UK intelligence agencies spying on lawyers in sensitive security cases. The intelligence services have routinely been intercepting legally privileged communications between lawyers and their clients in sensitive security cases, according to internal MI5, MI6 and GCHQ documents.
The information obtained may even have been exploited unlawfully and used by the agencies in the fighting of court cases in which they themselves are involved, the Investigatory Powers Tribunal (IPT) has been told, resulting in miscarriages of justice. Exchanges between lawyers and their clients enjoy a special protected status under the law. Who is Neustar? Brad Stone at the New York Times reports on an industry group working on a new platform for portable digital movie downloads: The [Digital Entertainment Content Ecosystem or DECE] is setting out to create a common digital standard that would let consumers buy or rent a digital video once and then play it on any device...
Under the proposed system, proof of digital purchases would be stored online in a so-called rights locker, and consumers would be permitted to play the movies they bought or rented on any DECE-compatible device. [DECE is] selecting Neustar, a company based in Sterling, Va., to create the online hub that will store records of people’s digital purchases, with their permission. Most consumers have likely never heard of Neustar, yet the firm plays an important role in the telecommunications industry, and has built a highly profitable business faciliating the disclosure of information regarding consumers' communications to law enforcement and intelligence agencies.
The executive order that led to mass spying, as told by NSA alumni. One thing sits at the heart of what many consider a surveillance state within the US today.
The problem does not begin with political systems that discourage transparency or technologies that can intercept everyday communications without notice. Like everything else in Washington, there’s a legal basis for what many believe is extreme government overreach—in this case, it's Executive Order 12333, issued in 1981. “12333 is used to target foreigners abroad, and collection happens outside the US," whistleblower John Tye, a former State Department official, told Ars recently.
"My complaint is not that they’re using it to target Americans, my complaint is that the volume of incidental collection on US persons is unconstitutional.” ICREACH: How the NSA Built Its Own Secret Google -The Intercept. The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept.
The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. Planning documents for ICREACH, as the search engine is called, cite the Federal Bureau of Investigation and the Drug Enforcement Administration as key participants. NSA/GCHQ: The HACIENDA Program for Internet Colonization. Translations of this article are available in German, French, Italian and Spanish.
Since the early days of TCP, port scanning has been used by computer saboteurs to locate vulnerable systems. In a new set of top secret documents seen by Heise, it is revealed that in 2009, the British spy agency GCHQ made port scans a "standard tool" to be applied against entire nations (Figure 1, see the picture gallery). Twenty-seven countries are listed as targets of the HACIENDA program in the presentation (Figure 2), which comes with a promotional offer: readers desiring to do reconnaissance against another country need simply send an e-mail (Figure 3). Bild 1 von 26 The HACIENDA Programm. Schrodinger's Cat Video and the Death of Clear-Text. You Can Get Hacked Just By Watching This Cat Video on YouTube. Many otherwise well-informed people think they have to do something wrong, or stupid, or insecure to get hacked—like clicking on the wrong attachments, or browsing malicious websites.
People also think that the NSA and its international partners are the only ones who have turned the internet into a militarized zone. But according to research I am releasing today at the Citizen Lab at the University of Toronto’s Munk School of Global Affairs, many of these commonly held beliefs are not necessarily true. The only thing you need to do to render your computer’s secrets—your private conversations, banking information, photographs—transparent to prying eyes is watch a cute cat video on YouTube, and catch the interest of a nation-state or law enforcement agency that has $1 million or so to spare.
To understand why, you have to realize that even in today’s increasingly security-conscious internet, much of the traffic is still unencrypted. Leaked Docs Show Spyware Used to Snoop on U.S. Computers. Software created by the controversial U.K. based Gamma Group International was used to spy on computers that appear to be located in the United States, the U.K., Germany, Russia, Iran and Bahrain, according to a leaked trove of documents analyzed by ProPublica.
It's not clear whether the surveillance was conducted by governments or private entities. Customer email addresses in the collection appeared to belong to a German surveillance company, an independent consultant in Dubai, the Bosnian and Hungarian Intelligence services, a Dutch law enforcement officer and the Qatari government. The leaked files — which were posted online by hackers — are the latest in a series of revelations about how state actors including repressive regimes have used Gamma's software to spy on dissidents, journalists and activist groups. NSA+Law.docx - unnecessary_and_disproportionate.pdf. International Principles on the Application of Human Rights to Communications Surveillance. Secrets, lies and Snowden's email: why I was forced to shut down Lavabit. My legal saga started last summer with a knock at the door, behind which stood two federal agents ready to to serve me with a court order requiring the installation of surveillance equipment on my company's network.
