+ Reply to Thread
Page 29 of 50 FirstFirst 1 19 29 39 50 LastLast
Results 561 to 580 of 1000

Thread: Edward Snowden: the whistleblower behind the NSA surveillance revelations

  1. Link to Post #561
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    64
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,815 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    Poll: Americans don't believe NSA reforms will increase privacy



    Published on 21 Jan 2014


    President Barack Obama's speech proposing major reforms to the
    National Security Agency on Friday did little to sway public opinion
    towards the NSA, a new Pew Research Center poll shows. Of those
    surveyed who had heard about the speech, 73 percent said the
    proposed reforms will have no effect on people's privacy, and 79
    percent said the reforms won't make it more difficult for the
    government to fight terrorism. RT's Meghan Lopez talks to political
    commentator Sam Sacks, who recently wrote an op-ed about the
    speech for RT.com, about Americans' reactions to Obama's

  2. Link to Post #562
    Moderator (on Sabbatical) Harley's Avatar
    Join Date
    11th September 2010
    Age
    74
    Posts
    1,610
    Thanks
    4,159
    Thanked 9,354 times in 1,378 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    Quote Posted by Anchor (here)
    MSNBC interviewing some congresswoman on NSA when anchor interrupts here from some "Breaking News out of Miami" which turns out to be some thing about Justin Beiber facing a judge live on video

    26seconds - watch and weep

    An attempt at Damage Control.

    This is a prime (Very Obvious) example of a government redirect of the masses.
    Harley

  3. The Following User Says Thank You to Harley For This Post:

    anonymous (25th January 2014)

  4. Link to Post #563
    United States Unsubscribed
    Join Date
    31st December 2013
    Location
    Nashville, TN
    Age
    39
    Posts
    199
    Thanks
    281
    Thanked 1,243 times in 163 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    my privacy standards have changed - 5/10/16 - apologies for the many edits of public comments
    Last edited by anonymous; 11th May 2016 at 16:11.

  5. Link to Post #564
    United States Unsubscribed
    Join Date
    31st December 2013
    Location
    Nashville, TN
    Age
    39
    Posts
    199
    Thanks
    281
    Thanked 1,243 times in 163 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    my privacy standards have changed - 5/10/16 - apologies for the many edits of public comments
    Last edited by anonymous; 11th May 2016 at 15:31.

  6. Link to Post #565
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    64
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,815 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations



    Edward Snowden tells German TV that NSA is involved in industrial espionage




    Public broadcaster ARD airs interview in which whistleblower says National Security
    Agency is involved in industrial espionage
    Reuters in Berlin

    The Guardian, Monday 27 January 2014

    Edward Snowden
    ARD is scheduled to broadcast its interview with Edward Snowden on Sunday night.
    Photograph: Uncredited/AP

    The National Security Agency is involved in industrial espionage and will take
    intelligence regardless of its value to national security, the former NSA contractor
    Edward Snowden has told a German television network. In a lengthy interview
    broadcast on the public broadcaster ARD TV on Sunday, Snowden said the NSA did
    not limit its espionage to issues of national security and cited the German
    engineering firm Siemens as one target.

    “If there's information at Siemens that's beneficial to US national interests – even if
    it doesn't have anything to do with national security – then they'll take that
    information nevertheless,” Snowden said in the interview conducted in Russia,
    where Snowden has claimed asylum.

    Snowden also told the German public broadcasting network he no longer had
    possession of any documents or information on NSA activities and had turned
    everything over to select journalists. He said he did not have any control over the
    publication of the information.

    Questions about US government spying on civilians and foreign officials arose last
    June, when Snowden leaked documents outlining the widespread collection of
    telephone records and email to media outlets including the Guardian.

    Reports that the NSA monitored Chancellor Angela Merkel's mobile phone have
    added to anger in Germany, which has been pushing for a “no-spy” agreement with
    the US, a country it considers to be among its closest allies.

    Snowden also talked about US reports that his life was in danger for leaking the
    documents. But he said that he sleeps well because he believes he did the right
    thing by informing the public about the NSA's activities.


    "There are significant threats but I sleep very well," he said before referring to a
    report on a US website that he said quoted anonymous US officials saying his life
    was in danger.
    "These people, and they are government officials, have said they would love to put
    a bullet in my head or poison me when I come out of the supermarket and then
    watch me die in the shower," Snowden said.

    Snowden's claim the NSA is engaged in industrial espionage follows a New York
    Times report earlier this month that the NSA put software in almost 100,000
    computers around the world, allowing it to carry out surveillance on those devices
    and could provide a digital highway for cyberattacks.

    The NSA planted most of the software after gaining access to computer networks,
    but has also used a secret technology that allows it entry even to computers not
    connected to the internet, the newspaper said, citing US officials, computer experts
    and documents leaked by Snowden.

    The newspaper said the technology had been in use since at least 2008 and relied
    on a covert channel of radio waves transmitted from tiny circuit boards and USB
    cards secretly inserted in the computers. Frequent targets of the programme, code-
    named Quantum, included units of the Chinese military and industrial targets.


    Snowden faces criminal charges after fleeing to Hong Kong and then Russia, where
    he was granted at least a year's asylum. He was charged with theft of government
    property, unauthorised communication of national security information and giving
    classified intelligence data to an unauthorised person

    http://www.theguardian.com/world/201...trial-sabotage

    ====================================================

    Link to interview....

    german state-run tv station's Edward Snowden interview 27 Jan 2014

    http://v.youku.com/v_show/id_XNjY2OTgzNzky.html

    Last edited by Cidersomerset; 28th January 2014 at 00:16.

  7. Link to Post #566
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    64
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,815 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    A detailed technical post from the BBC for those interested click link at bottom for
    full list.





    27 January 2014 Last updated at 08:29

    NSA-GCHQ Snowden leaks: A glossary of the key termsGoogle seeks reform
    Tapping the net
    Global opinions
    Surveillance glossary

    By Leo Kelion
    Technology reporter

    Edward Snowden poster outside the White House



    The documents leaked by Edward Snowden have led the White House to call for reforms

    When the Guardian and Washington Post newspapers published the first of Edward
    Snowden's NSA-GCHQ leaks in June, it unleashed a stream of abbreviations,
    acronyms and jargon describing the cyberspies' activities.Below are some of the
    key terms referred to in the classified documents and the reports about them.

    The list refers to documents alleged to have been sourced by Snowden from
    various intelligence agencies that have been printed by other news outlets. Where
    possible there are links to the original articles and the documents they refer to.

    Accumulo
    The name given to an open-source database created by the National Security
    Agency (NSA) but later made available to others via the Apache Foundation. It
    stores large amounts of structured and unstructured data across many computers
    and can use it to create near real-time reports.

    One of its key features is that users with different levels of clearance are shown
    different amounts of information. So a high-level operator might be shown all the
    data available, while a lower-level one would be restricted to seeing only certain
    columns, and might never be aware that other topics existed.

    It was modelled on Google's BigTable system.

    Ant
    A division of the NSA that provides software and hardware surveillance products,
    according to Der Spiegel.

