Researchers Find 25 Countries Using Surveillance Software | Rights & Liberties
The NSA Spying Machine: An Interactive Graphic With every new leak from Edward Snowden’s bottomless trove of pilfered documents, it gets harder to keep track of all the bizarre ways the National Security Agency has cooked up to spy on people and governments. This may help. Data in Motion NSA’s spies divide targets into two broad categories: data in motion and data at rest. Information moving to and from mobile phones, computers, data centers, and satellites is often easier to grab, and the agency sucks up vast amounts worldwide. Yet common data such as e-mail is often protected with encryption once it leaves a device, making it harder—but not impossible—to crack. Data at Rest Retrieving information from hard drives, overseas data centers, or cell phones is more difficult, but it’s often more valuable because stored data is less likely to be encrypted, and spies can zero in on exactly what they want.
And real corporate security is still impossible. A surveillance camera outside Google's China headquarters in 2010 (Jason Lee / Reuters) If you’ve been reading the news recently, you might think that corporate America is doing its best to thwart NSA surveillance. Google just announced that it is encrypting Gmail when you access it from your computer or phone, and between data centers. Last week, Mark Zuckerberg personally called President Obama to complain about the NSA using Facebook as a means to hack computers, and Facebook's Chief Security Officer explained to reporters that the attack technique has not worked since last summer. Yahoo, Google, Microsoft, and others are now regularly publishing "transparency reports," listing approximately how many government data requests the companies have received and complied with. Don’t Listen to Google and Facebook: The Public-Private Surveillance Partnership Is Still Going Strong - Bruce Schneier
Moroccan website Mamfakinch targeted by government-grade spyware from Hacking Team? Photo by FADEL SENNA/AFP/GettyImages An email claiming to reveal a political scandal will grab the attention of almost any journalist. But what if the email was just a ruse to make you download government-grade spyware designed to take total control of your computer? It could happen—as a team of award-winning Moroccan reporters recently found out. Ryan Gallagher is a journalist who reports on surveillance, security, and civil liberties.
Final version 10 July 2013 As technologies that facilitate State surveillance of communications advance, States are failing to ensure that laws and regulations related to communications surveillance adhere to international human rights and adequately protect the rights to privacy and freedom of expression. This document attempts to explain how international human rights law applies in the current digital environment, particularly in light of the increase in and changes to communications surveillance technologies and techniques. These principles can provide civil society groups, industry, States and others with a framework to evaluate whether current or proposed surveillance laws and practices are consistent with human rights. These principles are the outcome of a global consultation with civil society groups, industry and international experts in communications surveillance law, policy and technology. Necessary and Proportionate
Law-enforcement officials in the U.S. are expanding the use of tools routinely used by computer hackers to gather information on suspects, bringing the criminal wiretap into the cyber age. Federal agencies have largely kept quiet about these capabilities, but court documents and interviews with people involved in the programs provide new details about the hacking tools, including spyware delivered to computers and phones through...
Druckversion - Cover Story: How the NSA Targets Germany and Europe - SPIEGEL ONLINE - News - International At first glance, the story always appears to be the same. A needle has disappeared into the haystack -- information lost in a sea of data. For some time now, though, it appears America's intelligence services have been trying to tackle the problem from a different angle.
Much of the U.S. media coverage of the NSA revelations has concentrated on its impact on the constitutional rights of U.S. Internet users. But what about the billions of Internet users around the world whose private information is stored in U.S. servers, or whose data travels across U.S. networks? Below, we're publishing a series of articles looking into how the information disclosed in the NSA leaks affect the international community and how they highlight one part of an international system of surveillance that dissolves what national privacy protections any of us have, whereever we live. Spies Without Borders Series: Using Domestic Networks to Spy on the World
Global Dialogue on Governmental Extra-Territorial Surveillance This is the 6th article of our Spies Without Borders series. The series looks into how the information disclosed in the NSA leaks affects Internet users around the world whose private information is stored in U.S. servers, or whose data travels across U.S. networks. As news of the alarmingly broad reach and scope of the U.S. surveillance program reverberates around the globe, we call for a global dialogue on the increased capacity of States around the world to conduct sweeping extra-territorial surveillance from domestic soil.
An International Perspective on FISA: No Protections, Little Oversight Spies Without Borders III This is the third article of our Spies Without Borders series. It has been co-authored by Tamir Israel, Staff Lawyer at CIPPIC, Katitza Rodriguez, EFF International Rights Director and Mark Rumold, EFF Staff Attorney. The Spies Without Borders series are looking into how the information disclosed in the NSA leaks affect Internet users around the world whose private information is stored in U.S. servers, or whose data travels across U.S. networks.
