Parallel Construction: Unconstitutional NSA Searches Deny Due Process | Huffington Post
The NSA sits at the nexus of violations of both the Fourth and Fifth Amendments with a legal dodge called Parallel Construction.
Parallel Construction is a technique used by law enforcement to hide the fact that evidence in a criminal case originated with the NSA. In its simplest form, the NSA collects information showing say a Mr. Anderson committed a crime. This happens most commonly in drug cases. The conclusive information is passed to the Drug Enforcement Agency (DEA), who then works backwards from the conclusion to create an independent, “legal” body of evidence to use against Mr. Anderson. [Read more]
Snowden was ‘the one person in the f***ing NSA’ that did the right thing | Venture Beat
Over the weekend, two of the most famous whistleblowers in U.S. history, Edward Snowden and Pentagon papers leaker Daniel Ellsberg, sat down at the HopeX hacker conference in New York to discuss how technology can empower dissent and protect your privacy.
What began as a calm panel on the state of whistleblowing quickly evolved into a heated discussion on whether Snowden is a traitor and why, in Ellsberg’s words, “Snowden was the one person in the f***ing NSA that did what he absolutely should have done.” [Read more]
Researchers: Lawyers blocked our Black hat demo on de-anonymising Tor | The Guardian
The Tor network promises online privacy by routing users’ internet traffic through a number of servers – or layers – while encrypting data.
The surveillance whistleblower Edward Snowden is known to have used Tor to maintain his privacy, while the documents he leaked showed that the US National Security Agency (NSA) struggled to uncover identities of those on the network. [Read more]
How To Send Email Without Leaving Any Data Traces | Forbes
The unfolding revelations of government spying on private emails and communications have prompted a good deal of business for startups and bigger firms that sell tools to encrypt email to higher standards than easily available before. Such services prevent anyone intercepting a message from reading its contents — at least anyone who does not have NSA-style computing resources and abilities to decipher a message. [Read more]
High-Level NSA Whistleblower Says Blackmail Is a Huge – Unreported – Part of Mass Surveillance | BeforeitsNews
It is well-documented that governments use information to blackmail and control people.
The Express reported last month:
British security services infiltrated and funded the notorious Paedophile Information Exchange in a covert operation to identify and possibly blackmail establishment figures, a Home Office whistleblower alleges. [Read more]
Don’t Shackle the NSA Now | National Review
The Middle East is in turmoil. Syria has collapsed, essentially transforming into a giant battlefield between Sunni Islamists and Iran-backed entities. U.S. gains are still tenuous in Afghanistan, which is subject to attack from assorted terror groups, and the scheduled withdrawal of U.S. troops from there could empower warring militias and terror organizations, as is happening in Iraq. Meanwhile, many parts of Libya are now controlled by Islamist warlords. [Read more]
- Idaho woman appeals NSA surveillance lawsuit | KTVB
- UC, NSA partner to fight cyber crime | BizJournals
- Apple denies iOS ‘backdoor’ claims, says it’s not working with the NSA | The Inquirer
- Top Obama aides fly to Berlin to talk about spying allegations | McClatchyDC
– http://wp.me/p4sUqu-hn – Michael’s Blog