I have placed the copy here because mega.co.nz is so fast as a hosting server that If somebody was looking for a copy that it would be stupid not to place it here
it is however more than 500 MB of collected documents
I have placed the copy here because mega.co.nz is so fast as a hosting server that If somebody was looking for a copy that it would be stupid not to place it here
it is however more than 500 MB of collected documents
when you compare the world we live in and the way the world was some 30 years ago you are astonished that we have generally advanced so much and that things that were commonplace at that time wouldn't be accepted today (except in Syria that is)
Operation Condor was a coordination between different Latin American dictatorships to crush the opposition and to exchange information
a zipped folder of 80 MB has all the necessary information
Clearstream was a scandal in which files that were stolen from a bank a were being falsified to implicate now ex president (at the time coming man) Sarkozy and destroy his possible career
this didn't work for several reasons but the trial and the political ramifications were felt for a long time in french politics
all the necessary documents are articles to understand it are here
while watching the towers go down live on tv - you asked yourself what was happening with the people in and under and around these towers and what would they think or say (as sometimes their last words)
when the messages on the blackberrys that day were made public this was also the most important thing they wanted to accomplish - a memorial that would give the victims a more human face than those jumping down the building to a certain death
the science fraud blog was the blog of someone who was looking for fraud, mistakes and copy-paste in science. We know now that this is very common and that under commercial and other pressures people are being pushed to publish too much (rubbish) in the rat race.
from Google cache I was in time to save a copy and as I like freedom of press, here you will find a copy of this censored blog
censorship by threatening with trials does not work in the end
Stratfor wanted to be the commercial CIA and even better than the CIA even if they worked for the CIA and other organisations like that. They didn't present themselves like that. They were a business and risk intelligence firm who were paying sources all over the world to know things before they became public and who were recruited on seminars and pseudo-interesting non-events like that.
The list of more than a million contacts with their emailaddresse and sometimes their creditcards was one of the hottest things to get at the end of 2012. But I presume that most of them didn't change their passwords or emailaddresses and that there are still enough valuable contacts in the list.
After this massive leaks the firm just gave away some months of free access and than continued as if nothing happened.
So it was a hard lesson to learn but if you are a securityfirm and you want to make a name and hope on lots of money by discovering who is Anonymous antisec and help dismantle them, than you can be in a big surprise, because they won't let you push them down and out that easily especially if you have lousy passwords and security on your own security.
So HB Gary an American security firm lost all of its mails that were published online. It was one of the most interesting leaks by antisec because you learnt that for example the NATO had been penetrated by Advanced Persistant threats and very advanced trojans and copies of the trojans were to be found in the mails as were descriptions of threats
a package selection of the mails are available here
https://mega.co.nz/#F!05FnjSQC (it can be that your securitytools go wild and that you can't install it, but as I said it were at the time very advanced security threats)
The NSA is in fact the result of the fact that the CIA became too public and had too much 'oversight' and 'controls' which makes it not easy to do spying and counterintelligence operations. The US also needed an agency which had all the necessary intelligence and regrouped budgets to look after the proctection of its own intelligence (encryption) and after the interception of the information that could be of interest (echelon for example)
You will find here articles, documents and reports
if you want to add documents that are missing, place the link in the comments
Prism is a product of the terrorist attacks on the 11th of september, without it it wouldn't have been possible and it has only grown because of a number of other homegrown terrorist attempts in the US afterwards.
THe planning of the Bush-Cheney presidency was to let the Pentagon and the intelligence community integrate into one big military-intelligence sharing complex that would be monitoring the whole society for dangers (Some projects were called total monitoring) and that would inform police and antiterrorist services of any looming dangers (sometimes going as far as people reading a lot of books about Bin Laden)
The difference with Echelon is that as a result of the terrorist attacks the 11th of september the NSA-CIA (and the others) got the secret permission to ask a secret court the secret permission to spy on anyone who was deemed to be dangerous in the US (with the biggest danger being that the definition becomes fluid and the proof very thin and the motivation very vague). This gave them the possiblity to collect information on Americans where-ever they were (even in America).
The other thing was that the strategic thinking was also totally different. Where Echelon was primarily an interception network that only wanted to intercept information to be alerted when certain keywords or contacts were mentioned is PRISM a safeguarding environment where as much data as possible is intercepted and stored to be used whenever needed. It is not clear if the NSA can use this datastorage at will or it must have a warrant or motivation.
if you have other interesting documents, you can post the links in the comments
Echelon is the mother of all international interception networks and is in fact the grandmother of PRISM (of which later more). THere was an investigation by the European Commission, some books and a few articles but afterwards you could say that it was all very quiet and calmy.