Universal, Self-Evident: I'm Not American but I Have Privacy Rights too, NSA In a letter sent today to the United States Congress, an international coalition of non-profit organizations called upon the U.S. government to protect the privacy and freedoms of not only its citizens, but of people everywhere. As news of the alarmingly broad reach and scope of America’s surveillance program reverberates around the globe, now is the time for the United States to pass formal privacy safeguards to protect the billions of foreign Internet users whose communications are stored in U.S. servers or whose data travels across U.S. networks. EFF joined more than 50 NGOs—including European Digital Rights, Association For Progressive Communications, Access Now, WebWeWant Foundation, Center for Technology and Society (Brazil) and Thai Netizen Network—in signing the letter, which was organized through Best Bits , a global network of civil society organizations.
This is the second article of our Spies Without Borders series. This article has been co-authored by Tamir Israel, Staff Lawyer at CIPPIC, Katitza Rodriguez, EFF International Rights Director and Mark Rumold, EFF Staff Attorney. The Spies Without Borders series are looking into how the information disclosed in the NSA leaks affect Internet users around the world whose private information is stored in U.S. servers, or whose data travels across U.S. networks. This article has been crossposted on the website of OpenMedia.ca. In order to fully appreciate how the revelations of this past week will impact Internet users around the world whose private information is stored in U.S. servers, or whose data travels across U.S. networks, a little background on the U.S. legal framework is helpful. The centerpiece of this framework is the Foreign Intelligence Surveillance Act (FISA), enacted in the late 70s. U.S. Foreign Intelligence: From Carte Blanche Surveillance to Weak [Domestic] Protections
This is a joint international campaign between EFF and Access Now. The Guardian and the Washington Post recently published slides that indicate that the US government’s National Security Agency (NSA) is engaged in mass surveillance of users around the world through a program called PRISM. The NSA is extracting audio, video, photographs, emails, documents, and connection logs from nine leading Internet companies: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple. Furthermore, the US is reportedly sharing this data with the UK government. These major Internet companies have denied any knowledge of the PRISM program. For instance, Facebook’s CEO Mark Zuckerberg has said, “Facebook is not and has never been part of any program to give the US or any other government direct access to our servers…We hadn't even heard of PRISM before yesterday.” International Customers: It's Time to Call on US Internet Companies to Demand Accountability and Transparency
Using Domestic Networks to Spy on the World Spies Without Borders I This is the first article of our Spies Without Borders series. This article has been co-authored by Tamir Israel, Staff Lawyer at CIPPIC and Katitza Rodriguez, EFF International Rights Director. The Spies Without Borders series are looking into how the information disclosed in the NSA leaks affect the international community and how they highlight one part of an international system of surveillance that dissolves what national privacy protections any of us have, whereever we live.
Spying on the World From Domestic Soil: International Backlash This is the 5th article of our Spies Without Borders series. The series are looking into how the information disclosed in the NSA leaks affect Internet users around the world whose private information is stored in U.S. servers, or whose data travels across U.S. networks. The world is still reeling from the series of revelations about NSA and FBI surveillance. Over the past two weeks the emerging details paint a picture of pervasive, crossborder spying programs of unprecedented reach and scope: the U.S. has now admitted using domestic networks to spy on Internet users both domestically and worldwide. The people now know that foreign intelligence can spy on their communications if they travel through U.S. networks or are stored in U.S. servers. While international public outrage has justifiably decried the scope and reach of these revelations, carte blanche foreign intelligence surveillance powers over foreigners are far from new.
Edward Snowden, the former National Security Agency (NSA) contractor who blew the whistle on secret US surveillance programs like PRISM, has provided details on United States government hacking and cyber-spying to a newspaper in Hong Kong. The South China Morning Post, which previously interviewed Snowden, was shown information that Snowden said indicated the US government had hacked into “Chinese mobile firms to steal millions of text messages.” He also showed the newspaper that Tsinhua University, which the Post describes as the “mainland’s top education and research institute,” was the “target of extensive hacking by US spies this year.” “It is not known how many times the prestigious university has been attacked by the NSA but details shown to the Post by Snowden reveal that one of the most recent breaches was this January,” according to reporting by the newspaper. The attacks were “intensive and concerted efforts.” Edward Snowden Provides Information on NSA Cyber Spying & Hacking to Hong Kong Newspaper
Expert Says Kiwis Under Constant Surveillance
Washington pushed EU to dilute data protection
The Surveillance Catalog - The Wall Street Journal
The Surveillance Industry Index: An Introduction
Big Brother Inc.
