background preloader

Nsa

Facebook Twitter

'dutiful, loyal supporters of the president and his polices, good citizens who do nothing to attract negative attention from the powerful, have no reason to fear the surveillance state.

This is the case in every society: those who pose no challenge are rarely targeted by oppressive measures, and from their perspective, they can then convince themselves that oppression does not really exist. But the true measure of a society's freedom is how it treats its dissidents and other marginalized groups, not how it treats good loyalists. ... We shouldn't have to be faithful loyalists of the powerful to feel safe from state surveillance. Nor should the price of immunity be refraining from controversial or provocative dissent. We shouldn't want a society where the message is conveyed that you will be left alone only if you mimic the accommodating behavior and conventional wisdom of a Washington establishment columnist.'
Glenn Greenwald, author of 'No Place to Hide'

NSA Tests Out Smartphones that Recognize Handwriting Motion. The NSA Has Inserted Its Code Into Android OS, Or Three Quarters Of All Smartphones. Over a decade ago, it was discovered that the NSA embedded backdoor access into Windows 95, and likely into virtually all other subsequent internet connected, desktop-based operating systems. However, with the passage of time, more and more people went "mobile", and as a result the NSA had to adapt. And adapt they have: as Bloomberg reports, "The NSA is quietly writing code for Google’s Android OS.

" Is it ironic that the same "don't be evil" Google which went to such great lengths in the aftermath of the Snowden scandal to wash its hands of snooping on its customers and even filed a request with the secretive FISA court asking permission to disclose more information about the government’s data requests, is embedding NSA code into its mobile operating system, which according to IDC runs on three-quarters of all smartphones shipped in the first quarter? Yes, yes it is. From Bloomberg: The story continues: Well one wouldn't want their bug to be visible to users now, would one... NSA taps into Google, Yahoo clouds, can collect data 'at will,' says Post. The NSA has secretly tapped into the private fiber-optic networks that connect Google's and Yahoo's worldwide data centers, allowing the spy agency to suck up "at will" metadata and content belonging to users of the companies' services, according to The Washington Post.

Under a program called MUSCULAR -- a joint project with British NSA counterpart the GCHQ -- the NSA takes advantage of overseas taps to intercept data flowing within Google's and Yahoo's geographically distributed data "clouds," where multiple copies of user data are stored unencrypted, the Post reports. The article cites documents leaked by former NSA contractor Edward Snowden, as well as unnamed "knowledgeable officials. " Such data might include, for example, information in Gmail accounts or in Google Drive files. In a statement to the Post, Google said it was "troubled by allegations of the government intercepting traffic between our data centers, and we are not aware of this activity. Update, 11:35 a.m. Inner workings of a top-secret spy program. PRISM providers NSA collects, identifies, sorts and stores at least 11 different types of electronic communications Chats E-mail Filetransfers Internettelephone Login/ID Metadata Photos Socialnetworking Storeddata Video Videoconferencing How the PRISM program works Targeting a “selector” An NSA analyst types one or more search terms, or “selectors.”

Along with the selectors, the analyst must fill out an electronic form that specifies the foreign-intelligence purpose of the search and the basis for the analyst’s “reasonable belief” that the search will not return results for U.S. citizens, permanent residents or anyone else who is located in the United States. Accessing private companies’ data The search request, known as a “tasking,” can be sent to multiple sources — for example, to a private company and to an NSA access point that taps into the Internet’s main gateway switches. Data processed by NSA computers The same FBI-run equipment sends the search results to the NSA. What the analyst sees.

​NSA develops cyber weapons, ‘attacker mindset’ for domination in digital war – Snowden leaks. Published time: January 17, 2015 23:37 Reuters/Rick Wilking Mass surveillance by the NSA was apparently just the beginning. The agency is now preparing for future wars in cyberspace, in which control over the internet and rival networks will be the key to victory, documents leaked by Edward Snowden reveal. The National Security Agency’s aim is to be able to use the web to paralyze the enemy’s computer networks and all infrastructures they control – including power and water supplies, factories, airports, and banking systems, Der Spiegel magazine wrote after viewing the secret files.

The publication stresses that international conventions regulating the new digital weapons of the 21st century are almost non-existent, and the only law that applies in the field is “the survival of the fittest. " Mass surveillance by the NSA was only "Phase 0" in America’s digital war strategy, according to the leaked documents. Slide from NSA presentation published by Der Spiegel.

