-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Amy Goodman And Canada's Olympic Paranoia
,----[ Quote ]
| What could possibly have led to this level
| of scrutiny? They cared little that she was
| there to discuss the wars in Afghanistan
| and Iraq or the state of health care. The
| critical concern of the Canadian Border
| authorities was that Ms. Goodman would be
| discussing the 2010 Winter Olympic games in
| Vancouver. This is not a joke.
|
| [...]
|
| In Vancouver, dissent is now the only
| obstacle to an Olympic-sized theft. The
| games stand to cost Vancouver, in the
| analysis of the Vancouver Sun, "$6 billion
| and counting so far." Local papers are
| starting to ask, "Could the Olympics
| bankrupt the City of Vancouver, or put it
| in a financial straitjacket for decades to | come?"
|
| But it's not just the economic theft.
`----
http://www.huffingtonpost.com/dave-zirin/amy-goodman-and-canadas-o_b_372273.html
(en) Anarchist El Libertario on Venezuela: Anti-police impunity activist assassinated
,----[ Quote ]
| El Libertario, the Venezuelan anarchist
| newspaper, denounce the assassination of
| Mijail Martinez as the latest chapter in
| the Chavez governmentâs attack against
| base-level, autonomous, revolutionary and
| dissident organisations.
`----
http://www.ainfos.ca/en/ainfos23355.html
Sens. Feinstein and Durbins attack on citizen journalism
,----[ Quote ]
| The Senate is currently considering a media
| shield law, pushed by media outfits that
| want federal protection for their
| journalists.
`----
http://www.dailykos.com/storyonly/2009/12/2/810181/-Sens.-Feinstein-and-Durbins-attack-on-citizen-journalism
Recent:
UK MoD Manual of Security Volumes 1, 2 and 3 Issue 2, JSP-440, RESTRICTED, 2389 pages, 2001
,----[ Quote ]
| The main threats of this type are posed by
| investigative journalists, pressure groups,
| investigation agencies, criminal elements,
| disaffected staff, dishonest staff and computer
| hackers. The types of threat from these sources
| can be categorized in six broad groups: a.
| Confidentiality. Compromise of politically
| sensitive information. This threat is presented
| by: (1) Pressure groups and investigative
| journalists attempting to obtain sensitive
| information. (2) Unauthorized disclosure of
| official information (leaks)..."
|
| "Investigative journalists have exploited
| personal tax information; they also target
| commercial and financial information as do
| criminal elements seeking financial advantage. "
|
| [..]
|
| "The threat to operations against these targets
| is less likely to arise from positive acts of
| counter-espionage, than from leakage of
| information through disaffected members of staff,
| or as a result of the at tentions of an
| investigative journalist, or simply by accident
| or carelessness. 1706. In this wider definition
| of Threat, the "enemy" is unwelcome publicity of
| any kind, and through any medium. The most
| effective safeguard is to reinforce those aspects
| of security that minimise the risk of leakage of
| sensitive intelligence operations or product into
| the public domain - whether by accidental
| exposure or deliberate intent. The STRAP System
| aims to achieve this."
|
| [..]
|
| "The security measures in this chapter are aimed
| primarily to cover contacts made in CSSRAs and
| have been drawn up to protect the individual from
| action by FISs, extremist groups, investigative
| journalists and criminals."
|
| [..]
|
| "An Annual Threat Assessment (ATA) is issued to
| all Government Departments giving generic
| statements as to the main sources of Threat. This
| will include personnel who may be from or
| influenced by Foreign Intelligence Services
| (FIS), authorized users who, for whatever motive,
| may seek to gain access to official information
| they have no 'need to know', subversive or
| terrorist organizations, and investigative
| journalists."
|
| [..]
|
| "The threat from subversive or terrorist
| organisations, investigative journalists and
| others must also be considered."
|
| "Experience has shown that at least half the
| attempts to hack into systems arise from this
| group and that external hackers use "social
| engineering" techniques to trick authorised users
| into revealing information which may aid an
| external penetration. 7. The Media. Investigative
| journalists are increasingly interested in State
| IT systems, particularly those operated by the
| police and the Security and Intelligence
| agencies. There has been evidence of premeditated
| attempts to acquire protectively marked
| information from IT systems. 8. Members of the
| Public. The fact that inform ation held
| electronically may be open to novel forms of
| surreptitious attack provides a special
| attraction to certain individuals, commonly known
| as 'hackers'. Whilst the efforts of hackers are
| unlikely to be directed specifically against
| protectively marked information, there is added
| kudos in breaking into Defence systems, so much
| information might be discovered fortuitously. "
|
| "..The threat from subversive and terrorist
| organizations, criminal activity, investigative
| journalists, and members of the public cannot be
| discounted..."
|
| "..Malicious software can originate from many
| sources such as disaffected staff, foreign
| intelligence services, investigative journalists
| or terrorists..."
|
| [..]
|
| "..The main elements of the Audio security threat
| are: a. The threat from deliberate attempts to
| overhear conversations posed by FIS (especially
| at locations overseas), sophisticated terrorist
| and subversive organisations and in particular
| from criminals, investigative journalists,
| private investigators and some members of the
| public..."
|
| [..]
|
| "..Identify possible threats to your site, such
| as from: Foreign Intelligence Services. Terrorist
| groups. Disaffected staff. Criminals.
| Investigative journalists."
`----
http://wikileaks.org/wiki/UK_MoD_Manual_of_Security_Volumes_1%2C_2_and_3_Issue_2%2C_JSP-440%2C_RESTRICTED%2C_2389_pages%2C_2001
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAksYZwgACgkQU4xAY3RXLo6hnwCghAyHude8uksDXYpSFQT5AsXg
BggAnRABw9NTfCDRkBWMRfXTbLnLTd7k
=tRNY
-----END PGP SIGNATURE-----
|
|