Surveillance Whos Who
Do surveillance companies care about human rights?
Main Page - Buggedplanet.info
Next Step: Identifying Customers of Surveillance Technology Companies and Turning Up the Heat
Blue cabinet - We Re-Build
Researchers Spot Blue Coat Web Control Gear In Another Repressive Regime: Burma
Planet Blue Coat: Mapping Global Censorship and Surveillance ToolsThe Citizen Lab
Document Trove Exposes Surveillance Methods
Wikileaks docs reveal that governments use malware for surveillance
Trade Fair... For Trojans
Crashing the Wiretapper's Ball
Danish company helps Iran spy on citizens
Special Report: How foreign firms tried to sell spy gear to Iran
Governments turn to hacking techniques for surveillance of citizens | Technology
Thailand: $13 Million for Lese Majesty Web-taps | Asia Pacific | World
Occupy Wall Street's 'occucopter' – who's watching whom? | Noel Sharkey and Sarah Knuckey | Comment is free
commentary on surveillance
Dangerous Cybercrime Treaty Pushes Surveillance and Secrecy Worldwide
Papers, Please! » Blog Archive » European Commission wants to immunize DHS collaborators in travel surveillance and control
US: surveillance state
FOIA | Surveillance | Immigration - Surveillance in the Homeland
Police employ Predator drone spy planes on home front - latimes.com
Busted! Two New Fed GPS Trackers Found on SUV
No Warrant Needed for GPS Monitoring, Judge Rules | Threat Level
Tension grows between Calif. Muslims, FBI after informant infiltrates mosque
FOIA Documents Show FBI Illegally Collecting Intelligence Under Guise of “Community Outreach”
NYPD CIA Anti-Terror Operations Conducted In Secret For Years
C.I.A. Examining Legality of Its Work With New York Police
For Anarchist, Details of Life as F.B.I. Target
Four More Years of Unchecked Spying, Surveillance and Secrecy
The always-expanding bipartisan Surveillance State - Glenn Greenwald
House Committee Approves Bill Mandating That Internet Companies Spy on Their Users | Electronic Frontier Foundation | Rights & Liberties
House Advances Internet Surveillance Bill - Blog - OpenCongress | Rights & Liberties
Whistle-Blower: Feds Have a Backdoor Into Wireless Carrier -- Congress Reacts | Threat Level
Whistleblower: The NSA is Lying–U.S. Government Has Copies of Most of Your Emails
Detained in the U.S.: Filmmaker Laura Poitras Held, Questioned Some 40 Times at U.S. Airports
Exclusive: National Security Agency Whistleblower William Binney on Growing State Surveillance
"We Don’t Live in a Free Country": Jacob Appelbaum on Being Target of Widespread Gov’t Surveillance
Expanding the Surveillance State
The FBI's Next Generation Identification: Bigger and Faster but Much Worse for Privacy
The Law Enforcement Surveillance Reporting Gap by Christopher Soghoian
Wiretap Report 2011
Why Metadata Matters
F.B.I. Seeks Way to Wiretap Internet Messages
FBI Routinely Spying on You!
F.B.I. Giving Agents New Powers in Revised Manual
FBI: We need wiretap-ready Web sites -- now | Security & Privacy
DOJ Wants to Know Who’s Rejecting Your Friend Requests
Gonzales wants ISPs to save user data - Security - MSNBC.com
Big Brother on a budget: How Internet surveillance got so cheap
User Data Requests – Google Transparency Report
U.S. Government Requests For Google Users' Private Data Jump 37% In One Year
Government seeks to shut down NSA wiretapping lawsuit
Government Spies Illegally Bugged Kim Dotcom, Prime Minister Admits
Dotcom: Illegal spying revealed - National - NZ Herald News | Rights & Liberties
Dotcom saga sucks in leaders, police, spies - National - NZ Herald News | Rights & Liberties
Government Standards Agency “Strongly” Suggests Dropping its Own Encryption Standard
NSA surveillance everywhere
[liberationtech] Recent Der Spiegel coverage about the NSA and GCHQ
How the NSA is still harvesting your online data | World news
Exclusive: NSA pays £100m in secret funding for GCHQ | UK news | The Guardian
Revealed: Britain's 'secret listening post in the heart of Berlin' - Home News - UK
German Intelligence Agencies Used NSA Spying Program
NSA Leaks Prompt Surveillance Dialogue in India
Internet & location privacy/security