    The German magazine published extracts from a leaked catalogue featuring a range
    of such implants.

    Their codenames included:

    Cottonmouth - USB-based devices that offer agents wireless access to a target's
    network
    Deitybounce - technology that allows software to be installed on Dell's PowerEdge
    computer servers
    Dropoutjeep - software that allows voicemail, contact list, location, camera image
    capture and sound data to be captured from Apple iPhones
    Headwater - software that allows spyware to be covertly sent through selected
    routers manufactured by the Chinese firm Huawei
    Howlermonkey - a radio frequency transceiver that can be used to copy data or
    take control of a targeted computer
    Jetplow - firmware that creates a backdoor into certain Cisco firewall products
    Loudauto - a small listening device that uses very little power
    Monkeycalendar - software that takes location data from a mobile phone and
    secretly sends the details as text messages
    Somberknave - software that allows agents to take control of PCs running Windows XP
    Appelbaum, Jacob
    One of the journalists given direct access to some of Edward Snowden's leaked documents.

    He has written articles for Germany's Der Spiegel magazine.

    Mr Appelbaum is also known for developing security and encryption software,
    representing Wikileaks and serving as an advocate for the Tor Project.

    Back-door access
    The idea that cyberspies can access data held by organisations without having to
    formally ask them to hand it over through the "front door". This allows the bodies
    involved to be kept in the dark about the subject matter and amount of information being taken.

    Initial reports following the early Prism revelations sparked speculation that the
    firms involved had provided agents with direct backdoor access to their servers -
    something they strongly denied. The Washington Post later reported that the NSA
    and the UK intelligence agency, GCHQ, were instead intercepting and copying data
    from the companies without their knowledge via a project codenamed Muscular.

    The phrase back door has also been used to refer to allegations that the spy
    agencies had inserted secret vulnerabilities into encryption software.

    If true, this would mean spies could overcome steps taken by service providers and
    their users to ensure that only the sender and receiver of a communication should
    be able to read it.

    Belgacom
    A Belgian telecoms provider whose customers include several EU institutions.

    The firm revealed in September 2013 that its systems had been hacked since at least 2011.

    Belgian newspaper De Standaard initially reported that the NSA was believed to be responsible.

    However, Der Spiegel later said that leaked documents indicated GCHQ had carried
    out the attack, which had been codenamed Operation Socialist.

    Blackfoot
    The codename given to an NSA operation to gather data from French diplomats'
    offices at the United Nations in New York, according to leaked documents reported
    by Der Spiegel.

    It says papers dated September 2010 indicated that information was collected from
    bugged computer screens.

    Bluf
    An acronym used by the US military for "bottom line up front", used to signal that
    only the key facts are being presented. It appears towards the top of some NSA
    documents ahead of briefing notes.

    Boundless Informant
    Documents published by the Guardian indicate this is a tool used by the NSA to
    analyse the metadata it holds. It aims to let analysts know what information is
    currently available about a specific country and whether there are trends can be deduced.

    The newspaper says the agency uses "big data" analysis technology to scour the
    billions of pieces of intelligence held at any one time to provide "near real-time"
    details about available coverage.

    A screenshot of the NSA's alleged user interface shows different countries colour-
    coded to indicate how much data is known about each one.

    Buddy list
    A list of people a user is connected to via an instant messaging service or other social network.

    The spy agencies reportedly combine the information with data gathered from
    users' email address books to map connections between targets.

    According to one leaked document, published by the Washington Post, the NSA
    collected about half a million buddy lists and webmail inbox details on "a representative day".

    Bullrun
    The name of a counter-encryption programme run by the NSA.

    A document published by the Guardian says it uses a variety of processes,
    including "advanced mathematical techniques" and "industry relationships" to
    reveal an unscrambled version of the data.

    Cheesy Name
    A GCHQ program, identified by the Guardian, designed to identify encryption keys
    that could be cracked by the agency's computers.

    Collection
    Leaked documents refer to four types of NSA data collection with regard to US
    persons (a citizen of the country or someone located within its borders):

    Intentional - the deliberate targeting of an individual or group. NSA agents are
    forbidden from the intentional collection of data about US persons unless they are
    given special authority to do so.
    Inadvertent - information gathered about a person whom the agent believed to be
    foreign, but later learned to be a US person.
    Incidental - data gathered as a by-product of an inquiry into a legitimate foreign
    target, which might reveal information about a US person. An alleged memo, dated
    March 2013, says this does not constitute a violation and does not have to be
    reported for inclusion in reports to Congress.
    Reverse - the targeting of a foreign subject to intentionally gather information
    about a US person they are in contact with. NSA agents are banned from doing this
    and told to notify a supervisor if it occurs.

    Cloud
    The term used to refer to data stored at, or software run from, a service provider's
    data centres as opposed to being kept or processed on the user's own computer.

    Many of the Snowden leaks detail the alleged efforts of the NSA and GCHQ to study
    information held in the cloud that their targets might have believed was protected from others' view.

    Comint
    An abbreviation for "communications intelligence".

    Communications Security Establishment (CSEC)
    Canada's codebreaking security agency.

    Its logo featured in a leaked GCHQ document, published by the Guardian, which
    discussed the hacking of Blackberry devices at a G20 summit.

    Computer Network Attack (CNA)
    A term used by the NSA to refer to actions taken to "disrupt, deny, degrade, or
    destroy" information held on targeted computers and the computers themselves.

    Computer Network Defence (CND)
    A phrase used by the NSA to refer to computer-based actions taken to "protect,
    monitor, analyse, detect, and respond to network attacks, intrusions, disruptions,
    or other unauthorised actions".

    Computer Network Exploitation (CNE)
    The term used by the NSA to refer to efforts to exploit data gathered from its targets.

    Conveyance
    Identified by an NSA slide, the term appears to refer to a system used to remove
    voice content collected about US persons as part of the Prism programme before it
    is analysed by a process called Nucleon.

    US persons - citizens of the country or someone located within its borders - are not
    supposed to be the subject of the agency's investigations.

    Data Intercept Technology Unit (Ditu)
    An FBI unit that one of the leaked slides suggests collects much of the data
    gathered from internet companies as part of the Prism programme, before passing
    it on to the NSA.

    According to an investigation by Foreign Policy magazine, the operation is based at
    Marine Corps Base Quantico in Virginia, and acts as "the primary liaison" between
    the NSA and companies including Google, Facebook and Apple. The report says the
    unit maintains equipment that takes the desired information from the firms, and
    makes sure that any encryption processes used by them do not prevent the
    businesses from handing over data they have a legal responsibility to share.

    The article adds that having the Ditu act as a conduit allows companies to report
    that they do not hand information "directly" to the NSA.

    Data mining
    Analysis of large stores of information in order to obtain new knowledge.

    In the case of the US and UK spy agencies, the data mined is reported to include
    phone call records, emails, instant messages and other social network activity, photos and videos.

    As time goes on, the challenge is that the data generated is growing at an
    exponential rate. According to a forecast by the magazine Popular Mechanics, the
    amount of data created in 2020 will be 50 times greater than a decade earlier.

    Deep Packet Injection
    The addition of data into an internet stream.