My company, Lavabit, provided email services to 410,000 people – including Edward Snowden, according to news reports – and thrived by offering features specifically designed to protect the privacy and security of its customers. I had no choice but to consent to the installation of their device, which would hand the US government access to all of the messages – to and from all of my customers – as they travelled between their email accounts other providers on the Internet. But that wasn't enough. The federal agents then claimed that their court order required me to surrender my company's private encryption keys, and I balked. Researchers Find 25 Countries Using Surveillance Software.
NIS aquires supercomputer. OSLO/ RIO DE JANEIRO (Dagbladet): The Norwegian military intelligence service collects vast amounts of signal intelligence, known as «sigint».
In Afghanistan alone NIS collected 33 million registrations from telecommunication during 30 days around Christmas 2012, according to their own revelations. Additionally they listen to satellites and radio communication in our own region. Reference Note on Russian Communications Surveillance. Edward Snowden, perhaps under duress, recently participated in a call-in program where selected viewers can pose pre-screened questions directly to Vladimir Putin.
Snowden asked President Putin, “Does Russia intercept, store or analyze in any way the communications of millions of individuals?” Putin denied Russian mass surveillance, saying “Thank God, our special services are strictly controlled by the state and society, and their activity is regulated by law.” Don’t Listen to Google and Facebook: The Public-Private Surveillance Partnership Is Still Going Strong - Bruce Schneier. And real corporate security is still impossible. A surveillance camera outside Google's China headquarters in 2010 (Jason Lee / Reuters) If you’ve been reading the news recently, you might think that corporate America is doing its best to thwart NSA surveillance.
Google just announced that it is encrypting Gmail when you access it from your computer or phone, and between data centers. Last week, Mark Zuckerberg personally called President Obama to complain about the NSA using Facebook as a means to hack computers, and Facebook's Chief Security Officer explained to reporters that the attack technique has not worked since last summer. Yahoo, Google, Microsoft, and others are now regularly publishing "transparency reports," listing approximately how many government data requests the companies have received and complied with. Moroccan website Mamfakinch targeted by government-grade spyware from Hacking Team?
Photo by FADEL SENNA/AFP/GettyImages An email claiming to reveal a political scandal will grab the attention of almost any journalist. But what if the email was just a ruse to make you download government-grade spyware designed to take total control of your computer? It could happen—as a team of award-winning Moroccan reporters recently found out. Ryan Gallagher is a journalist who reports on surveillance, security, and civil liberties. Necessary and Proportionate.
Druckversion - Cover Story: How the NSA Targets Germany and Europe - SPIEGEL ONLINE - News - International. At first glance, the story always appears to be the same. A needle has disappeared into the haystack -- information lost in a sea of data. For some time now, though, it appears America's intelligence services have been trying to tackle the problem from a different angle.
Spies Without Borders Series: Using Domestic Networks to Spy on the World. Much of the U.S. media coverage of the NSA revelations has concentrated on its impact on the constitutional rights of U.S. Internet users. But what about the billions of Internet users around the world whose private information is stored in U.S. servers, or whose data travels across U.S. networks? Below, we're publishing a series of articles looking into how the information disclosed in the NSA leaks affect the international community and how they highlight one part of an international system of surveillance that dissolves what national privacy protections any of us have, whereever we live. Global Dialogue on Governmental Extra-Territorial Surveillance. This is the 6th article of our Spies Without Borders series. The series looks into how the information disclosed in the NSA leaks affects Internet users around the world whose private information is stored in U.S. servers, or whose data travels across U.S. networks.
As news of the alarmingly broad reach and scope of the U.S. surveillance program reverberates around the globe, we call for a global dialogue on the increased capacity of States around the world to conduct sweeping extra-territorial surveillance from domestic soil. An International Perspective on FISA: No Protections, Little Oversight.
