quote:
Het artikel gaat verder.quote:On June 5, 2013, the Guardian broke the first story in what would become a flood of revelations regarding the extent and nature of the NSA’s surveillance programs. Facing an uproar over the threat such programs posed to privacy, the Obama administration scrambled to defend them as legal and essential to U.S. national security and counterterrorism. Two weeks after the first leaks by former NSA contractor Edward Snowden were published, President Obama defended the NSA surveillance programs during a visit to Berlin, saying: “We know of at least 50 threats that have been averted because of this information not just in the United States, but, in some cases, threats here in Germany. So lives have been saved.” Gen. Keith Alexander, the director of the NSA, testified before Congress that: “the information gathered from these programs provided the U.S. government with critical leads to help prevent over 50 potential terrorist events in more than 20 countries around the world.” Rep. Mike Rogers (R-Mich.), chairman of the House Permanent Select Committee on Intelligence, said on the House floor in July that “54 times [the NSA programs] stopped and thwarted terrorist attacks both here and in Europe – saving real lives.”
However, our review of the government’s claims about the role that NSA “bulk” surveillance of phone and email communications records has had in keeping the United States safe from terrorism shows that these claims are overblown and even misleading. An in-depth analysis of 225 individuals recruited by al-Qaeda or a like-minded group or inspired by al-Qaeda’s ideology, and charged in the United States with an act of terrorism since 9/11, demonstrates that traditional investigative methods, such as the use of informants, tips from local communities, and targeted intelligence operations, provided the initial impetus for investigations in the majority of cases, while the contribution of NSA’s bulk surveillance programs to these cases was minimal. Indeed, the controversial bulk collection of American telephone metadata, which includes the telephone numbers that originate and receive calls, as well as the time and date of those calls but not their content, under Section 215 of the USA PATRIOT Act, appears to have played an identifiable role in initiating, at most, 1.8 percent of these cases. NSA programs involving the surveillance of non-U.S. persons outside of the United States under Section 702 of the FISA Amendments Act played a role in 4.4 percent of the terrorism cases we examined, and NSA surveillance under an unidentified authority played a role in 1.3 percent of the cases we examined.
quote:Kamer wil opheldering over apparatuur VS
Het Amerikaanse ministerie van Defensie heeft eigen apparatuur om satelliet-informatie op te vangen in het Friese Burum. Die apparatuur is, op afstand of op locatie, alleen toegankelijk voor Amerikaanse staatsburgers met speciale toegang. Dat blijkt uit onderzoek van Nieuwsuur.
Grote Oor
It Greate Ear noemen omwonenden het terrein met tientallen schotels: Het Grote Oor. Op het satellietstation in Burum is onder andere de Nationale Sigint Organisatie (NSO) gevestigd. De NSO valt onder het ministerie van Defensie en vergaart inlichtingen uit telecommunicatie voor de MIVD en de AIVD. De andere helft van het terrein in Burum is van het internationale bedrijf Inmarsat. Op dit commerciële deel van het satellietgrondstation staat de apparatuur van de Amerikaanse Defensie.
Contracten
Nieuwsuur heeft meerdere contracten gevonden tussen het Amerikaanse ministerie van Defensie en de Amerikaanse bedrijven Viasat en Northrop. Via de contracten wordt opdracht gegeven voor upgrades van software voor de eigen apparatuur in Burum. Een woordvoerder van het Amerikaanse ministerie bevestigt dit.
"Het ministerie van Defensie heeft zijn eigen satellietgrondstation-apparatuur geïnstalleerd op het Nederlandse grondstation om zo aan te kunnen sluiten op een satelliet die landt in Burum. Het Amerikaanse leger betaalt huur, zogeheten telehousing, om onze apparatuur in Burum te kunnen plaatsen en om satellietservice te ontvangen."
Missies
De Amerikanen gebruiken de apparatuur bijvoorbeeld om voor het monitoren van de eigen troepen tijdens missies. Defensiedeskundige Ko Colijn: "Als de Amerikanen in Irak of Afghanistan iets doen, dan willen ze precies weten wie waar zit. En dat is informatie die in de hoofdkwartieren in de VS bekend moet zijn. Dat kan niet rechtstreeks gecommuniceerd, dat gaat weer via die satellieten, dus logistiek is dit vrij belangrijk."
Belangrijke schakel
Burum blijkt inderdaad een belangrijke schakel in het Amerikaanse militaire netwerk te zijn. In een document op de website van de Amerikaanse overheidsdienst GSA staat: "Het United States Government Network van Inmarsat verschilt van commerciële netwerken in ontwerp, gebruik en gebruikers. Het netwerk wordt exclusief beheerd door één Amerikaans bedrijf en enkel bediend door Amerikaanse staatsburgers met een speciale clearance. USGN-grondstations bevinden zich in Hawaï en Nederland."
Geen antwoorden
Via welk bedrijf de satellietdiensten in Burum precies verlopen is onduidelijk. Het Amerikaanse ministerie van Defensie en Inmarsat weigeren daar op in te gaan. "Het is ons beleid niet in te gaan op vragen over specifieke klanten, of dit nu commerciële partijen zijn of overheidsorganisaties. Maar ik kan bevestigen dat we diensten bieden aan vele overheden ter wereld en dat we werken binnen de juridische en regelstellende kaders van ieder land waar we actief zijn", aldus de verklaring van Inmarsat.
Een woordvoerder van het Nederlandse ministerie van Defensie wil niet ingaan op vragen over de Amerikaanse apparatuur in Burum. "Er staat geen Amerikaanse overheidsapparatuur op het Defensie grondstation. Inmarsat is een commercieel bedrijf op het gebied van satellietcommunicatie. Het is niet aan Defensie om vragen te beantwoorden over wat er gebeurt op bedrijventerreinen in Nederland."