    The technique has previously been used by some internet service providers (ISPs)
    to replace websites' adverts with their own.

    The NSA and GCHQ are alleged to do it to send code to targets' computers that
    causes them to be infected with spyware as part of an operation codenamed
    QuantumInsert.

    Deep Packet Inspection
    Data sent over the internet is split into packets, each of which is identified by a
    header - containing information about where it is being sent, where it came from
    and what is contained.

    Normally these headers are used to ensure data gets to where it is meant to go,
    and - when necessary - ensure a packet is re-sent if there was a problem with the
    original copy.

    Deep packet inspection refers to a closer analysis of the contents of each packet.
    This might be done to detect malware or to obtain statistics about network activity.
    In addition, it can be used to spy on the communications.

    According to documents leaked by Mark Klein - an ex-employee of phone network
    AT&T - to the Electronic Frontier Foundation, one of the machines used by the NSA
    to do deep packet inspection was a Narus Semantic Traffic Analyzer, built by a
    division of Boeing.

    Mr Klein said that by the mid-2000s each machine could analyse 10GB worth of
    data packets and 2.5GB of web traffic or email every second.

    Demultiplexer
    The process used to split captured signals back into individual data streams. It is
    sometimes referred to as a "demux" tool.

    One alleged NSA leak makes reference to developing "custom demultiplexers" so
    the agency could make use of data sourced from Yahoo. It said these used a
    proprietary data format called Narchive to transfer packages containing entire email
    accounts between Yahoo's servers.

    Dewsweeper
    A leaked NSA document published by Le Monde identifies this as a hardware device
    that provides wireless access to a device on a target's network when plugged into
    one of the machine's USB sockets.

    Dial Number Recognition (DNR)
    A term used by the NSA to refer to information gathered from telephone taps.

    According to documents seen by Le Monde, the NSA collected 124.8 billion pieces of
    DNR data over the course of four weeks in 2013.

    Digital Network Intelligence (DNI)
    A term used by the NSA to refer to content sent across the internet. This includes
    everything from Skype voice calls to web page requests,

    According to Le Monde, the NSA collected 97.1 billion pieces of DNI data over the
    course of four weeks in 2013.

    Dishfire
    The NSA has confirmed this is the codename for a system used to process and
    store SMS message data.

    A leaked 2011 NSA presentation, published by the Guardian, indicated it was used
    to collect about 194 million texts a day, adding that the content was shared with GCHQ.

    The documents said that GCHQ's agents should toggle an option to ensure they
    would not see UK content, which would be illegal to read without a warrant. The
    report added that US-related SMS messages were automatically hidden from NSA staff.

    Further analysis of the data is said to be carried out by a related system named Prefer.

    Dragnet
    A term used in somemedia reports and by civil liberty groups to refer to the huge
    amount of information being trawled by the spy agencies.

    Dropmire
    The name for a way to bug security-enhanced fax machines, which was identified
    by a leaked document dated to 2007, according to the Guardian.

    It indicates the technique provides the NSA with access to documents that have
    passed through encrypted fax machines based in other countries' foreign embassies.

    Echelon
    The codename given to a global intelligence-gathering network operated on behalf
    of the Five Eyes Alliance (Australia, Canada, New Zealand, UK and US).

    A European Parliament report, published in 2001, suggests the first part of the
    network was built in 1971 and its focus was to intercept private and commercial -
    rather than military - communications.

    The inquiry says that the system was alleged to be able to intercept
    any "telephone, fax, internet or email message sent by any individual".

    Edgehill
    A UK-run counter-encryption programme that is named after a battle fought in
    1642 as part of the English Civil War.

    The Guardian reported that the operation's focus in 2012 was to "understand"
    Hotmail, Google, Yahoo and Facebook's encryption techniques. It adds that by 2015
    the agency aims to have cracked the codes used by 15 major internet companies.

    EgotisticalGiraffe
    The alleged codename given to an NSA effort to track users of Tor (The Onion
    Router) - a project that aims to let people browse the web anonymously by
    bouncing their traffic through other people's computers.

    Documents published by the Guardian indicate the technique involves exploiting
    vulnerabilities that exist in a version of the Firefox browser that used to be included
    in the Tor Browser Bundle - a collection of programs pre-configured to let people
    use the service. The browser's developer, Mozilla, has fixed the flaws in later versions.

    The Washington Post added that other leaked papers suggested the operation was
    used to unmask a "key propagandist" for the al-Qaeda terrorist organisation.

    Encryption
    The digital scrambling of source material, turning it into "ciphertext" - what appears
    to be a garbled stream of characters that is only supposed to become
    understandable if a piece of information called a "key" is used to turn it back into its original form.

    In theory, if data is encrypted and the key is not shared, a third party should not be
    able to read it. Web browsers usually notify their users that what they are seeing
    has been encrypted/decrypted by showing a little padlock next to the web address.

    The NSA openly states that part of its job is to counteract its adversaries' use of encryption.

    "Terrorists, cybercriminals, human traffickers and others... use code to hide their
    activities. Our intelligence community would not be doing its job if we did not try to
    counter that," it says.

    A report by ProPublica and the New York Times provides some detail about how the
    agency and GCHQ work together to do this.

    Measures are said to include:

    Working with chipmakers to insert backdoors into the code used to carry out
    encryption, allowing it to be deciphered without the key.
    Maintaining a database of encryption keys for specific commercial products.
    Intercepting a version of the data in its raw form as it is transmitted between a
    firm's computer servers before being encrypted and sent to the user.
    Carrying out "brute force" attacks - techniques that effectively shorten the length of
    the key making it easier to guess.
    Fallout
    Identified by an alleged NSA slide, the term appears to refer to an effort to screen
    out metadata collected about US citizens as part of the Prism programme before it
    is analysed by the Marina and Mainway systems.

    US persons are not supposed to be the subject of the agency's investigations.

    Fibre-optic cables
    Cables made out of strands of glass as thin as human hair that can transmit data in
    the form of light across long distances.

    Many of these are run along the seabed providing a variety of routes for data to
    criss-cross the globe.

    An NSA document published by the Dutch newspaper NRC Handelsblad indicates
    the agency and overseas partner agencies have "20 major accesses" to high-speed
    optical cables at various points across the globe.

    Five Eyes Alliance
    The NSA, GCHQ and their counterparts in Canada, Australia and New Zealand.

    It is sometimes referred to by the acronym Fvey.

    The Nine Eyes Alliance refers to the same group plus Denmark, France, the
    Netherlands and Norway. The 14 Eyes Alliance adds Belgium, Germany, Italy, Spain
    and Sweden.

    Flatliquid
    An operation by the NSA's Tao division that gave the agency access to a mail server
    used by the Mexican presidential computer network in May 2010, according to leaks
    reported by Der Spiegel.

    It said the public email account of Felipe Calderon - who was president at the time -
    was among those compromised.

    Foreign Intelligence Surveillance Act (Fisa)
    The original version of this law, passed in 1978, set out the conditions under which
    a special court would authorise electronic surveillance if people were believed to be
    engaged in espionage or planning an attack against the US on behalf of a foreign power.

