background preloader

NSA - United States

Facebook Twitter

La NSA doit réviser en profondeur ses programmes de surveillance - Iceweasel. La National Security Agency (NSA), l'agence américaine de renseignement, doit réviser en profondeur ses programmes controversés de surveillance, ont recommandé des experts dans un rapport rendu public mercredi 18 décembre par la Maison Blanche.

La NSA doit réviser en profondeur ses programmes de surveillance - Iceweasel

La NSA, dont l'étendue et le contenu des programmes ont été révélés par l'ancien consultant Edward Snowden, ne doit pas conserver les métadonnées téléphoniques (date d'appel, lieu, etc.), suggèrent notamment les experts, parmi leurs quarante-six recommandations. Lire (édition abonnés) : Aux Etats-Unis, la commission chargée de réformer la NSA propose des aménagements limités Par ailleurs, le groupe de travail, mandaté par Barack Obama, note que l'agence devrait mieux coopérer avec les « alliés proches » des Etats-Unis et que les critères présidant à la surveillance de dirigeants étrangers devraient être resserrés. Lire le rapport du groupe d'experts (en anglais) : Profiles of Key Officials in NSA Domestic Spying. The NSA Domestic Spying program involved key personnel from across the government and at the highest levels of the White House, Department of Justice (DOJ), Federal Bureau of Investigations (FBI), and National Security Agency (NSA).

Profiles of Key Officials in NSA Domestic Spying

Few people were aware of the program, but those who were played vital roles in the process of its creation and execution. Our NSA Domestic Spying Timeline cites those officials, some of whom are not as public as others. La France, précieux partenaire de l'espionnage de la NSA - Iceweasel. Snowden Related Targets. 27 November 2013 Snowden Related Targets.

Snowden Related Targets

U.S. Electronic Espionage: A Memoir. 10 June 1998: Link to dissent 14 April 1998: Add Duncan Campbell message 13 April 1998 Source: Columbia University Library, Microfilm.

U.S. Electronic Espionage: A Memoir

Origins

NSA 5 Eyes Sharing » CounterPunch: Tells the Facts, Names the Names - Iceweasel. Well, the guy who said this was full of crap: David Skillicorn, a professor in the School of Computing at Queen’s University, says this is one piece of the data-sharing relationship “that has always been carefully constructed.”

NSA 5 Eyes Sharing » CounterPunch: Tells the Facts, Names the Names - Iceweasel

“The Americans will not use Canadians to collect data on U.S. persons, nor will any of the other Five Eyes countries,” Skillicorn says. “In fact, in practice, it’s as if the five countries’ citizens were one large, collective group, and their mutual communications are not intercepted by any in the Five Eyes community.” U.S. and U.K. Struck Secret Deal Allowing NSA to “Unmask” Britons’ Personal Data. The phone, internet and email records of U.K. citizens not suspected of any wrongdoing have been analyzed and stored by America's National Security Agency under a secret deal that was approved by British intelligence officials, according to documents from the whistleblower Edward Snowden.

U.S. and U.K. Struck Secret Deal Allowing NSA to “Unmask” Britons’ Personal Data

In the first explicit confirmation that U.K. citizens have been caught up in U.S. mass surveillance programs, an NSA memo describes how in 2007 an agreement was reached that allowed the agency to "unmask" and hold on to personal data about Britons that had previously been off limits. The memo, published in a joint investigation by the Guardian and Britain's Channel 4 News, says the material is being put in databases where it can be made available to other members of the U.S. intelligence and military community. Britain and the U.S. are the main two partners in the 'Five-Eyes' intelligence-sharing alliance, which also includes Australia, New Zealand and Canada.

NSA infected 50,000 computer networks with malicious software. Photo Corbis News The American intelligence service - NSA - infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive information.

NSA infected 50,000 computer networks with malicious software

Documents provided by former NSA-employee Edward Snowden and seen by this newspaper, prove this. Meet the Spies Doing the NSA's Dirty Work - By Shane Harris. With every fresh leak, the world learns more about the U.S.

Meet the Spies Doing the NSA's Dirty Work - By Shane Harris

National Security Agency's massive and controversial surveillance apparatus. Here's How Ronald Reagan Played A Role In The NSA's Hack Of Google, Yahoo. SAN JOSE, Calif.

Here's How Ronald Reagan Played A Role In The NSA's Hack Of Google, Yahoo

(AP) — Back when Yahoo was something hollered at a rodeo and no one could conceive of Googling anything, President Ronald Reagan signed an executive order that extended the power of U.S. intelligence agencies overseas, allowing broader surveillance of non-U.S. suspects. At the time, no one imagined he was granting authority to spy on what became known as Silicon Valley. But recent reports that the National Security Agency secretly broke into communications on Yahoo and Google overseas have technology companies, privacy advocates and even national security proponents calling for a re-examination of Reagan's order and other intelligence laws. Experts suggest a legislative update is long overdue to clear up what Electronic Frontier Foundation legal director Cindy Cohn calls "lots of big gray areas. " Frankfurt: An American Military-Intel Metropolis. Frankfurt: An American Military-Intel Metropolis By Christian Fuchs, John Goetz, Frederik Obermaier, Bastian Obermayer and Tanjev Schultz Espionage, Logistics, Attacks Orchestrated from the U.S.

Frankfurt: An American Military-Intel Metropolis

National Security Agency. The National Security Agency (NSA) is a U.S. intelligence agency responsible for providing the United States government with encrypted communications (information assurance) and the reading of encrypted communications (signals intelligence) of other nations. The NSA also creates and maintains secure computer network operations for the U.S. Government and prepares for network warfare.[8] Originating as a unit to decipher code communications in World War II, it was officially formed as the NSA by President Truman in 1952.

Since then, it has become one of the largest of U.S. intelligence organizations in terms of personnel and budget,[6][9] operating under the jurisdiction of the Department of Defense and reporting to the Director of National Intelligence. The NSA has been a matter of political controversy on several occasions in its short history. During the Watergate affair, as a result of A Congressional Inquiry led by Sen. History[edit] Army predecessor[edit] Black Chamber[edit] NSA broke its own rules in 'virtually every' record, declassified documents show. CIA - United States. NSA/CSS. Masters of the Internet.

PRISM

AT&T gets paid millions by the CIA to give up user data. Foreign Affairs Directorate. People. Organizational structure of the NSA. Projects. Code Names for NSA Exploit Tools. This is from a Snowden document released by Le Monde: General Term Descriptions: HIGHLANDS: Collection from Implants VAGRANT: Collection of Computer Screens MAGNETIC: Sensor Collection of Magnetic Emanations MINERALIZE: Collection from LAN Implant OCEAN: Optical Collection System for Raster-Based Computer Screens LIFESAFER: Imaging of the Hard Drive GENIE: Multi-stage operation: jumping the airgap etc.

BLACKHEART: Collection from an FBI Implant [...] DROPMIRE: Passive collection of emanations using antenna CUSTOMS: Customs opportunities (not LIFESAVER) DROPMIRE: Laser printer collection, purely proximal access (***NOT*** implanted) DEWSWEEPER: USB (Universal Serial Bus) hardware host tap that provides COVERT link over US link into a target network.

Operates w/RF relay subsystem to provide wireless Bridge into target network. Our Government Has Weaponized the Internet. Here's How They Did It. The internet backbone — the infrastructure of networks upon which internet traffic travels — went from being a passive infrastructure for communication to an active weapon for attacks. According to revelations about the QUANTUM program, the NSA can “shoot” (their words) an exploit at any target it desires as his or her traffic passes across the backbone. It appears that the NSA and GCHQ were the first to turn the internet backbone into a weapon; absent Snowdens of their own, other countries may do the same and then say, “It wasn’t us. And even if it was, you started it.” If the NSA can hack Petrobras, the Russians can justify attacking Exxon/Mobil.

If GCHQ can hack Belgacom to enable covert wiretaps, France can do the same to AT&T. Which means the rest of us — and especially any company or individual whose operations are economically or politically significant — are now targets. Here’s how it works. Information Sharing. Secret US court, unrestrained by privacy concerns, confirms NSA surveillance powers — RT USA - Iceweasel. NSA's Italy op exposed: ‘Millions’ of private communications intercepted with govt awareness — RT News - Iceweasel. NSA spying on international banking and credit card transactions. The US National Security Agency (NSA) has been spying on international banking and credit card transactions, according to a new report based on information leaked by Edward Snowden, as German Der Spiegel revealed. The report indicates that the agency targeted VISA customers and global financial service SWIFT and created its own money flows database.

More specific, the monitoring activities were carried out by a branch called "Follow the Money" (FTM). Once the information on transactions was obtained, it was redirected to the NSA's own financial database, called "Tracfin". According to the report, in 2011 the database contained 180 million records, with 84% of those being credit card transactions details. More specific, the documents show that the NSA was spying on large credit card companies’ customers.

NSA Spies on World Bank, IMF, UN, Pope, World Leaders, American Politicians and Military Officers. Proof that NSA Spying Is Not Very Focused On Terrorism It came out this week that the NSA spied on the headquarters of the World Bank, International Monetary Fund, and United Nations. It was also alleged that the NSA spied on the Vatican and the Pope. Congressman Rand Paul asks whether the NSA might be spying on President Obama as well.

How the NSA identifies Tor users in 6 easy steps. In a recent article in the Guardian, security expert Bruce Schneier reported that the U.S. National Security Agency attacks users of the online anonymity network, Tor.