>It has been nearly two years since the first disclosures of government surveillance programs by former National Security Agency contractor Edward Snowden and citizens around the globe are still coming to terms with how they feel about the programs and how to live in light of them. The documents leaked by Snowden revealed an array of activities in dozens of intelligence programs that collect data. The documents further detail the collection of Web traffic around the whole planet.
Nexus23 Labs View :
Being in the privacy sector since decades, being aware of the Privacy Problems
described by superb writers like Orwell, Huxley, Kafka, etc.
we always fought the mass surveillance of the Government and its mobs allies.
Opposite to most of people that ,as highlighted in the article below,
when Privacy Theme is launched in the desk come up with their
“I’ve nothing to hide” we fight to make them understand that
“Yes , you have something to hide , your life” .
Continue reading “My Hidden Life”
The Whittaker Corporation , a specialty chemical and technology concern,
said it expected a Justice Department investigation to result in criminal charges
against the company or one of its subalterns .
Whittaker said Justice Department lawyers had presented it
with evidence suggesting that employees of a Whittaker unit had illegally paid money
to a Government employee in connection with certain contracts.
Whittaker would make no comment beyond the announcement.
The company’s shares fell $2 today, to $48.875, on the New York Stock Exchange.
Anonymous FTP In MIL
Total file number: 70
Total file size: 5.29 MB
System: UNIX Type: L8
This is a United States Department of Defense
This computer system and all related equipment,
networks and network devices
(including Internet access) are provided
only for authorized U.S. government use.
Unauthorized use may subject you
to criminal prosecution.
DoD computer systems may be monitored
for all lawful purposes,
Quellen TKÜ sunk by CCC
>The largest European hacker club, “Chaos Computer Club” (CCC), has reverse engineered and analyzed a “lawful interception” malware program used by German police forces. It has been found in the wild and submitted to the CCC anonymously. The malware can not only siphon away intimate data but also offers a remote control or backdoor functionality for uploading and executing arbitrary other programs. Significant design and implementation flaws make all of the functionality available to anyone on the internet.