Leaked police files contain guarantees disciplinary records will be kept secret

Contracts between police and city authorities, leaked after hackers breached the website of the country’s biggest law enforcement union, contain guarantees that disciplinary records and complaints made against officers are kept secret or even destroyed.

A Guardian analysis of dozens of contracts obtained from the servers of the Fraternal Order of Police (FOP) found that more than a third featured clauses allowing – and often mandating – the destruction of records of civilian complaints, departmental investigations, or disciplinary actions after a negotiated period of time.

The review also found that 30% of the 67 leaked police contracts, which were struck between cities and police unions, included provisions barring public access to records of past civilian complaints, departmental investigations, and disciplinary actions.

The leaked contracts became publicly accessible last week, when hackers breached the Fraternal Order of Police’s website and put around 2.5GB worth of its files online. These provide a glimpse into the influence of police unions, which Black Lives Matter activists have accused of impeding misconduct investigations, particularly after the death of 25-year-old Freddie Gray in Baltimore, Maryland in April.


State Department confirms FBI investigating Hillary Clinton

Today the State Department confirmed that the FBI is investigating former Secretary of State Hillary Clinton’s use of a private email server.

The FBI chief Attorney James Baker sent a letter to the State Department on February 2, 2016 correcting the record presented in a 2015 letter. The letter was released today due to a ongoing investigation from conservative watch dog Judicial Watch.

“Since that time, in public statements and testimony, the bureau has acknowledged generally that it is working on matters related to former Secretary Clinton’s use of a private e-mail server,” James A. Baker, the FBI attorney, said in the letter.

James Baker did not elaborate on specifics of the case due to the ongoing investigation.


Infowars Nightly News: Monday (2-8-16)

Infowars Reporter Joe Biggs Assaulted By Security Guard

Alex Jones Show: Commercial Free – Monday (2-8-16) Full Show

Court Decision Stops FBI From Eviscerating Freedom of Information Act

A court decision on January 22 thwarted the FBI’s attempt to eviscerate the Freedom of Information Act (FOIA) by creating an exemption that would have allowed it to neither confirm nor deny the existence of any record the agency wanted to keep secret.

Judge Randolph D. Moss of the United States District Court for the District of Columbia argued [PDF] the FBI asked the court to “recognize a new doctrine.” This “doctrine” would permit the agency to “withhold an entire category of otherwise unprotected records” in order to exclude them from FOIA requests.

“The FBI’s present policy would permit it to deny access to a large number of records that are neither exempt nor excluded,” Moss added. It would enable the FBI to conceal hundreds of processing records for every document simply because a “sophisticated FOIA requester” might be able to “infer the existence” of information considered to be sensitive.

The decision was the result of a lawsuit filed by individuals angry and frustrated with the FBI’s process for searching for documents when responding to FOIA requests. These individuals requested records—search slips, case processing notes, case evaluation forms, etc—which would show whether an adequate search was conducted by the FBI or not, and the FBI refused to release the records.

One of the plaintiffs, Ryan Shapiro, who is well-known for his scholarly work which depends on documents obtained through FOIA, told Shadowproof, “When it comes to FOIA, the FBI is simply not operating in good faith.”

“Since its earliest days, the FBI has viewed political dissent as a security threat. And since the passage of the Freedom of Information Act, the FBI has viewed efforts to force Bureau compliance with FOIA in the same light,” Shapiro maintained.

As a result, the FBI has spent the past years establishing and perfecting numerous methods for avoiding compliance with FOIA.


It’s Been 20 Years Since This Man Declared Cyberspace Independence

WHEN DIGITAL DYSTOPIANS and critics of Internet libertarians need a rhetorical dart board, they often pull out a document written by John Perry Barlow, co-founder of the nonprofit Electronic Frontier Foundation, a former cattle rancher and Grateful Dead lyricist. On this day in 1996, Barlow sat down in front of a clunky Apple laptop and typed out one very controversial email, now known as the “Declaration of Independence of Cyberspace,” a manifesto with a simple message: Governments don’t—and can’t—govern the Internet.

“Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind,” read the document’s first words. “On behalf of the future, I ask you of the past to leave us alone. You are not welcome among us. You have no sovereignty where we gather.”

In the modern era of global NSA surveillance, China’s Great Firewall, and FBI agents trawling the dark Web, it’s easy to write off Barlow’s declaration as early dotcom-era hubris. But on his document’s 20th anniversary, Barlow himself wants to be clear: He stands by his words just as much today as he did when he clicked “send” in 1996. “The main thing I was declaring was that cyberspace is naturally immune to sovereignty and always would be,” Barlow, now 68, said in an interview over the weekend with WIRED. “I believed that was true then, and I believe it’s true now.”


A Declaration of the Independence of Cyberspace by John Perry Barlow. from IDEALOGUE on Vimeo.

Social Engineering: The Art of Human Hacking

Social Engineering: The Art of Human Hacking

The first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.

Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.

  • Examines social engineering, the science of influencing a target to perform a desired task or divulge information
  • Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access
  • Reveals vital steps for preventing social engineering threats

Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers—now you can do your part by putting to good use the critical information within its pages.

From the Author: Defining Neuro-Linguistic Hacking (NLH)

Author Chris Hadnagy

NLH is a combination of the use of key parts of neuro-lingusitic programming, the functionality of microexpressions, body language, gestures and blend it all together to understand how to “hack” the human infrastructure. Let’s take a closer at each to see how it applies.

Neuro-Lingusitic Programming (NLP): NLP is a controversial approach to psychotherapy and organizational change based on “a model of interpersonal communication chiefly concerned with the relationship between successful patterns of behavior and the subjective experiences underlying them” and “a system of alternative therapy based on this which seeks to educate people in self-awareness and effective communication, and to change their patterns of mental and emotional behavior”

Neuro: This points to our nervous system which we process our five senses:
• Visual
• Auditory
• Kinesthetic
• Smell
• Taste

Linguistic: This points to how we use language and other nonverbal communication systems through which our neural representations are coded, ordered and given meaning. This can include things like:
• Pictures
• Sounds
• Feelings
• Tastes
• Smells
• Words

Programming: This is our ability to discover and utilize the programs that we run in our neurological systems to achieve our specific and desired outcomes.

In short, NLP is how to use the language of the mind to consistently achieve, modify and alter our specific and desired outcomes (or that of a target).

Microexpressions are the involuntary muscular reactions to emotions we feel. As the brain processes emotions it causes nerves to constrict certain muscle groups in the face. Those reactions can last from 1/25th of a second to 1 second and reveal a person’s true emotions.

Much study has been done on microexpressions as well as what is being labeled as subtle microexpressions. A subtle microexpression is an important part of NLH training as a social engineer as many people will display subtle hints of these expressions and give you clues as to their feelings.

List price: $34.99

Buy from amazon.com

Should journalists care if sources go off to prison?

ASK YOURSELF THIS QUESTION: Is it sufficient to protect journalists who report classified information while sources go off to prison?

During the last half decade, a growing roster of national-security reporters has withstood government pressure to reveal confidential sources. They’ve done so with the steady support of news organizations and well-heeled groups that work to protect journalists from threats of jail. Yet those media outfits show scant interest in advocating for the whistleblowers who put themselves at risk. If they go to prison, c’est la vie.

The intertwined cases of New York Times reporter James Risen and former CIA officer Jeffrey Sterling point up the contrast. Risen got broad and repeated support from the media establishment; Sterling got none.

After seven years of government harassment and threats that began in early 2008, Risen prevailed with his steadfast refusal to identify any confidential source for his book State of War. But a year ago, a jury in CIA-friendly Northern Virginia convicted Sterling on multiple counts of the Espionage Act, accepting the prosecution’s claim that he had provided Risen with classified information for a chapter in the book, which included details about a botched CIA operation that provided faulty nuclear weapons design information to Iran.

Just after the verdict, the executive director of the Reporters Committee for Freedom of the Press told The New York Times: “The speed with which the jury reached its verdict shows that reporter’s testimony was not needed for the government to make its case. I think going forward this is going to be a powerful precedent.” Such comments were echoed in celebratory fashion by then-Attorney General Eric Holder and others eager to drive a bigger wedge between journalists and whistleblowers.


Hackers breach DOJ, dump details of 9,000 DHS employees, plan to leak 20,000 from FBI

While some people were enjoying Super Bowl 50, hackers brought the pain to the Department of Home Security by dumping a directory of over 9,000 DHS employee names, email addresses, locations, telephone numbers and titles such as “DHS PRISM Support.” The same Twitter account announced plans to leak data of 20,000 FBI employees – including those who work outside of the US.

The hacker claimed to have downloaded “hundreds of gigbytes of data from a Department of Justice computer.” The unnamed hacker also told Motherboard that the data was obtained after compromising a DOJ employee’s email account, which is what the he used to contact the reporter. The email account wasn’t enough to access a DOJ web portal, but the hacker called the relevant department, social engineered his way in, and gained access to databases via a DOJ intranet.