Spioneren
PvdA, SP, D66, GroenLinks, de ChristenUnie, de Partij van de Dieren en 50PLUS willen van minister Hennis-Plasschaert van Defensie weten wat de Amerikanen precies doen met de apparatuur in Burum. Van Raak (SP): "We moeten weten wat daar gebeurt. Het lijkt er in eerste instantie op dat het gebruikt wordt voor militaire inlichtingen, maar dat weet je dus niet. We hebben de afgelopen tijd gezien dat de Amerikanen elke mogelijkheid aangrijpen om te spioneren en ik wil wel van de Nederlandse regering, met name van minister Hennis weten wat de Amerikanen uitspoken en wat onze betrokkenheid daarbij is."
Veiligheidsverantwoordelijkheid
Ko Colijn: "Als de overheid werkelijk greep wil hebben op wat andere landen hier doen en in het vitale en hele delicate veiligheidssegment, dan zou de overheid dat precies in kaart moeten brengen. Maar ik denk dat de overheid dat niet meer doet en ik denk dat wij in dat opzicht ook wel allang niet meer soeverein zijn. Wij delen onze veiligheidsverantwoordelijkheid helemaal met andere landen."
SPOILEROm spoilers te kunnen lezen moet je zijn ingelogd. Je moet je daarvoor eerst gratis Registreren. Ook kun je spoilers niet lezen als je een ban hebt.Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
De arrogantie van de Amerikanen.quote:'VS wil geen antispionagepact sluiten met Duitsland'
De onderhandelingen tussen de VS en Duitsland over een 'antispionagepact' zijn vastgelopen. De Amerikanen weigeren om aan te geven in welke periode bondskanselier Merkel werd afgeluisterd. Ook wil de VS niet garanderen dat zij in de toekomst niet wederom Duitse politici zullen aftappen.
Dat melden anonieme bronnen van de Duitse geheime dienst BND aan de Süddeutsche Zeitung. De BND voert momenteel in opdracht van de Duitse regering onderhandelingen met de VS waarbij Duitsland aanstuurt op het beperken van de wederzijdse spionage. De onderhandelingen zouden echter in het slop zijn geraakt met frustratie bij Duitse politici tot gevolg.
Een belangrijk struikelpunt zou zijn dat de Verenigde Staten weigert aan te geven in welke periode het mobieltje van bondskanselier Angela Merkel werd afgeluisterd. Vorig jaar oktober werd op basis van documenten van klokkenluider Edward Snowden bekend dat de Amerikaanse inlichtingendienst NSA Merkel heeft afgeluisterd. De onthulling gaf een schokgolf in politiek Duitsland en zette de relatie met de VS onder spanning.
Naast de weigering om meer informatie te geven over het aftappen van Merkel zou de VS tijdens de onderhandelingen ook hebben aangegeven dat zij niet willen uitsluiten dat Amerikaanse inlichtingendiensten in de toekomst wederom Duitse politici zullen aftappen. Ook zouden de Amerikanen weigeren om Duitse overheidsmedewerkers toe te laten tot de ambassade van Berlijn om daar een afluisterpost te inspecteren. Volgens Duitsland is de afluisterpost in strijd met de Weense conventie waarin de regels voor het diplomatieke verkeer zijn vastgelegd.
Een woordvoerder van de Duitse regering heeft aangeven dat de onderhandelingen alsnog doorgezet zullen worden en mogelijk binnen drie maanden tot resultaat zullen leiden. Het hoofd van de BND zou echter hebben aangegeven dat hij het huidige voorstel voor een 'antispionagepact' tussen de twee landen weigert te tekenen.
Arrogantie? Misdadig eerder. Lekker voor de internationale betrekkingen tussen deze 2 grote landen.quote:Op dinsdag 14 januari 2014 23:30 schreef Arthur_Spooner het volgende:
[..]
De arrogantie van de Amerikanen.
Precies, komt dat handelsverdrag er ook niet.quote:Op dinsdag 14 januari 2014 23:34 schreef Red_85 het volgende:
[..]
Arrogantie? Misdadig eerder. Lekker voor de internationale betrekkingen tussen deze 2 grote landen.
Laat maar lekker escaleren.
quote:
quote:When President Barack Obama delivers his speech on alleged surveillance reforms on Friday, he will not be suggesting measures that will truly prevent future abuse of surveillance powers. He will be advocating for reforms that could prevent another whistleblower like NSA contractor Edward Snowden.
quote:The New York Times described Obamas strategy for responding to disclosures from Snowden as trying to straddle a difficult line that will placate civil liberties advocates without a backlash from national security agencies. In other words, he does not think much of anything needs to be done at all but he wants civil liberties advocates to stop nipping at his heels.
quote:
Het artikel gaat verder.quote:De Amerikaanse afluisterdienst NSA onderschepte in april 2011 gemiddeld 194 miljoen sms'jes per dag, van willekeurige burgers over de hele wereld. Dat hebben The Guardian en Channel 4 News onthuld.
Sms-berichten zijn volgens een document van de NSA 'een goudmijn die kan worden uitgebuit'. In een reactie aan The Guardian houdt de dienst het erop dat de spionage alleen gericht was tegen 'gerechtvaardigde buitenlandse doelwitten'. Uit de informatie waar de krant zich op baseert, valt echter op te maken dat de dienst op zijn minst heeft geïnventariseerd wat de mogelijkheden zijn van dit soort grootschalige onderscheppingen.
twitter:YourAnonNews twitterde op vrijdag 17-01-2014 om 16:57:43In a few minutes, President Obama is going to piss off basically everybody. Here is why: http://t.co/su4NmyyBKm reageer retweet
quote:NSA leaks prompted major Canadian eavesdropping review: declassified memo
OTTAWA – The massive intelligence leak by former U.S. spy contractor Edward Snowden prompted Canada’s secret eavesdropping agency to review its policies on sharing information with the Americans and other key partners, a newly declassified memo reveals.
