaks to the Parliamentary Assembly of the Council of
    Europe from Moscow Photograph: Vincent Kessler/Reuters

  2. The Following User Says Thank You to Cidersomerset For This Post:

    Openmindedskeptic (20th February 2015)

  3. Link to Post #742
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    65
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,818 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    CIA Whistleblower Found Guilty Proves That Using ‘Proper Channels’ Doesn’t Work

    new Wednesday 28th January 2015 at 08:23 By David Icke



    Published on 26 Jan 2015


    Monday’s guilty verdict for former CIA officer Jeffrey Sterling is another example of
    whistleblowers attempting to go through proper channels to expose wrongdoing, and
    then being “flagged as troublemakers” and facing severe retaliation from the government,
    according to transparency advocate Norman Solomon. Speaking to RT’s Ben Swann just
    hours after a jury convicted the spy of espionage for revealing details of a CIA plot to give
    flawed nuclear weapons schematics to Iran, the journalist and activist not only lashed the
    administration for its prosecution of Sterling, but also offered a stark warning about the
    state of whistleblowing in the US

  4. The Following User Says Thank You to Cidersomerset For This Post:

    Openmindedskeptic (20th February 2015)

  5. Link to Post #743
    United States On Sabbatical
    Join Date
    30th June 2011
    Location
    The Seat of Corruption
    Age
    46
    Posts
    9,177
    Thanks
    25,610
    Thanked 53,743 times in 8,696 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    Summary:
    if it's on a computer or transmitted electronically it's probably compromised.

    Quote Snowden’s Revenge: New Mega-Spying Project Revealed
    A giant cellphone surveillance program is just one of the dark NSA secrets being dragged out into the light, thanks to a certain whistleblower and a Russian cybersecurity firm.

    After 20 months and dozens of stories from Edward Snowden’s classified document trove, you might’ve been tempted to think that there was nothing shocking left to learn about the lengths Western intelligence services would go in the hunt for a relative handful of spies, terrorists, and other criminals.

    Think again. Two blockbuster revelations this week—one, straight from the Snowden files, the other from a Russian cybersecurity firm—shed new light on just how determined U.S. and British spies are to pry into the world’s phone and computer networks, all while potentially undermining the security and privacy of hundreds of millions of innocent people.

    On Thursday, the Intercept revealed a secret U.S. and British intelligence operation that gave the nations’ spy agencies the ability to monitor “a large portion of the world’s cellular communications,” even if they were protected by encryption. The operation, apparently undertaken five years ago, gave the agencies the ability to break the codes used to encrypt phone calls, text messages, and other data sent on more than 450 wireless phone networks around the world.

    The Intercept reported in detail how the intelligence agencies hacked the emails and Facebook accounts of employees at a Dutch firm, Gemalto, that manufactures about 2 billion mobile phone SIM cards every year. By mining the employees’ communications, the agencies were able to gather information that helped them steal the “keys” used to encrypt those tiny cards, thus allowing the agencies to listen in on phone calls and read messages that users believed were kept disguised by powerful technology.

    The joint NSA-GCHQ operation may have far-reaching foreign policy consequences. It was mounted against a company headquartered in The Netherlands, a stalwart European ally of the United States and Britain and NATO member country, and it allowed the spy agencies to bypass legal procedures for gathering communications of citizens in countries around the world. If the agencies could intercept the calls and decrypt them on their own, they had no need to request the assistance of foreign companies or governments.That backdoor maneuver—while exactly the type of work that one expects of a secret intelligence outfit—may nevertheless further aggravate foreign relationships at a time when the United States is seen as a global spying hegemon that disregards the privacy of foreigners. And it comes just as the Obama administration is wrestling with European partners over what to do to stop Russian military aggression in Ukraine. In 2013, revelations from the Snowden files caused a rift between America and some of its NATO allies—a rift that had largely healed. Those old wounds could be reopened by fresh revelations of massive, clandestine spying on friendly nations.

    “This was the easy way: Attack a NATO [member country] company, and gain the keys for everybody,” Nicholas Weaver, a senior researcher at the International Computer Science Institute, told The Daily Beast. “But it wasn’t the elegant way. If the GCHQ wanted to target individuals and was willing to wait a day or two to decrypt a new target, they could have set up a pipeline where the GCHQ asks the Netherlands, which asks Gemalto to provide the keys for a set of targets. If they wanted to just target some countries, they could have also just targeted recipient [telecommunications companies], rather than a NATO company. But that would require more work: having to compromise a dozen companies rather than just one.”

    The revelation follows another a report this week about NSA’s aggressive cyber operations. The Russian cyber security firm Kaspersky disclosed that a secret unit it called the “Equation Group” has permanently embedded surveillance and sabotage devices on computers around the world, drilling down to the level of computer hardware, an especially pernicious and highly skilled feat of hacking. Clues in the Snowden files—and in the malware Kaspersky discovered—strongly indicated that the “Equation Group” was part of the NSA.Kevin Poulsen, the renowned former hacker, said the Group’s work was so sophisticated, and so advanced, that it was essentially the cyberwar equivalent to the Manhattan Project.

    “There are update mechanisms, dozens of plug-ins, a self-destruct function, massive code obfuscation, hundreds of fake websites to serve as command-and-control, Poulsen wrote in Wired. “One of the NSA’s malware plug-ins can even reprogram your hard drive’s firmware, allowing the implant to survive a complete disk wipe—a feat that’s been demonstrated by computer scientists under laboratory conditions but never before seen in the wild.”

