The invasion of America’s privacy is not possible without the support of encryption engineers
America's encryption engineers are betraying our trust, just like Hitler's Brownshirts betrayed their own parents, colleagues, neighbors and relatives. No German was immune from their treachery. The American Spy State Cartel (a) spies on everyone, (b) harasses rivals, (c) supports eugenics, (d) is supported by complicit federal judges turning a blind eye to the law, and (e) presses Obama-Hillary's policy for the "harnessing of private incentives to public goals." They also (f) support IBM who formed The Eclipse Foundation in 2001 and created Facebook along with the rest of social networking industry which compiles detailed "dark profiles" on every person on the planet. These are all disturbingly similar attributes to Hitler's fascism.
(Nov. 06, 2015)—The invasion of America’s privacy in the Digital Age is not possible without the support of encryption engineers.
Technically, politicians and bureaucrats don’t breach your privacy, encryption engineers do. So what has gone wrong with the morality of these talented people? This post will review the facts and leave the moral questions for later.
Encryption engineers manage the digital keys that lock and unlock your data “at rest” (stored) and “in motion” (moving through the Internet).
Encryption must be regulated in public, not by spies, bankers, corrupt judges and greedy lawyers
To date, this esoteric, but all-important task of data encryption has been the murky domain of spies, lawyers and bankers, FISA court judges and tech geeks (the “Spy State Cartel”).
Encryption scrambles the contents of your messages then files and unscrambles them once they reach their intended destinations using digital keys managed by encryption engineers.
For example, the phrase “your cancer treatment program” would be encrypted with a digital key and travel through the Internet as “Qij\aq6NB5Lf@;kndFq7CN{Q{." So, even if it was intercepted it could not be read. The theory is that this knowledge of your medical condition would remain confidential between you and your doctor.
The Big Privacy Lie
That is the BIG PRIVACY LIE. The fact is, the Spy State Cartel knows about your cancer and stores that information (along with every other detail about your life) in a “dark profile” maintained on you offshore—out of the reach of the U.S. Constitution.
Only the NSA and their “public-private partner” commercial crony accomplices have access. See President Obama Executive Order No. 13691, Feb. 13, 2015—Promoting Private Sector Cybersecurity Information Sharing.
On Jun. 06, 2013, we first learned from NSA whistleblower and American patriot Edward Snowden that all of the major American Internet and telecommunications providers have given the NSA a backdoor master encryption key to all your data.
Think about it. Would you be incensed if you arrived home tonight and discovered a person rummaging through your file cabinet? Of course you would. You'd call the police. What if it was the police, along with the phone company, a local politician, your and a group of local business leaders, just nosing around? You'd call out the hounds.
So then, why do you allow that very same activity to occur on your computer and phone just because you cannot see the bits and bytes through which they rummage? Put your foot down. Now!
These same providers colluded with former law professor James P. Chandler and crony commercial lawyers via the IBM Eclipse Foundation (2001) to write convoluted “end user license agreements” (EULA) where you agreed to give up your privacy in exchange for free applications and services, like email and document sharing. Stop signing and supporting this sneaky, slimy lawyering. Stop using providers that invade your privacy with such sneaky, abusive practices.
For example, Facebook’s EULA first states “You own all of the content and information you post on Facebook.” Sounds good, but then in the very next sentence you give up those rights “you grant us a . . . worldwide license to use any IP [intellectual property] you post.” It’s much worse, but the point is made.
Our encryption geek sons and daughters have betrayed us
These recalcitrant geek children of ours have allowed this unprecedented assault on our Constitutional rights to privacy and property. They don't appear to care, so let's give them motivation to care. Expose them.
When the NSA comes knocking at the door of an American company, they should be told "NO, you don’t have jurisdiction inside the borders of the United States." But, our encryption engineering children don't fight for our property and privacy rights. Instead, they just give them the backdoor keys and cash the bribery checks, in our opinion.
Bookmark: #drbg-listWho are these encryption engineers?
The National Institute of Standards (NIST) is required by law to publish a list of companies and their hardware and software products that include a “DRBG Algorithm” which likely gives the NSA and their commercial cronies a permanent backdoor. This list includes contact names and addresses.
See Perlroth, N., Larson, J., Shane, S. (Sep. 05, 2013). N.S.A. Able to Foil Basic Safeguards of Privacy on Web. The Wall Street Journal.
The NIST DRBG Validation List is formatted oddly [NOTE, Mar. 30, 2017: This file has been removed from the NIST website—see HTML | PDF versions reproduced from the file when it was available.] Part of each table entry scrolls off the page. Printing cuts off the disclosure about DRBG algorithms, and it is over 200 pages. Experienced investigators say such unwieldy government disclosure files are common in agencies with something to hide from public scrutiny.
Here are properly formatted versions of the NIST file: HTML | PDF (Thank you to AFI researchers. It took eight hours to fix.)
The list has over 900 entries currently. It reads like a Who’s Who of Internet, computer, software and telecommunications providers. Includes on the list are Microsoft, Dell, IBM, Cisco, Kapersky, Red Hat, Samsung, Motorola, Sonus, HP, Palo Alto Networks, Apple, McAfee, Oracle and Northrup Grumman.
Petition to Congress:
No end-of-year sweetheart deals for Spy State cronies on Wall Street
"Oppose, in must-pass bills to fund our government or our nation's infrastructure, more Wall Street handouts [incl. Citigroup] like attacks on the consumer protection agency, the Dodd-Frank financial reforms, and rules protecting investors."
Uncannily, the same companies are members of IBM’s Eclipse Foundation (2001). These companies all relied on Leader Technologies' social networking invention stolen by Professor James P. Chandler and the IBM Eclipse Foundation in 2001-2002.
Below are 133 of the most recent entries. Is your son, daughter, friend, or classmate on this list? Ask them why they are complicit or silent about this historic abuse of privacy. Ask them about their “sudden newfound wealth” (very likely for active colluders).
Their investments will likely focus on fellow Cartel members like JPMorgan, Morgan Stanley, Goldman Sachs, HSBC, UBS, Fidelity, Vanguard, T. Rowe Price, TIAA-CREF, Baillie Gifford, Credit Suisse, Barclays, Wells Fargo, Citigroup, Bank of America, Deutsche Bank and BlackRock. A trip to the Cayman Islands may have been in their vacation schedule.
Sons & Daughters Who may be Betraying our privacy — Encourage them to whistleblow and stop this madness
DRBG (Deterministic Random Bit Generator) Validation List, NIST, selected entries from the most recent 133 entries (over 900 total entries). Accessed Nov. 05, 2015. Click here for an Excel spreadsheet | PDF from which the following names were selected. | |||||
Company | Name (last, first) | Phone | City | State | |
Apple Inc | Geddis, Shawn | geddis@apple.com | Cupertino | CA | |
Alcatel-Lucent | Nothaft, Alfred | alfred.nothaft@alcatel-lucent.com | + 1-972-477-5087 | Ottawa | Canada |
Alcatel-Lucent | Rajsic, Carl | carl.rajsic@alcatel-lucent.com | + 1-613-784-6218 | Ottawa | Canada |
Dell Inc. | Mandava, Srihari | srihari_mandava@dell.com | Santa Clara | CA | |
Dell Software Inc. | Sanagala, Usha | usanagala@sonicwall.com | 408-962-6248 | Santa Clara | CA |
General Dynamics | Aylesworth, David | David.Aylesworth@gd-ms.com | 781-400-6527 | Needham | MA |
Harris Corporation | Kwak, Suzanne | skwak@harris.com | 585-242-4686 | Rochester | NY |
Harris Corporation | Ruggieri, Steven | sruggi01@harris.com | 585-239-7806 | Rochester | NY |
HP Security Voltage | Martin, Luther | support@voltage.com | 408-886-3200 | Cupertino | CA |
Hewlett Packard Enterprise | Johnson, Matt | matt.johnson@hp.com | 402-758-7262 | Omaha | NE |
Hewlett Packard Enterprise | Kuriyavar, Nagesh | nagesh.kuriyavar@hp.com | 402-758-7262 | Omaha | NE |
Hewlett Packard Enterprise | Pittman, Bob | bob.pittman@hpe.com | 978-264-5211 | Littleon | MA |
Hewlett-Packard | Drew, John | john.drew@hp.com | + 44-560-109-0356 | Bristol | UK |
Hewlett-Packard | Laredo, Laura | laura.loredo@hp.com | + 44-117-316-2462 | Bristol | UK |
Hewlett-Packard Company | Dhillon, Harjit | Harjit.dhillon@hp.com | 916-501-1426 | Sunnyvale | CA |
Hewlett-Packard Development Company, L.P. | Luciani, Luis | luis.luciani@hp.com | 281-518-6762 | Houston | TX |
IBM | Knibloe, Christine | cknibloe@us.ibm.com | 412-977-9398 | Tucson | AZ |
IBM Corporation | Fraser, Marie | fraserma@ie.ibm.com | + 353 (21) 730-6043 | New Brunswick | Canada |
IBM Corporation | Hernandez, Sandra | hsandra@us.ibm.com | 512-286-5624 | New Brunswick | Canada |
IBM Internet Security Systems | Leake, Sheena | sleake@us.ibm.com | 404-238-5565 | Atlanta | GA |
IBM Internet Security Systems | Moultrie, Ferrell | fmoultrie@us.ibm.com | 678-234-4069 | Atlanta | GA |
Intel Corporation | Nissen, Andy | andy.nissen@intel.com | 651-628-5385 | Santa Clara | CA |
Motorola Solutions Inc. | Nguyen, Tom | kxp467@motorolasolutions.com | 847-576-2352 | Schaumburg | IL |
Motorola Solutions Systems | Chmiel, Tomasz | tomasz.chmiel@motorolasolutions.com | + 48-12-29-79-000 | Krakow | PL |
Motorola Solutions Systems | Rypina, Tomasz | tomasz.rypina@motorolasolutions.com | + 48-12-29-79-000 | Krakow | PL |
Northrop Grumman MS Network Security | Howard, Kristian | kristian.howard@au.ngc.com | + 611300365893 | Braddon | Australia |
Northrop Grumman MS Network Security | Hoyle, Warwick | warwick.hoyle@au.ngc.com | + 611300365893 | Braddon | Australia |
OpenSSL Software Foundation Inc. | Marquess, Steve | info@openssl.com | 877-673-6775 | Adamstown | MD |
Oracle Communications | Mathiyalagan, Madhu | madhu.mathiyalagan@oracle.com | 781-538-7514 | Bedford | MA |
Oracle Communications | Suares, Nikhil | nikhil.suares@oracle.com | 781-538-7568 | Bedford | MA |
Palo Alto Networks | Bajic, Jake | jbajic@paloaltonetworks.com | 408-753-3901 | Santa Clara | CA |
Palo Alto Networks | Bishop, Richard | rbishop@paloaltonetworks.com | 408-753-4000 | Santa Clara | CA |
Qualcomm Technologies Inc. | Liong Ling, Yin Ling | yliong@qti.qualcomm.com | 858-651-7034 | San Diego | CA |
Red Hat, Inc. | Rubin, Ann-Marie | arubin@redhat.com | 978-392-1000 | Raleigh | NC |
Samsung | Ahn, Changsup | cs77.ahn@samsung.com | + 82-10-3173-9021 | Gyeonggi-do | Korea |
Samsung | Park, Jisoon | js00n.park@samsung.com | + 82-10-4556-5007 | Gyeonggi-do | Korea |
Samsung Electronics Co, Ltd. | Burnham, Kim | bumhan.kim@samsung.com | + 82-10-9397-1589 | Gyeonggi-do | Korea |
Security First Corporation | Orsini, Rick | rorsini@securityfirstcorp.com | 949-858-7525 | Rancho Santa Margarita | CA |
Sonus Networks Inc. | Chan, Nui | nchan@sonusnet.com | 1-855-GO-SONUS | Westford | MA |
SUSE LLC | Biege, Thomas | thomas@suse.de | + 49-911-74053-500 | Cambridge | MA |
SUSE LLC | Hager, Michael | mike@suse.de | + 49-911-74053-80 | Cambridge | MA |
Toshiba Corporation | Kimura, Akihiro | akihero.kimura@toshiba.co.jp | + 81-45-890-2856 | Tokyo | Japan |
ViaSat Inc. | Naik, Savitha | savitha.naik@viasat.com | 740-476-7416 | Carlsbad | CA |
ViaSat Inc. | Suksumrit, David | david.suksumrit@viasat.com | 760-476-2306 | Carlsbad | CA |
Vmware Inc. | Betts, Eric | betts@vmware.com | 1-650-427-1902 | Palo Alto | CA |
Vmware Inc. | Sturdivant, Gary | gsturdivant@vmware.com | 1-650-427-4429 | Palo Alto | CA |
Vocera Communications Inc. | Crispin, Jacob | cjacob@vocera.com | 918042654719 | San Jose | CA |
Vocera Communications Inc. | Keunemany, Ammath | akeunemany@vocera.com | 408-882-4615 | San Jose | CA |
How can you stop the spy state?
For starters, the Takings Clause of the Fifth Amendment empowers Congress to legislate a payday for Leader Technologies shareholders. This would provide adequate financing for Leader to offer a rational social networking environment—one that offers the application utility that people have come to enjoy about Leader’s invention without sacrificing security and privacy.
Contact your elected representatives and ask them to use Congress' power of the purse to pay Leader Technologies and unplug the Cartel.
* * *
Notice: This post may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself.
Comment
Click "N comments:" on the line just below this instruction to comment on this post. Alternatively, send an email with your comment to amer4innov@gmail.com and we'll post it for you. We welcome and encourage anonymous comments, especially from whisteblowers.
Email comment by GH:
ReplyDeleteOn January 22nd, 2009 Hillary Clinton signed a Non-Disclosure agreement, or NDA, where she agreed to protect highly classified information, and a failure to do so could result in criminal prosecution.
Herridge, C., Browne, P. Hillary Clinton signed non-disclosure agreement to protect classified info while secretary of state. FoxNews.
http://www.foxnews.com/politics/2015/11/06/hillary-clinton-signed-non-disclosure-agreement-to-protect-classified-info/
Thanks GH. We note that none of the alphabet MSM media have covered this critical development in proving Hillary's criminality. The truth does not rate high on their list of priorities.
DeletePropaganda is defined by Merriam-Webster as "ideas or statements that are often false or exaggerated and that are spread in order to help a cause, a political leader, a government, etc."
AFI researchers have downloaded Hillary's NDA (Nondisclosure Agreement) here so you can read it for yourself: She is now condemned by her own hand.
DeleteIf Hillary does not go to jail under the Economic Espionage Act of 1996 (18 U.S.C. 1831) and the Federal Trade Secrets Act (18 U.S.C. 1832), then those laws are meaningless.
Ironically, those laws were both written by her mentor, spy master Professor James P. Chandler. Chandler also wrote Subsection (b) of the False Statements Accountability Act of 1996 too (parties and lawyers can lie in lawsuits and to Congress). Let's see if Hillary cites Subsection (b) to justify her lies.
CITE:
Hillary R. Clinton Nondisclosure Agreement, Jan. 22, 2009, U.S. Dept. of State v. Competitive Enterprise Institute, FOIA Case No. F-2015-05069 Doc. No. C0583371, 11-05-2015.
http://www.fbcoverup.com/docs/library/2009-01-22-Hillary-Clinton-Nondisclosure-Agreement-US-State-Dept-FOIA-Case-No-F-2015-05069-Doc-No-C05833712-11-05-2015-signed-by-HRC-Jan-22-2009.pdf
Here's our previous post uncovering James P. Chandler and Bill & Hillary Clinton duplicity in 1996 in the passage of the deceptively named False Statements Accountability Act of 1996:
DeleteAFI (Jun. 10, 2015). Congress sanctioned lying to courts and government in 1996. Americans For Innovation
http://americans4innovation.blogspot.com/2015/06/congress-sanctioned-lying-to-courts-and.html
AFI readers are invited to join this bipartisan CREDO petition:
ReplyDeletePetition to Congress:
No end-of-year sweetheart deals for Spy State cronies on Wall Street
"Oppose, in must-pass bills to fund our government or our nation's infrastructure, more Wall Street handouts [incl. Citigroup] like attacks on the consumer protection agency, the Dodd-Frank financial reforms, and rules protecting investors."
http://www.fbcoverup.com/docs/library/2015-11-09-No-end-of-year-sweetheart-deals-for-Wall-Street-Petition-campaign-Nov-09-2015.pdf
Also at:
https://act.credoaction.com/sign/warren_holiday_2015?t=1&akid=16075.1344373.cPKa9P
Here's another bi-partisan petition that AFI readers are encouraged to support:
ReplyDeleteTell Congress: End Warrantless Email Snooping!
http://act.demandprogress.org/sign/ECPA_general/
More outdated than the old box of AOL installation CDs collecting dust in your basement is the Electronic Communications Privacy Act, or ECPA.
Passed in 1986, the law says the government can access your email without a warrant just because a message is over 180 days old.
In other words, it defies the Constitution and common sense.
Here's the deal: Congress can do something to fix this embarrassing, outdated law. And a large, bipartisan majority in the House is on board with a bill that would do just that — a rare feat for any piece of legislation on Capitol Hill.
In fact, it's now the most cosponsored bill in Congress to not earn a House vote—yet.[1]
So what's the hold-up? Tell Congress to get this important piece of privacy legislation moving — add your name to our petition today.
Source:
1. "Why Can't the Most Popular Bill in the House Get A Vote?" National Journal, June 25, 2015
http://www.nationaljournal.com/tech/why-can-t-the-most-popular-bill-in-the-house-get-a-vote-20150625
A SMALL VICTORY IN TAKING BACK OUR CONSTITUTIONAL RIGHTS TO PRIVACY AND AGAINST UNLAWFUL SEARCH AND SEIZURE:
ReplyDeleteAFP. (Nov. 09, 2015). Judge Orders NSA Bulk Collection Halted Early on Constitutional Grounds. NEWSMAX.
http://www.newsmax.com/Newsfront/US-intelligence-court-NSA/2015/11/09/id/701394/
Barrett, D. (Nov. 09, 2015). Federal Judges Rules Against NSA Phone Surveillance Program. THE WALL STREET JOURNAL.
http://www.wsj.com/articles/federal-judge-rules-against-nsa-phone-surveillance-program-1447091701
NEW NBC Thriller BLINDSPOT last night exposed an allegedly fictitious NSA/CIA program called "Operation Daylight" outed by a whistleblower.
DeleteHere's the NBC trailer promo:
http://www.tvguide.com/news/blindspot-operation-daylight-spoilers/
"Operation Daylight was a pact between the White House, the CIA and the FBI that involved taking information obtained through illegal NSA surveillance of average citizens, and attributing it to criminal sources - hi, Guerrero! - in order to prosecute people (and occasionally blackmail Congressmen). Sound shady? It is."
Sound familiar? We believe that this is exactly what has been happening in Washington DC for more than a decade at the hands of the IBM Eclipse Chandler Spy State Cartel. Art mimics Real Life.
Here's a YouTube clip from NBC Blindspot when the FBI and CIA are given a directive from the White House to start using illegally gathered NSA information against political opponents.
DeleteBLINDSPOT Scene, NSA White House Directive Episode, aired Nov. 09, 2015
https://youtu.be/6xvEfwEfQgg
Transcription of NSA Segment:
BETHANY: This is not a program. Where's it written down? What bill allows it? Its illegal, not to mention unconscionable. If the public ever found out about the true reach of the NSA surveillance.
THOMAS: The public wants us to win the war on terror.
BETHANY: This is not about terrorism. This is about the complete invasion of privacy for every citizen in this country.
THOMAS: If people aren't breaking the law, why do they care if we are listening?
BETHANY: We would be breaking the law if we used any of this intell.
BETHANY: If it ever got out, we could go to prison
THOMAS: Wowa... and whose talking about prison?
THOMAS: We just received a directive from the White House chief of staff, and I for one intend to act on it.
THIRD FEMALE: Beth, if any one of us says no, this all falls apart.
. . .
On Aug. 16, 2009, NSA director [James L.] Jones requested an urgent meeting with Hillary from the White House Situation Room, thus putting foreign state hackers on notice about concurrent event threats. This communication is classified by default. "H ."
http://www.fbcoverup.com/docs/library/2009-08-16-Hillary-Clinton-re-NSA-collaboration-Case-No-F-2014-20439-Doc-No-C05763753-Aug-16-2009.pdf
http://americans4innovation.blogspot.com/2015/10/new-hillary-emails-october-release-more.html
Suggest AFI readers send emails to all the engineers on the NIST table above. Turn up the heat and let them know the world is now watching them ...and waiting for them to do the right thing for a change.
ReplyDeleteDear NAME OF ENGINEER:
I see that you are on the NIST DRBG VALIDATION list of encryption engineers.
What puzzles me is how so many bright engineers, like you, can be so ethically compromised and silent about the abuses of our Constitutional rights to privacy. Just because one can get away with fooling the general public about the supposed privacy of encryption, you know better. Why are you not shouting from the housetops that digital privacy is a Potemkin Village?
For the sake of our children and grandchildren, I hope you are not a Brownshirt and that you are one of the good guys who steps forward to right these wrongs. Please do not be silent any longer.
http://americans4innovation.blogspot.com/2015/11/complicit-encryption-geeks-enable.html
Thank you for your time.
Sincerely,
Your NAME
Constitutional Privacy & Property Rights Activist