    Following the 9/11 attacks, the Bush administration secretly gave the NSA
    permission to bypass the court and carry out warrantless surveillance of al-Qaeda
    suspects, among others.

    After this emerged in 2005, Congress voted to both offer immunity to the firms that
    had co-operated with the NSA's requests and to make amendments to Fisa.

    The relaxation to the rules, introduced in 2008, meant officials could now obtain
    court orders without having to identify each individual target or detail the specific
    types of communications they intended to monitor so long as they convinced the
    court their purpose was to gather "foreign intelligence information".

    In addition, they no longer had to confirm both the sender and receiver of the
    messages were outside the US, but only had to show it was "reasonable" to believe
    one of the parties was outside the country.

    Foreign Intelligence Surveillance Court (Fisc)
    A Washington-based tribunal that considers government agency requests to carry
    out surveillance for "foreign intelligence purposes" of suspects operating from
    within the US's borders.

    Eleven federal judges make up the panel, each serving a seven-year term. The
    proceedings are not usually made public.

    One of the early Snowden leaks, published by the Guardian, documented that the
    court had granted the FBI permission to collect the telephone metadata records of
    millions of Verizon customers over a three-month period, rather than just those
    related to a specific target. The scope of the warrant was attacked by civil liberty
    groups and several politicians as being too broad.

    To tackle such concerns, President Obama is calling on Congress to establish a
    panel of "advocates from outside government to provide an independent voice" on
    significant cases that come before the court.

    The president also proposes that the US director of national intelligence and the
    attorney general hold an annual review to agree which rulings to declassify in order
    to allow the public to be aware of decisions that have "broad privacy implications".

    Foreign Satellite Collection (Fornsat)
    A codename that appears in an alleged NSA presentation referring to the collection
    of data from foreign countries' satellites.

    A subsequent document, published by the Dutch newspaper NRC Handelsblad,
    indicates that in 2012 the intercept facilities were based in Thailand, Great Britain
    and Japan, among other countries.


    Read More.......
    http://www.bbc.co.uk/news/technology-25085592
    Last edited by Cidersomerset; 28th January 2014 at 00:43.

  8. Link to Post #567
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    64
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,815 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations



    27 January 2014 Last updated at 23:37

    US and British spies 'get personal data from Angry Birds'Workers install a
    recreation facility at an Angry Birds theme park in Haining, Zhejiang province 10 July 2013



    The popular game has been downloaded 1.7 billion times
    Continue reading the main story
    Related Stories
    How vulnerable is the internet?
    NSA-GCHQ cyberspy leaks: A glossary
    'NSA betrayed trust of the internet' Watch

    US and British spy agencies routinely try to gain access to personal data from
    Angry Birds and other mobile applications, a report says.

    A National Security Agency (NSA) document shows location, website visited and
    contacts are among the data targeted from mobile applications.

    It is the latest revelation from documents leaked by Edward Snowden.

    In a statement, the NSA said it was not interested in data beyond "valid foreign
    intelligence targets".

    "Any implication that NSA's foreign intelligence collection is focused on the
    smartphone or social media communications of everyday Americans is not true,"
    the statement said.

    'Golden nugget'

    The report, published by the New York Times, ProPublica and the Guardian, says
    the NSA and Britain's GCHQ have worked together since 2007 to develop ways to
    gain access to information from applications for mobile phones and tablets.

    The scale of data gathering is unclear.

    But the reports suggest data is gained from variety of mapping, gaming and social
    networking applications, using techniques similar to the ones used to intercept
    mobile internet traffic and text message data.

    The documents also reveal two agencies increasingly convinced of the importance
    of mobile applications data.

    The joint spying programme "effectively means that anyone using Google Maps on
    a smartphone is working in support of a GCHQ system" one 2008 document from
    the British intelligence agency is quoted as saying.

    Another GCHQ report, in 2012, laid out how to extract information from Angry Birds
    user information from phones on the Android operating system. The game has been
    download 1.7 billion times across the world.

    The British spy agency said it would not comment on intelligence matters, but
    insisted that all of its activity was "authorised, necessary and proportionate".

    Another NSA document described a "golden nugget" - a perfect scenario where NSA
    analysts could get broad selections of information from the applications, including
    networks the phone had connected to, documents downloaded, websites visited
    and "buddy lists".

    Other applications mentioned by the documents include the photo-sharing site
    Flickr, movie-based social network Flixster and applications that connect to Facebook.

    Developers are responsible for the information generated from each application, but
    there was no suggestion firms were actively agreeing to give the spy agencies data.

    On Monday, the justice department announced it had reached had agreement with
    five major internet firms over their request to share information about how they
    responded to orders from the NSA and other agencies.

    Google, Microsoft, Yahoo, Facebook and LinkedIn had previously sued the US
    government over making more information on what they released to intelligence agencies public.

    Under the compromise announced, the firms will be able to release:

    report the number of criminal-related orders from the government the number of
    secret national security-related orders from government investigators, rounded to
    the nearest thousand how many national security-related orders came from the
    foreign service intelligence and the number of customers those orders affected
    whether those orders were for just email addresses or covered additional
    information.As part of the deal, the firms will delay releases of the number of
    national security orders by six months and promise they cannot reveal government
    surveillance of new technology or forms of communications they create for two years.

    http://www.bbc.co.uk/news/world-us-canada-25922569
    Last edited by Cidersomerset; 28th January 2014 at 01:50.

  9. Link to Post #568
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    64
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,815 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations



    Bruce Schneier: 'NSA and GCHQ have betrayed the trust of the internet'



    27 January 2014 Last updated at 12:54 GMT

    Security expert and technologist Bruce Schneier has told the BBC that he believes
    the NSA and GCHQ have "betrayed the trust of the internet".

    Mr Schneier said: "We have to trust the infrastructure [of the internet]... The fact
    that it has been subverted in ways we don't understand... we don't know what to
    trust. And that is an enormous blow to the global promise of the internet."

    He added that the NSA's "collect-it-all" mentality is "not effective" but it is the way
    the "intelligence community operates".

  10. Link to Post #569
    Australia Avalon Member Anchor's Avatar
    Join Date
    10th February 2010
    Location
    NSW, Australia
    Language
    English
    Age
    62
    Posts
    4,641
    Thanks
    11,310
    Thanked 26,237 times in 3,771 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    Quote Mr Schneier said: "We have to trust the infrastructure [of the internet]... The fact
    that it has been subverted in ways we don't understand... we don't know what to
    trust. And that is an enormous blow to the global promise of the internet."
    If you subscribe to the notion that Edward Snowden is a psy-op then one could conclude that this was the objective. After all, one has to know big-brother is watching you, all the time, in all the places.
    -- Let the truth be known by all, let the whole truth be known by all, let nothing but the truth be known by all --

  11. Link to Post #570
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    64
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,815 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations



    27 January 2014 Last updated at 13:10

    After Snowden: How vulnerable is the internet?Google seeks reform
    Tapping the net
    Global opinions
    Surveillance glossary

    By Adam Blenford & Christine Jeavans

    BBC News


    The BBC's Gordon Corera explains how agencies spy in the digital world

    Vid on link...http://www.bbc.co.uk/news/technology-25832341


    The internet was designed to be free and open. Eight months after Edward
    Snowden's first leaks of classified information, is that still the case?