    By secretly undermining or disabling encryption and other features that provide some measure of privacy and security to everyday computer and phone users, the NSA is arguably undermining cybersecurity on a broad scale. Previous disclosures based on documents leaked by Snowden showed that the NSA collects information on undefended vulnerabilities in computer software and operating systems, known as zero days, rather than disclosing that information to manufacturers so they can protect their customers.

    In 2013, a panel of security experts recommended to President Obama that the NSA stop hoarding zero days, which, like stolen encryption keys, give the NSA privileged access to spy on computers and mobile phones, but at a significant risk to individuals’ security. The agency now errs on the side of disclosing vulnerabilities, officials say, but reserves the right to not to in the interest of national security, a significant loophole.

    The revelations also come at an inopportune moment for the GCHQ, with Britain’s intelligence and policing watchdog having recently found that a regime governing sharing of intercepted electronic communications with the United States was illegal.

    The new report also shows the extent to which using encryption in the first place makes one a target in the intelligence agencies’ eyes. In one instance, the GCHQ found that a Gemalto employee in Thailand was sending encrypted files, which seemed to indicate that the underlying material was valuable. If the agency wanted to dig further into Gemalto’s inner workings, “he would certainly be a good place to start,” GCHQ officials said.

    The White House didn’t respond Thursday night to the revelations of SIM-card spying. But Obama has repeatedly sought to assure Americans that the NSA isn’t monitoring their phone communications without just cause.

    “Nobody is listening to your telephone calls,” Obama stressed in 2013 when the first Snowden leaks revealed that the NSA was collecting Americans’ phone records en masse. There is no indication that the SIM-card operation was aimed at Americans specifically, and in any event, the U.S. government must obtain a warrant whenever it wants to listen to Americans’ phone calls.

    But Obama’s reassurances did little to assuage the hundreds of millions of foreigners whose communications were fair game. And if history is any guide, they won’t be any more at ease now.

    http://www.thedailybeast.com/article...-revealed.html
    Hard times create strong men, Strong men create good times, Good times create weak men, Weak men create hard times.
    Where are you?

  6. The Following 3 Users Say Thank You to TargeT For This Post:

    Cidersomerset (20th February 2015), NancyV (20th February 2015), Openmindedskeptic (20th February 2015)

  7. Link to Post #744
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    65
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,818 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    Thanks Targe I actually posted this on Pauls thread ......

    Russian researchers expose ‘NSA’s secret weapon’: Outrage at program that
    enables America to spy on EVERY home computer in the world is uncovered

    Wednesday 18th February 2015 at 08:58 By David Icke







    Russian researchers expose 'NSA's secret weapon': Outrage at program that
    enables America to spy on EVERY home computer in the world is uncovered

    The NSA has figured out how to hide spying and sabotage software deep
    within hard drives, according to cyber researchers and former operatives

    The group said it found personal computers in 30 countries infected with
    one or more of the spying programs

    The most infections were seen in Iran, followed by Russia, Pakistan,
    Afghanistan, China, Mali, Syria, Yemen and Algeria

    The infections started in 2001, but increased drastically in 2008, the year
    President Barack Obama was elected

    The tools are designed to run on computers even when they are not
    connected to the Internet, and even the makers of some of the hard
    drives are unaware that these programs have been embedded

    The spies made a technological breakthrough by figuring out how to
    lodge malicious software in the obscure code called firmware that
    launches every time a computer is turned on

    By Reuters Reporter and Chris Spargo For Dailymail.com

    Published: 02:49, 17 February 2015 | Updated: 15:57, 17 February 2015


    ‘The National Security Agency has figured out how to hide spying
    software deep within hard drives, allowing them to monitor and
    eavesdrop on the majority of the world’s computers – even when
    they are not connected to the internet.

    The Moscow-based security software maker Kaspersky Lab said it has
    found personal computers in 30 countries infected with one or more of
    the spying programs, with the most infections seen in Iran, followed by
    Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria.

    The targets included government and military institutions, telecommunication
    companies, banks, energy companies, nuclear researchers, media, and
    Islamic activists.’

    Read more: Russian researchers expose 'NSA's secret weapon': Outrage
    at program that enables America to spy on EVERY home computer in the
    world is uncovered

    Read more: http://www.dailymail.co.uk/news/arti...#ixzz3S8wBzbqY
    Follow us: @MailOnline on Twitter | DailyMail on Facebook

  8. The Following 3 Users Say Thank You to Cidersomerset For This Post:

    NancyV (20th February 2015), Openmindedskeptic (20th February 2015), TargeT (20th February 2015)

  9. Link to Post #745
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    65
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,818 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    Another article related to the spying issue ....'Control'....

    Coming Soon: The Department of the Internet

    new Thursday 19th February 2015 at 09:52 By David Icke


    ‘Who opposes a free and open Internet? Answer: government.
    Who do activists beg to protect Internet freedom? Government.

    Trusting the government to run the Internet is like trusting the
    NSA to never spy on Americans.’

    --------------------------------------------------------------------

    Wednesday, February 18, 2015
    Coming Soon: The Department of the Internet

    Activist Post

    Who opposes a free and open Internet? Answer: government.
    Who do activists beg to protect Internet freedom? Government.

    Trusting the government to run the Internet is like trusting the
    NSA to never spy on Americans.




    If the FCC's plan to regulate the Internet is so wonderful,
    why can't the American people read it before it goes into effect?

