Edward Snowden Provides Information on NSA Cyber Spying & Hacking to Hong Kong Newspaper Edward Snowden, the former National Security Agency (NSA) contractor who blew the whistle on secret US surveillance programs like PRISM, has provided details on United States government hacking and cyber-spying to a newspaper in Hong Kong. The South China Morning Post, which previously interviewed Snowden, was shown information that Snowden said indicated the US government had hacked into “Chinese mobile firms to steal millions of text messages.” He also showed the newspaper that Tsinhua University, which the Post describes as the “mainland’s top education and research institute,” was the “target of extensive hacking by US spies this year.” “It is not known how many times the prestigious university has been attacked by the NSA but details shown to the Post by Snowden reveal that one of the most recent breaches was this January,” according to reporting by the newspaper. The attacks were “intensive and concerted efforts.” The global headquarters for Pacnet is in Hong Kong and Singapore.
NSA collected Americans' email records in bulk for two years under Obama | World news The Obama administration for more than two years permitted the National Security Agency to continue collecting vast amounts of records detailing the email and internet usage of Americans, according to secret documents obtained by the Guardian. The documents indicate that under the program, launched in 2001, a federal judge sitting on the secret surveillance panel called the Fisa court would approve a bulk collection order for internet metadata "every 90 days". A senior administration official confirmed the program, stating that it ended in 2011. The collection of these records began under the Bush administration's wide-ranging warrantless surveillance program, collectively known by the NSA codename Stellar Wind. Eventually, the NSA gained authority to "analyze communications metadata associated with United States persons and persons believed to be in the United States", according to a 2007 Justice Department memo, which is marked secret. What your email metadata reveals
'EvilOlive, Transient Thurible, MoonLightPath...": The NSA's Active Internet Spy Programs The NSA collects and analyzes significant amounts of data from US communications systems in the course of monitoring foreign targets. (Photograph: guardian.co.uk)With bizarre names—including "EvilOlive," "ShellTrumpet," "MoonLightPath," "Transient Thurible," and "Spinneret"—the existence of a series of internal data-mining programs developed and operated by the National Intelligence Agency, according to documents assessed by the Guardian, indicates that despite assurances from NSA officials, the massive collection of domestic internet data is not only ongoing, but possibly expanding. As part of the latest revelations based on leaked documents provided by former NSA contractor Edward Snowden on Thursday, journalists Glenn Greenwald and Spencer Ackerman, say the internal communications "indicate that the amount of internet metadata harvested, viewed, processed and overseen by the Special Source Operations (SSO) directorate inside the NSA is extensive." Greenwald and Ackerman continue:
Druckversion - Cover Story: How the NSA Targets Germany and Europe - SPIEGEL ONLINE - News - International At first glance, the story always appears to be the same. A needle has disappeared into the haystack -- information lost in a sea of data. For some time now, though, it appears America's intelligence services have been trying to tackle the problem from a different angle. "If you're looking for a needle in the haystack, you need a haystack," says Jeremy Bash, the former chief of staff to ex-CIA head Leon Panetta. An enormous haystack it turns out -- one comprised of the billions of minutes of daily cross-border telephone traffic. Europe Reacts to NSA Spying Begin quote gallery: Click on the arrow Four-star General Keith Alexander -- who is today the NSA director and America's highest-ranking cyber warrior as the chief of the US Cyber Command -- defined these challenges. All the signals all the time. A Fiasco for the NSA The whole episode is a fiasco for the NSA which, in contrast to the CIA, has long been able to conduct its spying without drawing much public attention.
intern bedreigde democratie FASCIA (database) FASCIA is a massive database of the U.S. National Security Agency that contains trillions of device-location records that are collected from a variety of sources. Its existence was revealed during the 2013 global surveillance disclosure by Edward Snowden. The FASCIA database stores various types of information, including Location Area Codes (LACs), Cell Tower IDs (CeLLIDs), Visitor Location Registers (VLRs), International Mobile Station Equipment Identity (IMEIs) and MSISDNs (Mobile Subscriber Integrated Services Digital Network-Numbers). Over a period of about seven months, more than 27 terabytes of location data were collected and stored in the database. Every day, five billion device-location records are added to the database Dishfire ^ Jump up to: a b Narayan Lakshman (2013-12-05).
International Customers: It's Time to Call on US Internet Companies to Demand Accountability and Transparency This is a joint international campaign between EFF and Access Now. The Guardian and the Washington Post recently published slides that indicate that the US government’s National Security Agency (NSA) is engaged in mass surveillance of users around the world through a program called PRISM. The NSA is extracting audio, video, photographs, emails, documents, and connection logs from nine leading Internet companies: Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple. These major Internet companies have denied any knowledge of the PRISM program. It’s difficult to square the companies’ denials with the leaked slides and the US government’s admission that the PRISM program does exist—and is capturing data from users all over world. The time is now for global users of US Internet companies to demand answers, and for those companies to join them in seeking more transparency—and limits to government surveillance of their international and US users. Denials are not enough.
HJA Hofland Stellar Wind (code name) Stellar Wind or STELLARWIND is the code name of a Sensitive Compartmented Information security compartment for information collected under the President's Surveillance Program (PSP). This was a program by the United States National Security Agency (NSA) during the presidency of George W. Bush and revealed by Thomas Tamm to The New York Times in 2008. The operation was approved by President George W. The intelligence community was also able to obtain from the Treasury Department suspicious activity reports, or "SARS", which are reports of activities such as large cash transactions that are submitted by financial institutions under anti-money laundering rules. In June 2013 the Washington Post and the Guardian published an OIG draft report, dated March 2009, leaked by Edward Snowden detailing the Stellar Wind program. See also References External links
Using Domestic Networks to Spy on the World Spies Without Borders I This is the first article of our Spies Without Borders series. This article has been co-authored by Tamir Israel, Staff Lawyer at CIPPIC and Katitza Rodriguez, EFF International Rights Director. The Spies Without Borders series are looking into how the information disclosed in the NSA leaks affect the international community and how they highlight one part of an international system of surveillance that dissolves what national privacy protections any of us have, whereever we live. You can follow the Spies Without Borders here. Introductions Much of the U.S. media coverage of last week’s NSA revelations has concentrated on its impact on the constitutional rights of U.S. While the details are still emerging, what is clear is that many of the newly exposed surveillance activities have been shaped by U.S. foreign intelligence surveillance laws. Global Communications Networks & Trans-border Surveillance
Prism: secret surveillance could destroy democracy rather than defend it | Nils Muižnieks 'States and private companies must develop surveillance and data collection policies that respect human rights.' Photograph: Martin Rogers/Workbook Stock A few years ago, Google CEO Eric Schmidt, when asked whether people should be sharing information with Google as if it were a "trusted friend", answered that if we don't want anyone to know what we do, we shouldn't be doing it in the first place. Data and privacy commissioners from several countries, including Australia, Canada and Switzerland, might have remembered this interview when they sent a letter to Google last week questioning the respect for privacy of Google Glass, a device you can wear and use to film and record other people without them being aware of it. Google is not alone in using technology to snoop. I disagree. States, of course, have a duty to ensure security within their borders, and in doing so they can undertake the secret surveillance of individuals who can pose a threat. These criteria are crucial.