    The technology pioneers who designed the net's original protocols saw their
    creation as a way to share information freely across a network of networks.

    Yet Edward Snowden's leaks of classified documents from the US National Security
    Agency have revealed that American spies - and their British counterparts at GCHQ
    - now use that very same internet to sweep up vast amounts of data from the
    digital trail we leave every day.

    It isn't simply that they mine social media updates and the information we already
    give to companies. The NSA and GCHQ have allegedly tapped into the internet's
    structure.


    An ever-growing network



    Much like the universe in the aftermath of the Big Bang, the internet is expanding.
    From humble beginnings as a project within the US Department of Defense, the net
    has grown with each technological advance.

    This growth has required an ever-expanding physical infrastructure of routers,
    cables, data centres and other hardware. Between 1994 and 2013 they multiplied
    many times over.

    Internet backbone



    Map showing Google and Amazon, Level 3 and Cogent

    The giants of the net are companies and organisations that provide the so-called
    internet backbone, transferring data around the net over high capacity fibre optic cables.

    This map, made using data from Peer 1's Map of the Internet, shows the relative
    connectedness of organisations online. The biggest blobs - those with the most
    connections - are the backbone firms, dwarfing the likes of Google and Amazon.

    How data is transferred



    Map of connections
    Almost everything we do online passes through a backbone company. If, for
    example, a student living in London sends an email to a friend in Brazil, the
    message will hop around the network and will often travel through a backbone firm
    like Level 3 Communications in the USA, which describes itself as "network provider
    for much of the world's communications infrastructure".

    So if the cables of firms like Level 3 were intercepted, the security agencies would
    have access to a huge amount of the world's internet traffic.

    In November 2013, the New York Times reported that the NSA may have accessed
    Google and Yahoo via Level 3's cables.

    In statement, the firm told the BBC: "We comply with applicable laws in each of the
    countries where we operate. In many instances, laws forbid us from revealing any
    details relating to our compliance, and make it a crime for us to discuss any
    required access to data.

    "Some media sources have incorrectly speculated that we have agreements with
    governments where we voluntarily provide access to network data even when we
    are not compelled to do so. That is incorrect. Customer privacy is paramount to our
    business. We do not allow unauthorised access to our network by any entity and
    will continue to operate our network to protect and secure our customers' data,
    while adhering to the laws that apply to Level 3 as well as all other
    telecommunications providers."

    Tapping cables


    Map of submarine cables
    Land-based cables are not the only physical access points for intercepting data.

    Snowden documents published in the Guardian last June indicate that the US and
    Britain's spy programmes aimed at "mastering the internet" include tapping the
    undersea cables through which data - and phone calls - flow.

    The documents claim GCHQ was able to monitor up to 600 million communications
    every day. The information describing internet and phone use was allegedly stored
    for up to 30 days in order for it to be sifted and analysed.

    GCHQ declined to comment on the claims but said its compliance with the law was "scrupulous".

    Continue reading the main story INTERACTIVEViviane Reding, David Drummond
    and Bruce Schneier EU Justice Commissioner Viviane Reding: 'Snowden was a wake-up call'
    Google's David Drummond: 'I was outraged by the bulk surveillance'
    Technologist Bruce Schneier: 'They betrayed the trust of the internet '

    Viviane Reding

    http://www.bbc.co.uk/news/technology-25832341

    The EU Justice Commissioner, Viviane Reding, says the revelation that the NSA had
    been spying on the European Union was a "wake-up call".


    David Drummond

    http://www.bbc.co.uk/news/technology-25832341

    Chief Legal Officer of Google David Drummond reveals he was "shocked, surprised
    and outraged" by Edward Snowden's revelations that the NSA hacked the company's data.
    Bruce Schneier

    http://www.bbc.co.uk/news/technology-25832341

    Technology expert Bruce Schneier says that the revelations that the internet's
    infrastructure has been breached means "we don't know who to trust".

    The future

    The scale of the NSA's data collection is hard to comprehend. And opinions about
    its legitimacy are divided: some believe it is a vital bulwark against terror attacks
    while others insist the programmes are dangerous infringements of civil liberties.

    The Snowden revelations may lead to a change in how governments and large
    organisations use the internet.

    There has been talk of the internet "breaking up" so that, for example,
    communications which start and end in Europe only travel along European cables.

    "Data is power, and data is money," security expert Bruce Schneier, who has
    analysed the Snowden documents for journalist Glenn Greenwald, told the BBC.

    "These discussions about who has control of data are bigger than the NSA, bigger
    than surveillance, and they are the key questions of the information age."

    But technology experts say this would make business more difficult to carry out
    online and may make the easy global access to which we have become accustomed
    a thing of the past.

    "I don't think we know what the internet is going to transform into because of this,"
    Mr Schneier said.

    http://www.bbc.co.uk/news/technology-25832341
    Last edited by Cidersomerset; 28th January 2014 at 02:09.

  12. Link to Post #571
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    64
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,815 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    Bill Maher is either showing his ignorance of world affairs or
    deliberately being a idiot.

    Shows Bill Maher Interviews Glenn Greenwald: Edward Snowden Always Says Something F*cking Nuts




    Published on 18 Jan 2014


    January 17, 2014 - Bill Maher Interview w/ Glenn Greenwald - Bill Maher returned
    to TV Friday night, and kicked things off with journalist Glenn Greenwald to talk
    about the NSA, and one of the things they addressed was Edward Snowden himself,
    and Maher admitted that he doesn't like how every time Snowden speaks, he
    comes out saying "something completely nuts."

    Maher cited Snowden saying that NSA surveillance was more about social control
    and almost not at all about terrorism. Greenwald shot back, "What's nuts is the fact
    that you think that's nuts." He argued that the bulk of what the NSA does "has
    nothing to do with national security" and said Snowden only speaks that way
    because he's not a trained politician with a filter and people constantly whispering
    in his ear.

    Maher granted him that, but maintained that "every time he opens his mouth, he
    always says something f*cking nuts."