    A new video by Project Internet Freedom highlights the absurd "solution" to a problem that doesn't exist.





    http://www.activistpost.com/2015/02/...-internet.html

  10. The Following 3 Users Say Thank You to Cidersomerset For This Post:

    NancyV (20th February 2015), Openmindedskeptic (20th February 2015), TargeT (20th February 2015)

  11. Link to Post #746
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    65
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,818 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    The Virtual Interview: Edward Snowden - The New Yorker Festival



    Published on 11 Oct 2014


    The New Yorker Festival presents Edward Snowden in conversation with Jane Mayer.

  12. The Following 2 Users Say Thank You to Cidersomerset For This Post:

    Openmindedskeptic (20th February 2015), TargeT (20th February 2015)

  13. Link to Post #747
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    65
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,818 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    Edward Snowden Speaks to World Affairs Conference 2015



    Published on 3 Feb 2015
    Last edited by Cidersomerset; 4th March 2015 at 00:25.

  14. The Following 2 Users Say Thank You to Cidersomerset For This Post:

    Openmindedskeptic (20th February 2015), TargeT (20th February 2015)

  15. Link to Post #748
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    65
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,818 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    US and UK spies hacked SIM card manufacturer to steal codes that allowed them to eavesdrop on mobile phones worldwide, according to bombshell documents leaked by Ed Snowden

    new Saturday 21st February 2015 at 09:41 By David Icke




    ------------------------------------------------------------------------------------



    US and UK spies hacked SIM card manufacturer to steal codes that allowed
    them to eavesdrop on mobile phones worldwide, according to bombshell
    documents leaked by Ed Snowden
    America's NSA allegedly worked with British intelligence agency GCHQ
    The agencies stole encryption keys to hack into mobile communications
    The hacks took place between 2010 and 2011 - with 300,000 keys stolen
    Company being targeted was Gemalto who produce billions of SIM cards
    NSA whistleblower Ed Snowden gave leaked documents to The Intercept
    GCHQ planted 'malicious software' on Gemalto's computers, files reveal

    By Jay Akbar For Mailonline

    Published: 09:47, 20 February 2015 | Updated: 11:15, 20 February 2015


    Read more: http://www.dailymail.co.uk/news/arti...#ixzz3SNnPM5pI
    Follow us: @MailOnline on Twitter | DailyMail on Facebook



    ‘British and American spies reportedly stole confidential codes from Dutch
    SIM card manufacturer to eavesdrop on mobile phones around the world,
    an intelligence leak has revealed.

    NSA whistleblower Edward Snowden gave leaked files to The Intercept
    detailing how the American agency and its British counterparts GCHQ
    stole encryption keys that keep mobile communications private.

    The company targeted was Gemalto who produce billions of electronic
    chips for mobile phones and next generation credit cards.

    It operates in 85 countries and its SIM cards cover more than 1.5 billion
    mobile users globally for clients such as AT&T, T-Mobile, Verizon and Sprint.’

    The hacks are thought to have taken place in 2010 and 2011 and led to
    the theft of 300,000 keys from Somalia, Iran, Afghanistan, Yemen, India,
    Serbia, Iceland and Tajikistan.



    SIM heist: GCHQ slides revealed the spy agency wanted to steal encryption
    keys which help keep mobile communications private



    Security breech: GCHQ also planted 'malicious software' on Gemalto's
    computers to obtain encryption keys and boasted in a slide: 'Successfully
    implanted several machines and believe we have their entire network'




    hone intercepts: Leaked documents given to The Intercept by NSA
    whistleblower Edward Snowden (pictured) revealed how the American
    agency and British-based GCHQ hacked into a Dutch company


    With these encryption keys, the intelligence agencies would have the
    ability to collect both voice and data information - such as text
    messages - from a large portion of the world's communications.

    The keys are used to decipher the communications between mobile
    phones and their network providers which would otherwise be
    received as a 'garbled mess'.

    Stealing them also sidesteps the need to get permission from telecom
    companies or a warrant for a wire-tap - and it leaves no trace on the
    wireless provider's network that communications have been hacked into.


    Read more: http://www.dailymail.co.uk/news/arti...#ixzz3SNo1ng00
    Follow us: @MailOnline on Twitter | DailyMail on Facebook
    Last edited by Cidersomerset; 21st February 2015 at 12:47.

  16. The Following 3 Users Say Thank You to Cidersomerset For This Post:

    Inaiá (26th February 2015), Openmindedskeptic (26th February 2015), TargeT (21st February 2015)

  17. Link to Post #749
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    65
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,818 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    Spies Can Track You Just by Watching Your Phone’s Power Use

    Saturday 21st February 2015 at 07:56 By David Icke




    Spies Can Track You Just by Watching Your Phone’s Power Use
    By Andy Greenberg
    02.19.15 |
    8:45 pm |
    Permalink







    ‘Smartphone users might balk at letting a random app like Candy Crush
    or Shazam track their every move via GPS. But researchers have found
    that Android phones reveal information about your location to every app
    on your device through a different, unlikely data leak: the phone’s power
    consumption.

    Researchers at Stanford University and Israel’s defense research group
    Rafael have created a technique they call PowerSpy, which they say can
    gather information about an Android phone’s geolocation merely by
    tracking its power use over time. That data, unlike GPS or Wi-Fi location
    tracking, is freely available to any installed app without a requirement to
    ask the user’s permission.

    That means it could represent a new method of stealthily determining a
    user’s movements with as much as 90 percent accuracy—though for now
    the method only really works when trying to differentiate between a
    certain number of pre-measured routes.’

    Read more: Spies Can Track You Just by Watching Your Phone’s Power Use

    http://www.wired.com/2015/02/powerspy-phone-tracking/

    ==================================================
    ==================================================

    I must admit I'm not sure that Russian intelligence will be to pleased with this...LOL



    Vladimim admires Russian intel agency emblem , looks a bit like Batman cymbol..