The three-page note from Communications Security Establishment Canada chief John Forster says the unprecedented breach also sparked a CSEC examination of its practices for protecting the privacy of Canadians.
The undated memo to national security adviser Stephen Rigby — obtained by The Canadian Press under the Access to Information Act — was prepared some time in mid-2013, after Snowden’s leaks began making global headlines.
The memo, originally classified top secret, says CSEC set about assessing the potential damage to Canadian signals intelligence collection capabilities, as well as asking its partners for confirmation on what data Snowden took from the U.S. National Security Agency.
The highly sensitive material showed the NSA had quietly obtained access to a broad spectrum of emails, chat logs and other information from major Internet companies, as well as data about a huge volume of telephone calls.
CSEC, the NSA’s Canadian counterpart, monitors foreign computer, satellite, radio and telephone traffic for information of intelligence interest.
With a staff of more than 2,000 — including skilled mathematicians, linguists and computer specialists — CSEC is a key player in the so-called Five Eyes community comprising Canada, the United States, Britain, Australia and New Zealand.
“In collaboration with domestic and international partners, CSEC is undertaking an organization-wide operation to assess the impacts of these unlawful disclosures of classified information,” says the memo, portions of which remain secret.
“Due to the unauthorized disclosures CSEC has developed an ongoing damage assessment, initiated external and internal communications strategies and introduced preventative measures to mitigate the potential of future damage.”
A section on Forster’s initial assessment of the damage is blacked out.
In addition to liaising with its Five Eyes partners, the spy agency briefed a committee of deputy ministers on the fallout and arranged a series of bilateral meetings with the Privy Council Office (where Rigby works), Foreign Affairs, the Canadian Security Intelligence Service and the RCMP.
The Ottawa-based CSEC held two briefings for staff members, along with specialized sessions, and took steps to “remind them of security protocols and provide guidance and support where appropriate,” the memo says.
“CSEC is also reviewing internal policies related to information sharing with the Five Eyes as well as the protection of the privacy of Canadians to ensure that they are appropriate and clear.”
CSEC spokeswoman Lauri Sullivan said Friday the agency “continues to review its policies, processes and procedures to ensure they are effective, and to ensure that CSE is taking the appropriate steps to protect information and the privacy of Canadians.”
The CSEC memo’s release came as U.S. President Barack Obama announced changes Friday to NSA practices with the aim of reassuring Americans their civil liberties will not be trampled.
At the time of the Forster memo, there had been no direct mention of CSEC in any of the stories spawned by Snowden’s cache of documents.
However, material later disclosed by the whistleblower indicated that Canada helped the United States and Britain spy on participants at the London G20 summit in 2009. Other documents suggested CSEC once monitored Brazil’s department of mines and energy.
Articles based on Snowden’s material continue to appear in the media.
Forster told Rigby the electronic spy agency — so low-profile it is still unknown to many Canadians — was exploring ways to better inform the public about what it does, including its efforts to prevent terrorism and cyber-attacks.
CSEC has since posted new information on its website about how the agency functions.
“CSEC will also keep employees informed as its damage assessment and forensic work unfold,” the memo says.
Ik neem aan dat de volledige inhoud gewoon bewaard wordt.quote:Op zaterdag 18 januari 2014 12:10 schreef gebrokenglas het volgende:
Wat ik niet snap is waarom alleen metadata van telefoongesprekken wordt bewaard en niet de inhoud van de gesprekken zelf? Die inhoud is toch waar je nog het meeste aan hebt? Als je toch bezig bent met verzamelen, doe dat dan er ook bij voor een volledig beeld...
quote:
quote:The UK and US governments hate the journalism that we're doing," he told VICE at his home near Rio de Janeiro, regarding Miranda's 11-hour detention and questioning by authorities at an airport in London in July. He was held under an anti-terror law, which was "a way of saying look at what it is we can do to people who defy us if we choose."
In that injustice, however, Greenwald found a silver lining. "At the time that it happened, I was angry, I felt helpless, I was furious they would target someone peripheral to these events, instead of me or Laura or the other journalists with whom we've been working," he said. "But at the same time I found it incredibly emboldening. They showed their true face to the world, or to me, about how abusive they are when it comes to the exercise of their power. And that made me know just how compelling it was to continue to bring transparency to what it is that they're doing. And it showed how they can't be trusted to exercise power without transparency and accountability."
NSA: Human Rights Watch criticises Obama's surveillance reforms - videoquote:Human Rights Watch annual report 2014 criticises NSA mass surveillance
States with poor human rights records may use spying scandal as excuse to clamp down on internet freedom, report warns
quote:US withholding Fisa court orders on NSA bulk collection of Americans' data
Justice Department refuses to turn over 'certain other' documents in ACLU lawsuit meant to shed light on surveillance practices
The Justice Department is withholding documents related to the bulk collection of Americans’ data from a transparency lawsuit launched by the American Civil Liberties Union.
US attorney Preet Bharara of the southern district of New York informed the ACLU in a Friday letter that the government would not turn over “certain other” records from a secret surveillance court, which are being “withheld in full” from a Freedom of Information Act suit the civil liberties group filed to shed light on bulk surveillance activities performed under the Patriot Act.