  13. Link to Post #572
    United States Avalon Member Openmindedskeptic's Avatar
    Join Date
    11th March 2013
    Posts
    342
    Thanks
    462
    Thanked 1,359 times in 313 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations



    Published on Jan 24, 2014

    NSA whistleblower Kirk Wiebe & former CIA analyst Ray McGovern point to the brashness of intelligence officials who went on the record to threaten Snowden's life, reflecting a culture of disregard for the Constitution and due process.
    "All truth passes through three stages. First, it is ridiculed. Second, it is violently opposed. Third, it is accepted as being self-evident." - Arthur Schopenhauer

  14. The Following User Says Thank You to Openmindedskeptic For This Post:

    Cidersomerset (28th January 2014)

  15. Link to Post #573
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    64
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,815 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    NSA's big nose in big business: Snowden says agency spies on industry



    Published on 27 Jan 2014


    The NSA agency is not preoccupied solely with national security,
    but also spies on foreign industrial entities in US business interests,
    former American intelligence contractor, Edward Snowden, has
    revealed in an interview to German TV. READ MORE: http://on.rt.com/4knl08

  16. The Following User Says Thank You to Cidersomerset For This Post:

    Openmindedskeptic (28th January 2014)

  17. Link to Post #574
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    64
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,815 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    CIA whistleblower's letters from prison deemed 'dangerous'



    Published on 28 Jan 2014


    The Bureau of Prisons is making a concerted effort to stop CIA whistleblower John Kiriakou
    from sending letters from prison. Kiriakou was the first CIA official to acknowledge torture
    was an official US policy under the George W. Bush administration. He is currently serving
    a 30-month sentence for leaking the name of an officer involved in the agency's rendition
    program. While in prison, Kiriakou began writing "Letters from Loretto," in which he
    communicates with supporters and describes his prison experiences, including calling out
    corruption and illegal activities taking place in prison. In August, prison officials made a
    deal with Kiriakou that would allow him to serve out the end of his sentence in a halfway
    house in exchange for no longer writing the letters. But then the prison officials reneged
    on the deal, Kiriakou says. RT's Ameera David discusses Kiriakou and the Letters from
    Loretto with Kevin Gosztola, a blogger at Firedoglake, the collaborative blog site that
    publishes Kiriakou's letters.

  18. The Following 3 Users Say Thank You to Cidersomerset For This Post:

    Agape (29th January 2014), Mad Hatter (10th February 2014), Sunny-side-up (17th February 2014)

  19. Link to Post #575
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    64
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,815 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations







    Huge swath of GCHQ mass surveillance is illegal, says top lawyer

    Legal advice given to MPs warns that British spy agency is 'using gaps in regulation
    to commit serious crime with impunity'

    Follow Nick Hopkins by emailBeta

    Nick Hopkins
    The Guardian, Tuesday 28 January 2014 20.01 GMT


    Link to video: Legality of GCHQ surveillance questioned by leading lawyer

    GCHQ's mass surveillance spying programmes are probably illegal and have been
    signed off by ministers in breach of human rights and surveillance laws, according
    to a hard-hitting legal opinion that has been provided to MPs.

    The advice warns that Britain's principal surveillance law is too vague and is almost
    certainly being interpreted to allow the agency to conduct surveillance that flouts
    privacy safeguards set out in the European convention on human rights (ECHR).

    The inadequacies, it says, have created a situation where GCHQ staff are potentially
    able to rely "on the gaps in the current statutory framework to commit serious
    crime with impunity".

    At its most extreme, the advice raises issues about the possible vulnerability of
    staff at GCHQ if it could be proved that intelligence used for US drone strikes
    against "non-combatants" had been passed on or supplied by the British before
    being used in a missile attack.

    "An individual involved in passing that information is likely to be an accessory to
    murder. It is well arguable, on a variety of different bases, that the government is
    obliged to take reasonable steps to investigate that possibility," the advice says.

    The opinion suggests the UK should consider publishing a memorandum of
    understanding with any country with which it intends to share intelligence.

    This would clarify what the intelligence can be used for under British law, and how
    the data will be stored and destroyed.

    The legal advice has been sent to the 46 members of the all-party parliamentary
    group on drones, which is chaired by the Labour MP, Tom Watson.

    Following disclosures over mass surveillance provided by the whistleblower Edward
    Snowden, the committee began looking at how intelligence is transferred from UK
    agencies to those in the US, such as the National Security Agency and CIA.

    In a 32-page opinion, the leading public law barrister Jemima Stratford QC raises a
    series of concerns about the legality and proportionality of GCHQ's work, and the
    lack of safeguards for protecting privacy.

    It makes clear the Regulation of Investigatory Powers Act 2000 (Ripa), the British
    law used to sanction much of GCHQ's activity, has been left behind by advances in
    technology. The advice warns:

    • Ripa does not allow mass interception of contents of communications between
    two people in the UK, even if messages are routed via a transatlantic cable.

    • The interception of bulk metadata – such as phone numbers and email addresses
    – is a "disproportionate interference" with article 8 of the ECHR.

    • The current framework for the retention, use and destruction of metadata is
    inadequate and likely to be unlawful.

    • If the government knows it is transferring data that may be used for drone strikes
    against non-combatants in countries such as Yemen and Pakistan, that is probably unlawful.

    • The power given to ministers to sanction GCHQ's interception of messages
    abroad "is very probably unlawful".

    The advice says Ripa "provides too wide a discretion" to the foreign secretary,
    William Hague, and "provides almost no meaningful restraint on the exercise of
    executive discretion in respect of external communications".

    Such surveillance may also be a breach of the ECHR, it adds.

    "We consider the mass interception of external contents and communications data
    is unlawful. The indiscriminate interception of data, solely by reference to the
    request of the executive, is a disproportionate interference with the private life of
    the individuals concerned."

    Last June, Snowden leaked thousands of files about the surveillance activities of
    GCHQ and its US counterpart the NSA.

    One of the key revelations focussed on Operation Tempora, a GCHQ programme
    that harvests vast amounts of information by tapping into the undersea cables that
    carry internet and phone traffic passing in and out of the UK. GCHQ and Hague,
    have repeatedly insisted the agency acts in accordance with the law.

    Last year, Hague told MPs: "It has been suggested GCHQ uses our partnership with
    the US to get around UK law, obtaining information that they cannot legally obtain
    in the UK. I wish to be absolutely clear that this accusation is baseless."

    However, the legal advice poses awkward new questions about the framework
    GCHQ operates within, the role of ministers and the legality of transferring bulk
    data to other spy agencies.

    The advice makes clear Ripa does not allow GCHQ to conduct mass surveillance on
    communications between people in the UK, even if the data has briefly left British
    shores because the call or email has travelled to an internet server overseas.

    GCHQ can seek a warrant allowing it to spy on a named person or premises in the
    UK – but Ripa was not intended to permit untargeted fishing expeditions in the UK.

    The advice also takes issue with Ripa's distinction between metadata and content of
    messages; when Ripa was passed this was analogous to the difference between the
    address on an envelope and the letter within it.

    Under Ripa, GCHQ is allowed to gather and store metadata with few restrictions,
    but requires more exacting ministerial approval to read the content of messages.

    However, the advice notes that "the significance of that boundary has been eroded
    by the realities of modern internet usage" because metadata can allow you to build
    up a much more complete picture of an individual's private life.

    "The distinction between contents and communications data has become
    increasingly artificial. Many of the most 'important' aspects of an individual's
    online 'private life' can be accessed via their communications data or 'metadata'."


    The advice concludes: "In short, the rules concerning communications data are too
    uncertain and do not provide sufficient clarity to be in accordance with the law …
    we consider the mass interception of communications via a transatlantic cable to be
    unlawful, and that these conclusions would apply even if some or all of the
    interception is taking place outside UK territorial waters."

    Leaving decisions about whether data can be shared with agencies abroad to
    the "unfettered discretion" of ministers is also a probable breach of the convention,
    the advice warns.