    Quote " What do you mean Dmitry ? We are the good boys in this scandal ?


    -------------------------------------------------------------------------------------------
    Quote Good job they do not know what I do in my spare time.....

    Russian spy agency targeting western diplomats FSB using psychological
    techniques developed by KGB to intimidate and demoralise diplomatic staff,
    activists and journalists



    http://www.theguardian.com/world/201...tern-diplomats


    ----------------------------------------------------------------------------------------






    ‘Unhackable’: Russian firm develops totally surveillance-proof smartphone

    Saturday 21st February 2015 at 07:03 By David Icke





    ‘Russia is entering the post-Snowden world with style. Its own anti-surveillance
    smartphone prototype, equipped with the latest in cutting-edge cybersecurity
    and intended for corporate users, is currently being tested.

    This is not Russia’s first foray into smartphones, with the dual-screen YotaPhone
    making headlines recently with its second incarnation. However, the new project
    will offer unparalleled, corporate-level security, when ready. The current version
    is a prototype and any photos are kept in strict secret.’


    Called the TaigaPhone, the phone will be manufactured by Taiga Systems, 99 percent
    of which belongs to Natalya Kasperskaya, owner of the InfoWatch group. The device
    will synergize with other tools provided by the company to its high-profile clients.

    According to Izvestia daily, things like photos and work-related files, as well as phone
    conversations and metadata will not “leak” without the user’s consent, according to
    Taiga Systems co-owner Aleksey Nagorny.

    “The device is entirely our own – the design, the schematics and circuitry. The phone
    will be manufactured in China,” he said.

    The company used Android’s base for the creation of its own Taiga operating system.
    Inventing one from scratch was too costly and cumbersome.

    But the system will also contain several levels of cyber defense, chief among them the
    ability to completely disable or enable select parts of the system. Nagorny mentioned
    the camera, as well as location services.



    New YotaPhone 2 smartphone. (RIA Novosti / Ramil Sitdikov)


    The phone can also be fashioned into a traditional “slab,” to allow only phone calls.
    The most extreme version of this setting will enable the user to only see incoming
    calls. And of course, no secure device would be complete without the ability to
    switch off your microphone.

    All of these settings will require one or two buttons maximum to operate.

    What’s more, a signal will alert the user if anyone is trying to hack the microphone
    or any other key features.

    Symantec will cooperate with Taiga Systems on some of the more key security
    capabilities. Many now know that switching off your phone does not disable the
    GPS – that’s where Symantec comes in.

    Other phones exist with similar capabilities, with the BlackPhone – an Android-based
    solution from Europe - released four months ago. It boasts information encryption,
    something the likes of whistleblowers Edward Snowden and Julian Assange have
    been very vocal about.

    READ MORE: 'Secret Santa for post-Snowden era': New app uses Tor-like encryption

    Despite the obvious advantages of encryption, high-security devices still aren’t the
    mainstream even in the corporate sector, for which the TaigaPhone was developed.
    The situation today is such that standard phones are bought in most cases, with the
    company installing various add-ons for its employees.

    The price and arrival date are being kept under wraps.

    According to Nagorny, the company is in talks to equip other makes with the Taiga system soon.


    Read more: ‘Unhackable’: Russian firm develops totally surveillance-proof smartphone

    http://www.wired.com/2015/02/powerspy-phone-tracking/
    Last edited by Cidersomerset; 21st February 2015 at 13:20.

  18. The Following 2 Users Say Thank You to Cidersomerset For This Post:

    Openmindedskeptic (26th February 2015), TargeT (21st February 2015)

  19. Link to Post #750
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    65
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,818 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    And the Oscar goes to… Snowden documentary CitizenFour wins award



    ------------------------------------------------------------------------------------
    CITIZENFOUR - Official Trailer



    Published on 21 Dec 2014

    --------------------------------------------------------------------------------

    Citizenfour: Inside Story of NSA Leaker Edward Snowden
    Captured in New Film by Laura Poitras




    Published on 23 Oct 2014


    "At this stage I can offer nothing more than my word. I am a senior government
    employee in the intelligence community. I hope you understand that contacting
    you is extremely high risk … This will not be a waste of your time." This was one
    of the first messages Edward Snowden wrote to filmmaker Laura Poitras
    beginning an exchange that helped expose the massive surveillance apparatus
    set up by the National Security Agency. Months later, Poitras would meet Snowden
    for the first time in a Hong Kong hotel room. Poitras filmed more than 20 hours of
    footage as Snowden debriefed reporters Glenn Greenwald and Ewen MacAskill.
    That footage — most unseen until now — forms the backbone of Poitras’ new film, "Citizenfour."

    Full episodes of Democracy Now! can be viewed at the link: https://www.freespeech.org/collection...



    ACADEMY AWARD® WINNER - BEST DOCUMENTARY
    IN CINEMAS NOW.

    ====================================================

    I'd travel to US, but not to UK: filmmaker of Edward Snowden documentary



    Published on 17 Oct 2014


    Subscribe to Channel 4 News: http://bit.ly/1sF6pOJ

    EXCLUSIVE: Channel 4 News's Paul Mason speaks to Laura Poitras, who film
    CITIZENFOUR captures the man at the centre of today's Watergate moment -
    Edward Snowden - in a compelling story of whistleblowing and NSA snooping.

    Edward Snowden interview: http://bit.ly/1tzg8ds
    Last edited by Cidersomerset; 24th February 2015 at 01:03.

