Mostrando entradas con la etiqueta cibersecurity. Mostrar todas las entradas
Mostrando entradas con la etiqueta cibersecurity. Mostrar todas las entradas

martes, junio 11, 2013

Moscow opens door to asylum for Snowden, 'it will be considered'

Moscow has opened the door to asylum for American whistleblower Edward Snowden.
There is no official information that the 29-year-old Snowden has applied for asylum, after exposing U.S. surveillance programs that have logged millions of phone calls and the Internet activities of Americans.
However, a spokesman for Russian President Vladimir Putin said Tuesday the Communist county would consider such an asylum request.
"If such an appeal is given, it will be considered,” Putin spokesman Dmitry Peskov told the Russian newspaper Kommersant. “We'll act according to facts."
The comment was reported first by The Guardian.
Snowden, who until Tuesday was a National Security Agency contract worker, has said he is looking for a country in which to seek asylum that has “shared values.”
Snowden fled to Hong Kong after news reports last week about the U.S. date mining. He has been in hiding since appearing in a video Sunday in which he claims to be the source of the leaks.
Snowden’s decision to decamp to Hong Kong offers no guarantee of freedom.
Hong Kong has a relatively solid human rights record and signed an extradition treaty with the United States in 1996, but the island region is now largely under the rule of communist China, notorious for spying on the United States.
“Does he not know (Hong Kong) now belongs to the People’s Republic of China?” asked Steve Bucci, a foreign policy expert with the Heritage Foundation.
Other experts suggest Snowden is trying to take advantage of a recent Hong Kong court decision requiring a review of asylum applications, which also could allow him to stay there while the process remains in limbo.
Simon Young, of the University of Hong Kong’s law center, told the online news agency GlobalPost that everybody is waiting to learn how the Hong Kong government is going to implement the court decision.
"Until that’s the case, you can’t return anyone until the law’s in place," he said.
An extradition process could take months or even years, experts say.
Snowden has reportedly said his best hope for asylum is in Iceland “with its reputation of a champion of Internet freedom.”
To be sure, Iceland has no extradition agreement with the United States, but how and when he would get there remains unclear.
Right now, Snowden’s whereabouts remains uncertain, though he told The Guardian he has been in Hong Kong since May 20.
And the Justice Department has said only that the agency is “in the initial stages” of an investigation into the unauthorized disclosure of classified information by somebody with authorized access.

NSA leaker on the run, whereabouts unknown

lunes, junio 10, 2013

NSA whistle-blower who sought to 'inform the public' in surveillance risks decades in jail

 A 29-year-old American who works as contract employee at the National Security Agency is the source of The Guardian's disclosures about the U.S. government's secret surveillance programs, the London newspaper reported Sunday.
The source of the bombshell leaks about the U.S. government gathering information on billions of phone calls and Internet activities risks decades in jail for the disclosures if the U.S. can extradite him from Hong Kong, where he says he has taken refuge after saying his sole motive was to “inform the public.”
Edward Snowden, 29, who claims to have worked as a contractor at the National Security Agency and the CIA, allowed The Guardian and The Washington Post to reveal his identity Sunday. Snowden, in a video that appeared on the Guardian’s website, said two NSA surveillance programs are wide open to abuse.
"Any analyst at any time can target anyone. Any selector. Anywhere," Snowden said. "I, sitting at my desk, had the authority to wiretap anyone, from you or your accountant to a federal judge to even the president if I had a personal e-mail."
Snowden said he was a former technical assistant for the CIA and a current employee of defense contractor Booz Allen Hamilton, which released a statement Sunday confirming he had been a contractor with them in Hawaii for less than three months. Company officials have promised to work with investigators.
Snowden told the Guardian he believes the government could try to charge him with treason under the Espionage Act, but Mark Zaid, a national security attorney who represents whistle-blowers, told The Associated Press that that would require the government to prove he had intent to betray the United States. Snowden has said his “sole motive” was to inform the public and spur debate.
"My sole motive is to inform the public as to that which is done in their name and that which is done against them," Snowden told the Guardian.
In a note accompanying the first set of documents he provided to the newspaper, Snowden wrote: "I understand that I will be made to suffer for my actions," but "I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant."
Snowden told the Post he was not going to hide.
"Allowing the U.S. government to intimidate its people with threats of retaliation for revealing wrongdoing is contrary to the public interest," he said in the interview published Sunday. Snowden said he would "ask for asylum from any countries that believe in free speech and oppose the victimization of global privacy."
Snowden is now staying in Hong Kong and seeking asylum outside the United States, possibly in Iceland, The Guardian reports.
If the reports are accurate, Snowden could face many years in prison for releasing classified information if he is successfully extradited from Hong Kong or elsewhere.
The Office of the Director of National Intelligence declined to comment on Snowden's disclosure, saying the issue has been referred to the Justice Department.
However, the agency said: "Any person who has a security clearance knows that he or she has an obligation to protect classified information and abide by the law."
"The Department of Justice is in the initial stages of an investigation into the unauthorized disclosure of classified information by an individual with authorized access," Justice Department spokeswoman Nanda Chitre said in a statement late Sunday. 
New York Republican Rep. Peter King, chairman of the Homeland Security Subcommittee on Counterintelligence and Terrorism and a member of the Select Committee on Intelligence, said: "If Edward Snowden did in fact leak the NSA data as he claims, the United States government must prosecute him to the fullest extent of the law and begin extradition proceedings at the earliest date. The United States must make it clear that no country should be granting this individual asylum. This is a matter of extraordinary consequence to American intelligence."
In a nearly 13-minute video that accompanied The Guardian story Sunday, Snowden says he has no intentions of hiding because he has done nothing wrong.
“When you’re in positions of privileged access … . You recognize some of these things are actual abuses,” Snowden said about his decision to be a whistle-blower. “Over time, you feel compelled to talk about it.”
The Guardian broke the story late Wednesday that the federal government was collecting phone call records from Verizon customers.
The Guardian and the Post followed with a series of reports about the calls being taken from other telecommunications companies and that the NSA and FBI have a Internet scouring program, code-named PRISM, that records Internet activities, all part of a post-9/11 effort to thwart terrorism.
White House spokesman Josh Earnest said the Oval Office would not comment on Snowden before Monday.
Washington officials have acknowledged all branches of the federal government — Congress, the White House and federal courts — knew about the collection of data under the Patriot Act.
Still, the leaks have reopened the debate about privacy concerns versus heightened measure to protect against terrorist attacks. They also led the NSA to ask the Justice Department to conduct a criminal investigation.
Fox News confirmed the Obama administration took the first steps Saturday in a criminal investigation when officials filed a “crimes report.”
National Intelligence Director James Clapper has decried the leaks as reckless. And in the past days he has taken the rare step of declassifying some details about them to respond to media reports about counterterrorism techniques employed by the government.
“Disclosing information about the specific methods the government uses to collect communications can obviously give our enemies a ‘playbook’ of how to avoid detection,” Clapper said Saturday.
PRISM allows the federal government to tap directly into the servers of major U.S. Internet companies such as Google, Apple, Microsoft, Facebook and AOL, scooping out emails, video chats, instant messages and more to track foreign nationals who are suspected of terrorism or espionage.
The chief executives of Facebook and Google have said their companies were not aware of the data grab.
Officials say the government is not listening to any of the billions of phone calls, only logging the numbers.  
President Obama, Clapper and others also have said the programs are subject to strict supervision of a secret court.
Obama said Friday that the programs have made a difference in tracking terrorists and are not tantamount to "Big Brother." 
The president acknowledged the U.S. government is collecting reams of phone records, including phone numbers and the duration of calls, but said this does not include listening to calls or gathering the names of callers.  
"You can't have 100 percent security and also then have 100 percent privacy and zero inconvenience,” he said. “We're going to have to make some choices as a society."
However, the president said he welcomes a debate on that issue. 
The Guardian reported that Snowden was working in an NSA office in Hawaii when he copied the last of the documents he planned to disclose and told supervisors that he needed to be away for a few weeks to receive treatment for epilepsy.
Snowden is quoted as saying he chose Hong Kong because it has a "spirited commitment to free speech and the right of political dissent" and because he believed it was among the spots on the globes that could and would resist the dictates of the U.S. government.
Hong Kong has an extradition treaty with the United States that took force in 1998, according to the U.S. State Department website.
"The government could subject him to a 10- or 20-year penalty for each count," with each document leaked considered a separate charge, Mark Zaid, a national security lawyer who represents whistle-blowers told the Associated Press.
Snowden is quoted as saying he hopes the publicity of the leaks will provide him some protection.
"I feel satisfied that this was all worth it. I have no regrets," Snowden told the Guardian.
Snowden was said to have worked on IT security for the CIA and by 2007 was stationed with diplomatic cover in Geneva, responsible for maintaining computer network security. That gave him clearance to a range of classified documents, according to the Guardian report.
"Much of what I saw in Geneva really disillusioned me about how my government functions and what its impact is in the world," he says. "I realized that I was part of something that was doing far more harm than good."

What we know about NSA leaker Edward Snowden

The 29-year-old computer whiz who says he divulged details about National Security Agency's data-collecting programs has also revealed specifics of his life story, from an upbringing in North Carolina to a top-secret contract in Hawaii.
Speaking from a Hong Kong hotel that he reportedly has since left, Edward Snowden told The Guardian that he had enjoyed a "very comfortable life," but one marked by mounting disillusionment with what he views as government intrusion into the private lives of American citizens.
"I don't want to live in a society that does these sort of things … I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under," he said.
Here's some of what we know about the bespectacled self-proclaimed "spy" who is being called both a traitor and a hero:
Background: Born June 21, 1983, he grew up in Wilmington, N.C., but later moved to Ellicott City, Md., he told The Guardian. His mother, Wendy, is the chief deputy clerk for administration and information technology at the federal court in Baltimore, a court official told NBC News. His father, Lonnie, is a former Coast Guard officer who lives in Pennsylvania, the Allentown Morning Call reported. A neighbor said he has an older sister who is an attorney.
"He was a quiet guy, kept to himself. He always dressed nice, was clean cut. He just reminded me of a brainiac," said neighbor Joyce Kinsey. "I feel terrible for his family." In his interview with The Guardian, Edward Snowden said the only thing he feared from outing himself is the "harmful effects on my family."
Education: He did not complete high school. He told The Guardian that he studied computers at a community college and obtained a general equivalency degree. A spokesman for Anne Arundel Community College confirmed that a student with the same name and birth date took classes there, from 1999 to 2001 and again in 2004 and 2005.
Military service: He spent four months in the Army reserves, from May to September 2004 as a special forces recruit to a 14-week training course, the Army said. "He did not complete any training or receive any awards," an Army statement said. No other details were given, but Snowden told The Guardian he was discharged after breaking his legs in an accident.
Government work: His first job with the National Security Agency was as a security guard, and the next stop was an information-technology job with the CIA, which stationed him in Geneva in 2007, he claimed. He said he left the CIA in 2009 to work for private contractors, including Dell and Booz Allen. Through his job with Booz Allen, he was assigned to NSA offices in Japan and, more recently, Hawaii. Booz Allen said he has been an employee for about three months. He told reporters he made about $200,000 a year.

Anita Hofschneider / AP
A real estate sign stands in front of a home in Waipahu, Hawaii, Sunday, June 9, 2013, where Edward Snowden, source of disclosures about the U.S. government's secret surveillance programs, lived with his girlfriend until recently. A Hawaii real estate agent says Snowden and his girlfriend moved out of the home near Honolulu on May 1, leaving nothing behind.
Hawaii: He briefly lived in a 1,559-square-foot rented home on Oahu, where neighbors said he and his girlfriend, who has not been named, kept to themselves. "They just say, 'Hi' and 'Hello' in the morning," Angel Cunanan told NBC station KHNL. "He mentioned that he worked for the government." Local residents said the couple never really unpacked before they moved out May 1, after the owner decided to sell the house, the Associated Press reported.
Exit plan: When he decided to go to Hong Kong to await the fallout from the leaks, Snowden told the NSA that he was taking a leave for treatment of epilepsy, a condition he told The Guardian he was diagnosed with last year after seizures. He said he didn't give his girlfriend a specific reason, just saying he had to go away for a few weeks.
Politics: A public records search shows Snowden was a registered voter but did not declare a political party affiliation. Someone with the same name who lived in the same places and at one point worked for Dell made two $250 donations last year to libertarian-leaning GOP presidential candidate Ron Paul.
Cloak-and-dagger: Snowden self-identifies as a spook. "I've been a spy almost all of my adult life," he told the Washington Post. In his communications with a reporter, he used a code name — "Verax," or truth-teller in Latin. He's worried he's being watched and puts a red hood over his head and laptop when he enters passwords, The Guardian reported.