The decision to keep some of the records secret, in the thick of Edward Snowden’s revelations, has raised suspicions within the ACLU that the government continues to hide bulk surveillance activities from the public, despite US president Barack Obama’s Friday concession that controversial National Security Agency programs have “never been subject to vigorous public debate”.
The ACLU lawsuit, like others filed by civil liberties groups, has resulted in a trove of documents from the so-called Fisa court detailing the scope, authorizations and, in some cases, violations surrounding NSA surveillance ostensibly occurring under Section 215 of the Patriot Act. The director of national intelligence now posts the released documents to a Tumblr page, usually without revealing that the disclosures were spurred by lawsuits.
The latest such disclosure happened Friday with the release of 24 documents, mostly detailing Fisa court reauthorizations of the bulk phone records collection first reported by the Guardian thanks to leaks from whistleblower Snowden.
Among the information disclosed in the documents, which date back to 2006 – the first year in which the program received authorization from the Fisa court at all – is the footnoted stipulation that the court “understands that NSA expects it will continue to provide, on average, approximately 3 telephone numbers per day to the FBI”.
If true – the footnote only appears in pre-2009 court reauthorizations – the estimate suggests the NSA has given the FBI approximately 13,203 phone numbers based on the 12-year-old domestic bulk phone data program.
In his letter, written on the day Obama gave a long-awaited speech on surveillance that pledged additional transparency, Bhahara said that Friday’s release will be the last disclosure under the terms of the ACLU’s lawsuit.
“As discussed by telephone this morning, the government in fact has processed all of the remaining FISC Orders responsive to the FOIA request in this case that relate to bulk collection, regardless of whether the order contains any additions and/or adjustments to the implementation procedures, minimization procedures, and/or reporting requirements set out in other FISC orders,” the US attorney wrote.
“The government cannot specify the total number of documents withheld in full from this final set of responsive documents because the number itself is classified."
Alexander Abdo, an ACLU attorney, noted that the government’s bulk surveillance disclosures have yet to include, among other efforts, a reported CIA program to collect international money transfers in bulk, revealed in November by the Wall Street Journal and the New York Times.
“It appears that the government is concealing the existence of other bulk collection programs under the Patriot Act, such as the CIA’s reported collection of our financial records,” Abdo said.
“In other words, on the same day that President Obama recognized the need for a vigorous debate about bulk collection, the government appears to be hiding the ball. We can't have the public debate that President Obama wants without the facts that his agencies are hiding.”
Abdo said that the scope of the ACLU’s disclosure lawsuit only concerned surveillance efforts under Section 215 of the Patriot Act and that surveillance authorizations containing individualized suspicion were already excluded.
The NSA conducts other bulk data collection under the Foreign Intelligence Surveillance Act of 1978, an update to that law in 2008, and under a three-decade-old executive order known as 12333, all of which are outside the terms of the ACLU’s lawsuit.
Bharara's office routed a request for comment back through the Justice Department, which declined to elaborate on the 17 January letter.
quote:Independent commission to investigate future of internet after NSA revelations
Two-year inquiry headed by Swedish foreign minister, set up by Chatham House and CIGI thinktanks, is announced at Davos
A major independent commission headed by the Swedish foreign minister, Carl Bildt, was launched on Wednesday to investigate the future of the internet in the wake of the Edward Snowden revelations.
The two-year inquiry, announced at the World Economic Forum at Davos, will be wide-ranging but focus primarily on state censorship of the internet as well as the issues of privacy and surveillance raised by the Snowden leaks about America's NSA and Britain's GCHQ spy agencies.
The investigation, which will conducted by a 25-member panel of politicians, academics, former intelligence officials and others from around the world, is an acknowledgement of the concerns about freedom raised by the debate.
Bildt, the former Swedish prime minister, said: "The rapid evolution of the net has been made possible by the open and flexible model by which it has evolved and been governed. But increasingly this is coming under attack.
"And this is happening as issues of net freedom, net security and net surveillance are increasingly debated. Net freedom is as fundamental as freedom of information and freedom of speech in our societies."
The Obama administration on Friday announced the initial findings of a White House-organised review of the NSA. There are also inquiries by the US Congress and by the European parliament, but this is the first major independent one.
The inquiry has been set up by Britain's foreign affairs thinktank Chatham House and by the Center for International Governance and Innovation (CIGI), which is partly funded by the Canadian government.
In a joint statement, Chatham House and the CIGI said the current internet regime was under threat. "This threat to a free, open and universal internet comes from two principal sources. First, a number of authoritarian states are waging a campaign to exert greater state control over critical internet resources."
The statement does not name the countries but it is aimed mainly at China and Iran, both of whom are censoring the internet.
The other big issue, according to Chatham House and the CIGI, is the revelations from Snowden.
"Second, revelations about the nature and extent of online surveillance have led to a loss of trust."
Robin Niblett, director of Chatham House, said: "The issue of internet governance is set to become one of the most pressing global policy issues of our time."
The intention of the inquiry is to hold public consultations around the world. About half a dozen meetings are planned, at a cost of about £150,000 each.
Among those on the panel are: Joseph Nye, former dean of the Kennedy school of governance at Harvard; Sir David Omand, former head of GCHQ; Michael Chertoff, former secretary of the US homeland security department and co-author of the Patriot Act that expanded NSA surveillance powers; the MEP Marietje Schaake, who has been a leading advocate of internet freedom; Latha Reddy, former deputy national security adviser of India; and Patricia Lewis, research director in the international security department at Chatham House, who said: "Internet governance is too important to be left just to governments."
Asked about the lack of debate in the UK so far compared with the US and elsewhere in Europe and around the world, Lewis said: "People in Britain are more concerned than we realise. They have clearly agreed at some level to exchange data for goods and services but they did not agree for that data to be given to the government and security services.