  20. The Following 3 Users Say Thank You to Cidersomerset For This Post:

    Anchor (24th February 2015), mountain_jim (24th February 2015), Openmindedskeptic (26th February 2015)

  21. Link to Post #751
    Australia Avalon Member Anchor's Avatar
    Join Date
    10th February 2010
    Location
    NSW, Australia
    Language
    English
    Age
    62
    Posts
    4,654
    Thanks
    11,345
    Thanked 26,318 times in 3,784 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    A few hours ago Ed Snowden, Glen Greenwald and Laura Poitras completed an AMA with Reddit

    http://www.reddit.com/r/IAmA/comment...ras_and_glenn/

    From that, in response to this question:

    What's the best way to make NSA spying an issue in the 2016 Presidential Election? It seems like while it was a big deal in 2013, ISIS and other events have put it on the back burner for now in the media and general public. What are your ideas for how to bring it back to the forefront?

    Quote Posted by Glen Grenwald
    The key tactic DC uses to make uncomfortable issues disappear is bipartisan consensus. When the leadership of both parties join together - as they so often do, despite the myths to the contrary - those issues disappear from mainstream public debate.

    The most interesting political fact about the NSA controversy, to me, was how the divisions didn't break down at all on partisan lines. Huge amount of the support for our reporting came from the left, but a huge amount came from the right. When the first bill to ban the NSA domestic metadata program was introduced, it was tellingly sponsored by one of the most conservative Tea Party members (Justin Amash) and one of the most liberal (John Conyers).

    The problem is that the leadership of both parties, as usual, are in full agreement: they love NSA mass surveillance. So that has blocked it from receiving more debate. That NSA program was ultimately saved by the unholy trinity of Obama, Nancy Pelosi and John Bohener, who worked together to defeat the Amash/Conyers bill.

    The division over this issue (like so many other big ones, such as crony capitalism that owns the country) is much more "insider v. outsider" than "Dem v. GOP". But until there are leaders of one of the two parties willing to dissent on this issue, it will be hard to make it a big political issue.

    That's why the Dem efforts to hand Hillary Clinton the nomination without contest are so depressing. She's the ultimate guardian of bipartisan status quo corruption, and no debate will happen if she's the nominee against some standard Romney/Bush-type GOP candidate. Some genuine dissenting force is crucial.

    Quote Posted by Edward Snowden
    This is a good question, and there are some good traditional answers here. Organizing is important. Activism is important.

    At the same time, we should remember that governments don't often reform themselves. One of the arguments in a book I read recently (Bruce Schneier, "Data and Goliath"), is that perfect enforcement of the law sounds like a good thing, but that may not always be the case. The end of crime sounds pretty compelling, right, so how can that be?

    Well, when we look back on history, the progress of Western civilization and human rights is actually founded on the violation of law. America was of course born out of a violent revolution that was an outrageous treason against the crown and established order of the day. History shows that the righting of historical wrongs is often born from acts of unrepentant criminality. Slavery. The protection of persecuted Jews.

    But even on less extremist topics, we can find similar examples. How about the prohibition of alcohol? Gay marriage? Marijuana?

    Where would we be today if the government, enjoying powers of perfect surveillance and enforcement, had -- entirely within the law -- rounded up, imprisoned, and shamed all of these lawbreakers?

    Ultimately, if people lose their willingness to recognize that there are times in our history when legality becomes distinct from morality, we aren't just ceding control of our rights to government, but our agency in determing thour futures.

    How does this relate to politics? Well, I suspect that governments today are more concerned with the loss of their ability to control and regulate the behavior of their citizens than they are with their citizens' discontent.

    How do we make that work for us? We can devise means, through the application and sophistication of science, to remind governments that if they will not be responsible stewards of our rights, we the people will implement systems that provide for a means of not just enforcing our rights, but removing from governments the ability to interfere with those rights.

    You can see the beginnings of this dynamic today in the statements of government officials complaining about the adoption of encryption by major technology providers. The idea here isn't to fling ourselves into anarchy and do away with government, but to remind the government that there must always be a balance of power between the governing and the governed, and that as the progress of science increasingly empowers communities and individuals, there will be more and more areas of our lives where -- if government insists on behaving poorly and with a callous disregard for the citizen -- we can find ways to reduce or remove their powers on a new -- and permanent -- basis.

    Our rights are not granted by governments. They are inherent to our nature. But it's entirely the opposite for governments: their privileges are precisely equal to only those which we suffer them to enjoy.

    We haven't had to think about that much in the last few decades because quality of life has been increasing across almost all measures in a significant way, and that has led to a comfortable complacency. But here and there throughout history, we'll occasionally come across these periods where governments think more about what they "can" do rather than what they "should" do, and what is lawful will become increasingly distinct from what is moral.

    In such times, we'd do well to remember that at the end of the day, the law doesn't defend us; we defend the law. And when it becomes contrary to our morals, we have both the right and the responsibility to rebalance it toward just ends.
    (emphasis above is my own)
    -- Let the truth be known by all, let the whole truth be known by all, let nothing but the truth be known by all --

  22. The Following 3 Users Say Thank You to Anchor For This Post:

    Cidersomerset (24th February 2015), Openmindedskeptic (26th February 2015), Wind (28th February 2015)

  23. Link to Post #752
    United States Avalon Member lizfrench's Avatar
    Join Date
    14th July 2012
    Location
    Deer Creek - Edmond, OK
    Posts
    149
    Thanks
    417
    Thanked 591 times in 124 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    Will someone please explain to me how this particular information is "allowed" in media when we all know the media is run by the PTB??? I mean really? This show, which I am watching right now, seems more like a "test" to see what the public reaction is. Am I wrong here? Am I missing something folks? And the website to "sign up" against the control of the internet by the government looks very suspicious, it is soooo contrived.