Snowden's Steps To Protect His Privacy

Weeks ago, Edward Snowden, a contractor for the National Security Agency, left his home in Hawaii and checked into a hotel in Hong Kong.
The 29-year-old man responsible for one of the more notable intelligence leaks in American history then waited until he became one of the most wanted men in the world.
“We have got a CIA station just up the road – the consulate here in Hong Kong – and I am sure they are going to be busy for the next week,” Snowden told the Guardian. “And that is a concern I will live with for the rest of my life, however long that happens to be.”
One would imagine that Snowden is intimately familiar with the capabilities of NSA, and what he has gotten himself into. The Guardian details some of the steps he takes to protect his privacy:
  • In case of hidden cameras, he drapes a large red hood over his head and computer screen when he enters his passwords.
  • He places pillows under the crack of his door to combat eavesdropping.
  • He rarely ventures out in public. "I've left the room maybe a total of three times during my entire stay," Snowden said.

sábado, junio 08, 2013

Facebook forensics? What the feds can learn from your digital crumbs

Bits of you are all over the Internet. If you've signed into Google and searched, saved a file in your Dropbox folder, made a phone call using Skype, or just woken up in the morning and checked your email, you're leaving a trail of digital crumbs. People who have access to this information — companies powering your emails and Web searches, advertisers who are strategically directing ads at you — can build a picture of who you are, what you like, and what you will probably do next. Revelations about government counter-terrorism programs such as PRISM indicate that federal agents and other operatives may use this data, too.
"Google knows what kinds of porn everyone in the world likes," Bruce Schneier, a security and cryptography expert told NBC News. Not only are companies tracking what you are doing, they are correlating it, he said.
Since news of PRISM broke, the leaders of the tech companies have denied knowledge of government access to their information. At Facebook, one of the world's biggest data collectors, Mark Zuckerberg posted a message that read: "When governments ask Facebook for data, we review each request carefully to make sure they always follow the correct processes and all applicable laws, and then only provide the information if is required by law."
But the law already permits quite a bit of digital sniffing — much of it without a warrant.
While authorities need a warrant to access the content of emails stored by companies like Yahoo and Google, they don't need a warrant for IP addresses of the computers used to access accounts, ProPublica notes. The government doesn't need a warrant to request draft emails, data stored in the cloud on services like Dropbox and Google Drive, and emails and texts that are older than 180 days old — investigators can demand them with a subpoena.
And when authorities do get a court order, the amount of available data multiplies. Director of National Intelligence James Clapper clarified in a statement to press Thursday that the government has access not to content of phone calls, but to "telephony metadata." That's a vague term, but at the very least, in includes who you called, from where, and when.
Painting a picture of you
Gather all of these shreds of metadata, apply some algorithms that spot clues in patterns, and you can put together a pretty good idea of who a person is, and what they're up to.
For example, when a group from MIT analyzed location data from cellphones of 1.5 million people in a single country over 15 months, the team could identify individuals simply by knowing where they were on four separate occasions.
When Netflix released anonymous watch histories of 500,000 subscribers as part of a public contest to create an algorithm that predicted what movie a person would like, Arvind Narayanan, a security researcher at Princeton University, and his colleague Vitaly Shmatikov, pinned names to numbers by comparing histories in the anonymized data with comments made by named individuals on IMDB. "In every case, you find two location points, or six to eight movies, or three data points ... it's enough to identify a person," Narayanan told NBC News.
Narayanan is now researching ways to make people harder to identify by their online behavior.
Facebook, as you might imagine, provides a wealth of identifying information. In a study published in the Proceedings of the Academy of Sciences in March this year, a team of data scientists showed that they could work out a person's sexual preferences, political leanings, and a host of other character details from their "likes." In a similar manner, others can work out similar identifying characteristics from "browsing histories, search queries, or purchase histories," they write in their paper.
"Commercial companies, governmental institutions, or even one’s Facebook friends could use software to infer attributes such as intelligence, sexual orientation, or political views that an individual may not have intended to share," they add. "One can imagine situations in which such predictions, even if incorrect, could pose a threat to an individual’s well-being, freedom, or even life."
Snoop tricks
Advertisers already track our lives with astonishing accuracy going off very little information — Target has known when a woman was pregnant even before her family did. And just as advertisers are profiling you to make money, law enforcement and counter-terrorism operatives make use of these clues to hunt for suspects.
In April, the NSA released a document called "Untangling the Web: A Guide to Internet Research." The massive work, 643 pages total, contains loads and loads of tips for hunting information that's publicly available on the Internet. One section, about "Google Hacking" isn't really hacking at all, just fancy tricks for locating accidentally published secrets.
Raytheon's Rapid Information Overlay Technology (or RIOT) software was built to make some of this searching easier. Its government customers use it to compile case files of location data scraped from checkins on Twitter, Facebook, Foursquare and other public social outlets.
President Obama said in a statement on Friday that surveillance programs like PRISM have "helped us prevent terrorist attacks." Still, privacy advocates have consistently pointed to such initiatives as potentially over-reaching.
The key here is that, even without a so-called "back door" into Facebook, Google, Apple and Microsoft servers (which the companies have vehemently denied), and even without the warrants they need to get specific information about individuals from those companies, the feds — and anyone else — can see an awful lot. And they have you to thank for it. Remember that next time you post to Facebook, upload a picture or comment on an article ... like this one.

Intelligence chief declassifies PRISM details, slams ’reckless disclosures’

The United States' top intelligence official said he was concerned about recent leaks to the media that revealed some of the country's surveillance activities in a move that  he said could damage U.S. intelligence capabilities. 
"I think we’re very, very concerned about it," Director of National Intelligence James Clapper told NBC News' Andrea Mitchell Saturday. "For me, it is literally – not figuratively – literally gut-wrenching to see this happen because of the huge, grave damage it does to our intelligence capabilities." 
In a statement released Saturday, Clapper said media reports contained some inaccuracies that cannot be corrected without revealing additional classified information – something he is not prepared to do. 
“Over the last week we have seen reckless disclosures of intelligence community measures used to keep American safe,” Clapper said in the statement. “In a rush to publish, media outlets have not given the full context – including the extent to which these programs are overseen by all three branches of government – to these effective tools.”
The revelation of two ultra-secret government surveillance programs on Thursday raised outrage among many Americans.
The British newspaper The Guardian published a classified document detailing a program under which a division of telecommunications provider Verizon was ordered to hand over records to the National Security Agency. 
A second program, code-named PRISM, was revealed later in the day, and first reported on by the Washington Post and The Guardian. Under the program, U.S. intelligence agencies have been given access to files maintained by some of the country’s top Internet companies, including Microsoft, Google, Facebook, and Apple, according to the reports. Those companies denied providing special government access to their systems when contacted by NBC News.
Describing a lot of the reporting on the subject as "hyperbole," Clapper told Mitchell these intelligence programs represent "a key tool for preserving, protecting the nation’s safety and security." 
In a second statement released Saturday, Clapper's office described PRISM as follows: "PRISM is not an undisclosed collection or data mining program. It is an internal government computer system used to facilitate the government's statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision as authorized by Section 702 of the Foreign Intelligence Surveillance Act."
"The United States government does not unilaterally obtain information from the servers of U.S. electronic communication service providers," the statement continued. 
Clapper said the intelligence community has been "profoundly affected" by the recent leaks, and he expressed concern over the "double-edged sword" of transparency, which could benefit "nefarious" groups. 
According to the statement released by Clapper's office, the country's intelligence collection is credited with numerous accomplishments.
"For example, the intelligence community acquired information on a terrorist organization's strategic planning efforts. Communications collected under Section 702 have yielded intelligence regarding proliferation networks and have directly and significantly contributed to successful operations to impede the proliferation of weapons of mass destruction and related technologies," the statement read.

jueves, junio 06, 2013

U.S. intelligence mining data from nine U.S. Internet companies in broad secret program


The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person’s movements and contacts over time.
The highly classified program, code-named PRISM, has not been disclosed publicly before. Its establishment in 2007 and six years of exponential growth took place beneath the surface of a roiling debate over the boundaries of surveillance and privacy. Even late last year, when critics of the foreign intelligence statute argued for changes, the only members of Congress who know about PRISM were bound by oaths of office to hold their tongues.
Related stories
What has the government been doing? Is it legal? Does it mean some bureaucrat somewhere has heard all your phone calls? Read on to find out.

An internal presentation on the Silicon Valley operation, intended for senior analysts in the NSA’s Signals Intelligence Directorate, described the new tool as the most prolific contributor to the President’s Daily Brief, which cited PRISM data in 1,477 articles last year. According to the briefing slides, obtained by The Washington Post, “NSA reporting increasingly relies on PRISM” as its leading source of raw material, accounting for nearly 1 in 7 intelligence reports.
That is a remarkable figure in an agency that measures annual intake in the trillions of communications. It is all the more striking because the NSA, whose lawful mission is foreign intelligence, is reaching deep inside the machinery of American companies that host hundreds of millions of American-held accounts on American soil.
The technology companies, which participate knowingly in PRISM operations, include most of the dominant global players of Silicon Valley. They are listed on a roster that bears their logos in order of entry into the program: “Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple.” PalTalk, although much smaller, has hosted significant traffic during the Arab Spring and in the ongoing Syrian civil war.
Dropbox , the cloud storage and synchronization service, is described as “coming soon.”
Government officials declined to comment for this story.
Roots in the ’70s
PRISM is an heir, in one sense, to a history of intelligence alliances with as many as 100 trusted U.S. companies since the 1970s. The NSA calls these Special Source Operations, and PRISM falls under that rubric.
The Silicon Valley operation works alongside a parallel program, code-named BLARNEY, that gathers up “metadata” — address packets, device signatures and the like — as it streams past choke points along the backbone of the Internet. BLARNEY’s top-secret program summary, set down alongside a cartoon insignia of a shamrock and a leprechaun hat, describes it as “an ongoing collection program that leverages IC [intelligence community] and commercial partnerships to gain access and exploit foreign intelligence obtained from global networks.”
But the PRISM program appears more nearly to resemble the most controversial of the warrantless surveillance orders issued by President George W. Bush after the al-Qaeda attacks of Sept. 11, 2001. Its history, in which President Obama presided over “exponential growth” in a program that candidate Obama criticized, shows how fundamentally surveillance law and practice have shifted away from individual suspicion in favor of systematic, mass collection techniques.
Keep reading on 
http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story_1.html

miércoles, mayo 29, 2013

Report: U.S. Weapons System Designs Breached by Chinese Cyber Attacks

According to a report prepared for the Pentagon and the defense industry, US weapons systems have been infiltrated by Chinese hackers.  "More than two dozen major weapons systems whose designs were breached were programs critical to U.S. missile defenses and combat aircraft and ships, according to a previously undisclosed section of a confidential report prepared for Pentagon leaders by the Defense Science Board."

Gaining access to these systems could not only accelerate the development of Chinese weapon systems, but also cripple our military advantage in the future. The Defense Science Board, an advisory board of civilian and government experts, did not state that the Chinese stole the weapons information and designs. But officials with knowledge of the breaches reported the intrusions were part of a larger campaign by the Chinese against the US defense systems.
A report in January warned that the US and the Pentagon is not prepared to protect against a full scale cyber attack. The Washington Post was given a copy of the confidential report listing all of the weapons systems that were compromised.
The designs included those for the advanced Patriot missile system, known as PAC-3; an Army system for shooting down ballistic missiles, known as the Terminal High Altitude Area Defense, or THAAD; and the Navy’s Aegis ballistic-missile defense system.Also identified in the report are vital combat aircraft and ships, including the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter and the Navy’s new Littoral Combat Ship, which is designed to patrol waters close to shore.Also on the list is the most expensive weapons system ever built — the F-35 Joint Strike Fighter, which is on track to cost about $1.4 trillion. The 2007 hack of that project was reported previously.
In March of this year, National Security Adviser Tom Donilon gave a speech instructing China to "control it's cyberactivity."  But the US addressed this issue as well in a four hour private meeting a year ago. "The officials, who spoke on the condition of anonymity to describe a closed meeting, said senior U.S. defense and diplomatic officials presented the Chinese with case studies detailing the evidence of major intrusions into U.S. companies, including defense contractors."
The Chinese deny they conduct cyber-espionage. President Obama will meet with President Xi Jinping next month in California and is expected to address the issue.
A senior military official stated  “This is billions of dollars of combat advantage for China. They’ve just saved themselves 25 years of research and development. It’s nuts.”

domingo, mayo 26, 2013

War News Updates: NSA Chief Is In The Center Of A 'Cyber Storm'

War News Updates
An aide (L) takes notes as U.S. General Keith Alexander, director of the National 
Security Agency (NSA) and U.S. Cyber Command, speaks to reporters 
during the Reuters Cybersecurity Summit in Washington,
 May 14, 2013. REUTERS/Stelios Varias


Four-Star General In Eye Of U.S. Cyber Storm -- Reuters

(Reuters) - Depending on your point of view, U.S. General Keith Alexander is either an Army four-star trying to stave off a cyber Pearl Harbor attack, or an overreaching spy chief who wants to eavesdrop on the private emails of every American.

Alexander, 61, has headed the National Security Agency since 2005, making him the longest-serving chief in the history of an intelligence unit so secretive that it was dubbed "No Such Agency." Alexander also runs U.S. Cyber Command, which he helped to create in 2010 to oversee the country's offensive and defensive operations in cyberspace.

