ForgotPassword?
Sign Up
Search this Topic:
Posts: 27156
Jul 25 15 9:40 AM
Psychological projection is a theory in psychology in which humans defend themselves against unpleasant impulses by denying their existence in themselves, while attributing them to others.[1] For example, a person who is rude may constantly accuse other people of being rude. According to some research, the projection of one's negative qualities onto others is a common process in everyday life.[2]
Psychological projection is a defense mechanism people subconsciously employ in order to cope with difficult feelings or emotions. Psychological projection involves projecting undesirable feelings or emotions onto someone else, rather than admitting to or dealing with the unwanted feelings. Have you ever disliked someone only to become convinced that the person had a vendetta against you? This is a common example of psychological projection.
TRENTON — Gov. Chris Christie on Wednesday sharpened his verbal attacks on Edward Snowden for his disclosure of classified domestic surveillance programs, blasting the former NSA contractor as a "piece of garbage." And Christie also took a shot at fellow Republican presidential candidate Rand Paul for lauding Snowden. The governor, speaking on Fox News' "The Five," lashed out against Snowden, who's living in Russia to avoid being prosecuted in the United States for leaking thousands of documents to journalists in 2013 that showed the NSA had been collecting millions of Americans' phone records. When asked if he would send Navy SEALs to return him to the United States, Christie said: "No. I wouldn't send the SEALs in to pick up that piece of garbage."
Years after Edwards Snowden exposed the scale of NSA and GCHQ mass surveillance in a series of high profile leaks, UK police are still investigating the journalists involved in the expose to decide whether to prosecute. After refusing to confirm or deny whether the two-year investigation was still underway, the Metropolitan Police have revealed they are still examining the journalists who published the leaks by NSA contractor Edward Snowden. The disclosure was reported by the Intercept, who had been engaged in a Freedom of Information battle which has lasted seven months. In 2013 Cressida Dick, a high-ranking UK police officer, told a parliamentary inquiry the force was investigating whether the journalists should be charged for their reportage. In a statement, National Union of Journalists (NUJ) General Secretary Michelle Stanistreet told the Intercept that police should “stop attacking press freedom.” She warned against treating journalist as if their work was breaking the law. “Journalists who reported on the Snowden documents are not criminals, they are not a threat to national security.” “It is totally unacceptable that the authorities have spent the last two years considering whether they will prosecute British journalists reporting in the public interest,” she said. On Monday a court head that Scotland Yard used anti-terror legislation to violate the human rights of three British reporters in 2012 by accessing their private phone records.
With the given security tools, journalists are ill-equipped to protect the identity of their sources, especially after Edward Snowden's leak of classified documents to journalists across the globe about massive government surveillance programmes and threats to personal privacy, says a new study. "Addressing many of the security issues journalists face will require new technical solutions, while many existing secure tools are incompatible with the journalistic process in one way or the other," said lead author Susan McGregor, assistant professor at Columbia University in the US. The researchers probed the computer security habits of 15 journalists across the US and France and found a number of security weaknesses in their technological tools. "If you use your iPhone to translate speech to text, for example, it sends that information to Apple," said senior author Franziska Roesner from University of Washington. "So, if you record a sensitive conversation, you have to trust that Apple is not colluding with an adversary or that Apple's security is good enough that your information is never going to be compromised," said Roesner. News organizations' abilities to build trust with sources and gather sensitive information have been called into question by recent disclosures about surveillance: the US Department of Justice's admission that it secretly obtained phone records from the Associated Press, Microsoft's admission that it read a blogger's personal Hotmail account to find a source of an internal leak, and criminal investigations that have used email traces to identify and prosecute anonymous sources, the study said.
GCHQ days of form-filling and 'bulk' intercept Feature David Anderson QC’s review of Britain’s anti-terrorism laws, published earlier this month, has mostly been examined for its potential impact on the government’s plans for a new act of Parliament on surveillance, known as the Snooper’s Charter to opponents. He made extensive recommendations as to what should be in the legislation, although his proposal that surveillance warrants should be signed off by judges rather than ministers has already been talked down by the government. But the part-time Independent Reviewer of Terrorism Legislation, who in his day job is a high-flying human rights lawyer, also used his 373-page report to shed light on how spies use electronic surveillance, based on research that included a three-day visit to GCHQ in Cheltenham. This and other recently published documents provide new insights into how Britain’s electronic eavesdroppers work, and come from official sources rather than documents leaked by Edward Snowden. Anderson, who saw informing the public and political debate as a key purpose of his report, outlines the powers of the UK’s secret agencies. In GCHQ’s case, this includes hacking (Computer Network Exploitation or CNE, in the jargon), something disclosed when the government published the Home Office’s Draft Equipment Interference Code in February. The code requires applications for such hacking to include what the operation is expected to deliver, details of “collateral intrusion”, whether it will obtain legally privileged or confidential material, and what will be done to mitigate the surveillance, such as filtering and disregarding personal information. This, along with many other sections of Anderson’s report, suggest that many hours in Cheltenham are spent filling out forms.
"Edward loves America and he would definitely like to return home," said Anatoly Kucherena, Snowden's attorney in Russia, in a statement to the media. "But it is our position, and a very simple one, that as long as his case is politicized and commented on as it is by politicians of all levels, that his return to his motherland is impossible."
Wikileaks founder Julian Assange has told of how the U.S. government could topple most others in the world using information from current leaders’ pasts. He also took a swipe at British journalists who he called “gentleman amateurs”, and blasted the Guardian newspaper for abandoning Wikileaks source Edward Snowden. In an interview with Germany’s Der Speigel newspaper, Assange spoke at length on how British and American intelligence agencies work, revealing details about tactics employed by both agencies which could put companies out of business, and even the German Chancellor, Angela Merkel, out of work. “If you knew as a German politician that American intelligence agencies have been collecting intensively on 125 top-level politicians and officials over decades, you would recall some of the conversations you had in all these years and you would then understand that the United States has all those conversations, and that it could take down the Merkel cabinet any time it feels like it, by simply leaking portions of those conversations to journalists,” he said.
"What lies behind us and what lies before us are small matters compared to what lies within us." ~ Ralph Waldo Emerson ~
Interact