  24. The Following 2 Users Say Thank You to lizfrench For This Post:

    Anchor (24th February 2015), Cidersomerset (24th February 2015)

  25. Link to Post #753
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    65
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,818 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    Quote Will someone please explain to me how this particular information is "allowed" in media when we all know the media is run by the PTB??? I mean really?
    They run the overall show and much of the news editing but there is much info put
    out if you are clued up in the alternate media to spot it. Which unfortunately is still
    not enough. Most if not all their agendas are hidden in plain site which is a theme
    discussed on many threads especially 9/11.David Icke headline pages reviews a lot
    of this material daily which he adds his experienced eye to with appropriate
    comments, which is where I get a fair bit from.http://www.davidicke.com/headlines/

    Quote This show, which I am watching right now, seems more like a "test" to see what the public reaction is. Am I wrong here? Am I missing something folks? .
    They are always watching and testing the waters , which is one of Edward Snowden points,
    although to be fair I think we all knew that , with the amount of $/£ spent on think tanks
    etc and most people knew we are spied on , with Cameras everywhere and the ' cold war'
    intel agencies .'Five Eyes' , Echelon etc are still up and running , with the 'bastards' doing
    their best to start a new one so mil ind complex etc can keep their budgets up and the
    fear factor going.......Sorry about that ,had a rant attack , Which show are you watching ?

    Quote And the website to "sign up" against the control of the internet by the government looks very suspicious, it is soooo contrived.
    I'm vary of websites I tend to keep to tried and tested ones, but they
    are all monitored or potentially so.....
    Last edited by Cidersomerset; 24th February 2015 at 07:59.

  26. The Following 2 Users Say Thank You to Cidersomerset For This Post:

    Anchor (24th February 2015), Openmindedskeptic (26th February 2015)

  27. Link to Post #754
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    65
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,818 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    The SIM Card Saga. The NSA and Britain’s GCHQ’s Agenda:
    Establishing Total Control Over Internet and Mobile Phone Users

    new Tuesday 24th February 2015 at 06:50 By David Icke





    On February 16, researchers at the Moscow-based security group
    Kaspersky Lab announced the discovery of the ultimate virus which
    has virtually infected all spheres of military and civilian computing
    in more than 40 countries around the world.

    They’ve managed to discover a piece of malware that must have
    been installed on hard disks while they were still being manufactured,
    and due to its complexity and a certain number of features that it
    shares with Stuxnet, it’s safe to assume that it was created by
    US secret services.

    On February 18, The Guardian confirmed that for the last 7 years
    Government Communications Headquarters (GCHQ) had been sharing
    personal intelligence data en masse with America’s national security
    agencies, regardless of the fact that it had interceptedmillions of
    foreign citizens’ conversations. The ruling of a UK court clearly
    suggests that these actions were illegal on top of being carried out
    in violation of the the European Convention on Human Rights.’

    Read more: The SIM Card Saga. The NSA and Britain’s GCHQ’s
    Agenda: Establishing Total Control Over Internet and Mobile Phone Users

    http://journal-neo.org/2015/02/22/ns...ever-believed/

  28. The Following 2 Users Say Thank You to Cidersomerset For This Post:

    Openmindedskeptic (26th February 2015), TargeT (24th February 2015)

  29. Link to Post #755
    Australia Avalon Member Anchor's Avatar
    Join Date
    10th February 2010
    Location
    NSW, Australia
    Language
    English
    Age
    62
    Posts
    4,654
    Thanks
    11,345
    Thanked 26,318 times in 3,784 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    From what I have read Gemalto were not "hacked", they used criminally weak opsec which was exploited. The NSA/GCHQ effectively reached in and took their stuff through an open door (after casing them out very carefully).

    A security company like Gemalto should have known better, (but then so should have SONY).

    Never the less that doesnt make the wilful theft of that data legal and GCHQ and obviously the NSA should be held to the same standards as the people they prosecute for computer misuse of this kind.

    There are a lot more stories like this in the pipeline....
    -- Let the truth be known by all, let the whole truth be known by all, let nothing but the truth be known by all --

  30. The Following 3 Users Say Thank You to Anchor For This Post:

    Cidersomerset (24th February 2015), Openmindedskeptic (26th February 2015), TargeT (24th February 2015)

  31. Link to Post #756
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    65
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,818 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations



    20 February 2015 Last updated at 14:32

    US and UK accused of hacking Sim card firm to steal codes Sim card



    The stolen encryption keys allowed agencies to decode data that passes between
    mobile phones and cell towers US and British intelligence agencies hacked into a
    major manufacturer of Sim cards in order to steal codes that facilitate
    eavesdropping on mobiles, a US news website says.

    The Intercept says the revelations came from US intelligence contractor turned
    whistleblower Edward Snowden.

    The Dutch company allegedly targeted - Gemalto - says it is taking the
    allegations "very seriously".

    It operates in 85 countries and has more than 40 manufacturing facilities.

    The Intercept says that "the great Sim heist" gave US and British surveillance
    agencies "the potential to secretly monitor a large portion of the world's cellular
    communications, including both voice and data".

    It says that among the clients of the Netherlands-based company are AT&T,
    T-Mobile, Verizon, Sprint and "some 450 wireless network providers around the
    world".