Timeline of NSA Domestic Spying. The Intercept. The NSA and Me. The tone of the answering machine message was routine, like a reminder for a dental appointment. But there was also an undercurrent of urgency. “Please call me back,” the voice said. “It’s important.” What worried me was who was calling: a senior attorney with the Justice Department’s secretive Office of Intelligence Policy and Review. By the time I hung up the payphone at a little coffee shop in Cambridge, Mass., and wandered back to my table, strewn with yellow legal pads and dog-eared documents, I had guessed what he was after: my copy of the Justice Department’s top-secret criminal file on the National Security Agency.

It was July 8, 1981, a broiling Wednesday in Harvard Square, and I was in a quiet corner of the Algiers Coffee House on Brattle Street. The author in Hawaii, 1967 For several years I had been working on my first book, The Puzzle Palace, which provided the first in-depth look at the National Security Agency. “You Want to Hear Something Interesting?” NSA Ft. ICREACH: How the NSA Built Its Own Secret Google -The Intercept. The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept. The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies.

Planning documents for ICREACH, as the search engine is called, cite the Federal Bureau of Investigation and the Drug Enforcement Administration as key participants. ICREACH contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden. One-Stop Shopping Project CRISSCROSS. Exclusive: NSA pays £100m in secret funding for GCHQ | UK news. The US government has paid at least £100m to the UK spy agency GCHQ over the last three years to secure access to and influence over Britain's intelligence gathering programmes. The top secret payments are set out in documents which make clear that the Americans expect a return on the investment, and that GCHQ has to work hard to meet their demands.

"GCHQ must pull its weight and be seen to pull its weight," a GCHQ strategy briefing said. The funding underlines the closeness of the relationship between GCHQ and its US equivalent, the National Security Agency. But it will raise fears about the hold Washington has over the UK's biggest and most important intelligence agency, and whether Britain's dependency on the NSA has become too great. In one revealing document from 2010, GCHQ acknowledged that the US had "raised a number of issues with regards to meeting NSA's minimum expectations".

It said GCHQ "still remains short of the full NSA ask". In 2011/12 the NSA paid another £34.7m to GCHQ. Edward Snowden condemns Britain's emergency surveillance bill | World news. Loaded: 0% Progress: 0% The NSA whistleblower Edward Snowden has condemned the new surveillance bill being pushed through the UK's parliament this week, expressing concern about the speed at which it is being done, lack of public debate, fear-mongering and what he described as increased powers of intrusion.

In an exclusive interview with the Guardian in Moscow, Snowden said it was very unusual for a public body to pass an emergency law such as this in circumstances other than a time of total war. "I mean we don't have bombs falling. We don't have U-boats in the harbour. " Suddenly it is a priority, he said, after the government had ignored it for an entire year. "It defies belief. " "I mean the NSA could have written this draft," he said. David Cameron, searching for cross-party support, assured the Liberal Democrats and Labour that there would be no extension of the powers.

But internal Home Office papers seen by the Guardian appear to confirm that there would be an expansion of powers. Sites/all/files/fusion_centers.pdf. Subrealism: xkeyscore renders the security state more powerful than the 1% (deep state) Targetfreedom | Apparently the criminals in the United States government now have a vested interest in keeping Edward Snowden alive and safe. A classified briefing was given to members of Congress on Wednesday Feb. 6, 2014. Leading members of the House Armed Services Committee emerged from the classified briefing “shocked” at the amount of information Edward Snowden reportedly took with him when he left the country. Congressional members were informed that Snowden possesses: A complete roster of absolutely every employee, and official, in the entire US Government.

The names, home addresses, unlisted personal home telephone numbers, personal cellular phone numbers, dates of birth and social security numbers of every person involved in any way, with any department of the US Government. This database even extends to government contractors, bankers, Corporate Boards Of Directors and the entire private support apparatus for the Federal government. Britain's response to the NSA story? Back off and shut up | Simon Jenkins. William Hague told the Commons that every intercept had to be personally signed by him. Link to video: NSA Prism programme: William Hague makes statement on GCHQ On Monday the Guardian carried a story that British intelligence had spied on delegates at two G20 summits, those chaired by Gordon Brown in 2009. Laptops and mobile phones had been hacked, and internet cafes installed and bugged.

With many of the same heads of government gathering for the G8 summit in Northern Ireland, the story was, to put it mildly, sensational. The source was the American whistleblower, Edward Snowden, whose revelations about the US National Security Agency had been running in the Guardian and Washington Post for a week. It vanished from general view. Complaints at the bugging from governments in Turkey, South Africa and Germany have poured into the Foreign Office, yet the nearest British journalists can get to the story is to report the protests as foreign news. What matters here is first the mendacity.