"This is a debate we sorely need."
Gordon Smith, who is to be deputy chair of the commission, said: "For many people, internet governance sounds technical and esoteric but the reality is that the issues are 'high politics' and of consequence to all users of the internet, present and future."
quote:The Global Commission on Internet Governance
The Global Commission on Internet Governance was established in January 2014, to articulate and advance a strategic vision for the future of Internet governance. With work commencing in May 2014, the two-year project will conduct and support independent research on Internet-related dimensions of global public policy, culminating in an official commission report.
Chaired by Carl Bildt, the commission will inform concrete policy recommendations for the future of Internet governance, by providing a framework both for coordination among advanced industrial democracies and for addressing the interests and values of states that are uncertain about the future of multi-stakeholder governance. Key issues to be addressed by the commission include governance legitimacy and regulation, innovation, online rights and systemic risk.
Launched by two independent global think tanks, The Centre for International Governance Innovation (CIGI) and Chatham House, the Global Commission on Internet Governance will help educate the wider public on the most effective ways to promote Internet access, while simultaneously championing the principles of freedom of expression and the free flow of ideas over the Internet.
quote:
Het artikel gaat verder.quote:The forthcoming report of the Privacy and Civil Liberties Oversight Board, the arm's-length body established by the Congress to investigate NSA spying, has leaked, with details appearing in The New York Times and The Washington Post.
From its pages, we learn that the board views the NSA's metadata collection program -- which was revealed by Edward Snowden -- as illegal, without "a viable legal foundation under Section 215, implicates constitutional concerns under the First and Fourth Amendments, raises serious threats to privacy and civil liberties as a policy matter, and has shown only limited value…As a result, the board recommends that the government end the program."
The report goes farther than the President's Review Group on Intelligence and Communications Technologies (whose recommendations Obama ignored) and even farther than the policies announced by the President himself.
Ik denk dat NSA de metadata vergaart voor analyse. De telecom-providers daarentegen bewaren de inhoud.quote:Op zaterdag 18 januari 2014 12:10 schreef gebrokenglas het volgende:
Wat ik niet snap is waarom alleen metadata van telefoongesprekken wordt bewaard en niet de inhoud van de gesprekken zelf? Die inhoud is toch waar je nog het meeste aan hebt? Als je toch bezig bent met verzamelen, doe dat dan er ook bij voor een volledig beeld...
Ook gewoon onderbreken voor die kneus van een Bieber... USAquote:
quote:
quote:The Resolution To Renounce The National Security Agencys Surveillance Program, which reportedly passed by an overwhelming majority during the party's annual winter meeting Friday, calls for an investigation into the NSAs dragnet surveillance program and for the creation of a committee to make "specific recommendations for legal and regulatory reform to end unconstitutional surveillance."
quote:
quote:In a jarring break from the George W. Bush era, the Republican National Committee voted Friday to adopt a resolution demanding an investigation into the National Security Agencys spy programs.
quote:
Het artikel gaat verder.quote:At the end of December 2013, journalists working for the German newspaper Der Spiegel published information about a top-secret arm of the NSA, called the Tailored Access Operations division. TAO does highly targeted surveillance, a world apart from the indiscriminate, mass surveillance that happens under other NSA and FBI programs. One of the more alarming things we learned in the TAO story is that the NSA intercepts computers ordered online and installs malware on them, before sending them on to their final destination.
Could this be what happened to Shepard's computer, ordered on Amazon and delivered to Alexandria, instead of to Seattle? Could Amazon have made a mistake in notifying Shepard about this extra journey, which was likely meant to stay a secret? If this really is an example of the TAO laptop-interception program in action, does this mean that companies like Amazon are made aware of the government's intention to "look after" consumer products ordered by their customers? Or did Shepard receive this weird notice only after some sort of glitch in the NSA's surveillance matrix?
If this indeed is evidence of the NSA intercepting a laptop to install spyware on it, it's yet more proof that, even when the spying is highly targeted and precise, the NSA isn't necessarily using its powers to only go after terrorists or dangerous criminals. Shepard is neither a criminal nor a terrorist. She's a developer, an activist, and a free speech supporter.
Ped0-vrouwen bestaan ook...quote:Op vrijdag 24 januari 2014 15:56 schreef venomsnake het volgende:
[..]
Ook gewoon onderbreken voor die kneus van een Bieber... USA!
quote:
quote:Voorafgaand aan de uitzending van het interview vanavond deed de zender een verklaring uitgaan waarin Snowden wordt geciteerd en is een fragment uit het interview gepubliceerd. Daarin zegt Snowden dat als een bedrijf als Siemens informatie zou hebben waarbij de Verenigde Staten baat zouden hebben - maar die niks met nationale veiligheid te maken heeft - de NSA die informatie toch zou gebruiken. ARD geeft verder geen details en het is onduidelijk wat de NSA precies met zulke informatie zou doen. Eerder gaf de NSA volgens ARD juist aan geen bedrijven te bespioneren.