The dual role means Alexander has more knowledge about cyber threats than any other U.S. official, since the NSA already protects the most sensitive U.S. data, extracts intelligence from foreign networks and uses wiretaps to track suspected terrorists. But it also puts the general at the center of an intense debate over how much power the government should have to spy on private citizens in the name of protecting national security.

Read more >>

viernes, mayo 24, 2013

Is Privacy Overrated? Cyberattack in the New Digital Age

ForaTv
Google's Eric Schmidt and Jared Cohen, authors of the book "The New Digital Age," explain why it might be time to have  "the talk" about cyber security, at home, at work, all over the country. 

miércoles, mayo 08, 2013

China labels US the ’real hacking empire’ after Pentagon report

chinhdangvu.blogspot.com
BEIJING -- China on Wednesday accused the United States of sowing discord between it and its neighbors after the Pentagon said Beijing is using espionage to fuel its military modernization, branding Washington the "real hacking empire.”
The latest salvo came a day after China's foreign ministry dismissed as groundless a Pentagon report that accused China for the first time of trying to break into U.S. defense computer networks.
The Pentagon also cited progress in Beijing's effort to develop advanced-technology stealth aircraft and to build an aircraft carrier fleet to project power further offshore.
The People's Liberation Army Daily called the report a "gross interference in China's internal affairs.”
"Promoting the ‘China military threat theory’ can sow discord between China and other countries, especially its relationship with its neighboring countries, to contain China and profit from it," the newspaper said in a commentary that was carried on China's Defense Ministry website.
The United States is "trumpeting China's military threat to promote its domestic interests groups and arms dealers,” the newspaper said, adding that it expects "U.S. arms manufacturers are gearing up to start counting their money.”
The remarks in the newspaper underscore the escalating mistrust between China and the United States over hacking, now a top point of contention between Washington and Beijing.
A U.S. computer security company, Mandiant, said in February a secretive Chinese military unit was likely behind a series of hacking attacks that targeted the United States and stole data from more than 100 companies.
That set off a war of words between Washington and Beijing.
China has said repeatedly that it does not condone hacking and is the victim of hacking attacks -- most of which it says come from the United States.
"As we all know, the United States is the real 'hacking empire' and has an extensive espionage network," the People's Daily, a newspaper regarded as a mouthpiece of the Chinese Communist Party, said in a commentary.
"In recent years, the United States has continued to strengthen its network tools for political subversion against other countries,” the article said.
"Cyber weapons are more frightening than nuclear weapons," the People's Daily said. "To establish military hegemony on the Internet by repeatedly smearing other countries is a dangerous and wrong path to take and will ultimately end up in shooting themselves in the foot."

martes, abril 16, 2013

White House threatens cybersecurity veto

By Pam Benson
www.wina.com
The White House is threatening to veto a House cybersecurity bill unless changes are made to further safeguard privacy and civil liberties, and limit private-sector liability protections.
Last week, the House Intelligence Committee approved and sent to the full House proposed legislation that would enhance data sharing between the government and private industry to help protect computer networks from cyber attacks.
The committee amended the bill after consulting with the White House during its drafting, but the Obama administration is still not satisfied with some of its provisions.
"The administration still seeks additional improvements and if the bill, as currently crafted, were presented to the president, his senior advisers would recommend that he veto" it, the White House budget office said in a statement on Tuesday.

In particular, the administration wants to require private companies to "take reasonable steps" to remove personal data not relevant to a cyber threat when they share information with the government.
As it stands now, the bill only mandates the government take steps to minimize the collection and retention of personal information such as addresses and e-mail.
The White House also wants the Department of Homeland Security to coordinate information-sharing from industry to government, making clear that a civilian agency would be in charge of the process.
Another point of contention is the extent of liability protection provided to private industry.
The White House supports the efforts to remove legal barriers that could inhibit information sharing by companies, but the OMB statement said, "the law should not immunize a failure to take reasonable measures, such as the sharing of information, to prevent harm when and if the entity knows that such inaction will cause damage or otherwise injure or endanger other entities or individuals."
The full House is expected to debate and vote on the measure this week.
Two Democratic representatives who voted against the committee bill, Adam Schiff of California and Jan Schakowsky of Illinois, plan to introduce amendments that could satisfy the administration's concerns.

jueves, abril 11, 2013

FBI sued over facial-recognition technology

Bob Unruh
A team of privacy advocates and experts is launching a lawsuit against the FBI for refusing to provide information to the public about its new Next Generation Identification system, which the federal agency says is in demand for its biometric database of Americans.
The lawsuit filed against the FBI in Washington by the Electronic Privacy Information Center is asking for a court order that information about the program’s contracts with private companies and its technical specifications be made available.
EPIC said that the NGI system upon completion “will be the largest biometric database in the world” and will include files of fingerprints, DNA profiles, iris scans, palm prints, voice identification profiles, photographs and other identifying information already collected by states, counties and even schools.
“The FBI will use facial recognition to match images in the database against facial images obtained from CCTV and elsewhere,” the organization said, noting there already are an estimated 30 million spy cameras across the United States.
The complaint explains that the FBI announced in 2009 the NGI system was being created to record, analyze and use biometrics of U.S. citizens – whether they know that their details have been recorded or not.
EPIC followed up shortly later with Freedom of Information Act requests for details about the program’s contracts with private companies. The group wanted to know who would get access to Americans’ biometrics and why.
The database was expected to include millions of photographs, fingerprints, voiceprints and other identifiers of people who are not criminals and are not even suspects in crimes, EPIC said. In fact, they are individuals who probably “are unaware that their images and biometric identifiers were captured.”
Some law enforcement officers now are using handheld devices that allow them to “scan irises and faces of individuals and match them against biometric databases.”
Also, some “school districts now are requiring children to provide biometric identifiers, such as palm prints.”
The complaint said the danger was made clear when a private company was found trying to sell its biometric database of American consumers after its parent company, Verified Identity Pass, collapsed into bankruptcy,
“Personally identifiable information could be lost or misused as a result” of the new program, the complaint said.
Among the private companies thought to be involved are Lockheed Martin, IBM, Accenture, BAE Systems Information Technology, Global Science & Technology, Innovative Management and Technology Services and Platinum Solutions.
States already thought to be providing biometric details to the NGI include Arizona, Hawaii, Kansas, Maryland, Michigan, Missouri, Nebraska, New Mexico, Ohio, South Carolina and Tennessee.
Although the FBI admitted that it had more than 7,300 pages of documentation that responded to the requests, EPIC has yet to see any, the complaint alleged.
The FBI explained that it launched the biometric database of Americans because of “customer requirements.”
The FBI said it is expected to replace its existing fingerprint ID system and expand the agency’s capabilities into “multimodal functionality.”
“The NGI Program Office mission is to reduce terrorist and criminal activities by improving and expanding biometric identification and criminal history information services through research, evaluation, and implementation of advanced technology,” the FBI explained.
The system specifically calls for iris records and search capabilities, palm prints, facial recognition capabilities and other components of a “unimodel” system.
“The framework will be expandable, scalable, and flexible to accommodate new technologies and biometric standards, and will be interoperable with existing systems. Once developed and implemented, the NGI initiatives and multimodal functionality will promote a high level of information sharing, support interoperability, and provide a foundation for using multiple biometrics for positive identification,” the FBI said.

sábado, abril 06, 2013

«Facebook Home destruye cualquier noción de privacidad»

mexico.cnn.com
El GPS del teléfono puede enviar información constante a los servidores de Facebook [«infractor reincidente en cuestiones de privacidad»], indicando tu paradero en todo momento.

De modo que si tu teléfono no se mueve de un mismo lugar entre las 22h y las 6h durante, digamos, una semana, Facebook puede deducir que esa ubicación es tu hogar. Facebook será capaz de localizar en un mapa dónde está tu casa aunque nunca hayas indicado tu dirección personal en Facebook.

Así Facebook puede comenzar a construir un perfil de ti mejor y más completo. Puede correlacionar todas tus relaciones, las tiendas en las que compras, los restaurantes en los que comes y otros muchos datos. El acelerómetro del teléfono le dirá a Facebook si estás caminando, corriendo o conduciendo.

El problema es que Facebook va a utilizar todos esos datos —no para mejorar tu vida— sino para mejorar sus campañas de publicidad.

lunes, marzo 18, 2013

Cyberattack on Florida election is first known case in US, experts say

Tim Chapman / Miami Herald
About 2,000 rejected absentee ballots at Miami-Dade Elections Department, mostly for lack of signatures or review of signatures from the last election.
An attempt to illegally obtain absentee ballots in Florida last year is the first known case in the U.S. of a cyberattack against an online election system, according to computer scientists and lawyers working to safeguard voting security.
The case involved more than 2,500 “phantom requests” for absentee ballots, apparently sent to the Miami-Dade County elections website using a computer program, according to a grand jury report on problems in the Aug. 14 primary election. It is not clear whether the bogus requests were an attempt to influence a specific race, test the system or simply interfere with the voting. Because of the enormous number of requests – and the fact that most were sent from a small number of computer IP addresses in Ireland, England, India and other overseas locations – software used by the county flagged them and elections workers rejected them.
Computer experts say the case exposes the danger of putting states’ voting systems online – whether that’s allowing voters to register or actually vote.
“It’s the first documented attack I know of on an online U.S. election-related system that’s not (involving) a mock election,” said David Jefferson, a computer scientist at Lawrence Livermore National Laboratory who is on the board of directors of the Verified Voting Foundation and the California Voter Foundation.
Other experts contacted by NBC News agreed that the attempt to obtain the ballots is the first known case of a cyberattack on voting, though they noted that there are so many local elections systems in use that it's possible that a similar attempt has gone unnoticed.
There have been allegations of election system hacking before in the U.S., but investigations of irregularities have found only software glitches, voting machine failures, voter error or inconclusive evidence. Where there has been evidence of a computer security breach -- such as a 2006 incident in Sarasota, Fla., in which  a computer worm that had been around for years raised havoc with the county elections voter database -- it was unclear whether the worm's appearance was timed to interfere with the election.
In any case, experts say they’ve been warning about this sort of attack for years.
“This has been in the cards, it’s been foreseeable,” said law Professor Candice Hoke, founding director of the Center for Election Integrity at Cleveland State University.
The primary election in Miami-Dade County in August 2012 involved state and local races along with U.S. Senate and congressional contests (see a sample ballot here). The Miami Herald, which first reported the irregularities, said the fraudulent requests for ballots targeted Democratic voters in the 26th Congressional District and Republicans in Florida House districts 103 and 112. None of the races’ outcomes could have been altered by that number of phantom ballots, the Herald said.
Overseas “anonymizers” -- proxy servers that make Internet activity untraceable -- kept the originating computers’ location secret and prevented law enforcement from figuring out who was responsible, according to the grand jury report, issued in December. The state attorney’s office closed the case in January without identifying a suspect.

Keep reading on openchannel >>

lunes, marzo 11, 2013

Cybersecurity threatens US-China relationship, White House official says

usnews
Growing Chinese Telecoms Threaten

Chinese leaders must address cybersecurity threats emanating from their country on “an unprecedented scale” or risk weakening the economic relationship between Beijing and the United States, White House national security adviser Tom Donilon said Monday.

“U.S. businesses are speaking out about their serious concerns about sophisticated, targeted theft of confidential business information and proprietary technologies through cyberintrusions emanating from China on an unprecedented scale,” said Donilon.  “The international community cannot afford to tolerate such activity from any country.”
The remarks, delivered to The Asia Society in New York, are the first by a White House official to specifically name China as a threat to U.S. cybersecurity.
Though Donilon focused mainly on the danger to U.S. businesses, he did acknowledge the risk such an attack could pose to U.S. national security.  He said that the issue has become “a key point of concern and discussion with China at all levels of our governments” and that President Barack Obama has vowed to do what is necessary to protect America’s interests against cyberattacks.  
During last month’s State of the Union address, Obama highlighted how vulnerable America’s financial institutions, power grid and air traffic control systems could be to an attack.  The president, who has signed an executive order to help address those concerns, called on Congress to pass comprehensive legislation that would better secure online networks to help protect against attacks.
The president never mentioned China during his high-profile address.
But on Monday, Donilon was much more direct, detailing three requests for Beijing, including recognition of the severity of the problem, “serious steps” to address it and establishing guidelines of acceptable norms in the digital realm.   
“Both countries face risks when it comes to protecting personal data and communications, financial transactions, critical infrastructure, or the intellectual property and trade secrets that are so vital to innovation and economic growth,” said Donilon.
James Lewis, a cybersecurity expert at the Center for Strategic and International Studies, said Donilon’s remarks indicate an aggressive shift in how the administration deals with China. It is a pivot, Lewis said, that comes as more and more data pours in pointing to China as the biggest culprit behind cyberattacks.
“The atmosphere has just changed; the data is overwhelming,” he said.
Lewis said protecting digital institutions is more diplomatically framed as an economic issue instead of a security one to avoid stirring threats of military action. Still it is significant the debut of the administration’s sterner policy came from the president’s top security adviser, he said.   
A report released in February by a private security firm found a Chinese military unit hacked more than 140 businesses, mostly inside the United States.  It’s a claim the Chinese government denies.
Media giants The New York Times and Wall Street Journal say they had been hacked for months and through an investigation with the FBI, traced the intrusions back to China.  The Wall Street Journal said the hacking was aimed at monitoring the newspaper’s China reporting, a claim that the spokesman for the Chinese foreign ministry called “irresponsible.”
White House spokesman Jay Carney said cybersecurity will be one of the priorities the president addresses with congressional leaders when he visits Capitol Hill this week.
And the United States is not alone. European countries have suspected China has infiltrated their computer systems as well.  Nations could retaliate with sanctions against Beijing.
“It’s become a problem that China can’t ignore without harming their economy,” said Lewis.