    Full investigation

    The Intercept alleges that the hack organised by Britain's GCHQ and the US
    National Security Agency (NSA) began in 2010, and was organised by operatives in
    the "Mobile Handset Exploitation Team". Neither agency has commented directly on
    the allegations.

    However GCHQ reiterated that all its activities were "carried out in accordance with
    a strict legal and policy framework which ensures that our activities are authorised,
    necessary and proportionate".



    Mobile phone users in the Philippines (January 2015) Experts say that the alleged
    hack is a major compromise of worldwide mobile phone security

    How does the hack work?

    Each Sim card has an individual encryption key, installed by the chip manufacturer,
    that secures communications between the handset in which it inserted and mobile
    phone masts.This means that if anyone were to snoop on conversations or text
    messages, they would receive garbled, unintelligible data.

    That is, of course, unless those carrying out the surveillance get hold of the
    encryption key. With that information, they can even decrypt previously intercepted
    communications.

    However, this tactic only works for phone conversations and text messages.
    Communications through mobile applications such as Whatsapp, iMessage and
    many email services have separate encryption systems.


    The stolen encryption allowed the agencies to decode data that passes between
    mobile phones and cell towers. They were able to decrypt calls, texts or emails
    intercepted out of the air.

    A Gemalto spokeswoman said the company was unable to verify whether there had
    indeed been a breach, and highlighted that other Sim manufacturers could also
    have been targeted.

    She added: "We take this publication very seriously and will devote all resources
    necessary to fully investigate and understand the scope of such highly sophisticated
    techniques to try to obtain Sim card data".

    Global ripples

    Reacting to The Intercept's revelations, Eric King, deputy director of the campaign
    group Privacy International, said the NSA and GCHQ had "lost sight of what the rule
    of law means and how to weigh what is necessary and proportionate".

    He said trust in the security of our communications systems is "essential for our
    society and for businesses to operate with confidence". And the impact of these
    latest revelations will have "ripples all over the world."



    Passport Gemalto also manufactures ID chips for passports, among other
    technologies Privacy International is currently engaged in legal action against GCHQ
    over its alleged hacking practices.

    Gemalto makes Sim cards for mobile phones and furnishes service providers with
    encryption codes to keep the data on each phone private.

    The Intercept claims that by first cyber-stalking employees at Gemalto and then
    penetrating their emails, the spy agencies were able to steal thousands of
    encryption keys at source.

    This would allow them to eavesdrop easily on phone calls and texts without seeking
    permission from telecoms companies or foreign governments, and without leaving a trace.

    The Intercept cites as its source documents leaked by Edward Snowden, the former
    NSA contractor who is currently living in Russia.

    'Weakest link'

    Karsten Nohl, a security researcher who has exposed previous Sim card
    vulnerabilities, told the BBC the leak showed that "it is still not terribly difficult" to
    circumvent encryptions on mobile phone communications.

    He added that since it was Gemalto, and not the mobile providers, which sets Sim
    encryption codes, this makes the Dutch firm the "weakest link of the security chain".

    Other Gemalto clients, such as passport agencies, buy blank chips and set the
    codes themselves.

    "A lot of telecom companies will be scrambling to find out what went wrong," said Mr Nohl.



    Analysis: Joe Miller, BBC technology reporter

    Lock
    If The Intercept's report is to be believed, the most striking discovery is how easily
    those wanting to engage in mass surveillance can eavesdrop on our mobile
    communications.

    Gemalto, the company which was allegedly targeted, manufactures an estimated
    30% of all Sim cards worldwide. And crucially, it creates the security key for each
    item. All security agencies needed to do was obtain (by hacking, allegedly) the list
    of security keys from the firm. Then, as security expert Karsten Nohl says, they
    could snoop on phone calls with a "few hundred dollars worth of radio equipment in
    strategically important locations".

    This contrasts with security procedures used, for example, for chips in passports.
    Many are are also manufactured by Gemalto. These are delivered to the relevant
    authorities as a blank chip, and the Passport Office - not the company - creates the
    security key.

    Many of Edward Snowden's allegations have shone a light on complex surveillance
    tactics by the NSA. But perhaps this latest leak has done more to highlight how a
    single company is in control of millions of people's private data.

    http://www.bbc.co.uk/news/technology-31545050
    ====================================================
    ====================================================
    ====================================================





    24 February 2015 Last updated at 13:16

    Yahoo executive challenges NSA over encryption demandsAlex Stamos
    Yahoo's security chief Alex Stamos clashed with Adm Mike Rogers, the
    director of the US National Security Agency

    Continue reading the main story
    Related Stories
    Tech firms urged to share data with US
    US and UK 'hacked Sim card firm'
    NSA 'developing quantum computer'



    A Yahoo executive has publicly challenged the National Security Agency
    (NSA) over encryption "backdoors".

    Alex Stamos pressed NSA director Adm Mike Rogers on whether the access to encrypted
    data requested by the US authorities should also be granted to the Russian and Chinese
    governments.


    Adm Rogers insisted an agreement could be reached "within a framework".

    The tense exchange came after many top tech figures refused to attend a White House c
    ybersecurity summit this month.

    "If we're going to build defects, backdoors or golden master keys for the US government,
    do you believe we should do so... for the Chinese government, the Russian government,
    the Saudi Arabian government, the Israeli government, the French government?" asked
    Mr Stamos, Yahoo's chief information security officer.

    After initially dodging the question, Adm Rogers - who took over as director of the
    NSA last year - responded: "I think that we're lying that this isn't technically feasible.

    "Now, it needs to be done within a framework. I'm the first to acknowledge that."