Sorry, maar hebben journalisten geen enkel benul waar ze over schrijvenquote:
quote:Op 5 juli 2000 besloot het Europees Parlement tot het opzetten van een tijdelijke commissie om onderzoek naar ECHELON te doen. De reden hiervoor was een rapport getiteld Interception capabilities 2000, waarin melding werd gemaakt van het gebruik van de door het ECHELON-netwerk vergaarde inlichtingen voor commerciële doeleinden van de bij het UKUSA aangesloten landen. Zo zou in 1994 het Franse bedrijf Thomson-CSF een contract in Brazilië ter waarde van 1,3 miljard dollar zijn misgelopen ten gunste van het Amerikaanse Raytheon als gevolg van onderschepte commerciële informatie die aan Raytheon zou zijn doorgespeeld. In datzelfde jaar zou Airbus een contract van 6 miljard dollar in Saoedi-Arabië zijn misgelopen ten gunste van de Amerikaanse bedrijven Boeing en McDonnell Douglas, doordat via ECHELON alle onderhandelingen tussen Airbus en Saoedi-Arabië waren afgeluisterd en de informatie werd doorgespeeld aan de beide Amerikaanse bedrijven.
quote:
Het artikel gaat verder.quote:Officials are planning to review the historic D-notice system, which warns the media not to publish intelligence that might damage security, in the wake of the Guardian's stories about mass surveillance by the security services based on leaks from the US whistleblower Edward Snowden.
Sources said Jon Thompson, the permanent secretary of the Ministry of Defence, was setting up an inquiry into the future of the committee, raising fears that the voluntary censorship system also known as the DA-notice could be made compulsory.
The committee is supposed to be consulted when news organisations are considering publishing material relating to secret intelligence or the military. It is staffed by senior civil servants and media representatives, who give advice on the publication of sensitive stories.
The MoD declined to say why the future of the committee was being considered, but minutes of its latest meeting say: "The events of the last few months had undoubtedly raised questions in some minds about the system's future usefulness."
quote:
Het artikel gaat verder.quote:The National Security Agency and its UK counterpart GCHQ have been developing capabilities to take advantage of "leaky" smartphone apps, such as the wildly popular Angry Birds game, that transmit users' private information across the internet, according to top secret documents.
The data pouring onto communication networks from the new generation of iPhone and Android apps ranges from phone model and screen size to personal details such as age, gender and location. Some apps, the documents state, can share users' most sensitive information such as sexual orientation – and one app recorded in the material even sends specific sexual preferences such as whether or not the user may be a swinger.
Many smartphone owners will be unaware of the full extent this information is being shared across the internet, and even the most sophisticated would be unlikely to realise that all of it is available for the spy agencies to collect.
Dozens of classified documents, provided to the Guardian by whistleblower Edward Snowden and reported in partnership with the New York Times and ProPublica, detail the NSA and GCHQ efforts to piggyback on this commercial data collection for their own purposes.
Scooping up information the apps are sending about their users allows the agencies to collect large quantities of mobile phone data from their existing mass surveillance tools – such as cable taps, or from international mobile networks – rather than solely from hacking into individual mobile handsets.
Exploiting phone information and location is a high-priority effort for the intelligence agencies, as terrorists and other intelligence targets make substantial use of phones in planning and carrying out their activities, for example by using phones as triggering devices in conflict zones. The NSA has cumulatively spent more than $1bn in its phone targeting efforts.
The disclosures also reveal how much the shift towards smartphone browsing could benefit spy agencies' collection efforts.
quote:
Het artikel gaat verder.quote:British intelligence officials can infiltrate the very cables that transfer information across the internet as well as monitor users in real time on sites like Facebook without the company's consent, according to documents leaked by Edward Snowden.
The internal documents reveal that British analysts gave instruction to members of the National Security Agency in 2012, showing them how to spy on Facebook, Twitter, and YouTube in real time and collect the computer addresses of billions of the sites’ uploaders.
The leaked documents are from a GCHQ publication titled ‘Psychology: A New Kind of SIGDEV’ (Signals Development). Published by NBC News on Monday, the papers detail a program dubbed ‘Squeaky Dolphin,’ which was developed for analysts working in “broad real-time monitoring of online activity.”
Sources told NBC that the British have proven their ability to both directly monitor the world’s web traffic cable and use a third party to view the data stream and extract information from it.
Representatives from the companies in question said they have not provided any data to the government of the United Kingdom under this program, either voluntarily or involuntarily. One person who wished to remain anonymous said that Google, the company that owns YouTube, was “shocked” to discover the UK may have been “grabbing” data for years.
quote:NASA and Britain’s GCHQ Mapping “Political Alignments” of Millions of Smartphone Users Worldwide.
New information made public by Edward Snowden reveals that the governments of the United States and United Kingdom are trawling data from cellphone “apps” to accumulate dossiers on the “political alignments” of millions of smartphone users worldwide.
According to a 2012 internal UK Government Communications Headquarters (GCHQ) document, the National Security Agency (NSA) and GCHQ have been accumulating and storing hundreds of millions of user “cookies” —the digital footprints left on a cellphone or computer each time a user visits a web site—in order to accumulate detailed personal information about users’ private lives.
This confirms that the main purpose of the programs is not to protect the population from “terrorism,” but to facilitate the state repression of working class opposition to widening social inequality and social counterrevolution. The programs do not primarily target “terrorists,” but workers, intellectuals, and students.
The collection of data regarding the “political alignment” of cellphone users also suggests that the governments of the US and UK are keeping lists of those whose “political alignments” are of concern to the government. Previous revelations have shown how the NSA and GCHQ “flag” certain “suspects” for additional surveillance: the most recent revelation indicates that suspects are “flagged” at least in part based on their “political alignment.”
The legal rationale behind this process points to a growing movement to criminalize political thought in the US and UK.
If, as the revelations indicate, determining a user’s “political alignment” is a primary goal of this program, then it is also likely a factor in determining whether the government has a “reasonable, articulable suspicion” that the user is a “terrorist suspect.” If this is the case, the web sites a user visits may raise the government’s level of suspicion that the user is engaged in criminal activity, and may thereby provide the government with the pseudo-legal pretext required to unlock the content of all his or her phone calls, emails, text messages, etc.
Such a rationale would amount to a flagrant violation of both the First and Fourth Amendments to the United States Constitution. Not only does the Fourth Amendment protect against “unreasonable searches and seizures,” but the First Amendment also proscribes the government from monitoring individuals based on their political beliefs. The elimination of such a fundamental democratic right would be a dangerous step towards the imposition of a police state dictatorship.
The new report also details the depth of the mobile-app spying operation.
A 2009 “brute-force” analysis test performed by the NSA and GCHQ of what the New York Times describes as a “tiny sliver of their cellphone databases” revealed that in one month, the NSA collected cellphone data of 8,615,650 cellphone users. Data from the GCHQ test revealed that in three months, the British had spied on 24,760,289 users. Expanded to a full year, this data shows that in 2009, the NSA collected data from over 103,000,000 users, while GCHQ collected data from over 99,000,000 users: and this coming from only a “tiny sliver” of a month’s data!
“They are gathered in bulk, and are currently our single largest type of events,” one leaked document reads.
The program—referred to in one NSA document as “Golden Nugget!”—also allows the governments to receive a log of users’ Google Maps application use. Such information allows the intelligence apparatus to track the exact whereabouts of surveillance victims worldwide. One chart from an internal NSA slideshow asks: “Where was my target when they did this?” and “Where is my target going?”
An NSA report from 2007 bragged that so much geo-data could be gathered that the intelligence agencies would “be able to clone Google’s database” of all searches for directions made via Google Maps.
“It effectively means that anyone using Google Maps on a smartphone is working in support of a GCHQ system,” a 2008 GCHQ report noted.
Additional presentation material leaked by Snowden shows that in 2010 the NSA explained that its “perfect scenario” was to “target uploading photo to a social media site taken with a mobile device.” The same slide asks, “What can we get?” The answer, according to the same presentation, includes the photographs of the user, buddy lists, emails, phone contacts, and “a host of other social networking data as well as location.”
The agencies also use information provided by mobile apps to paint a clear picture of the victim’s current location, sexual orientation, marital status, income, ethnicity, education level, and number of children.
GCHQ has an internal code-name system for grading their ability to snoop on a particular cellphone user. The codes are based on the television show “The Smurfs.” If the agencies can tap the phone’s microphone to listen to conversations, the codename “Nosey Smurf” is employed. If the agencies can track the precise location of the user as he or she moves, the codename “Tracker Smurf” is used. The ability to track a phone that is powered off is named “Dreamy Smurf,” and the ability to hide the spy software is coded “Paranoid Smurf.”
That the intelligence agencies have cheekily nicknamed codes in an Orwellian surveillance program after animated characters from a children’s show is a telling indication of the contempt with which the ruling class views the democratic rights of the population of the world.
Additionally, the agencies have been tracking and storing data from a series of cellphone game applications, including the popular “Angry Birds” game, which has been downloaded over 1.7 billion times.
The tracking of data from online games like “Angry Birds” further reveals that these programs are not intended to protect the population from “terrorism.” It would be indefensible for the NSA and GCHQ to explain that they suspected to glean information about looming Al Qaeda plots from a mindless cellphone game.
Yet this is precisely how the NSA has attempted to justify these programs.
“The communications of people who are not valid foreign intelligence targets are not of interest to the National Security Agency,” an agency spokeswoman said. “Any implication that NSA’s foreign intelligence collection is focused on the smartphone or social media communications of everyday Americans is not true. Moreover, NSA does not profile everyday Americans as it carries out its foreign intelligence mission.”
In an added indication of its anti-democratic character, the US government is therefore employing the technique of the “Big Lie” by denying what has just been proven true.
In reality, the revelations have further exposed President Barack Obama’s January 17 speech as a celebration of lies.
The president told the nation that the spying programs do “not involve the NSA examining the phone records of ordinary Americans.” He also said that the US “is not abusing authorities to listen to your private phone calls or read your emails,” and that “the United States is not spying on ordinary people who don’t threaten our national security.”
He added in reference to the “folks” at the NSA that “nothing I have learned [about the programs] indicated that our intelligence community has sought to violate the law or is cavalier about the civil liberties of their fellow citizens.”
But the evidence is mounting that the governments of the US and UK are compiling information regarding the “political alignments” of hundreds of millions across the globe. All those responsible for carrying out such a facially anti-democratic campaign—including President Obama, David Cameron, their aides, and the leaders of the security apparatus—must face criminal charges and immediate removal from office.
quote:
Het artikel gaat verder.quote:We've mentioned in the past that, for all the focus on the NSA lately, the FBI may be equally, if not more, worrisome for its willingness to collect tons of data on everyone and use it. Back in August, it became pretty clear that the FBI had compromised the Tor Browser Bundle, and had effectively taken over Freedom Hosting -- a popular hosting provider for dark web tor sites -- in order to push out malware that identified Tor users. A month later, it was confirmed that it was the FBI behind the effort, which led to the closing of Freedom Hosting.
Now there are new reports, suggesting that along with Freedom Hosting, the FBI was able to get the full database of emails on TorMail, a popular tor-based email service that used Freedom Hosting and was shut down at the same time Freedom Hosting went down. The reports point to a new lawsuit, in which the FBI was able to get a search warrant to search TorMail using its own copy of the database -- which it clearly had obtained at an earlier date. This basically means that the FBI has a pretty easy time searching all those emails if it needs to:
. The tactic suggests the FBI is adapting to the age of big-data with an NSA-style collect-everything approach, gathering information into a virtual lock box, and leaving it there until it can obtain specific authority to tap it later. There’s no indication that the FBI searched the trove for incriminating evidence before getting a warrant. But now that it has a copy of TorMail’s servers, the bureau can execute endless search warrants on a mail service that once boasted of being immune to spying.