Gay? Conservative? High IQ? Your Facebook ’likes’ can reveal traits

cosmiclog
David Stillwell / Cambridge
A graphic from the "You Are What You Like" Facebook app illustrates how the pages you click on can tell others about your personal traits, even if you don't mean to do so.

When you click a "like" button on Facebook, you could be telling the world whether you're gay or straight, liberal or conservative, intelligent or not so much — even if you don't intend to. That's what researchers found when they ran tens of thousands of Facebook profiles and questionnaires through a computer algorithm to find the obvious as well as not-so-obvious connections.
The results were published on Monday in the Proceedings of the National Academy of Sciences, and you can sample the method for yourself at a website called YouAreWhatYouLike.com.
"The main message of the paper is that whether they like it or not, people do communicate their individual traits in their online behavior," said lead author Michal Kosinski, operations director at the University of Cambridge's Psychometrics Center.
Some of the correlations are obvious: For example, If you're a fan of the "I'm Proud to Be a Christian" Facebook page, it's a pretty safe bet that you're a Christian. But others are hard to explain: Why is it that liking the "Curly Fries" page is associated with having a high IQ? Why does the computer model put "Sometimes I Just Lay in Bed and Think About Life" in the category for homosexual females, while "Thinking of Something and Laughing Alone" is linked to heterosexual females?
"These little patterns are really not perceptible to humans," Kosinski said. Sometimes, it takes a computer.
Kosinski and his colleagues conducted their experiment over the course of several years, through their MyPersonality website and Facebook app. More than 8 million people took the MyPersonality survey, which asked participants about their personal details and also had them answer questions about personality traits. About half of the test-takers gave their OK for the researchers to match up their survey results with Facebook likes, on an anonymous basis. More than 58,000 of the volunteered profiles from U.S. respondents were selected for matching.
The results were analyzed to produce correlations in more than a dozen categories, including five widely accepted personality attributes (openness, conscientiousness, extraversion, agreeableness and emotional stability). Those are the attributes analyzed on the "You Are What You Like" website. The other categories included IQ, religion, politics, sexual orientation, age, gender, race, relationship status, alcohol and drug use, tobacco use, life satisfaction, number of friends — and even whether a Facebook user's parents had separated by the time the user was 21.
This PDF file shows you which Facebook pages are the best fit for each of the categories.
YouAreWhatYouLike.com
Researchers set up a website that assesses your personality based on Facebook "likes."
The researchers' computer model did the best at predicting black-vs.-white and male-vs.-female (95 and 93 percent accuracy, respectively). It could distinguish correctly between Republicans and Democrats 85 percent of the time, and between Christians and Muslims 82 percent of the time.
The accuracy rates for predicting sexual orientation were 88 percent for males and 75 percent for females. But don't think reaching that result was as easy as seeing who clicked the "like" button for "Gay Marriage." Less than 5 percent of the gay users were fans of such obvious pages, Kosinski and his colleagues said. The predictions were based instead on inferences from likes for less obvious pages. For example, the computer model associated the fan pages for Kathy Griffin and "Wicked, The Musical" with homosexual males, while heterosexual males were associated with the pages for Bruce Lee and WWE wrestling.
OK, maybe the pages weren't all that much less obvious.
The model wasn't as accurate (60 percent) when it came to predicting whether a user's parents stayed together or separated before the user turned 21. But even that level of predictive power could be "worthwhile for advertisers," the researchers said. "For instance, digital systems and devices (such as online stores or cars) could be designed to adjust their behavior to best fit each user's preferred profile," they wrote.
"I know the paper might sound like we're criticizing Facebook, but not at all," Kosinski told NBC News. "I'm a fan of Facebook."
Kosinski pointed out that an analysis of your credit card purchases, online music preferences, video rentals and Web browsing habits could come up with personal profiles at least as detailed as the ones that he and his colleagues produced. It just so happens that the Facebook likes were accessible enough to yield a vivid illustration of how such analyses work.
"It's possible this will lead some people to say, 'Maybe I shouldn't be using Facebook, or I shouldn't be using Google.' And that could be bad," he said. That kind of technophobia could hamper technological and economic progress, he said. Instead, the research should lead people to think twice about what they share online.
"We hope this information will help users start a discussion with organizations like Facebook, Google, Microsoft, or even policymakers about the rules of the game online," Kosinski said.
Update for 3:55 p.m. ET March 11: Kosinski's two co-authors, David Stillwell of Cambridge and Thore Graepel of Microsoft Research, passed along their comments in a news release from Cambridge.
"Consumers rightly expect strong privacy protection to be built into the products and services they use, and this research may well serve as a reminder for consumers to take a careful approach to sharing information online, utilizing privacy controls and never sharing content with unfamiliar parties," Graepel said.
"I have used Facebook since 2005, and I will continue to do so," Stillwell said. "But I might be more careful to use the privacy settings that Facebook provides."

sábado, marzo 09, 2013

Invasion Of Privacy: Just Because Government Can, Doesn't Mean They Should

Extreme peeping Tom
Technology is moving into the culture at such a fast pace that Joe and Jane Citizen can’t even wrap their minds around it. And, no, I am not suggesting paranoia is the best response to it. But when government uses Joe’s and Jane’s money to use technology to take away their privacy and their freedoms, I think it’s time to take a hard look at what this “Brave New World” is foisting upon us. Science fiction has become reality. This is why we are looking at drone strikes on American citizens and why Rand Paul’s filibuster was such a dramatic and seminal moment.
My readers know I have been on the rabbit trail, chasing down the power grab of Councils of Governments and trying to warn our elected officials. To that end, I am going to share a few details with you from the grant application and grant that our Centralina Council of Governments took from the Federal government. The grant is based on United Nations global governance. But to hide that fact, our Federal government has obfuscated the jargon in an attempt to snooker the American public. And a good job they’ve done so far.
How do you like the idea that an unelected bureaucracy has given itself the power to assess and collect data on your personal belongings and your lifestyle? (Worse that your elected officials are letting them do it.) We know the Federal government is implementing data collection through the healthcare bill and through the public school system. So why no do it through unelected planning agencies as well? They are!
This may be too much “getting into the weeds” for some, but here is an example of what I mean:
Under the heading of “Energy Conservation” the HUD grant application sets out the budget to be spent on data collection on your home, your assets, and your activities. This bureaucratic cabal of self-important controllers. is using your tax dollars to pay people with infra-red thermal imaging equipment to come to your house and assess the greenhouse gases your house may be emitting. Is your house leaking heat or cooling emissions? Remember this CCOG has captured 14 counties and all of the towns and cities within that area….four of the counties are not even in this state.
This project provides comparable analyses of energy-savings potentials for a cross-section of neighborhood houses in the CCOG/Catawba COG represented county region. Deliverables for this project include: (1) a compilation of neighborhood housing sampling per county for the Neighborhood Energy Profile Database; (2) assessments will be made as to which neighborhoods collectively have the best potential for realizing cost-effective energy savings; (3) targeting those identified neighborhoods with messages on how households can realize these savings through proven, affordable, achievable and accessible measures.
Related Posts Plugin for WordPress, Blogger...

Retratos de fusilados por el Castrismo - Juan Abreu

"Hablame"

"EN TIEMPOS DIFÍCILES" - Heberto Padilla

A aquel hombre le pidieron su tiempo

para que lo juntara al tiempo de la Historia.

Le pidieron las manos,

porque para una época difícil

nada hay mejor que un par de buenas manos.

Le pidieron los ojos

que alguna vez tuvieron lágrimas

para que contemplara el lado claro

(especialmente el lado claro de la vida)

porque para el horror basta un ojo de asombro.

Le pidieron sus labios

resecos y cuarteados para afirmar,

para erigir, con cada afirmación, un sueño

(el-alto-sueño);

le pidieron las piernas

duras y nudosas

(sus viejas piernas andariegas),

porque en tiempos difíciles

¿algo hay mejor que un par de piernas

para la construcción o la trinchera?

Le pidieron el bosque que lo nutrió de niño,

con su árbol obediente.

Le pidieron el pecho, el corazón, los hombros.

Le dijeron

que eso era estrictamente necesario.

Le explicaron después

que toda esta donación resultaria inútil.

sin entregar la lengua,

porque en tiempos difíciles

nada es tan útil para atajar el odio o la mentira.

Y finalmente le rogaron

que, por favor, echase a andar,

porque en tiempos difíciles

esta es, sin duda, la prueba decisiva.

Etiquetas

"Reflexiones" de Fidel (17) 1984 (1) 2010 (8) 2011 (8) 2012 (11) 2013 (23) 2014 (5) 2015 (4) 3-D (22) 4-D (1) 911 (44) aberraciones (1) aborigenes (3) Aborto (12) Abu Bakr al-Baghdadi (1) Abuso (6) Abuso infantil (6) Abuso Sexual (7) academia (47) academia cubana (182) Accidentes (159) activismo politico (9) activismo social (2) activista digital (3) actor Cuba (7) actrices (12) actrices cubanas (10) Actualidad (3) Acueductos y alcantarillados (13) Acuerdos militares (1) Adan Chavez (3) Adeiny Hechavarria (1) adn (6) Aduana (7) aeropuertos (3) Afectaciones (3) Afganistan (130) Afganistan-EEUU (13) Africa (27) Agencia de Seguridad Nacional (14) Agencias de noticias (2) agenda 21 (2) Agenda de Raul (31) Agentes (27) Agentes cubanos en el exterior (97) agentes de influencia (36) agentes en el exterior (11) Agitadores (1) Agricultura (135) agua (2) Agua potable (24) Ahmadinejad (9) Ahmadineyad (4) Ai Weiwei (4) Ai Weiwie (2) ajedrez (13) Al Gore (1) al jazeera (16) Al Qaeda (148) Al Yazira (1) alan gross (152) Alarcon (13) Alaska (4) ALBA (72) albania (4) Albert Camus (1) ALCA (1) Alcholismo (6) Alcibiades Hidalgo (3) alcoholismo (21) Alejandro Armengol (4) Alejandro Castro Espin (19) Alemania (68) alex jones (78) alexei ramirez (1) alexis cuba (1) alexis vila (9) alfa 66 (1) alfredo guevara (5) Alfredo Pong (70) algeria (5) Aliados (4) Alimentacion (93) Alimentos (246) alina fernandez (10) Alinsky (2) Allende (9) Alvarez Guedes (2) alvaro vargas llosa (1) alz (1) Alzados (2) alzheimer (6) amaury gutierrez (1) amazonas (3) ameh (1) Amenazas (1) America (13) America Latina (19) american dream (1) Amistad (1) Amnistia (1) Amnistia Internacional (11) amor (4) Ana Belen Montes (13) Ana Frank (1) Analisis economico (123) Analisis politico (235) analisis social (23) anarquismo (7) ancianos (41) andre malraux (1) andrei sajarov (3) Andrew Breitbart (4) Andy Garcia (3) Angel Castro (4) Angel Santiesteban (19) Angela Merkel (9) Angelina Jolie (8) Angola (14) Animales (217) anita ekberg (1) anna chapman (8) Anonymous (7) ANPP (7) Antartica (7) Antenas (2) anticapitalismo (2) Anticastrismo (63) antichavistas (1) antigravity (1) Antiguedades (7) Antimotines (1) antisemitismo (2) Antonio Castro (6) Antonio Rodiles (36) antrax (2) Antropologia (27) Antunez (93) Apertura (1) apple (4) Arabe (6) Arabia Saudita (38) Archivo Cuba (2) argelia (8) Argentina (33) Arianna Huffington (1) Ariel Sigler Amaya (5) Armamentismo (16) Armando Lago (1) Armas (251) armas biologicas (1) armas de destruccion masivas (5) armas laser (6) armas nucleares (191) armas quimicas (8) Armenia (2) Aroldis Chapman (14) arqueologia (11) Arquitectura (13) Arquitectura cubana (31) arroz (3) arte (76) arte cubano (45) Arte. Cuba (13) Artico (13) artistas cubanos (29) Artistas y Escritores cubanos (32) Arturo Lopez-Levi (8) Asamblea Nacional (48) Asesinatos (63) Asignacion (1) asilo (3) asistencia social (1) Asteroides (8) astrobiologia (12) Astrofisica (30) Astronautica (135) Astronomia (108) Ataque cibernetico (29) atares (1) ateistas (1) Atentado (4) Aung San Suu Kyi (11) Australia (28) austria (2) Autismo (9) Automatizacion (1) Autos (129) Aviacion (245) Aviones cubanos (8) Awareness (1) Ayuda a las victimas (37) ayuda externa (3) Azerbaijan (4) Azucar (19) bacardi. Cuba (3) bahamas (12) bahrein (20) ballet (1) Ballet Cubano (25) Balseros (163) bancarrota (6) Banco Mundial (11) Bancos (110) bandas juveniles (9) bangladesh (4) Barack Obama (1386) Barbarroja (4) barcos (68) barhein (3) barquin (1) Barthelemy (2) Bashar al Assad (8) Bashar Assad (2) Batista (5) BBC (5) belarus (5) belgica (10) belice (1) bellator (41) bellator. hector lompard (1) Benemelis (8) Benjamin Netanyahu (6) Benoit Mandelbrot (2) berlusconi (3) Berta Soler (48) bielorusia (5) bienestar (1) Bieolorusia (4) bilderberg (8) Bill Clinton (15) Bill Gates (5) Bill O'Reilly (97) bimillonarios (6) Biocombustibles (3) Bioetica (1) biologia (2) bionica (3) Biotecnologia (16) Bioterrorismo (7) birmania (10) Bitcoin (14) black (6) Black Power (23) blogguer (15) Blogoestroika (8) Blogs (59) Blogs cubanos (318) Blogs ranking (4) Blogs-premios (5) bloguer (5) Bloqueo (8) Bloqueo interno (2) bob dylan (3) bob marley (2) Bob Menendez (9) bobby fisher (3) Bodega cubana (1) body language (1) boing boing (2) Bolivia (41) bolsa (30) bonzo (1) bosnia (3) Boxeadores cubanos (219) Boxeo (190) Boxeo cubano (170) Bradley Manning (10) Brasil (76) Brian Latell (6) brigada 2506 (11) Bruno Rodriquez (2) Budismo (2) bulgaria (7) Burma (1) Buro Politico (1) burocracia (3) CaCastrismo (1) Cachao Lopez (1) Cadecas (5) Calle 13 (1) Cambio climatico (66) Cambio de sexo (12) Cambios (60) cambodia (4) Camerun (1) Camilo Cienfuegos (6) Campesinos (36) Canada (561) Canada-China (5) Canal de Nicaragua (1) Canal de Panama (3) canal de suez (2) Canarias (9) cancer (58) candada (1) Candidatos a la Presidencia (6) canibalismo (1) cannes (1) cantantes (9) cantantes cubanos (12) Caos (15) capital (1) Capitalismo (15) Carceles (77) Carceles cubanas (196) Cardenal Bertone (2) Carl Sagan (2) Carlos Alberto Montaner (60) Carlos Marx (10) Carlos Otero (4) Carlos Saladrigas (15) carlos salim (1) carlos varela (4) Carmelo Mesa-Lago (10) Carnavales (1) Carne (1) carter (22) Casa Blanca (40) Casa de Fidel (16) casinos (3) caso uci (6) Castillo del Morro (1) Castrismo (473) casualidades (5) Catastrofismo (14) Cato Institute (2) Causa 1 (6) Causas de su enfermedad (4) Cayo Coco (1) CEA (6) Ceasescu (6) Celac (53) Celebridades (227) celia cruz (1) Celia Hart (2) celulares (14) Celulas madres (9) Censura (42) Censura en internet (160) central nuclear (9) Centro de estudios de la inteligencia cubana (3) cerebro (54) certificado de nacimiento (13) chantaje (9) Chavez (523) chavismo (37) Che Guevara (74) Chechenia (10) Chelsea Clinton (1) Chernobil (20) Chicago's boys (1) Chile (76) China (492) China ejercito (5) China-Rusia (2) China-Tibet (19) Chinos (2) Chipre (5) Chismes (2) Chivatos (8) chocolate (1) Choteo (7) Chris Simmons (79) Christmas (1) Chuck Hagel (15) CIA (159) ciber espionaje (35) Ciberactivismo (14) Ciberataques (46) cibersecurity (49) Ciencia (50) ciencia-ficcion (1) Ciencias (345) Ciencias y Politica (20) cine (168) Cine Cubano (152) circulacion monetaria (5) Cirque du Soleil (1) ciudadanos (4) ciudades (15) Clase Media (2) Clases sociales (4) Claudia Cadelo (7) Clima (25) cnn (20) coalicion (5) Cobalto (1) coca (2) cocacola (3) Cocaina (7) cocina (2) colaboracionistas (42) Colaboradores y agentes en el exterior (349) Colaborares y agentes en el exterior (31) Colin Powel (4) Colombia (83) Combustibles (5) comercio (4) Comercio Cuba-Estados Unidos (7) Comercio Exterior (27) comercio internacional (27) comercio sexual (7) Comida cubana (3) competitividad (6) complejidad (2) Computacion (33) computadoras (21) comunicacion (6) Comunismo (91) comunistas (54) conceptos (1) condicion humana (4) Condoleezza Rice (1) conducta humana (40) Conflicto (1) Conflicto Colombia-Venezuela (5) conflicto colombia-venezuela-ecuador (21) conflicto cuba-estados unidos (19) Congo (2) consecuencias (1) Consejo de Estado (3) Conservadores (12) Conspiracion (475) conspiranoia (36) constitucion (27) Construccion (55) consules cubano (1) Consumo (3) Contaminacion ambiental (70) Contrabando (6) Contrainteligencia (105) contrarrevolucion (1) contraterrorismo (4) Control de Armas (64) Control Social (37) cookies (1) cooperacion economica (2) cooperativas (11) Coraje (2) Corea (6) Corea del Norte (226) Corea del Norte - Corea del Sur (2) Corea del Norte-Cuba (42) Corea del Norte-EEUU (35) Corea del Sur (38) Corporacion Cubana (1) corporaciones (8) Correa (21) Corrupcion (369) costa de marfil (5) costa de oro (1) Costa Rica (11) Costo de Vida (2) creatividad (5) Creditos (30) crimen organizado (1) Crimenes (107) Criminales (38) Criminales en Cuba (35) Crisis (19) Crisis de Octubre (36) Crisis economica (156) Crisis financiera (279) Crisis mundial (38) crisis politica (8) Cristina Fernández de Kirchner (2) critica social (2) Criticas (1) croacia (2) Crowdfundig (1) Cruceros (5) Cub (2) Cuba (8633) Cuba - Remesas de dinero (37) Cuba Ante Todo (1) Cuba crisis (65) cuba economia (18) Cuba ideologia (5) Cuba Independiente (1) Cuba politica (9) Cuba turismo (143) Cuba-Agricultura (69) Cuba-Argentina (10) cuba-biotecnologia (7) cuba-brasil (91) Cuba-Canada (184) cuba-china (53) Cuba-Colombia (24) Cuba-Corea del Sur (2) Cuba-demografia (15) Cuba-Deportes (22) cuba-ecologia (31) Cuba-Economia (9) Cuba-Educacion (20) Cuba-empleo y desempleo (61) cuba-es (1) Cuba-España (208) Cuba-Estados Unidos (1927) Cuba-Estados Unidos-Canada (16) Cuba-Estados Unidos-Rusia (20) Cuba-Estados Unidos-Union Europea (6) cuba-estados unidos-union sovietica (11) Cuba-eta (8) Cuba-Etiopia (3) Cuba-Exportaciones (26) Cuba-Farc (14) Cuba-Google (9) cuba-holanda (7) Cuba-Ideologia (4) Cuba-India (6) cuba-inglaterra (8) Cuba-internet (115) Cuba-Iran (18) Cuba-Iso (1) Cuba-Medicina (78) Cuba-Medio Oriente (5) Cuba-Mexico (55) Cuba-narcotrafico (22) Cuba-Obama (126) cuba-onu (66) Cuba-Opinion publica (1) Cuba-Prensa-Ideologia (16) Cuba-Qatar (2) Cuba-reformas (42) Cuba-Reino Unido (5) Cuba-Rusia (84) Cuba-Rusia-Estados Unidos (10) Cuba-Rusia-Venezuela (4) Cuba-Sida (15) Cuba-sospechas y miedos (4) Cuba-Sudafrica (2) Cuba-terrorismo (37) Cuba-turismo (2) Cuba-Tv (5) Cuba-Union Europea (83) Cuba-Union Sovietica (8) Cuba-Union Sovietica-EEUU (6) Cuba-Uruguay (11) Cuba-Vaticano (109) Cuba-Venezuela (296) Cuba-venezuela-rusia (5) Cuba-violencia (16) Cuba-Yahoo (1) Cuba: Identidad nacional (4) cubadebate (4) Cubaencuentro (1) Cubalse (1) Cuban study group (4) cubana de aviacion (20) cubanalisis (86) Cubanicidios (1) cubano-americanos (37) Cubanologia (11) Cubanologos (47) Cubanos (19) cubanos en el mundo (81) Cubanos en MMA (4) Cubaq (1) CubaResponde (2) Cubq (1) CUC (24) cuentapropistas (181) Cuentas Nacionales (2) Culto a la personalidad (5) Cultura (38) Curiosidades (506) Cuva (1) Daguestan (1) dalai lama (15) dalia soto (4) damas de blanco (269) daniel ortega (9) Danza (8) Darsi Ferrer (5) Davos (2) Dayron Robles (11) debate de raul (2) Debate Politico (5) Deborah Castro Espin (1) Declaracion de Estados Unidos (3) Delfin (2) Delincuencia juvenil (5) demanda (3) Demandas populares (1) Democracia (168) Demografia (18) denuncia (1) Departamento de Estado (22) Deportacion (51) Deporte (185) deporte cubano (112) deporte profesional (19) deportistas cubanos (39) Derechos Humanos (455) Derribo de Avionetas (6) desalojos (8) desaparecidos (8) Desarrollo cientifico-tecnico (47) Desarrollo-Subdesarrollo (24) desastre ecologico (32) desastre nuclear (123) Desastres (33) Desastres naturales (130) Desde aqui (1) desempleo (27) deserciones (14) Deserciones de deportistas (152) desnudos (6) Desperanza (1) destierro (4) Destruccion (5) deuda (55) Deuda Exterior de Cuba (36) Deuda externa (13) DGI (224) Dialogo con Raul (1) Dialogo Nacional (1) Dialogo Politico (8) Dialogueros (9) diamantes (1) diana krall (1) Diana Nyad (3) Diaz-Balart (4) Dick Cheney (1) Dictadores (97) dictadura (16) Dictaduras (56) dilma rouseff (24) dinamarca (2) dinastias (1) dinero (24) Diosdado Cabello (25) diplomacia (24) diplomaticos cubanos (38) discapacitados (35) Discrepancias (1) Discriminacion (3) Disidencia (166) Disidentes (1045) Distribucion (1) Divisas (10) Djibouti (1) Djokovic (2) doble moral (2) doctrina militar (2) Documental (102) Documental cubano (80) Dolar (11) Donaciones (24) donald trump (12) doping (5) Dr. Antonio de la Cova (1) Dr. Antonio Morales-Pita (2) Dr. Biscet (14) Dr. Darsi Ferrer (19) Dr. Francia (2) Dra. Molina (6) drogas (102) dronenet (1) drones (63) Dualidad monetaria (6) dubai (1) dulce maria loynaz (4) Duque Hernandez (7) Dyron Robles (2) e (1) E-commerce (1) Ebay (5) Ebola (3) ebooks (2) Ecologia (59) Economia (163) Economia Canadiense (13) Economia China (45) Economia Cubana (350) Economia mundial (75) Economist (1) Economistas cubanos (13) Ecuado-Estados Unidos (2) Ecuador (76) Ecuador-Estados Unidos (2) Educacion (36) Edward Snowden (63) EEUU (2) EEUU Congreso (169) EEUU desintegracion (2) EEUU Economia (73) EEUU Gobierno (61) EEUU senado (126) EEUU-China (51) EEUU-Japon (3) EEUU-Mexico (19) efecto domino (2) efectos (1) Egipto (174) Einstein (8) ejecutivos (2) Ejercito (84) ejercito britanico (1) ejercito canadiense (6) ejercito cubano (52) Ejercito norteamericano (217) Ejercito norteamericano Iraq (9) Ejercito norteamericanoIslamismo (2) Ejercito Rebelde (8) ejercito ruso (20) ejercito venezolano (14) El caso Marquitos (1) El Chacal (3) El Coran (5) El Critico (2) El Grupo de Raul (25) El Guaton (22) El Pais (3) El Papa (113) El Salvador (9) El Sexto (11) Elecciones (140) Elecciones en Cuba (76) elecciones en estdos unidos (3) Elecciones en EU (216) electronica (1) Elena Burke (1) Elian (13) Eliecer Avila (29) Elite (5) email (10) embajadas cubanas (6) Embargo (591) Emigracioin (20) Emigracion (78) Emigracion cubana (1345) emigracion ilegal (53) Emigrantes ilegales (49) emilio ichikawa (135) EMP ha (1) Empleo (18) Emprendedores (13) empresarios (6) empresas (26) Empresas extranjeras en Cuba (40) Encuesta de opinion (32) Energia (36) energia electrica (29) Energia nuclear (89) energia termonuclear (1) Energias renovables (31) enfermedades (88) enfermos (8) Enjuiciamiento (1) Enrique Dans (1) Enrisco (14) Entrenamiento militar (1) entretenimiento (7) envejecimiento (3) envios a Cuba (10) epidemias (59) equality (1) Eric Holder (12) erick sanchez (3) erislandi lara (2) erislandy lara (16) Ernesto Diaz de Villegas (1) Ernesto Hernandez Busto (2) erotismo (18) escambray (3) escandalo (36) esclavitud (2) escocia (1) Escritores cubanos (98) escuadron patriota (8) escuelas (6) Eslovaquia (1) Espacio Laical (1) Espana (10) España (148) Especulacion (3) Espias (47) espias cubanos (98) Espias cubanos presos (158) Espinaxiones (23) Espionaje (94) espionaje industrial (11) estacion internacional (1) estadisticas (26) Estado (7) Estado de Sats (26) Estado de sitio (1) estados (1) Estados Unidos (1343) estados unidos crisis (112) Estados Unidos economia (86) estados unidos gobierno (40) Estados Unidos-Canada (35) Estados Unidos-China (4) Estados Unidos-Rusia (63) estanflacion (1) Esteban Lazo (1) Esteban Morales Dominguez (4) esteroides (1) estonia (1) estrategia (3) estrategia militar (3) estudiantes extranjeros (8) Estudios Cubanos (2) estulin (1) Estupideces (295) Eta (8) Etanol (4) Etica Politica (3) Etica y moral (10) Etnologia (2) EU (2) eu senado (3) Eugenio Yáñez (66) euro (4) Europa (67) Europa del Este (1) Eusebio Leal (12) eutanasia (5) Eva Braun (2) evacuacion (1) evasion fiscal (1) Evo Morales (38) evolucion (19) ex paises socialistas (1) excarcelados (1) Exili (1) Exilio (8) Exilio cubano (105) Exodo cubano (5) explosion nuclear (4) Explotacion del trabajo infantil (2) Exportaciones (11) expropiaciones (6) extranjeros (6) extrema derecha (6) extremistas (59) F1 (4) facebook (67) fallas de internet (9) Familia (43) familia cubana (9) Famosos (2) Far (26) Farc (81) fascismo (4) FBI (122) federico garcia lorca (1) Felicidad (4) Felix Bonne Csarcasses (1) Feria del Libro (1) ferry (1) Fertilizantes (1) Fidel (873) Fidel Castro (8) Fidel familia (61) Fidel reflexiones (4) Fidel-Estados Unidos (2) Fidelistas (1) Fidelito (9) fiji (1) filipinas (11) Filosofia (21) Finanzas (81) Finlandia (3) first nation (4) fisica (29) Fisin (1) FIU (9) flamur (5) Flash usb (1) flora (1) Florida (54) FMI (9) Fnca (9) Fondos de inversion (21) forbes (9) Foreign Policy blog (3) Formula 1 (1) Foros cubanos (1) Fortuna de Fidel y Raul (5) Fotografia (119) fran (1) Francia (60) Francis I (24) franco (2) François Hollande (1) Frank Delgado (1) Frases celebres (3) Fraude (123) fraude electoral (41) fraude fiscal (2) freddi roche (1) Frente de Resistencia Civica OZT (6) Friedrich Hayek (5) frontera (9) Fuerza de trabajo (24) fukushima (9) Fusilamientos (13) futbol (3) Futbol cubano (8) Futuro (27) G.W. Bush (8) G2 (7) G20 (3) G7 (2) g8 (4) Gabo (5) Gabriel Garcia Marquez (7) gaddafi (136) Gaesa (5) Galicia (3) Gallegos (1) Gamboa (24) Ganaderia (9) Ganado (5) Gangs (2) garry kasparov (5) Gas (10) Gasolina (8) gatos (1) Gays (56) gaza (1) gazapos (1) Geert Wilders (2) Gen. Petraeus (12) Gen. Rafael del Pino (17) gene (1) gene sharp (3) Generacion Y (26) Generales (39) Generales cubanos (43) Genetica (33) genios (5) genocidio (2) Geoges Soros (17) Geometria Fractal (4) geopolitica (48) Geopolitica cubana (20) Geopolitica latinoamericana (37) george orwel (2) George Zimmerman (9) Georgia (8) Gerencia empresarial (5) Ghana (4) Giron (1) gitanos (2) glacier (1) glasnost (1) glasnot (2) Glenn Beck (4) globalistas (3) Globalizacion (14) Gloria Stefan (1) gmail (1) gobernabilidad (6) gobernantes (1) Gobierno cubano (15) Gobierno Mundial (10) Gobierno paralelo (2) gobiernos (21) golf (3) golfo de mexico (2) Golpe de estado (10) google (61) Google glass (2) Gorbachov (24) Gorki (27) grammy (1) Granada (6) grandes ligas (71) Granma (66) grecia (30) greenpace (1) greenpeace (1) Grenada (1) Groenlandia (6) Ground Zero (6) guama (20) Guanabo (3) Guantanamo (18) Guatemala (5) guerra (92) guerra asimetrica (5) guerra cibernetica (53) guerra civil (70) guerra comercial (2) Guerra de Angola (20) Guerra de E-mails (1) guerra espacial (2) Guerra Fria (37) Guerra hispano-americana (6) Guerra Irregular (2) guerra sicologica (3) Guerras (98) Guerras africanas (13) Guerrillas (31) Guillermo Cabrera Infante (10) Guillermo Farinas (86) guinness (6) gulag (2) Guyana (1) haarp (4) Habana (1) Hackers (60) Hackers cubanos (4) Hairon Socarras (1) Haiti (24) Hamas (29) Hambre (14) hambruna (3) Hamid Karzai (14) Haroldo (3) Hassan Rouhani (4) hawai (4) Hazanas (88) Heberto Padilla (8) Hector Lombard (11) hemingway (5) Henrique Capriles (20) henry kissinger (4) Herencia (2) Hermanos al Rescate (18) heroismo (6) Herta Müller (2) herzegovina (1) hesbollah (1) Hezbollah (16) Hialeah (4) Hidrologia (1) Hijos (4) hijos de puta (2) Hilda Molina (7) Hillary Clinton (83) hipotecas (7) hippies (2) hispanos (4) Historia (57) Historia de Cuba (48) Hitler (21) hizbollah (2) hobby (1) Holanda (6) hollywood (85) holografia (1) hombre (39) homeless (8) Homofobia (50) Homosexuales (25) Homosexualismo (23) Honduras (42) Hong Kong (3) hopkins (2) hot line (1) huber matos (19) Hubert Matos (20) Huckabee (1) huelga de hambre (160) huelgas (3) humanismo (2) humanos (25) Humberto Fontova (15) Humidores (1) Humor (583) hungria (3) Huracanes (80) I GM (3) I-D (4) Iberoamerica (3) icaic (3) Ichikawa (2) Ideologia (12) Idiomas (4) Idiotas (18) Ig Nobel Prize (4) Iglesia (48) Iglesia cubana (230) II GM (18) III GM (1) iInestabilidad social (1) Ileana de la Guardia (1) Ileana Ros-Lehtinen (24) Ilegales (1) imperios (2) Importaciones (22) Impuestos (99) India (35) Indice de Desarrollo Humano (5) indigenas (7) Indigencia (2) indolencia (4) indonesia (5) industria (4) Industria azucarera (45) industria cubana (1) industriales (2) Ineficiencia economica (1) inequality (6) Inestabilidad social (17) Infamia (6) inflacion (8) Informacion (14) informatica (22) Infraestructura (1) ingenieria social (2) Inglaterra (25) Ingrid Betacourt (7) Inmobiliarias (20) inmolacion (1) Inmovilismo raulista (3) innovaciones (20) Intelectuales (24) intelectuales y artistas cubanos (31) Inteligencia (52) inteligencia artificial (9) Inteligencia cubana (71) Internet (242) intervencion militar (44) Intolerancia (4) invasion (5) Inversion extranjera (412) Inversiones (48) inversiones norteamericanas en cuba (14) investigaciones secretas (2) Ion Mihai Pacepa (1) ipad (5) iphone (2) Iran (201) iran-estados unidos (65) Iraq (58) irlanda (12) isaac asimov (2) ISIS (21) Islam (99) Islamismo (168) islandia (6) islas caiman (6) Islas del Pacifico (2) Israel (148) Israel-EEUU (23) israel-iran (8) israel-palestina (12) Italia (41) Ivan de la Nuez (4) Ivan Pedroso (1) Izquierdas (26) J.E. Hoover (2) J.K. Rowling (1) jaime bayly (6) Jaime Ortega (53) Jaime Suchlicki (1) jamaica (3) Japon (178) japon terremotos (8) Jared Lee Loughner (1) jeb bush (6) jesse ventura (16) JFK (43) Jicotea cubana (1) jihad (18) jineterismo (51) Joaquin Sabinas (1) joe biden (18) Joel Casamayor (9) John A. Boehner (48) John Boehner (2) John Brennan (2) John Kerry (37) john lennon (6) Jon Jones (2) Jon Stewart (4) jordania (5) Jorge Arreaza (1) jorge pomar (4) Jose Ariel Contreras (4) Jose Daniel Ferrer (7) Jose Dariel Abreu (12) Jose Fernandez (1) jose lezama lima (2) jose marti (2) Jose Mujica (6) Jose Ramon Machado Ventura (11) Juan Abreu (38) Juan F. Benemelis (9) Juan Juan (31) Juan Manuel Marquez (2) Juan Triana (7) jubilados (1) judios (21) Juegos (15) Juegos Olimpicos (23) Julian Assange (31) Julio Casas Regueiro (2) justicia (4) Justin Bieber (5) Justin Trudeau (6) Justin Truedeau (1) Juventud (31) Juventud Cubana (104) Juventud Rebelde (5) kamikazes (1) Kaos (8) kAOS en la red (28) karadzic (1) karzai (2) kazajastan (3) Kcho (2) kendry morales (5) Kennedy (53) Kenya (5) Keynesianismo (3) KGB (11) Khamenei (4) Kid Chocolate (2) Kim Jong Il (20) kim jong-un (51) kirchner (2) kirguizia (2) Kirguizistan (2) Kitchner (5) klitchko (1) Klitschko (1) klitshko (10) Kosovo (3) kuwait (3) La Habana (23) lady gaga (7) Laetitia Casta (1) Lage (21) Lance Armstrong (13) laser (1) Latinoamerica (115) latinos (2) Laura Labrada Pollan (1) laura pollan (34) lavado de dinero (26) Laz (2) Lazaro Barredo (2) Lazaro Gonzalez (1) leche (4) Lee Harvey Oswald (5) lefties (24) Leftist (4) leftists (112) leinier (2) Lenguaje (10) lenin (7) leo brouwer (1) Leonard Cohen (2) leonardo da vinci (2) Leonardo Padura (13) Leopoldo Lopez (10) lesbian (6) Ley de Ajuste Cubana (20) Leyes (82) Leyes cubanas (68) Lezama Lima (2) lgbt (17) libano (6) Liberacion (1) Liberales (9) Liberalismo (11) Libertad (30) Libertad de expresion (50) libertad de informacion (18) libertad de prensa (8) Libia (356) Libre Expresion (1) Libreta de Abastecimientos (11) Libros (23) lideres (1) Lina Ruz (1) Literatura (35) Literatura Cubana (61) Lituania (3) Liu Xiaobo (9) livan hernandez (11) Lluvia (1) Logica Difusa (2) logistica (2) Long tail (1) Los Aldeanos (28) Los Duros (2) Los Miquis (4) loteria (25) Lucha no violenta activa (36) Ludwing von Mises (3) luis alberto garcia (1) Luis Alberto Lopez Rodriquez-Callejas (3) Luis Alberto Rodriquez (6) Lula (44) lulzsec (1) Luna (13) Machado Ventura (19) Machu Picchu (1) Macroeconomia (10) madres (9) Mafia (24) Mafia cubana (4) Magnus Carlsen (1) Mahmoud Abbas (3) mahoma (1) malasia (5) Malcolm Gladwell (1) malcom x (1) Maleconazo (11) mali (1) Malta (2) Malvinas (2) Mambises (3) Mandela (4) Manipulacion (556) manny pacquiao (18) Manuel Cuesta Morua (1) Manuel Diaz Martinez (2) Manuel Vazquez Portal (4) Mao Tse Tung (8) Mapas (5) Maquiavelo (1) mar (42) Maradona (5) marcas (4) marco rubio (102) marcos rubio (3) maremotos (10) margaret thatcher (6) Marginalidad (19) Maria Corina Machado (8) María Corina Machado (3) maria elvira (3) Maria Gabriela Chavez (1) Mariel (18) Mariela Castro (91) Marifelli Perez-Stable (9) marihuana (22) marijuana (2) marilyn monroe (8) Marino Murillo (6) Mario Chanes de Armas (2) Mario Vargas Llosa (6) Mark Zuckerberg (8) Marketing (10) Marquitos (1) marta fonseca (1) marte (13) Martha Beatriz Roque (49) Martha Colmenares (16) Marti (5) martin luther king (4) Marulanda (7) Marx (1) Marxismo (18) Masacre del remolcador 13 de marzo (5) masas (1) mashable (1) masoneria (3) mass killers (26) matematicas (7) material nuclear (15) Materias primas (6) Mauritania (1) max lesnik (3) Max Marambio (31) mayweather (11) Mazorra (1) McCain (17) media (68) Mediacion (2) Medicare (18) Medicina (139) medicinas (31) Medicos cubanos (107) Medio ambiente (24) Medio Oriente (80) medio oriente crisis (4) Medios de comunicion (125) Medvedev (19) Mercado (18) Mercado informal (7) Mercado Inmobiliario (36) Mercado InmobiliarioR (1) mercado mayorista (8) mercado minorista (3) Mercados Agropecuarios (26) mercados emergentes (2) Mercosur (1) meryl streep (1) Mesa Redonda (5) meteoritos (23) Mexico (52) mi5 (1) Miami (362) michael jackson (5) Michael Moore (9) Michel Foucault (3) Michelle Bachelet (3) michelle obama (19) Microcreditos (12) microeconomia (1) Microsiervos (4) Microsoft (9) miedos (4) Migracion (6) Miguel Barnet (1) Miguel Diaz-Canel (31) Mike Perez (2) mike porcel (1) Mike Tyson (9) Militares (37) militares cubanos (49) militares venezolanos (12) Militarismo (17) Millennials (1) milton friedman (1) minas (5) minerales (25) Minint (28) minorias (2) Miriam Celaya (1) miseria (90) Misterios (25) Mitt Romney (36) MLC (3) MMA (138) moda (11) Modelo chino (9) modelos economicos (3) Mohammed Morsi (13) momias (1) Monarquias (8) moneda (12) moneda virtual (4) mongolia (2) Montaner (7) montreal (1) Movilizacion contra Castro (1) Movimiento 26 de Julio (1) Movimiento Cristiano Liberacion (4) Mozambique (1) Mubarak (9) muerte (48) muerte asistida (1) Muertes del Castrismo (180) Muertos de la Revolucion (12) Mugabe (8) Muhammad Ali (5) Mujeres (149) Mujeres cubanas (105) mulsumanes (7) multiculturalismo (10) Mundo (1102) Muro de Berlin (17) Musica (173) Musica Cubana (258) Musica-tecnologia (2) musicos (13) Musicos cubanos (261) Musicos ubanos (1) muslim brotherhood (3) muslims brotherhood (57) mussolini (1) Musulmanes (244) myanmar (6) nacion (1) Nacionalismo (1) Nadal (3) namibia (5) nanomedicina (2) nanotecnologias (15) Napoleon (2) narcoguerrilla (23) Narcotrafico (53) Nasa (64) National Security Agency (20) naturaleza (22) navy seal (3) nazismo (18) Negociacion politica (172) negocios (41) negros (5) Nelson Mandela (16) Neocastrismo (540) neocons (8) neonazis (3) nepal (11) Nepotismo (6) nerd (1) Neruda (2) Network (1) neutralidad (1) New York (31) New York Times (17) Newsweek (1) Niagara Falls (5) nicaragua (25) Nick Wallenda (1) Nicolas Maduro (116) nigeria (2) Nik Wallenda (1) Nikita Jrushchov (3) ninos (214) Niquel (17) Niurka Marcos (1) nivel de vida (10) Noam Chomsky (1) nomeklatura (6) nomekltarua (3) nomen (1) Nomenklatura (456) Norberto Fuentes (11) Norteamerica (3) norteamericanos (5) noruega (14) Nostradamus (1) Noticias (8) NSA (13) nudismo (2) nueva zelandia (13) Nuevo Herald (7) Obama (20) Obama-Raul (18) Obama's Group (12) Obamacare (38) Obamunismo (1) Occidente (45) occupy movement (17) Ochoa (14) Odalanier Solis (7) Odio (3) odlanier solis (13) OEA (36) Ofelia Acevedo (1) Ofensiva revolucionaria (1) Oferta y demanda (8) oil sands (2) Olimpiadas (2) Oliver Stone (2) ollanta humala (3) Olof Palme (1) OLPL (15) ontario (20) Ontologia (3) ONU (54) Operacion Caguairan (2) Opiniones (4) Opositores (882) opostiores (16) Orestes Lorenzo (1) Organizaciones politicas del exilio (85) organs trade (1) Orlando Zapata Tamayo (81) orlov (9) Ortega (1) osama bin laden (82) oscar de la hoya (1) Oscar Elias Biscet (25) Oscar Espinosa Chepe (20) Oscar Haza (5) Otan (55) OTZ (1) ovnis (12) OWS (33) OZT (57) Pablo Escobar Gavirias (7) Pablo Iglesias (1) Pablo Milanes (24) Padre Conrado (1) Paises emisores de turismo (31) Pakistan (46) paladares (8) Palestina (68) Panama (28) pancho cespedes (4) Panfilo (5) papua (1) paquetes a Cuba (2) paquistan (1) paquito D'rivera (6) paradigmas (8) paraguay (5) paraguay. Cuba (2) Paramilitares (4) paranormal (3) Parche (1) Paris Hilton (1) parlamento (7) Partido Comunisa de Cuba (43) partido comunista (35) Partido Comunista de Cuba (7) Partido Democrata (92) Partido politicos (49) Partido Republicano (102) Partido Socialista Unido Venezolano (1) partidos politicos (12) pastor terry jones (1) Patricio de la Guardia (2) patriotismo (1) paul krugman (16) Paul Ryan (2) Pavonato (1) Paya (111) paypal (3) paywall (1) Paz (6) PCC (10) PDVAL (1) PDVSA (14) peacemakers (1) Pederastia (1) Pedofilia (3) pedolfilia (1) pedro campos (3) Pedro Diaz Lanz (5) Pedro Luis Boitel (5) Pedro Luis Diaz Lanz (1) Pedro Luis Ferrer (5) pedro pablo oliva (5) Pelota (66) Pelota cubana (294) peloteros cubanos (12) Peloteros cubanos en grandes ligas (243) Pena de muerte (5) Pensadores cubanos (5) Pensamiento politico (2) pensiones (3) Pentagono (82) Penultimos Dias (3) pequenos negocios (3) percepcion (4) Perdon (2) Perez Roque (10) Perfil de Raul (2) Periodismo (9) periodistas (17) Periodistas cubanos (21) periodistas independientes (39) Peronismo (1) Persona del ano (1) personalidades (23) Peru (16) perugorria (2) Peso cubano (17) PETA (1) Petrocasas (3) Petroleo (195) Petroleo cubano (202) PIB [GDP] (1) picasso (1) Piedad Cordova (1) pinochet (1) pinttura (4) Pintura Cubana (44) piratas (7) Plan de Raul (2) planificacion (4) Playa Giron (23) playas (9) Plaza Tiannamen (7) po0 (1) poblacion (100) Poblacion y dinero (137) Pobreza (234) pobreza estructural (84) poder (6) Poder Politico (131) Poder politico en Cuba (41) Poder Popular (12) Poesia (19) Poker (1) Polemica (5) Policia (91) Politica (63) politica exterior (8) politica fiscal (1) Politica internacional (5) Politica Monetaria (2) Politica norteamericana hacia Cuba (1) Political correctness (10) politicamente correcto (3) politicos (87) politicos norteamericanos (1) Polo Norte (1) polonia (8) Polucion (1) ponzi scheme (3) popularidad (2) Populismo (10) Porno (5) Porno para Ricardo (20) pornografia (6) Portugal (12) posada carriles (4) posicion comun (4) post Fidel (4) Post-castrismo (7) Post-fidelismo (5) Postcastrismo (38) Postcastro (1) Postcomunismo (1) PostFidel (2) Postfidelismo (13) Precios (27) Precios en el mercado informal (3) predicciones (8) premio (9) Premio 11 de Abril (2) Premio al Buen Corazon (1) Premio Blog Acido (1) Premio Blog Desmentido (1) Premio Blog Dorado (2) Premio Eta Kanpora (1) Premio Huella 2008 (5) Premio Nobel (26) Premio Nobel de Economia (4) premio nobel de la paz (6) Premio Nobel de Literatura (6) Premio Ortega y Gasset (3) Premio Sajarov (2) Premio San Miguel Arcangel (1) Premios (11) Premios 11 de Abril (1) Prensa (43) prensa cubana (52) Prensa Extranjera (89) Presidente de Cuba (1) Presidio Politico (39) Presos (58) Presos de conciencia (88) presos politicos (55) Presupuesto (106) Presupuesto Militar (2) pride (2) Primavera Negra (77) prisioneros (10) Prisioneros de conciencia (61) Prisioneros de concienciencia (1) privacidad (67) productividad (3) Producto Interno de Cuba (1) profecias (6) Programa politico (11) Progreso (2) Prohibiciones (2) pronosticos (13) Propaganda (248) Propiedad (2) Propiedad intelectual (1) Propiedad privada (6) proselitismo (2) Prosperidad (1) Prostitucion (90) Protesta (45) Protestas (559) provocacion (21) Proyecto Varela (8) PSUV (1) publicidad (1) Pueblo (5) Puerto Rico (6) Punto 0-0 (1) puppets (1) Putin (137) Pymes (63) Qatar (5) quantum computer (2) Quebec (3) Quejas de la poblacion (51) Queubec (1) Quinquenio Gris (1) Racionamiento (4) Racismo (50) radio frequency wapons (1) Radio Marti (16) radioactividad (31) Rafael Alejandro Hernandez Real (1) Rafael Correa (24) rafael rojas (3) rahm emanuel (5) ramadan (2) Ramiro (22) Rances Barthelemy (2) randy alonso (3) raperos cubanos (1) Raul (646) Raul Castro (12) raul familia (17) Raul Reyes (16) Raul Rivero (7) Raul y Fidel Castro (4) Raulismo (16) Razas en Cuba (1) RDA (17) Real politik (2) rebeldes (56) rebelion (1) reciclaje (1) Reclamacion de propiedades expropiadas (1) Reclutamiento de agentes (1) reconciliacion nacional (1) Reconstruccion (1) Recrutamiento de agentes (9) Red Avispa (58) Redes sociales (37) redistribucion (1) Reflexiones (4) reforma en cuba (239) reforma migratoria (105) Reforma Monetaria (49) Reforma politica (4) Reformas (86) Reformas economicas (517) Reformas economicas. (1) Reformas raulistas (146) Refugiados (6) Regionalismo (1) Reina Tamayo (30) reinaldo arenas (5) Reinaldo Escobar (23) reino unido (116) Relaciones Cuba-Estados Unidos (5) Relaciones Internacionales (2) Relevo generacional (5) Religion (184) religiones afrocubanas (34) Remolcador (6) Renuncia (2) Renuncia de Fidel (1) rep checa (1) repatriacion (5) Reporteros sin Fronteras (7) Represioin (33) Represion (1389) Represion a los intelectuales (116) Repsol (16) Republica Checa (5) Republica Dominicana (15) resistencia popular (3) reunificacion (1) reunificacion familiar (8) revolucion (7) revolucion arabe (5) revolucion cubana (48) Revolucionarios (2) reynier aguero (1) richard branson (6) Richard Nixon (5) ricos (22) riesgo (2) rigondeaux (28) Riqueza (24) Rob Ford (1) robert kennedy (1) robertico robaina (2) Robots (37) rockets (35) Roger Federer (2) ron cubano (10) ronald reagan (13) Rosa Diez (1) Rosa María Payá (40) Rosita Fornes (2) Ruinas (3) Rumania (16) rumanos (1) Rumores (5) rupert murdoch (1) Rusia (383) Saddam Hussein (1) sahara occidental (1) Salarios (32) Salman Rushdie (1) Salud (356) salud cubana (172) Salud de Fidel (70) Salud de Raul (2) Salud publica (369) same sex marriage (1) Sandinistas (1) Sandino (1) santiago de cuba (9) Sara Marta Fonseca (1) Sarah Palin (15) sarajevo (1) satelite (11) Sats. Cuba (40) Scarabeo 9 (6) secret service (4) Secretario de Defensa (2) Secretario de Estado (1) Secreto (17) secretos militares (12) Secuestrados (21) Secuestros (39) securidad del estado (1) Seguridad (32) seguridad cubana (25) Seguridad del Estado (77) Seguridad nacional (72) seguridad personal (12) seguridad social (4) Seguros (11) Selman (2) Semiotica (2) senadores (40) serbia (3) Sergio Ramirez (1) sexo (69) Sharia (16) Sherrit (19) siberia (2) Sicilia (1) Sicologia (38) Sicologia politica (12) Sida (10) Silvio Benitez (20) Silvio Rodriquez (30) silvito el libre (4) Simon Bolivar (3) sina (25) Sindicatos (27) Sindrome de la Indefension Adquirida (15) Sindrome del Neocastrismo (69) Singapur (7) siquiatria (12) Siria (93) smartphone (8) smog (1) sms (1) Soberania (1) Social (1) social media (4) social network (1) Socialdemocracia (4) Socialismo (56) socialismo de mercado (3) Socialismo del Siglo XXI (19) socialistas (44) Sociedad (84) Sociedad Civil (30) Sociedades Secretas (1) Sociologia (29) sofia loren (1) software (2) sol (11) soldados (27) Solidaridad (7) Solzhenitsyn (3) Somalia (16) Sonia Garro (14) Soros (1) sri lanka (1) st.piere (1) st.pierre (2) Stalin (23) Stephen Hawking (10) steve jobs (12) stock market (6) stratfor (3) Subastas (18) submarinos (1) Subversion (3) Sucesion (154) Sucesores (107) Sucre (3) Sudafrica (29) Sudal del Sur (1) Sudan (4) suecia (18) Suelos (1) suerte (13) suicidio (25) suiza (7) sundance (2) Susan Boyle (1) Susan Rice (3) Swat team (4) Tabaco Cubano (33) tabacos cubanos (3) tabaquismo (4) Tabu (1) tailandia (3) taiwan (10) Taladrid (1) talento (2) Taliban (65) Tania Bruguera (10) Tarata (1) tarjetas de credito (3) task force (1) tattoo (4) taxpayers (2) Tea Party (15) Teatro cubano (11) tecnologia (213) ted cruz (22) ted kennedy (1) Telecomunicaciones (77) Television (14) tendencias (1) Tenis (8) Teoria Economica (76) Teoria Politica (43) Terremotos (29) terromotos (7) Terrorismo (469) terroristas (409) terry fox (1) Terry Jones (2) Texas (3) thailandia (3) the beatles (6) thi (1) Think Tank (269) Tibet (20) tiburones (5) Tierra (52) Times (7) timor oriental (1) Tina Turner (1) Tiro fijo (2) tolerancia (1) tomas piard (2) tony blair (2) tony castro (23) Tony Cortes (4) Tony de la Guardia (9) Toronto (79) Torturas (17) Totalitarismo (21) trabajadores por cuenta propia (29) trabajadores publicos (1) trabajos (10) Tracey Eaton (29) trafico de armas (53) Trafico de drogas (98) trafico de organos (2) trafico de personas (22) tragedias (3) transgender (2) Transicion (175) Transporte (29) Trasvestismo (4) Tratado de Libre Comercio (1) travesti (1) tren (20) tribunal internacional (1) Trilateral (2) trinida y tobago (1) Trotsky (1) trudeau (1) Tsunami (10) tunez (16) Tupamaro (1) Turismo (24) Turismo Cuba (136) turistas norteamericanos (2) Turquia (23) TV cubana (11) Tv Marti (12) twiter (5) Twitter (40) tycoon (5) UCI (14) Ucrania (43) UFC (65) ufo (10) uigur (1) UJC (13) Umap (7) Underground (1) Uneac (30) Uneac. Censura (10) UNESCO (1) Unidad politica (2) union (1) Union Europea (93) Union Sovietica (110) Universidad (86) Universo (68) Univision (1) UNPACU (75) Upec (3) uranio (3) Uribe (3) Uruguay (12) US Grants (2) US Presidentes (53) uzbekistan (2) Vacilon (1) vaclav havel (4) Valores y normas de conductas (14) Van Van (3) Vaticano (66) Vejez (3) Venezuela (467) Venezuela crisis (42) venezuela economia (3) Venezuela elecciones (50) venezuela-china (7) Venezuela-Cuba-Rusia-China-Iran (1) Venezuela-Estados Unidos (26) Venezuela-Rusia (5) Ventas (1) Verizon Scandal (1) VI Congreso del PCC (46) Via China (3) Viajes a Cuba (232) viajes al exterior (10) vicente botin (1) victimas del 911 (7) victor mesa (1) Vida (32) vida extraterrestre (19) Vida Guerra (1) Video (30) video juegos (9) viejos (6) Viet Nam (26) Violencia (20) Virgen del Cobre (4) virtual (1) Virus (12) Vitali Klitschko (1) Vivienda (199) Vladimiro Roca (13) Voces del Barrio (8) volcanes (9) Walesa (11) wall street (31) walmart (6) Welfare (7) Wendy Guerra (4) whistleblower (3) whistleblowers (1) wi-fi (8) WikiLeaks (143) wikipedia (4) william levy (1) Willy Chirno (6) Wilman Villar Mendoza (26) Wilmar Villar Mendoza (1) windows (1) winston churchill (4) World Trade Center (18) World Trade Organization (1) wynoma ryder (1) Xi Jinping (11) xiomara laugart (6) XXX (1) yahoo (3) Yaoutube (1) Yasiel Puig (14) Yasmani Tomas (1) yasser arafat (10) Yeltsin (4) yemen (38) Yo acuso al gobierno cubano (1) Yoan Moncada (1) Yoani (276) Yoany (19) Yoenis Cespedes (10) yoga (5) Yohandry (6) yoko ono (1) Youtube (15) yuan (6) Yugoeslavia (1) Yunier Dorticos (1) yuri gagarin (3) Zawahri (1) zelaya (1) Zimbawe (8) Zoe Valdes (22) Zona Franca Mariel (38) Zumbado (1)

La columna de Cubanalisis

NEOCASTRISMO [Hacer click en la imagen]

NEOCASTRISMO [Hacer click en la imagen]
¨Saturno jugando con sus hijos¨/ Pedro Pablo Oliva

Seguidores

Carta desde la carcel de Fidel Castro Ruz

“…después de todo, para mí la cárcel es un buen descanso, que sólo tiene de malo el que es obligatorio. Leo mucho y estudio mucho. Parece increíble, las horas pasan como si fuesen minutos y yo, que soy de temperamento intranquilo, me paso el día leyendo, apenas sin moverme para nada. La correspondencia llega normalmente…”

“…Como soy cocinero, de vez en cuando me entretengo preparando algún pisto. Hace poco me mandó mi hermana desde Oriente un pequeño jamón y preparé un bisté con jalea de guayaba. También preparo spaghettis de vez en cuando, de distintas formas, inventadas todas por mí; o bien tortilla de queso. ¡Ah! ¡Qué bien me quedan! por supuesto, que el repertorio no se queda ahí. Cuelo también café que me queda muy sabroso”.
“…En cuanto a fumar, en estos días pasados he estado rico: una caja de tabacos H. Upman del doctor Miró Cardona, dos cajas muy buenas de mi hermano Ramón….”.
“Me voy a cenar: spaghettis con calamares, bombones italianos de postre, café acabadito de colar y después un H. Upman #4. ¿No me envidias?”.
“…Me cuidan, me cuidan un poquito entre todos. No le hacen caso a uno, siempre estoy peleando para que no me manden nada. Cuando cojo el sol por la mañana en shorts y siento el aire de mar, me parece que estoy en una playa… ¡Me van a hacer creer que estoy de vacaciones! ¿Qué diría Carlos Marx de semejantes revolucionarios?”.

Quotes

¨La patria es dicha de todos, y dolor de todos, y cielo para todos, y no feudo ni capellaní­a de nadie¨ - Marti

"No temas ni a la prision, ni a la pobreza, ni a la muerte. Teme al miedo"
-
Giacomo Leopardi

¨Por eso es muy importante, Vicky, hijo mío, que recuerdes siempre para qué sirve la cabeza: para atravesar paredes¨Halvar de Flake [El vikingo]

"Como no me he preocupado de nacer, no me preocupo de morir" - Lorca

"Al final, no os preguntarán qué habéis sabido, sino qué habéis hecho" - Jean de Gerson

"Si queremos que todo siga como está, es necesario que todo cambie" - Giuseppe Tomasi di Lampedusa

"Todo hombre paga su grandeza con muchas pequeñeces, su victoria con muchas derrotas, su riqueza con múltiples quiebras" - Giovanni Papini


"Life is what happens while you are busy making other plans" - John Lennon

"Habla bajo, lleva siempre un gran palo y llegarás lejos" - Proverbio Africano

"No hay medicina para el miedo" - Proverbio escoces

"El supremo arte de la guerra es doblegar al enemigo sin luchar"
- Sun Tzu

"You do not really understand something unless you can explain it to your grandmother" - Albert Einstein

"It is inaccurate to say I hate everything. I am strongly in favor of common sense, common honesty, and common decency. This makes me forever ineligible for public office" - H. L. Menken

"I swore never to be silent whenever and wherever human beings endure suffering and humiliation. We must always take sides. Neutrality helps the oppressor, never the victim. Silence encourages the tormentor, never the tormented" - Elie Wiesel

"Stay hungry, stay foolish" -
Steve Jobs

"If you put the federal government in charge of the Sahara Desert , in five years ther'ed be a shortage of sand" - Milton Friedman

"The tragedy of modern man is not that he knows less and less about the meaning of his own life, but that it bothers him less and less" - Vaclav Havel

"No se puede controlar el resultado, pero si lo que uno haga para alcanzarlo" -
Vitor Belfort [MMA Fighter]

Liborio

Liborio
A la puerta de la gloria está San Pedro sentado y ve llegar a su lado a un hombre de cierta historia. No consigue hacer memoria y le pregunta con celo: ¿Quién eras allá en el suelo? Era Liborio mi nombre. Has sufrido mucho, hombre, entra, te has ganado el cielo.

Para Raul Castro

Cuba ocupa el penultimo lugar en el mundo en libertad economica solo superada por Corea del Norte.

Cuba ocupa el lugar 147 entre 153 paises evaluados en "Democracia, Mercado y Transparencia 2007"

Cuando vinieron

Cuando vinieron a buscar a los comunistas, Callé: yo no soy comunista.
Cuando vinieron a buscar a los sindicalistas, Callé: yo no soy sindicalista.
Cuando vinieron a buscar a los judíos, Callé: yo no soy judío. Cuando vinieron a buscar a los católicos, Callé: yo no soy “tan católico”.
Cuando vinieron a buscarme a mí, Callé: no había quien me escuchara.

Reverendo Martin Niemöller

Martha Colmenares

Martha Colmenares
Un sitio donde los hechos y sus huellas nos conmueven o cautivan
Bloggers Unite

CUBA LLORA Y EL MUNDO Y NOSOTROS NO ESCUCHAMOS

Donde esta el Mundo, donde los Democratas, donde los Liberales? El pueblo de Cuba llora y nadie escucha.
Donde estan los Green, los Socialdemocratas, los Ricos y los Pobres, los Con Voz y Sin Voz? Cuba llora y nadie escucha.
Donde estan el Jet Set, los Reyes y Principes, Patricios y Plebeyos? Cuba desesperada clama por solidaridad.
Donde Bob Dylan, donde Martin Luther King, donde Hollywood y sus estrellas? Donde la Middle Class democrata y conservadora, o acaso tambien liberal a ratos? Y Gandhi? Y el Dios de Todos?
Donde los Santos y Virgenes; los Dioses de Cristianos, Protestantes, Musulmanes, Budistas, Testigos de Jehova y Adventistas del Septimo Dia. Donde estan Ochun y todas las deidades del Panteon Yoruba que no acuden a nuestro llanto? Donde Juan Pablo II que no exige mas que Cuba se abra al Mundo y que el Mundo se abra a Cuba?
Que hacen ahora mismo Alberto de Monaco y el Principe Felipe que no los escuchamos? Donde Madonna, donde Angelina Jolie y sus adoptados around de world; o nos hara falta un Brando erguido en un Oscar por Cuba? Donde Sean Penn?
Donde esta la Aristocracia Obrera y los Obreros menos Aristocraticos, donde los Working Class que no estan junto a un pueblo que lanquidece, sufre y llora por la ignominia?
Que hacen ahora mismo Zapatero y Rajoy que no los escuchamos, y Harper y Dion, e Hillary y Obama; donde McCain que no los escuchamos? Y los muertos? Y los que estan muriendo? Y los que van a morir? Y los que se lanzan desesperados al mar?
Donde estan el minero cantabrico o el pescador de percebes gijonese? Los Canarios donde estan? A los africanos no los oimos, y a los australianos con su acento de hombres duros tampoco. Y aquellos chinos milenarios de Canton que fundaron raices eternas en la Isla? Y que de la Queen Elizabeth y los Lords y Gentlemen? Que hace ahora mismo el combativo Principe Harry que no lo escuchamos?
Donde los Rockefellers? Donde los Duponts? Donde Kate Moss? Donde el Presidente de la ONU? Y Solana donde esta? Y los Generales y Doctores? Y los Lam y los Fabelo, y los Sivio y los Fito Paez?
Y que de Canseco y Miñoso? Y de los veteranos de Bahia de Cochinos y de los balseros y de los recien llegados? Y Carlos Otero y Susana Perez? Y el Bola, y Pancho Cespedes? Y YO y TU?
Y todos nosotros que estamos aqui y alla rumiando frustaciones y resquemores, envidias y sinsabores; autoelogios y nostalgias, en tanto Louis Michel comulga con Perez Roque mientras Biscet y una NACION lanquidecen?
Donde Maceo, donde Marti; donde aquel Villena con su carga para matar bribones?
Cuba llora y clama y el Mundo NO ESCUCHA!!!

Suscribirse Cuba Independiente

CIF: Cuba Independiente http://CubaIndependiente.blogspot.com Registro (c) Copyright: ® DIN 189297780000 Gerente By: www.copyrightwww.com