    "First, the transfer of private data is a significant interference with an individual's
    article 8 rights. That interference will only be lawful when proportionate.

    "Secondly, the ECHR has held on more than one occasion that surveillance, and the
    use of surveillance data, is an area in which governments must conduct themselves
    in a transparent and 'predictable' manner. The current framework is uncertain: it relies on the discretion of one individual.

    "Thirdly, on a pragmatic level,there is a real possibility that the NSA might function
    as GCHQ's unofficial 'backup' service. If GCHQ is not entitled to hold onto data
    itself, it might transfer it to the NSA. In time, and if relevant, that data might be
    transferred back to GCHQ. Without strong guidelines and scrutiny, the two services
    might support each other to (in effect) circumvent the requirements of their domestic legislation."

    The opinion adds: "If GCHQ transfers communications data to other governments it
    does so without any statutory restrictions. Such transfers are a disproportionate
    interference with the article 8 rights of the individuals concerned. There are no
    restrictions, checks or restraints on the transfer of that data."

    The opinion notes that the UK has not adopted the doctrine of "anticipatory self-
    defence" in the same way as the US to provide legal cover for drone strikes in
    countries where it is not involved in an international armed conflict.

    "Accordingly, in our view, if GCHQ transferred data to the NSA in the knowledge
    that it would or might be used for targeting drone strikes, that transfer is probably
    unlawful," the advice states.

    "The transferor would be an accessory to murder for the purposes of domestic law
    … We consider that, pursuant to the transfer, the agent is likely to become an
    accessory to murder."

    Watson said he would be submitting the legal opinion to the parliamentary
    intelligence and security committee, which is undertaking an inquiry into mass
    surveillance.

    "MPs now have strong independent advice questioning the legality of major UK
    intelligence programmes," he said.

    "If ministers are prepared to allow GCHQ staff to be potential accessories to
    murder, they must be very clear that they are responsible for allowing it. We have
    seen a step change in mass covert surveillance and intelligence gathering,
    underpinned on dubious legal grounds and with virtually no parliamentary oversight.

    "The leadership of all the main parties should stop turning a blind eye to a
    programme that has far-reaching consequences around the globe."

    http://www.theguardian.com/uk-news/2...ing-law-lawyer
    Last edited by Cidersomerset; 29th January 2014 at 22:33.

  20. The Following 2 Users Say Thank You to Cidersomerset For This Post:

    Mad Hatter (10th February 2014), Sunny-side-up (17th February 2014)

  21. Link to Post #576
    UK Avalon Member Cidersomerset's Avatar
    Join Date
    16th May 2011
    Location
    Bridgwater somerset UK
    Age
    64
    Posts
    22,333
    Thanks
    33,460
    Thanked 79,815 times in 18,702 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    The NSA & GCHQ Surveillance Made Simple



    Published on 18 Jan 2014

  22. The Following 3 Users Say Thank You to Cidersomerset For This Post:

    Mad Hatter (10th February 2014), Openmindedskeptic (30th January 2014), Sunny-side-up (17th February 2014)

  23. Link to Post #577
    Sweden Avalon Member Slorri's Avatar
    Join Date
    10th February 2012
    Posts
    185
    Thanks
    313
    Thanked 518 times in 158 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    What The Rest Of The World Heard Snowden Say Last Week That US Censored (Video)

    http://beforeitsnews.com/spies-and-i...-fbshare-small

  24. The Following 3 Users Say Thank You to Slorri For This Post:

    Atlas (9th February 2014), Cidersomerset (3rd February 2014), Mad Hatter (10th February 2014)

  25. Link to Post #578
    Unsubscribed
    Join Date
    22nd January 2013
    Location
    Toronto
    Posts
    764
    Thanks
    4,724
    Thanked 3,847 times in 715 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    Microsoft, Facebook, Google and Yahoo release US surveillance requests

    Spencer Ackerman in Washington and Dominic Rushe in New York
    Monday 3 February 2014
    http://www.theguardian.com/world/201...lance-requests

    • Tech giants turn over data from tens of thousands of accounts
    • Limited disclosure part of transparency deal made last month




    Quote Tens of thousands of accounts associated with customers of Microsoft, Google, Facebook and Yahoo have their data turned over to US government authorities every six months as the result of secret court orders, the tech giants disclosed for the first time on Monday.

    As part of a transparency deal reached last week with the Justice Department, four of the tech firms that participate in the National Security Agency’s Prism effort, which collects largely overseas internet communications, released more information about the volume of data the US demands they provide than they have ever previously been permitted to disclose.

    But the terms of the deal prevent the companies from itemising the collection, beyond bands of thousands of data requests served on them by a secret surveillance court. The companies must also delay by six months disclosing information on the most recent requests – terms the Justice Department negotiated to end a transparency lawsuit before the so-called Fisa court that was brought by the companies.

    In announcing the updated data figures, the companies appeared concerned by the lack of precision over the depth of their compelled participation in government surveillance.

    “We still believe more transparency is needed so everyone can better understand how surveillance laws work and decide whether or not they serve the public interest,” said Google’s legal director for law enforcement and information security, Richard Salgado, in a post on the company’s official blog.

    “Specifically, we want to disclose the precise numbers and types of requests we receive, as well as the number of users they affect in a timely way.”
    In the most recent period for which data is available, January to June 2013 – a period ended by the beginning of whistleblower Edward Snowden’s landmark surveillance disclosures – Google gave the government the internet metadata of up to 999 customer accounts, and the content of communications from between 9,000 and 9,999 customers.

    Microsoft received fewer than 1,000 orders from the Fisa court for communications content during the same period, related to between 15,000 and 15,999 “accounts or individual identifiers”.

    The company, which owns the internet video calling service Skype, also disclosed that it received fewer than 1,000 orders for metadata – which reveals communications patterns rather than individual message content – related to fewer than 1,000 accounts or identifiers.

    Yahoo disclosed that it gave the government communications content from between 30,000 and 30,999 accounts over the first six months of 2013, and fewer than 1,000 customer accounts that were subject to Fisa court orders for metadata.

    Facebook disclosed that during the first half of 2013, it turned over content data from between 5000 and 5999 accounts – a rise of about 1000 from the previous six month period – and customer metadata associated with up to 999 accounts.
    Microsoft, Facebook and Yahoo also gave the FBI certain customer records – not content – under a type of non-judicial subpoena called a national security letter. Since disclosure of national security letters is not subject to a six-month delay under last week’s deal, Microsoft revealed that it received up to 999 such subpoenas between June and December 2013, affecting up to 999 user accounts. Facebook’s National Security Letter total was the same.

    Yahoo received up to 999 national security letters during the same period, affecting 1,000 to 1,999 accounts. Google received the same total, and disclosed that since 2009, national security letters have compelled the handover of customer records from as many as 1999 accounts every six months. Last week Apple disclosed that between 1 January and 30 June 2013 it had received less than 250 national security orders – including national security letters and other requests – relating to less than 250 accounts.

    LinkedIn, the professional networking service, disclosed on Monday that it received the same total of generic “national security requests.”