Obama's Pledge to Curtail NSA Phone Meta Data Collection is Meaningless - Here's Why. Sorry to burst your bubble, but Obama's recent announcement regarding the scaling back of the NSA's phone metadata collection, was not a watershed moment. This was nothing but a public relations distraction, designed to give the public the illusion of reform. First of all the proposed changes apply only to telephone messages - not email, social media, video cameras, internet searches, Skype calls, etc. To put this into perspective, none of Edward Snowden's leaks dealt with phone metadata. Not one of them. Remember PRISM? And PRISM was just the tip of the iceberg. Any of this would have landed a private citizen in prison, but none of this blatantly criminal activity is slated to stop with the proposal put forth by Obama.

Even if the most significant violations of privacy were going to be curtailed (and they're not), the proposal itself doesn't even achieve what it claims to. Obama's proposal essentially just outsources the hard drives. This is not reform. Did you find this interesting? Boundless Informant: the NSA's secret tool to track global surveillance data.

The National Security Agency has developed a powerful tool for recording and analysing where its intelligence comes from, raising questions about its repeated assurances to Congress that it cannot keep track of all the surveillance it performs on American communications. The Guardian has acquired top-secret documents about the NSA datamining tool, called Boundless Informant, that details and even maps by country the voluminous amount of information it collects from computer and telephone networks. The focus of the internal NSA tool is on counting and categorizing the records of communications, known as metadata, rather than the content of an email or instant message. The Boundless Informant documents show the agency collecting almost 3 billion pieces of intelligence from US computer networks over a 30-day period ending in March 2013. Iran was the country where the largest amount of intelligence was gathered, with more than 14bn reports in that period, followed by 13.5bn from Pakistan.

NSA paying U.S. companies for access to communications networks. New details of the corporate-partner project, which falls under the NSA’s Special Source Operations, confirm that the agency taps into “high volume circuit and packet-switched networks,” according to the spending blueprint for fiscal 2013. The program was expected to cost $278 million in the current fiscal year, down nearly one-third from its peak of $394 million in 2011. Voluntary cooperation from the “backbone” providers of global communications dates to the 1970s under the cover name BLARNEY, according to documents provided by former NSA contractor Edward Snowden. These relationships long predate the PRISM program disclosed in June, under which American technology companies hand over customer data after receiving orders from the Foreign Intelligence Surveillance Court. In briefing slides, the NSA described BLARNEY and three other corporate projects — OAKSTAR, FAIRVIEW and STORMBREW — under the heading of “passive” or “upstream” collection.

“They lose a ton of money,” Gidari said. Sites/all/files/fusion_centers.pdf. On 6/5, 65 Things We Know About NSA Surveillance That We Didn’t Know a Year Ago. It’s been one year since the Guardian first published the Foreign Intelligence Surveillance Court order, leaked by former NSA contractor Edward Snowden, that demonstrated that the NSA was conducting dragnet surveillance on millions of innocent people. Since then, the onslaught of disturbing revelations, from disclosures, admissions from government officials, Freedom of Information Act requests, and lawsuits, has been nonstop.

On the anniversary of that first leak, here are 65 things we know about NSA spying that we did not know a year ago: 1. We saw an example of the court orders that authorize the NSA to collect virtually every phone call record in the United States—that’s who you call, who calls you, when, for how long, and sometimes where. 2. We saw NSA Powerpoint slides documenting how the NSA conducts “upstream” collection, gathering intelligence information directly from the infrastructure of telecommunications providers. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19.

NSA Intercepts Hardware And Installs Surveillance Equipment. For years, the US government loudly warned the world that Chinese routers and other internet devices pose a "threat" because they are built with backdoor surveillance functionality that gives the Chinese government the ability to spy on anyone using them. Yet what the NSA's documents show is that Americans have been engaged in precisely the activity that the US accused the Chinese of doing.

The drumbeat of American accusations against Chinese internet device manufacturers was unrelenting. In 2012, for example, a report from the House Intelligence Committee, headed by Mike Rogers, claimed that Huawei and ZTE, the top two Chinese telecommunications equipment companies, "may be violating United States laws" and have "not followed United States legal obligations or international standards of business behaviour". The committee recommended that "the United States should view with suspicion the continued penetration of the US telecommunications market by Chinese telecommunications companies". Why Can’t Obama End NSA Spying? Rand Paul “who is truly in charge of our government” » Justice Scalia ‘Foolish’ to Have the Supreme Court Decide If NSA Wiretapping Is Unconstitutional Alex Jones. NSA files decoded: Edward Snowden's surveillance revelations explained.

Paper Trail? NSA Releases Email Snowden Sent to Agency Officials. Officials Have Warned for 40 Years that Mass Surveillance Would Lead to Tyranny in America. 500 Years of History Shows that Mass Spying Is Always Aimed at Crushing Dissent Washington. NSA 'Secret Interpretation of Patriot Act - Tapping CONTENT, Not Just Metadata.