Universal, Self-Evident: I'm Not American but I Have Privacy Rights too, NSA. U.S. Foreign Intelligence: From Carte Blanche Surveillance to Weak [Domestic] Protections. International Customers: It's Time to Call on US Internet Companies to Demand Accountability and Transparency. Using Domestic Networks to Spy on the World. Spying on the World From Domestic Soil: International Backlash. Edward Snowden Provides Information on NSA Cyber Spying & Hacking to Hong Kong Newspaper. Expert Says Kiwis Under Constant Surveillance. Washington pushed EU to dilute data protection.
Stratfor. The Surveillance-Industrial Complex. Spy Files. Wikileaks docs reveal that governments use malware for surveillance. >Wikileaks - The Spy files. Thailand: $13 Million for Lese Majesty Web-taps. Occupy Wall Street's 'occucopter' – who's watching whom? Commentary on surveillance. Dangerous Cybercrime Treaty Pushes Surveillance and Secrecy Worldwide. European Commission wants to immunize DHS collaborators in travel surveillance and control. India Eying Access To All Encrypted Services, Not Just Email - MediaNama. Aadhaar: Enrollment, Authentication & Beyond - MediaNama.
Mass surveillance. US: surveillance state. Immigration - Surveillance in the Homeland. Police employ Predator drone spy planes on home front - latimes.com. Busted! Two New Fed GPS Trackers Found on SUV. No Warrant Needed for GPS Monitoring, Judge Rules. Tension grows between Calif. Muslims, FBI after informant infiltrates mosque. FOIA Documents Show FBI Illegally Collecting Intelligence Under Guise of “Community Outreach” NYPD CIA Anti-Terror Operations Conducted In Secret For Years. C.I.A. Examining Legality of Its Work With New York Police. For Anarchist, Details of Life as F.B.I. Target. Four More Years of Unchecked Spying, Surveillance and Secrecy.
The always-expanding bipartisan Surveillance State - Glenn Greenwald. House Committee Approves Bill Mandating That Internet Companies Spy on Their Users. House Advances Internet Surveillance Bill - Blog - OpenCongress. Whistle-Blower: Feds Have a Backdoor Into Wireless Carrier. Whistleblower: The NSA is Lying–U.S. Government Has Copies of Most of Your Emails. Detained in the U.S.: Filmmaker Laura Poitras Held, Questioned Some 40 Times at U.S. Airports. Exclusive: National Security Agency Whistleblower William Binney on Growing State Surveillance. "We Don’t Live in a Free Country": Jacob Appelbaum on Being Target of Widespread Gov’t Surveillance. EFF Surveillance Self-Defense Project.
Expanding the Surveillance State. The FBI's Next Generation Identification: Bigger and Faster but Much Worse for Privacy. The Law Enforcement Surveillance Reporting Gap by Christopher Soghoian. Wiretap Report 2011. Why Metadata Matters. F.B.I. Seeks Way to Wiretap Internet Messages. FBI Routinely Spying on You! F.B.I. Giving Agents New Powers in Revised Manual. FBI: We need wiretap-ready Web sites. DOJ Wants to Know Who’s Rejecting Your Friend Requests. Gonzales wants ISPs to save user data - Security - MSNBC.com.
Big Brother on a budget: How Internet surveillance got so cheap. User Data Requests – Google Transparency Report. U.S. Government Requests For Google Users' Private Data Jump 37% In One Year. Government seeks to shut down NSA wiretapping lawsuit. Government Spies Illegally Bugged Kim Dotcom, Prime Minister Admits. Dotcom: Illegal spying revealed - National - NZ Herald News. Dotcom saga sucks in leaders, police, spies - National - NZ Herald News. Government Standards Agency “Strongly” Suggests Dropping its Own Encryption Standard. NSA. The NSA Spying Machine: An Interactive Graphic. NSA surveillance everywhere.
[liberationtech] Recent Der Spiegel coverage about the NSA and GCHQ. How the NSA is still harvesting your online data. XKeyscore: NSA tool collects 'nearly everything a user does on the internet' Exclusive: NSA pays £100m in secret funding for GCHQ. GCHQ and European spy agencies worked together on mass surveillance. Privacy International challenges GCHQ's unlawful hacking of computers, mobile phones. German Intelligence Agencies Used NSA Spying Program. NSA Leaks Prompt Surveillance Dialogue in India. Internet & location privacy/security.