AFI Custom Search

To ensure you are reading the latest post, click the logo above.
SEARCH by topic, keyword or phrase. Type in Custom Search box
Use this Custom Search toole.g. "IBM Eclipse Foundation" or "racketeering"

Friday, November 6, 2015

COMPLICIT ENCRYPTION GEEKS ENABLE THE AMERICAN SPY STATE

The invasion of America’s privacy is not possible without the support of encryption engineers

Contributing Writers | Opinion | AMERICANS FOR INNOVATION  | Nov. 06, 2015, Updated Mar. 30, 2017 | PDF
Adolf Hitler with his Brownshirts
Fig. 1—Adolf Hitler relied upon his "Brownshirts" to spy on rivals.
In 1921, Adolf Hitler organized a group to protect his political rallies. They became known as Brownshirts (also stormtroopers, Sturm Abteilung – SA) after the color of their uniform shirts. Their activities evolved from protecting Hitler and Nazi meetings to disrupting the activities of those who opposed him. As Nazi influence grew, the Brownshirts gained a reputation as a well-organized gang of violent thugs. They became Hitler’s private army that led the violence on Kristallnacht (the "Night of the Broken Glass") in November 1938 that destroyed about half the synagogues in Germany and thousands of businesses, and sent tens of thousands of innocent citizens to camps (including the business and family of an AFI contributing writer, God rest their souls).
Encryption engineers are modern day Brownshirts?
While they put many off of Nazism, others were attracted to the group’s discipline. In 1934, to consolidate his power, Hitler ordered the killing of 85 Brownshirt leaders in a “blood purge” that became known as the “Night of the Long Knives.” These hits were carried out by the SS and Gestapo, the secret police of his emerging regime. Germany’s courts turned a blind eye to the murders, a judicial failure that ushered in Hitler as “the supreme judge of the German people.” Hitler then proceeded with his Third Reich eugenic vision of German superiority. (Eugenics: literally “well born”—a set of beliefs and practices that aimed to improve the genetic quality of humanity). IBM provided Hitler with computers to catalog Jews, Poles, Gypsies, homosexuals and political opponents.

America's encryption engineers are betraying our trust, just like Hitler's Brownshirts betrayed their own parents, colleagues, neighbors and relatives. No German was immune from their treachery. The American Spy State Cartel (a) spies on everyone, (b) harasses rivals, (c) supports eugenics, (d) is supported by complicit federal judges turning a blind eye to the law, and (e) presses Obama-Hillary's policy for the "harnessing of private incentives to public goals." They also (f) support IBM who formed The Eclipse Foundation in 2001 and created Facebook along with the rest of social networking industry which compiles detailed "dark profiles" on every person on the planet. These are all disturbingly similar attributes to Hitler's fascism.

(Nov. 06, 2015)—The invasion of America’s privacy in the Digital Age is not possible without the support of encryption engineers.

Technically, politicians and bureaucrats don’t breach your privacy, encryption engineers do. So what has gone wrong with the morality of these talented people? This post will review the facts and leave the moral questions for later.

Encryption engineers manage the digital keys that lock and unlock your data “at rest” (stored) and “in motion” (moving through the Internet).

Encryption must be regulated in public, not by spies, bankers, corrupt judges and greedy lawyers

To date, this esoteric, but all-important task of data encryption has been the murky domain of spies, lawyers and bankers, FISA court judges and tech geeks (the “Spy State Cartel”).

Encryption scrambles the contents of your messages then files and unscrambles them once they reach their intended destinations using digital keys managed by encryption engineers.

For example, the phrase “your cancer treatment program” would be encrypted with a digital key and travel through the Internet as “Qij\aq6NB5Lf@;kndFq7CN{Q{." So, even if it was intercepted it could not be read. The theory is that this knowledge of your medical condition would remain confidential between you and your doctor.

The Big Privacy Lie

That is the BIG PRIVACY LIE. The fact is, the Spy State Cartel knows about your cancer and stores that information (along with every other detail about your life) in a “dark profile” maintained on you offshore—out of the reach of the U.S. Constitution.

Only the NSA and their “public-private partner” commercial crony accomplices have access. See President Obama Executive Order No. 13691, Feb. 13, 2015—Promoting Private Sector Cybersecurity Information Sharing.

Edward Snowden, American Patriot
Photo: Edward Snowden, Digital Trends.

On Jun. 06, 2013, we first learned from NSA whistleblower and American patriot Edward Snowden that all of the major American Internet and telecommunications providers have given the NSA a backdoor master encryption key to all your data.

Your personal information is private in any form

Think about it. Would you be incensed if you arrived home tonight and discovered a person rummaging through your file cabinet? Of course you would. You'd call the police. What if it was the police, along with the phone company, a local politician, your and a group of local business leaders, just nosing around? You'd call out the hounds.

So then, why do you allow that very same activity to occur on your computer and phone just because you cannot see the bits and bytes through which they rummage? Put your foot down. Now!

These same providers colluded with former law professor James P. Chandler and crony commercial lawyers via the IBM Eclipse Foundation (2001) to write convoluted “end user license agreements” (EULA) where you agreed to give up your privacy in exchange for free applications and services, like email and document sharing. Stop signing and supporting this sneaky, slimy lawyering. Stop using providers that invade your privacy with such sneaky, abusive practices.

For example, Facebook’s EULA first states “You own all of the content and information you post on Facebook.” Sounds good, but then in the very next sentence you give up those rights “you grant us a . . . worldwide license to use any IP [intellectual property] you post.” It’s much worse, but the point is made.

Our encryption geek sons and daughters have betrayed us

These recalcitrant geek children of ours have allowed this unprecedented assault on our Constitutional rights to privacy and property. They don't appear to care, so let's give them motivation to care. Expose them.

When the NSA comes knocking at the door of an American company, they should be told "NO, you don’t have jurisdiction inside the borders of the United States." But, our encryption engineering children don't fight for our property and privacy rights. Instead, they just give them the backdoor keys and cash the bribery checks, in our opinion.

Bookmark: #drbg-list

Who are these encryption engineers?

The National Institute of Standards (NIST) is required by law to publish a list of companies and their hardware and software products that include a “DRBG Algorithm” which likely gives the NSA and their commercial cronies a permanent backdoor. This list includes contact names and addresses.

See Perlroth, N., Larson, J., Shane, S. (Sep. 05, 2013). N.S.A. Able to Foil Basic Safeguards of Privacy on Web. The Wall Street Journal.

The NIST DRBG Validation List is formatted oddly [NOTE, Mar. 30, 2017: This file has been removed from the NIST website—see HTML | PDF versions reproduced from the file when it was available.] Part of each table entry scrolls off the page. Printing cuts off the disclosure about DRBG algorithms, and it is over 200 pages. Experienced investigators say such unwieldy government disclosure files are common in agencies with something to hide from public scrutiny.

Here are properly formatted versions of the NIST file: HTML | PDF (Thank you to AFI researchers. It took eight hours to fix.)

The list has over 900 entries currently. It reads like a Who’s Who of Internet, computer, software  and telecommunications providers. Includes on the list are Microsoft, Dell, IBM, Cisco, Kapersky, Red Hat, Samsung, Motorola, Sonus, HP, Palo Alto Networks, Apple, McAfee, Oracle and Northrup Grumman.

Left & Right United Against Obama's Spy State
CREDO logo

Petition to Congress:
No end-of-year sweetheart deals for Spy State cronies on Wall Street

"Oppose, in must-pass bills to fund our government or our nation's infrastructure, more Wall Street handouts [incl. Citigroup] like attacks on the consumer protection agency, the Dodd-Frank financial reforms, and rules protecting investors."

Uncannily, the same companies are members of IBM’s Eclipse Foundation (2001). These companies all relied on Leader Technologies' social networking invention stolen by Professor James P. Chandler and the IBM Eclipse Foundation in 2001-2002.

Below are 133 of the most recent entries. Is your son, daughter, friend, or classmate on this list? Ask them why they are complicit or silent about this historic abuse of privacy. Ask them about their “sudden newfound wealth” (very likely for active colluders).

Their investments will likely focus on fellow Cartel members like JPMorgan, Morgan Stanley, Goldman Sachs, HSBC, UBS, Fidelity, Vanguard, T. Rowe Price, TIAA-CREF, Baillie Gifford, Credit Suisse, Barclays, Wells Fargo, Citigroup, Bank of America, Deutsche Bank and BlackRock. A trip to the Cayman Islands may have been in their vacation schedule.

Sons & Daughters Who may be Betraying our privacy — Encourage them to whistleblow and stop this madness

DRBG (Deterministic Random Bit Generator) Validation List, NIST, selected entries from the most recent 133 entries (over 900 total entries). Accessed Nov. 05, 2015. Click here for an Excel spreadsheet | PDF from which the following names were selected.
Company Name (last, first) Email Phone City State
Apple Inc Geddis, Shawn geddis@apple.com   Cupertino CA
Alcatel-Lucent Nothaft, Alfred alfred.nothaft@alcatel-lucent.com + 1-972-477-5087 Ottawa Canada
Alcatel-Lucent Rajsic, Carl carl.rajsic@alcatel-lucent.com + 1-613-784-6218 Ottawa Canada
Dell Inc. Mandava, Srihari srihari_mandava@dell.com   Santa Clara CA
Dell Software Inc. Sanagala, Usha    usanagala@sonicwall.com 408-962-6248  Santa Clara CA
General Dynamics Aylesworth, David David.Aylesworth@gd-ms.com 781-400-6527 Needham MA
Harris Corporation Kwak, Suzanne skwak@harris.com 585-242-4686 Rochester NY
Harris Corporation Ruggieri, Steven sruggi01@harris.com 585-239-7806 Rochester NY
HP Security Voltage Martin, Luther support@voltage.com 408-886-3200 Cupertino CA
Hewlett Packard Enterprise Johnson, Matt matt.johnson@hp.com 402-758-7262 Omaha NE
Hewlett Packard Enterprise Kuriyavar, Nagesh nagesh.kuriyavar@hp.com 402-758-7262 Omaha NE
Hewlett Packard Enterprise Pittman, Bob bob.pittman@hpe.com 978-264-5211 Littleon MA
Hewlett-Packard Drew, John john.drew@hp.com + 44-560-109-0356 Bristol UK
Hewlett-Packard Laredo, Laura laura.loredo@hp.com + 44-117-316-2462 Bristol UK
Hewlett-Packard Company Dhillon, Harjit Harjit.dhillon@hp.com 916-501-1426 Sunnyvale CA
Hewlett-Packard Development Company, L.P. Luciani, Luis            luis.luciani@hp.com 281-518-6762 Houston TX
IBM   Knibloe, Christine cknibloe@us.ibm.com 412-977-9398 Tucson AZ
IBM Corporation Fraser, Marie fraserma@ie.ibm.com + 353 (21) 730-6043 New Brunswick Canada
IBM Corporation Hernandez, Sandra hsandra@us.ibm.com 512-286-5624 New Brunswick Canada
IBM Internet Security Systems Leake, Sheena sleake@us.ibm.com 404-238-5565 Atlanta GA
IBM Internet Security Systems Moultrie, Ferrell fmoultrie@us.ibm.com 678-234-4069 Atlanta GA
Intel Corporation Nissen, Andy andy.nissen@intel.com 651-628-5385 Santa Clara CA
Motorola Solutions Inc. Nguyen, Tom kxp467@motorolasolutions.com 847-576-2352 Schaumburg IL
Motorola Solutions Systems Chmiel, Tomasz tomasz.chmiel@motorolasolutions.com + 48-12-29-79-000 Krakow PL
Motorola Solutions Systems Rypina, Tomasz tomasz.rypina@motorolasolutions.com + 48-12-29-79-000 Krakow PL
Northrop Grumman MS Network Security Howard, Kristian kristian.howard@au.ngc.com + 611300365893 Braddon Australia
Northrop Grumman MS Network Security Hoyle, Warwick warwick.hoyle@au.ngc.com + 611300365893 Braddon Australia
OpenSSL Software Foundation Inc. Marquess, Steve info@openssl.com 877-673-6775 Adamstown MD
Oracle Communications Mathiyalagan, Madhu madhu.mathiyalagan@oracle.com 781-538-7514 Bedford MA
Oracle Communications Suares, Nikhil nikhil.suares@oracle.com 781-538-7568 Bedford MA
Palo Alto Networks Bajic, Jake jbajic@paloaltonetworks.com 408-753-3901 Santa Clara CA
Palo Alto Networks Bishop, Richard rbishop@paloaltonetworks.com 408-753-4000 Santa Clara CA
Qualcomm Technologies Inc. Liong Ling, Yin Ling yliong@qti.qualcomm.com 858-651-7034 San Diego CA
Red Hat, Inc. Rubin, Ann-Marie arubin@redhat.com 978-392-1000 Raleigh NC
Samsung  Ahn, Changsup cs77.ahn@samsung.com + 82-10-3173-9021 Gyeonggi-do Korea
Samsung  Park, Jisoon js00n.park@samsung.com + 82-10-4556-5007 Gyeonggi-do Korea
Samsung Electronics Co, Ltd. Burnham, Kim bumhan.kim@samsung.com + 82-10-9397-1589 Gyeonggi-do Korea
Security First Corporation Orsini, Rick rorsini@securityfirstcorp.com 949-858-7525 Rancho Santa Margarita CA
Sonus Networks Inc. Chan, Nui nchan@sonusnet.com 1-855-GO-SONUS Westford MA
SUSE LLC Biege, Thomas thomas@suse.de + 49-911-74053-500 Cambridge MA
SUSE LLC Hager, Michael mike@suse.de + 49-911-74053-80 Cambridge MA
Toshiba Corporation Kimura, Akihiro akihero.kimura@toshiba.co.jp + 81-45-890-2856 Tokyo   Japan
ViaSat Inc. Naik, Savitha            savitha.naik@viasat.com 740-476-7416 Carlsbad CA
ViaSat Inc. Suksumrit, David david.suksumrit@viasat.com 760-476-2306 Carlsbad CA
Vmware Inc. Betts, Eric betts@vmware.com 1-650-427-1902 Palo Alto CA
Vmware Inc. Sturdivant, Gary    gsturdivant@vmware.com 1-650-427-4429 Palo Alto CA
Vocera Communications Inc. Crispin, Jacob cjacob@vocera.com 918042654719 San Jose CA
Vocera Communications Inc. Keunemany, Ammath akeunemany@vocera.com 408-882-4615 San Jose CA