Echelon is like Gladio one of the consequences of the second world war in which the US, UK, Canada and Australia worked together to gather intelligence together much more quickly. But as they couldn't spy on their own citizens, they had to use others to spy on theirs and be sure that they got the information if warranted.
One should also remember that one of the biggest lessons from the second world war was that right information was critical and made the difference. You can only get that critical information if you can intercept it without the other side knowing it and before they think you can know or use it.
You will find articles, parliamentary reports and so on that seem interesting
If you have other interesting documents you can post the links in the comments
Gladio is the secret stay behind network that the Allies set up because they presumed that the Russians would one day attack Europe and that they didn't want to make the same mistake as with Hitler, that is leaving him on the ground all the time to set up his defences.
The allies had also learnt during D-Day that the local resistance was very important before and during the operation because they had to destroy communication and transportlines or keep bridges intact and to get them information. The idea was to have such stay behind active in case off. Military it is a logical idea if the danger was important but over time this was no longer the case and those secret armies somewhere were - by lack of external ennemies - becoming active against socalled internal ennemies especially during the political violence during the 1970's and 1980's.
This is a folder with
* a few interesting documents, (parliamentary) reports
* the parliamentary reports and some articles from Luxembourg where the prime minister had resigned because he didn't organize any oversight over such a stay-behind group that went rogue
If you have other documents you can place the links in the comments
the folder https://mega.co.nz/#F!Rp8TAK4T
1984: (corrected a few minor OCR errors, 17th March 2002)
A Book Sprint brings together a group to produce a book in 3-5 days. There is no pre-production and the group is guided by a facilitator from zero to published book. The books produced are high quality content and are made available immediately at the end of the sprint via print-on-demand services and e-book formats.
Zero to book in 5 days. Seem impossible? Its not, its very possible, fun, and extremely rewarding.
There are three common reasons to do Book Sprints:
This 392 page, Creative Commons licensed handbook is designed to help those with no prior experience to protect their basic human right to Privacy in networked, digital domains. By covering a broad array of topics and use contexts it is written to help anyone wishing to understand and then quickly mitigate many kinds of vulnerability using free, open-source tools. Most importantly however this handbook is intended as a reference for use during Crypto Parties. It is being continuously developed.
It can be edited here: https://github.com/cryptoparty/handbook
It can be edited directly in the browser here (exporting to PDF, e-pub formats): http://booki.cc/cryptoparty-handbook/ . Please note all edits will be reviewed before release. All authors will be credited. Please use language and methods an absolute newbie can understand.
Either way, the discussion on how to proceed can be held at http://blast.k0a1a.net/cgi-bin/mailman/listinfo/cryptobook.
WARNING! - Due to the rapid development of the Handbook, as well as lack of rigorous peer review, there may be advice within that does not guarantee your safety - be vigilant! This is version 1. Each version of the book will improve upon the last, if you find any errors, please contribute your suggested changes. IMPORTANT! - PPTP was referenced in this book as one method for use when setting up Virtual Private Networks. It is easily breakable. Do not use it!
I didn't place them
I give no guarantee that these will stay online
so the list is just as good as it takes
meanwhile you will find books and documents about a bit of everything from food to art to ITsecurity to programming to history to politics to science to whatever that catched my eye
more documents and books at (but no guarantee that the links are still valid)
The hack of the digital advanced security agency was for the securitycommunity a real interesting database with a lot of files and analyses that made technological sense and that made public that there were some really deep penetrated attacks and infections in a lot of networks of banks and for example NATO that were held secret but are troubling.
On the deepnet you can find a copy of the attachments
http://xqz3u5drneuzhaeo.onion/users/hbgary/ HB gary dump
http://xqz3u5drneuzhaeo.onion/users/hbgary/file_list.txt list of all the attachments that are found in his dump, some is for securityresearcher really amazing and interesting
you can download the full collection here
http://xqz3u5drneuzhaeo.onion/users/hbgary/hbgary_email_attachments.zip (but you have to keep in mind that you are going through a relay which makes downloading slower)
You can browse the whole selection of works at the following address: http://share.lqdn.fr
An in-depth exploration of digital culture and its dissemination, "Sharing" (released in 2012) offers a counterpoint to the dominant view that file sharing is piracy. Instead, Philippe Aigrain looks at the benefits of file sharing, which allows unknown writers and artists to be appreciated more easily. Concentrating not only on the cultural enrichment caused by widely shared digital media, Sharing also discusses new financing models that would allow works to be shared freely by individuals without aim at profit. Source : http://www.sharing-thebook.com/
In computer science, "code" typically refers to the text of a computer program (the source code). In law, "code" can refer to the texts that constitute statutory law. In his book "Code and Other Laws of Cyberspace", Lawrence Lessig, a Harvard law professor, explores the ways in which code in both senses can be instruments for social control, leading to his dictum that "Code is law." This book, released in 2000, is especially relevant to understand how technical regulation of the Internet can lead to undermining rights and freedoms online.
"The Future of Ideas" is a continuation of his previous book Code and Other Laws of Cyberspace, which is about how computer programs can restrict freedom of ideas in cyberspace. While copyright helps artists get rewarded for their work, Lessig warns that a copyright regime that is too strict and grants copyright for too long a period of time (e.g. the current US legal climate) can destroy innovation, as the future always builds on the past. Lessig also discusses recent movements by corporate interests to promote longer and tighter protection of intellectual property in three layers: the code layer, the content layer, and the physical layer.
In "Free Culture", Lessig masterfully argues that never before in human history has the power to control creative progress been so concentrated in the hands of the powerful few, the so-called Big Media. Never before have the cultural powers- that-be been able to exert such control over what we can and can’t do with the culture around us. Our society defends free markets and free speech; why then does it permit such top-down control? To lose our long tradition of free culture, Lawrence Lessig shows us, is to lose our freedom to create, our freedom to build, and, ultimately, our freedom to imagine.. Free Culture was released in 2005 and remains a landmark piece for the copyright reform movement.
In "Remix" (released in 2008) Lawrence Lessig, a Harvard law professor and a respected voice in what he deems the "copyright wars", describes the disjuncture between the availability and relative simplicity of remix technologies and copyright law. Lessig insists that copyright law as it stands now is antiquated for digital media since every "time you use a creative work in a digital context, the technology is making a copy". Thus, amateur use and appropriation of digital technology is under unprecedented control that previously extended only to professional use.
With the radical changes in information production that the Internet has introduced, we stand at an important moment of transition, says Yochai Benkler in this ground-breaking book released in 2006. The phenomenon he describes as social production is reshaping markets, while at the same time offering new opportunities to enhance individual freedom, cultural diversity, political discourse, and justice. But these results are by no means inevitable: a systematic campaign to protect the entrenched industrial information economy of the last century threatens the promise of today’s emerging networked information environment.In this comprehensive social theory of the Internet and the networked information economy, Benkler describes how patterns of information, knowledge, and cultural production are changing—and shows that the way information and knowledge are made available can either limit or enlarge the ways people can create and express themselves. He describes the range of legal and policy choices that confront us and maintains that there is much to be gained—or lost—by the decisions we make today.
The Free Culture Forum was first organised as an international encounter on free culture and free knowledge that took place in Barcelona from October 30th to November 1st 2009. During the Forum more than a hundred organisations and individuals from all continents active in free culture worked together to produce a common declaration, or charter. The Forum ended up with a first version of the "Charter for Innovation, Creativity and Access to Knowledge". The present document is the interpretation of the Charter from the perspective of Free Knowledge. Note that this is work in progress.
We can no longer put off re-thinking the economic structures that have been producing, financing and funding culture up until now. Many of the old models have become anachronistic and detrimental to civil society. The aim of this document, first released in 2010, is to promote innovative strategies to defend and extend the sphere in which human creativity and knowledge can prosper freely and sustainably. This "How-To" is addressed to policy reformers, citizens and free/libre culture activists to provide them practical tools to actively operate this change.
During the MIDEM 2011, HADOPI presented its own study showing in page 45 that people who download the most are those are the cultural industries' best customers.
In its answer to a EU Commission's consultation on "creative content", La Quadrature calls on the EU to reconsider the EU's coercive and repressive copyright policies, while encouraging it to match words to deeds by fostering the rights of the public in the digital creative ecosystem. The document gives a hint of what should be done to start reforming copyright: repeal liberty-killer repressive schemes and Internet filtering; ban techincal restriction measures; shorten copyright terms; make the existing exceptions to copyright mandatory EU-wide; create new exceptions for not-for-profit sharing and re-use of cultural works, and give room to the development of new funding models
RIP!: A Remix Manifesto, by Brett Gaylor
"RiP!: A Remix Manifesto" is a 2008 open source documentary film about "the changing concept of copyright" directed by Brett Gaylor.
Created over a period of six years, the documentary film features the collaborative remix work of hundreds of people who have contributed to the Open Source Cinema website, helping to create the "world's first open source documentary" as Gaylor put it. The project's working title was Basement Tapes, (referring to the album of the same name) but it was renamed RiP!: A Remix Manifesto prior to theatrical release. Gaylor encourages more people to create their own remixes from this movie, using media available from the Open Source Cinema website, or other websites like YouTube, Flickr, Hulu, or MySpace.
"Steal This Film" is a film series documenting the movement against intellectual property produced by The League of Noble Peers and released via the BitTorrent peer-to-peer protocol. Part One, shot in Sweden and released in August 2006, combines accounts from prominent players in the Swedish piracy culture (The Pirate Bay, Piratbyrån, and the Pirate Party) with found material, propaganda-like slogans and Vox Pops.
Nina Paley is an award-winning independent cartoonist and animator for her "Sita sings the blues" video. "Copying is not Theft", released in 2009, advocates to reconsider the act of copying in a new light, stressing the importance of copying for creativity, innovation and free speech.
"Star Wars Uncut" is a 2010 fan film remake of Star Wars Episode IV: A New Hope. It is a shot-for-shot recreation of the "Special Edition" version of the film made from 473 fifteen-second segments created and submitted from a variety of participants. The full film was made available on the Internet in August 2010 and can be watched for free. The project was conceived by Casey Pugh, a Web developer who was 25 at the time of the release.
"Can I Get An Amen?" is a 2004 audio installation that unfolds a critical perspective of perhaps the most sampled drum beat in the history of recorded music, "the Amen Break". It begins with the pop track "Amen Brother" by 60's soul band The Winstons, and traces the transformation of their drum solo from its original context as part of a 'B' side vinyl single into its use as a key aural ingredient in contemporary cultural expression. The work attempts to bring into scrutiny the techno-utopian notion that 'information wants to be free'- it questions its effectiveness as a democratizing agent. This as well as other issues are foregrounded through a history of the Amen Break and its peculiar relationship to current copyright law.
"The Grey Album" is a mashup album by Danger Mouse, released in 2004. It uses an a cappella version of rapper Jay-Z's The Black Album and couples it with instrumentals created from a multitude of unauthorized samples from The Beatles' LP The Beatles (more commonly known as The White Album). The Grey Album gained notoriety due to the response by EMI in attempting to halt its distribution, despite the fact that both Jay-Z and Paul McCartney said they felt fine with the project.
This is Mash-up mastermind Girl Talk's (real name: Gregg Gillis)'s fourth sample-heavy album. This 12-track compilation features nearly 400 samples of artists from Beck to the Beastie Boys, Radiohead to Portishead, the Arcade Fire to Alicia Key. "All Day", released in 2010, consists entirely of musical samples from other artists’ songs, often bringing together completely different musical genres side by side in harmony.
"Feed the Animals" was released on Illegal Art in 2008. It is composed almost entirely of sample taken from other artists' songs, plus minor original instrumentation by Girl Talk. Gillis stated that the album was created as one long piece of music and then subsequently broken into individual songs
Girl Talk detonates the notions of mash-up on his third album, the violently joyous "Night Ripper", released in 2006. Rather than squeeze two songs that sorta make sense together into a small box, Gillis crams six or eight or 14 or 20 songs into frenetic rows, slicing fragments off 1980s pop, Dirty South rap, booty bass, and grunge, among countless other genres. Then he pieces together the voracious music fan's dream: a hulking hyper-mix designed to make you dance, wear out predictable ideas, and defy hopeless record-reviewing (Source: Pitchfork).
Steinski’s "Rough Mix" (released in 2011) bursts with songs and artists discussed within Kembrew McLeod & Peter DiCola’s book "Creative License: The Law and Culture of Digital Sampling" (published in April 2011 by Duke University Press). It features hundreds of songs and samples mashed together by Steinski, the sonic cut-and-paste artist best known for a hugely influential series of early-1980s twelve-inch singles popularly known as “The Lessons.” Peppered throughout the mix are soundbites from McLeod’s co-produced documentary Copyright Criminals
Security is first of all heuristic (you have to keep an eye on everything) and it is also based on knowledge and insight and having an open mind
although scribd is cleaning up stuff and making searching for free stuff harder every month (you get more an more only paid books in the search results even when you want only to look for the free stuff)
here is the list of 200 recently uploaded books at scribd
webdevelopment, terrorism, security, funny things and so and so on
I am not giving any guarantee that those books won't disappear fast
and I don't hold their copyrights, I am only giving a link