    Mike Rogers Adm Mike Rogers testifying before a Senate committee while a vice-admiral
    According to a transcript provided by the Just Security website, he argued that he
    did not want the FBI and NSA to unilaterally decide what access they should have, but
    insisted an agreement was achievable.

    Pressed on whether he thought that access should also be granted to other nations'
    governments, Adm Rogers said: "I think we can work our way through this."

    Mr Stamos responded: "I'm sure the Chinese and Russians are going to have the same opinion."

    The exchange took place before delegates at a cybersecurity conference hosted by the
    New America Foundation on Monday.



    NSA The US authorities want to ensure they have access to encrypted data in order to investigate crime
    There has been an increasingly tense relationship between the US authorities and Silicon
    Valley since information was leaked by NSA whistleblower Edward Snowden.

    Encryption of user data has subsequently become increasingly popular and, in some cases,
    the companies hand over the keys to users, making it difficult to break.

    But the White House has asked tech firms to share more data with law enforcement agencies.
    And the US authorities want them to build in vulnerabilities that they would be able to exploit.

    The rift was illustrated when, earlier this month, senior Google, Yahoo and Facebook executives
    turned down invitations to a White House cybersecurity summit at Stanford University.

    Tim Cook, of Apple, was one of the few top tech bosses to appear.

    Adm Rogers told the conference on Monday that the NSA needed a way to access data if it was
    believed that a device was "being used for criminal, or in my case, foreign intelligence or
    national security issues".

    But he acknowledged that there were legitimate concerns to be addressed before a
    "legal framework" could be established.

    http://www.bbc.co.uk/news/technology-31604503
    Last edited by Cidersomerset; 24th February 2015 at 20:45.

  32. The Following User Says Thank You to Cidersomerset For This Post:

    Openmindedskeptic (26th February 2015)

  33. Link to Post #757
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    65
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,818 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    The Spy Cables: A glimpse into the murky world of espionage

    new Wednesday 25th February 2015 at 07:14 By David Icke



    Published on 22 Feb 2015


    A digital leak to Al Jazeera of hundreds of secret intelligence
    documents from the world's spy agencies.

    From 1800GMT on Monday, February 23, Al Jazeera's Investigative
    Unit is publishing The Spy Cables, in collaboration with
    The Guardian newspaper.

    The leaked documents come from intelligence agencies around
    the world, including: Israel's Mossad, Britain's MI6, Russia's FSB,
    Australia's ASIO and South Africa's SSA.

    Al Jazeera's Phil Rees reports.

    Read more: http://aje.io/rc9w

  34. Link to Post #758
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    65
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,818 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    Glenn Greenwald: Edward Snowden Will Never Be Safe in US

    new Wednesday 25th February 2015 at 06:23 By David Icke



    Published on 24 Feb 2015

    Glenn Greenwald describes meeting Edward Snowden and how
    the whistleblower gained his trust. Clip courtesy of C-SPAN
    Subscribe to The Daily Conversation for . Full video from Sixth and I.

    Full video from Sixth and I Historic Synagogue available at:
    Glenn Greenwald, author of No Place to Hide: Edward S.

  35. The Following User Says Thank You to Cidersomerset For This Post:

    Openmindedskeptic (26th February 2015)

  36. Link to Post #759
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    65
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,818 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    DARPA Spending Millions on ‘RATS’ Voice Recognition Surveillance Technology

    Wednesday 25th February 2015 at 08:05 By David Icke





    ‘Between 2015 and 2017, the Pentagon will have the ability to decipher
    human voices in surveillance audio even if background noise makes the
    covertly recorded conversations inaudible.

    This may bring to mind the surveillance audio secretly recorded through
    our smartphones when they are in our pockets. On or off, we know now
    that our conversations are being recorded by a wide array of electronic
    devices, and our conversations we used to consider private are actually
    being stored in data collection facilities like the one in Utah aptly titled
    the ‘Utah Data Center’.

    With this multimillion dollar technology, our seemingly private conversations
    can be stored and analyzed by government officials even if the background
    noise is too much for a normal audio recording.’

    Read more: DARPA Spending Millions on 'RATS' Voice Recognition Surveillance Technology


    http://www.activistpost.com/2015/02/...ats-voice.html

  37. The Following User Says Thank You to Cidersomerset For This Post:

    Openmindedskeptic (26th February 2015)

  38. Link to Post #760
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    65
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,818 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    Google gives new meaning to ‘Orwellian’ – Becomes Ministry of Truth

    Monday 2nd March 2015 at 09:45 By David Icke





    ‘“…if all records told the same tale — then the lie passed into history and became truth.” (1984, George Orwell)

    The New Scientist has the stunning story (2/28/15, “Google wants to rank websites based on facts not links,” by Hal Hodson):

    “THE internet is stuffed with garbage. Anti-vaccination websites make the front page of Google, and fact-free
    ‘news’ stories spread like wildfire. Google has devised a fix – rank websites according to their truthfulness.”

    Great idea, right?

    Sure it is.

    The author of the article lets the cat out of the bag right away with his comment about “anti-vaccination” websites.’

    Read more: Google gives new meaning to 'Orwellian' – Becomes Ministry of Truth

    http://www.activistpost.com/2015/03/...orwellian.html
    Last edited by Cidersomerset; 2nd March 2015 at 19:36.

  39. The Following User Says Thank You to Cidersomerset For This Post:

    Openmindedskeptic (3rd March 2015)

+ Reply to Thread
Page 38 of 50 FirstFirst 1 28 38 48 50 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts