CSIS freed from final shreds of oversight
[Source: The Toronto Star] by Andrew Mitrovica If you are a Canadian citizen, landed immigrant or refugee to this country … Continue reading CSIS freed from final shreds of oversight
[Source: The Toronto Star] by Andrew Mitrovica If you are a Canadian citizen, landed immigrant or refugee to this country … Continue reading CSIS freed from final shreds of oversight
[From NOW Magazine] BY JESSE ROSENFELD When public safety minister Vic Toews introduced his new anti-terrorism strategy last month, many … Continue reading G20 Civil Wrongs: New Documents Show RCMP Targeted Activist Groups Long Before G20 Mass Bust
by Mike Ely How should communists and revolutionaries be organized? Even asking that, ruffles some feathers â since historically, some … Continue reading Kasama Project: “Democracy and centralism? Yes, sure, but…”
[From The Globe and Mail.] by ADRIAN MORROWÂ ANDÂ KIM MACKRAEL In early 2009, two strangers started mingling with the activist communities … Continue reading How police infiltrated groups planning G20 protests
[Reposted from Kasama Project. – ed.] by sks I will go out and say it outright: The âoccupyâ movement in … Continue reading On leaderless resistance & Occupy Wall Street
It is a surprise to no one – old news, in fact – that anarchist and activist groups were widely … Continue reading ExposĂ© on RCMP / CSIS Infiltration of Anarchist Groups
[From Computerworld.com and Kasama.]
By Robert McMillan
IDG News Service â More than three years after the iPhone was first hacked, computer security experts think theyâve found a whole new way to break into mobile phones â one that could become a big headache for Apple, or for smartphone makers using Googleâs Android software.
In a presentation set for next weekâs Black Hat conference in Washington D.C., University of Luxembourg research associate Ralf-Philipp Weinmann says he plans to demonstrate his new technique on an iPhone and an Android device, showing how they could be converted into clandestine spying systems. âI will demo how to use the auto-answer feature present in most phones to turn the telephone into a remote listening device,â he said in an e-mail interview.
Weinmann says he can do this by breaking the phoneâs âbasebandâ processor, used to send and receive radio signals as the device communicates on its cellular network. He has found bugs in the way the firmware used in chips sold by Qualcomm and Infineon Technologies processes radio signals on the GSM (Global System for Mobile Communications) networks used by the majority of the worldâs wireless carriers.
Continue reading “Coming soon: A new way to hack into your smartphone”