How can you stop the spy state?

Stop the Cartel
Letter to Congress:
Word Doc

PDF Doc

For starters, the Takings Clause of the Fifth Amendment empowers Congress to legislate a payday for Leader Technologies shareholders. This would provide adequate financing for Leader to offer a rational social networking environment—one that offers the application utility that people have come to enjoy about Leader’s invention without sacrificing security and privacy.

Contact your elected representatives and ask them to use Congress' power of the purse to pay Leader Technologies and unplug the Cartel.

* * *

Notice: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself.

Comment

Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.

10 comments:

  1. Email comment by GH:

    On January 22nd, 2009 Hillary Clinton signed a Non-Disclosure agreement, or NDA, where she agreed to protect highly classified information, and a failure to do so could result in criminal prosecution.

    Herridge, C., Browne, P. Hillary Clinton signed non-disclosure agreement to protect classified info while secretary of state. FoxNews.

    http://www.foxnews.com/politics/2015/11/06/hillary-clinton-signed-non-disclosure-agreement-to-protect-classified-info/

    ReplyDelete
    Replies
    1. Thanks GH. We note that none of the alphabet MSM media have covered this critical development in proving Hillary's criminality. The truth does not rate high on their list of priorities.

      Propaganda is defined by Merriam-Webster as "ideas or statements that are often false or exaggerated and that are spread in order to help a cause, a political leader, a government, etc."

      Delete
    2. AFI researchers have downloaded Hillary's NDA (Nondisclosure Agreement) here so you can read it for yourself: She is now condemned by her own hand.

      If Hillary does not go to jail under the Economic Espionage Act of 1996 (18 U.S.C. 1831) and the Federal Trade Secrets Act (18 U.S.C. 1832), then those laws are meaningless.

      Ironically, those laws were both written by her mentor, spy master Professor James P. Chandler. Chandler also wrote Subsection (b) of the False Statements Accountability Act of 1996 too (parties and lawyers can lie in lawsuits and to Congress). Let's see if Hillary cites Subsection (b) to justify her lies.

      CITE:

      Hillary R. Clinton Nondisclosure Agreement, Jan. 22, 2009, U.S. Dept. of State v. Competitive Enterprise Institute, FOIA Case No. F-2015-05069 Doc. No. C0583371, 11-05-2015.

      http://www.fbcoverup.com/docs/library/2009-01-22-Hillary-Clinton-Nondisclosure-Agreement-US-State-Dept-FOIA-Case-No-F-2015-05069-Doc-No-C05833712-11-05-2015-signed-by-HRC-Jan-22-2009.pdf

      Delete
    3. Here's our previous post uncovering James P. Chandler and Bill & Hillary Clinton duplicity in 1996 in the passage of the deceptively named False Statements Accountability Act of 1996:

      AFI (Jun. 10, 2015). Congress sanctioned lying to courts and government in 1996. Americans For Innovation

      http://americans4innovation.blogspot.com/2015/06/congress-sanctioned-lying-to-courts-and.html

      Delete
  2. AFI readers are invited to join this bipartisan CREDO petition:

    Petition to Congress:

    No end-of-year sweetheart deals for Spy State cronies on Wall Street

    "Oppose, in must-pass bills to fund our government or our nation's infrastructure, more Wall Street handouts [incl. Citigroup] like attacks on the consumer protection agency, the Dodd-Frank financial reforms, and rules protecting investors."

    http://www.fbcoverup.com/docs/library/2015-11-09-No-end-of-year-sweetheart-deals-for-Wall-Street-Petition-campaign-Nov-09-2015.pdf

    Also at:

    https://act.credoaction.com/sign/warren_holiday_2015?t=1&akid=16075.1344373.cPKa9P

    ReplyDelete
  3. Here's another bi-partisan petition that AFI readers are encouraged to support:

    Tell Congress: End Warrantless Email Snooping!

    http://act.demandprogress.org/sign/ECPA_general/

    More outdated than the old box of AOL installation CDs collecting dust in your basement is the Electronic Communications Privacy Act, or ECPA.

    Passed in 1986, the law says the government can access your email without a warrant just because a message is over 180 days old.

    In other words, it defies the Constitution and common sense.

    Here's the deal: Congress can do something to fix this embarrassing, outdated law. And a large, bipartisan majority in the House is on board with a bill that would do just that — a rare feat for any piece of legislation on Capitol Hill.

    In fact, it's now the most cosponsored bill in Congress to not earn a House vote—yet.[1]

    So what's the hold-up? Tell Congress to get this important piece of privacy legislation moving — add your name to our petition today.
    Source:

    1. "Why Can't the Most Popular Bill in the House Get A Vote?" National Journal, June 25, 2015

    http://www.nationaljournal.com/tech/why-can-t-the-most-popular-bill-in-the-house-get-a-vote-20150625



    ReplyDelete
  4. A SMALL VICTORY IN TAKING BACK OUR CONSTITUTIONAL RIGHTS TO PRIVACY AND AGAINST UNLAWFUL SEARCH AND SEIZURE:

    AFP. (Nov. 09, 2015). Judge Orders NSA Bulk Collection Halted Early on Constitutional Grounds. NEWSMAX.
    http://www.newsmax.com/Newsfront/US-intelligence-court-NSA/2015/11/09/id/701394/


    Barrett, D. (Nov. 09, 2015). Federal Judges Rules Against NSA Phone Surveillance Program. THE WALL STREET JOURNAL.
    http://www.wsj.com/articles/federal-judge-rules-against-nsa-phone-surveillance-program-1447091701




    ReplyDelete
    Replies
    1. NEW NBC Thriller BLINDSPOT last night exposed an allegedly fictitious NSA/CIA program called "Operation Daylight" outed by a whistleblower.

      Here's the NBC trailer promo:

      http://www.tvguide.com/news/blindspot-operation-daylight-spoilers/

      "Operation Daylight was a pact between the White House, the CIA and the FBI that involved taking information obtained through illegal NSA surveillance of average citizens, and attributing it to criminal sources - hi, Guerrero! - in order to prosecute people (and occasionally blackmail Congressmen). Sound shady? It is."

      Sound familiar? We believe that this is exactly what has been happening in Washington DC for more than a decade at the hands of the IBM Eclipse Chandler Spy State Cartel. Art mimics Real Life.

      Delete
    2. Here's a YouTube clip from NBC Blindspot when the FBI and CIA are given a directive from the White House to start using illegally gathered NSA information against political opponents.

      BLINDSPOT Scene, NSA White House Directive Episode, aired Nov. 09, 2015

      https://youtu.be/6xvEfwEfQgg

      Transcription of NSA Segment:

      BETHANY: This is not a program. Where's it written down? What bill allows it? Its illegal, not to mention unconscionable. If the public ever found out about the true reach of the NSA surveillance.

      THOMAS: The public wants us to win the war on terror.

      BETHANY: This is not about terrorism. This is about the complete invasion of privacy for every citizen in this country.

      THOMAS: If people aren't breaking the law, why do they care if we are listening?

      BETHANY: We would be breaking the law if we used any of this intell.

      BETHANY: If it ever got out, we could go to prison

      THOMAS: Wowa... and whose talking about prison?

      THOMAS: We just received a directive from the White House chief of staff, and I for one intend to act on it.

      THIRD FEMALE: Beth, if any one of us says no, this all falls apart.

      . . .

      On Aug. 16, 2009, NSA director [James L.] Jones requested an urgent meeting with Hillary from the White House Situation Room, thus putting foreign state hackers on notice about concurrent event threats. This communication is classified by default. "H ."

      http://www.fbcoverup.com/docs/library/2009-08-16-Hillary-Clinton-re-NSA-collaboration-Case-No-F-2014-20439-Doc-No-C05763753-Aug-16-2009.pdf

      http://americans4innovation.blogspot.com/2015/10/new-hillary-emails-october-release-more.html

      Delete
  5. Suggest AFI readers send emails to all the engineers on the NIST table above. Turn up the heat and let them know the world is now watching them ...and waiting for them to do the right thing for a change.

    Dear NAME OF ENGINEER:

    I see that you are on the NIST DRBG VALIDATION list of encryption engineers.

    What puzzles me is how so many bright engineers, like you, can be so ethically compromised and silent about the abuses of our Constitutional rights to privacy. Just because one can get away with fooling the general public about the supposed privacy of encryption, you know better. Why are you not shouting from the housetops that digital privacy is a Potemkin Village?

    For the sake of our children and grandchildren, I hope you are not a Brownshirt and that you are one of the good guys who steps forward to right these wrongs. Please do not be silent any longer.

    http://americans4innovation.blogspot.com/2015/11/complicit-encryption-geeks-enable.html

    Thank you for your time.

    Sincerely,

    Your NAME
    Constitutional Privacy & Property Rights Activist

    ReplyDelete

NOTICE TO COMMENTERS: When the MSM diatribe on "fake news" began, our regular commenters were blocked from posting comments here. Therefore, email your comments to a new secure email addess afi@leader.com and we will post them.