    Brad Smith, Microsoft’s general counsel, posted on the company’s blog that “only a fraction of a percent of users are affected by these orders”, and argued that “we have not received the type of bulk data requests that are commonly discussed publicly regarding telephone records.”

    But the disclosures only apply to data requests turned over to the NSA and FBI as the result of Fisa court orders.

    Documents that Snowden disclosed to the Guardian, Washington Post and other outlets show that the NSA also siphons communications and associated data from information in transit across the global communications infrastructure – without court orders, under authority claimed under a seminal executive order known as executive order 12,333.

    “Nothing in today's report minimises the significance of efforts by governments to obtain customer information outside legal process,” Smith said, affirming that the company remained concerned about reports of clandestine government hacking and would continue to press for more transparency from the US government and others.


    Google data shows a significant growth in internet content collection from its products by the NSA.

    The data from Google shows a significant growth in internet content collection from its products by the NSA. In the first six months of 2009, the company gave the government data from up to 2,999 customer accounts, a figure that grew to between 12,000 and 12,999 customer accounts by the second half of 2012 before dipping to under 10,000 accounts in the first half of 2013.

    But the data does not provide any indication of what accounted for the rise, beyond the growth in popularity of Google email and other internet products.

    Similarly, Microsoft revealed that it gave the US government content information on more than 12,000 customer accounts in the second half of 2011, a figure that grew to over 16,000 customer accounts in late 2012 before dropping to more than 15,000 in the first six months of 2013.

    Kevin Bankston, the policy director for the Open Technology Institute in Washington, said the amount of information the companies were able to detail about their roles in US surveillance was “far less than what we need for adequate accountability from the government”.

    “Lumping all of the different types of surveillance orders together into one number, then adding obscurity on top of obscurity by requiring that number to be reported in ranges of one thousand, is not enough to educate the American public or reassure the international community that the NSA is using its surveillance authorities responsibly," said Bankston, who like Google’s Salgado advocated legislation permitting the additional disclosure of “specific number of requests issued under specific legal authorities and the number of people affected by each”.

    Nate Cardozo, a staff attorney at the Electronic Frontier Foundation, said the new information in the transparency reports was “a good first step” but added that large questions remained. Cardozo said the national security letters had all been “lumped together” and it was impossible to see what legal framework had been used to compel the companies to hand over information.

    “It makes you question the government’s repeated assertions that it welcomes this debate,” he said.

    Microsoft’s Smith lamented that “despite the president's reform efforts and our ability to publish more information, there has not yet been any public commitment by either the US or other governments to renounce the attempted hacking of internet companies.

    “We believe the constitution requires that our government seek information from American companies within the rule of law. We'll therefore continue to press for more on this point, in collaboration with others across our industry.”

  26. Link to Post #579
    On Sabbatical
    Join Date
    10th July 2013
    Location
    Project Avalon
    Posts
    3,649
    Thanks
    19,216
    Thanked 16,271 times in 3,219 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations

    Quote Posted by Slorri (here)
    What The Rest Of The World Heard Snowden Say Last Week That US Censored (Video)
    http://beforeitsnews.com/spies-and-i...-fbshare-small
    Snowden was interviewed by a German television network ARD. In the interview, Mr. Snowden lays out a succinct case as to how these domestic surveillance programs undermines and erodes human rights and democratic freedom.



    Clapper lies to the world

    He stated his tipping point was when “seeing Director of National Intelligence, James Clapper, directly lie under oath to Congress” denying the existence of a domestic spying programs while under questioning in March of last year. Under oath, Clapper said the government did “not wittingly” collect data on millions of Americans, a blatant lie for which he later apologized to the panel, changed his story and tried to justify his lie.



    “The public had a right to know about these programs,” Snowden said. “The public had a right to know that which the government is doing in its name, and that which the government is doing against the public.”




    Source: Watch on Vimeo


  27. The Following 4 Users Say Thank You to Atlas For This Post:

    Cidersomerset (10th February 2014), Mad Hatter (10th February 2014), mountain_jim (10th February 2014), Wind (10th February 2014)

  28. Link to Post #580
    United States Avalon Member Openmindedskeptic's Avatar
    Join Date
    11th March 2013
    Posts
    342
    Thanks
    462
    Thanked 1,359 times in 313 posts

    Default Re: Edward Snowden: the whistleblower behind the NSA surveillance revelations



    Quote Foolish attempt to criminalize journalism - USA Today

    It's an idea that needs to have a stake driven through its heart — right away.

    Rep. Mike Rogers, R-Mich., is floating the notion that journalists who publish articles based on classified information might be criminals who are "fencing stolen material."

    Rogers is chairman of the House Intelligence Committee. But this is a proposition that has no intelligence at all.

    "So if I'm a newspaper reporter for — fill in the blank — and I sell stolen material, is that legal because I'm a newspaper reporter?" Rogers asked FBI Director James Comey at a hearing Tuesday. "If I'm hawking stolen, classified material that I'm not legally in possession of for personal gain and profit, is that not a crime?"

    After the hearing, according to Politico, Rogers made clear to reporters that he was talking about Glenn Greenwald, who has led the way in the coverage of the National Security Agency's rampant surveillance. Greenwald, a lawyer and freelance journalist based in Brazil, filed his stories on a freelance basis for the British newspaper The Guardian. They were based on classified documents leaked by former NSA contractor Edward Snowden.

    "For personal gain, he's now selling his access to information; that's how they're terming it," Rogers said. "A thief selling stolen material is a thief."

    With all due respect, writing a story based on classified material is a long way from knocking over a bank. What we have here is a blatant attempt to intimidate journalists by criminalizing their actions. The goal is clearly to choke off publication of articles that are embarrassing or uncomfortable to the government.

    And, like it or not, many revelations clearly in the public interest have come to light because of leaked classified material. Putting journalists in the slammer for producing them may be gratifying to people who don't like the stories. But it's bad for democracy.

    It's important to keep in mind that there are classified documents and then there are classified documents. The federal government for years has been guilty of overclassification, a practice decried by, among many others, the 9/11 commission. Obviously, there is material that needs to be kept secret — no one should be revealing troop movements. But there are many documents shrouded in darkness whose content should be known to the American people.

    To their credit, Snowden and Greenwald, rather than dumping everything onto the Internet, have been selective about what they have disclosed. And here's the payoff: We are having a vitally needed debate about the limits of government snooping, thanks to Greenwald's alleged fencing of stolen property. Pre-Snowden, who knew the NSA was amassing all those phone records of American citizens suspected of absolutely nothing?

    Full Article: http://www.usatoday.com/story/money/c...-

    "Leave no authority existing not responsible to the people."
    —Thomas Jefferson

    Time For A New American Revolution?
    "All truth passes through three stages. First, it is ridiculed. Second, it is violently opposed. Third, it is accepted as being self-evident." - Arthur Schopenhauer

  29. The Following 2 Users Say Thank You to Openmindedskeptic For This Post:

    Cidersomerset (10th February 2014), Mad Hatter (10th February 2014)

+ Reply to Thread
Page 29 of 50 FirstFirst 1 19 29 39 50 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts