Stone Ghost STONEGHOST or "Stone Ghost", is a codename for a network operated by the United States' Defense Intelligence Agency (DIA) for information sharing and exchange between the United States, the United Kingdom, Canada and Australia. Other sources say that New Zealand is also participating, and that STONEGHOST therefore connects, and is maintained by the defense intelligence agencies of all Five Eyes countries. STONEGHOST does not carry Intelink-Top Secret information and was previously known as Intelink-C and may also be referred to as "Q-Lat" or "Quad link". It's a highly secured network with strict physical and digital security requirements. The network not only hosts information about military topics, but also about SIGINT, foreign intelligence and national security. 2012 Canadian Spy Case Royal Canadian Navy intelligence officer Sub-Lt. References
Latest Snowden revelation: NSA sabotaged electronic locks The latest Edward Snowden-powered exposé published by the New York Times, ProPublica and the Guardian is, to me, the most frightening. It reveals that the National Security Agency has moved beyond its historic role as a code-breaker to become a saboteur of the encryption systems. Its work has allegedly weakened the scrambling not just of terrorists' emails but also bank transactions, medical records and communications among coworkers. Here's the money graf: "The NSA hacked into target computers to snare messages before they were encrypted. I'd be disappointed if the NSA hadn't figured out how to do that hacking trick. The outrage is still pouring in from various advocacy groups. "These revelations demonstrate a fundamental attack on the way the Internet works," senior staff technologist Joseph Lorenzo Hall wrote in a statement. Every form of encryption can theoretically be cracked, given enough time and processing power. Marijuana laws done right School dress codes: Miniskirt madness
Snowden Documents Indicate NSA Has Breached Deutsche Telekom When it comes to choosing code names for their secret operations, American and British agents demonstrate a flare for creativity. Sometimes they borrow from Mother Nature, with monikers such as "Evil Olive" and "Egoistic Giraffe." Other times, they would seem to take their guidance from Hollywood. A program called Treasure Map even has its own logo, a skull superimposed onto a compass, the eye holes glowing in demonic red, reminiscent of a movie poster for the popular "Pirates of the Caribbean" series, starring Johnny Depp. Treasure Map is anything but harmless entertainment. Furthermore, every single end device that is connected to the Internet somewhere in the world -- every smartphone, tablet and computer -- is to be made visible. The breathtaking mission is described in a Treasure Map presentation from the documents of the former intelligence service employee Edward Snowden which SPIEGEL has seen. Battlefield Map 'Completely Unacceptable' 'Key Staff' Katy Scoggin / Laura Poitras 'Fuck!'
FOURTEEN EYES Huge New Snowden Scoop: Ordinary Internet Users 'Far Outnumbered' Legal Targets July 6, 2014 | Like this article? Join our email list: Stay up to date with the latest headlines via email. When the US National Security Agency (NSA) intercepted the online accounts of legally targeted foreigners over a four-year period it also collected the conversations of nine times as many ordinary internet users, both Americans and non-Americans, according to an investigation by the Washington Post. Nearly half of those surveillance files contained names, email addresses or other details that the NSA marked as belonging to US citizens or residents, the Post reported in a story posted on its website on Saturday night. The intercepted messages contained material of considerable intelligence value, the Post reported, such as information about a secret overseas nuclear project, double-dealing by an ostensible ally, a military calamity that befell an unfriendly power and the identities of aggressive intruders into US computer networks.
New Documents Shed Light on One of the NSA's Most Powerful Tools Today, we're releasing several key documents about Executive Order 12333 that we obtained from the government in response to a Freedom of Information Act lawsuit that the ACLU filed (along with the Media Freedom and Information Access Clinic at Yale Law School) just before the first revelations of Edward Snowden. The documents are from the National Security Agency, the Defense Intelligence Agency, and others agencies. They confirm that the order, although not the focus of the public debate, actually governs most of the NSA's spying. In some ways, this is not surprising. After all, it has been reported that some of the NSA's biggest spying programs rely on the executive order, such as the NSA's interception of internet traffic between Google's and Yahoo!' The order, issued by President Ronald Reagan in 1981, imposes the sole constraints on U.S. surveillance on foreign soil that targets foreigners. Here are some of the most significant things these new records show:
Five Eyes FVEY AUSCANNZUKUS The United Kingdom – United States of America Agreement (UKUSA, /juːkuːˈsɑː/ ew-koo-SAH) is a multilateral agreement for cooperation in signals intelligence between the United Kingdom, the United States, Canada, Australia, and New Zealand. The alliance of intelligence operations is also known as Five Eyes. In classification markings this is abbreviated as FVEY or the countries are listed like AUS, CAN, GBR, NZL, USA. Emerging from an informal agreement related to the 1941 Atlantic Charter, the secret treaty was renewed with the passage of the 1943 BRUSA Agreement, before being officially enacted on 5 March 1946 by the United Kingdom and the United States. Currently, the global surveillance disclosure by Edward Snowden has shown that the intelligence-sharing activities between the First World allies of the Cold War are rapidly shifting into the digital realm of the World Wide Web. History Origins (1940s–1950s) Investigations (1970-90s)
Edward Snowden: Surveillance, Spying Practices Have Brought U.S. to ‘Brink of the Abyss’ - Truthdig Wired/Platon Edward Snowden has just been granted three more years of asylum in Russia, and the former NSA contractor-turned-whistle-blower is understandably choosy about whom he meets with in person. In June, he gave top NSA expert James Bamford a good deal of his time for an in-depth Wired story, and Bamford didn’t waste it. Also read: Edward Snowden Can Stay in Russia for 3 More Years In the Wired profile, set off memorably by photographer Platon Antoniou’s images (including the particularly striking portrait shown above), Snowden says he built clues into classified files he perused and leaked to make his intentions apparent to the U.S. government, but that wasn’t ultimately how officials have reacted to his choice to pass documents to a select group of journalists in June 2013: Snowden tells me it doesn’t have to be like this. —Posted by Kasia Anderson More Below the Ad If you have trouble leaving a comment, review this help page.
Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack U.S. President Barack Obama (L) greets Israeli Prime Minister Benjamin Netanyahu during a press conference on March 20, 2013 in Jerusalem, Israel. Photo credit: Lior Mizrahi/Getty Images The U.S. government has long lavished overwhelming aid on Israel, providing cash, weapons and surveillance technology that play a crucial role in Israel’s attacks on its neighbors. But top secret documents provided by NSA whistleblower Edward Snowden shed substantial new light on how the U.S. and its partners directly enable Israel’s military assaults – such as the one on Gaza. Over the last decade, the NSA has significantly increased the surveillance assistance it provides to its Israeli counterpart, the Israeli SIGINT National Unit (ISNU; also known as Unit 8200), including data used to monitor and target Palestinians. The relationship has, on at least one occasion, entailed the covert payment of a large amount of cash to Israeli operatives. The cooperation between the NSA and ISNU began decades ago.
NINE EYES ‘We Need’ People Like Edward Snowden, U.N. Human Rights Commissioner Says U.N. High Commissioner for Human Rights Navi Pillay said in a news conference Wednesday that Edward Snowden is a defender of human rights and should not be prosecuted. “We owe a great deal to him for revealing this kind of information,” she said. When asked specifically whether President Obama should pardon Snowden, Pillay acknowledged that he would first have to be convicted, but said, “I am raising right here some very important arguments that could be raised on his behalf so that these criminal proceedings are averted.” Pillay’s office just released a report titled The Right to Privacy in the Digital Age, and she credits Snowden with initiating and informing a global debate on the subject. The Guardian: Mona Rishmawi, head of the rule of law branch of Pillay’s office, said: “In this particular case, the way we see the situation of Snowden is he really revealed information which is very, very important for human rights. —Posted by Peter Z. More Below the Ad
The NSA Is Targeting Users of Privacy Services, Leaked Code Shows | Threat Level NSA headquarters in Fort Meade, Maryland. If you use Tor or any of a number of other privacy services online or even visit their web sites to read about the services, there’s a good chance your IP address has been collected and stored by the NSA, according to top-secret source code for a program the NSA uses to conduct internet surveillance. There’s also a good chance you’ve been tagged for simply reading news articles about these services published by Wired and other sites. This is according to code, obtained and analyzed by journalists and others in Germany, which for the first time reveals the extent of some of the wide-spread tracking the NSA conducts on people using or interested in using privatizing tools and services—a list that includes journalists and their sources, human rights activists, political dissidents living under oppressive countries and many others who have various reasons for needing to shield their identity and their online activity. Secrets Revealed in the Code
US spies on UK for UK Telecommunications industry experts and the pressure group Liberty fear the top-secret US listening-post on the edge of moorland six miles west of Harrogate, is being used by Britain's intelligence agencies and police to avoid the requirement to obtain Home Office warrants authorising tapping. A university computer lecturer who has made a study of electronic eavesdropping told the Independent on Sunday he understood that the 1,760 staff at the heavily-guarded base were used regularly to tap phones in this country. He said: "If the security service wants to tap your phone and wants nobody to know, there are two ways they can do it: illegally - or, entirely above board, ask US personnel at Menwith Hill to do it." Under US law, the phone-tapping of foreign nationals in a foreign country does not require any licence. Liberty said it had been concerned for some time that "a US base is spying on British citizens and that spying is unregulated by British law".
EXCLUSIVE: Owner of Snowden’s Email Service on Why He Closed Lavabit Rather Than Comply With Gov’t This is a rush transcript. Copy may not be in its final form. AARON MATÉ: We turn now to the news an encrypted email service believed to have been used by National Security Agency leaker Edward Snowden has abruptly shut down. The owner of Lavabit, Ladar Levison, wrote a message online saying, quote, "I have been forced to make a difficult decision: to become complicit in crimes against the American people, or walk away from nearly 10 years of hard work by shutting down Lavabit." He went on to write, quote, "This experience has taught me one very important lesson: without congressional action or a strong judicial precedent, I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States." Later on Thursday, another secure email provider called Silent Circle also announced it was shutting down. AMY GOODMAN: Now, in a Democracy Now! We welcome you both to Democracy Now! LADAR LEVISON: Yeah, well, I’ve—thank you, Amy.