This again highlights one of the problems of the "collect it all" approach. Rather than merely targeting a specific individual or group, the FBI now has all of those emails sitting in a database. Even if it's getting a warrant to search, it's now searching its own database, rather than having to go out to get the information from others who might challenge the requests.
quote:
quote:GCHQ's mass surveillance spying programmes are probably illegal and have been signed off by ministers in breach of human rights and surveillance laws, according to a hard-hitting legal opinion that has been provided to MPs.
The advice warns that Britain's principal surveillance law is too vague and is almost certainly being interpreted to allow the agency to conduct surveillance that flouts privacy safeguards set out in the European convention on human rights (ECHR).
The inadequacies, it says, have created a situation where GCHQ staff are potentially able to rely "on the gaps in the current statutory framework to commit serious crime with impunity".
At its most extreme, the advice raises issues about the possible vulnerability of staff at GCHQ if it could be proved that intelligence used for US drone strikes against "non-combatants" had been passed on or supplied by the British before being used in a missile attack.
"An individual involved in passing that information is likely to be an accessory to murder. It is well arguable, on a variety of different bases, that the government is obliged to take reasonable steps to investigate that possibility," the advice says.
The opinion suggests the UK should consider publishing a Memorandum of Understanding with any country with which it intends to share intelligence.
This would clarify what the intelligence can be used for under British law, and how the data will be stored and destroyed.
The legal advice has been sent to the 46 members of the all-party parliamentary group on drones, which is chaired by the Labour MP, Tom Watson.
Het artikel gaat verder.quote:"We consider the mass interception of external contents and communications data is unlawful. The indiscriminate interception of data, solely by reference to the request of the executive, is a disproportionate interference with the private life of the individuals concerned."
Last June, Snowden leaked thousands of files about the surveillance activities of GCHQ and its US counterpart the NSA.
One of the key revelations focussed on Operation Tempora, a GCHQ programme that harvests vast amounts of information by tapping into the undersea cables that carry internet and phone traffic passing in and out of the UK. GCHQ and Hague, have repeatedly insisted the agency acts in accordance with the law.
Last year Hague told MPs: "It has been suggested GCHQ uses our partnership with the US to get around UK law, obtaining information that they cannot legally obtain in the UK. I wish to be absolutely clear that this accusation is baseless."
However, the legal advice poses awkward new questions about the framework GCHQ operates within, the role of ministers and the legality of transferring bulk data to other spy agencies.
The advice makes clear Ripa does not allow GCHQ to conduct mass surveillance on communications between people in the UK, even if the data has briefly left British shores because the call or email has travelled to an internet server overseas.
twitter:ECA_Legion twitterde op dinsdag 28-01-2014 om 23:11:43It's not just you nsa.gov appears to be Down via #Anonymous reageer retweet
twitter:r3v3r3nd_m4yh3m twitterde op dinsdag 28-01-2014 om 23:30:15STEAL THIS TWEET nsa.gov #TANGODOWN #Anonymous #ProtectSnowden #FreeAnons #OpBlitzkrieg We Are Legion #AntiSec #LulzSec reageer retweet
quote:Philips werkte jarenlang intensief samen met NSA-spionnen
Elektronicaconcern Philips heeft jarenlang intensief samengewerkt met de Amerikaanse inlichtingendienst NSA. Philips verkocht beveiligde telefoons aan de Nederlandse overheid, waarvan de versleuteling afkomstig was van de Amerikaanse spionnen en hun Britse collega's (de GCHQ, Government Communications Headquarters).
De telefoons zijn tot een paar jaar geleden door het Nederlandse leger en op ambassades gebruikt. De NSA bevond zich in het hart van het Nederlandse militaire en diplomatieke verkeer. Philips liep in zekere zin aan de leiband van de NSA, zo beschrijft onderzoeksjournalist en Philips-biograaf Marcel Metze in een artikel dat vandaag in De Groene Amsterdammer verschijnt.
Uit archiefonderzoek en gesprekken met voormalige medewerkers van Philips-dochter Ultra Sonore Fabricage Afdeling (USFA), de cryptografische afdeling van het concern, blijkt dat het bedrijf wel met de Amerikanen moest samenwerken. Zonder de NSA-input maakten de Nederlanders geen kans op opdrachten van NAVO-landen.
Encryptiemachines
Dus nam Philips de NSA aan boord, toen het begin jaren tachtig encryptiemachines ging bouwen voor de NAVO en meedong naar een grote order (200 miljoen gulden) voor een nieuw communicatienetwerk voor het Nederlandse leger. Philips leverde in de jaren daarna onder de codenaam Zodiac mobiele verbindingen, telefooncentrales en duizenden digitaal beveiligde telefoons aan het leger. De telefoons waren zeer vernieuwend: ze verhaspelden de woorden meteen tijdens het spreken. Ook het ministerie van Buitenlandse Zaken nam de telefoons af.
De NSA leverde een met de GCHQ ontwikkeld versleutelingsprogramma voor de telefoons, Saville, dat ingebakken in drie chips in de apparaten werd ingebouwd. Er waren slechts enkele medewerkers bij Philips die het algoritme kenden.
Overigens zat de NSA-code in alle apparatuur van de NAVO-landen. 'De NSA had die order gewonnen, zij waren gewoon de beste', zegt hoogleraar computerbeveiliging Bart Jacobs van de Radboud Universiteit Nijmegen.
Of de Amerikanen hun kennis misbruikt hebben is niet duidelijk. Betrokken Philips-medewerkers zeggen daarvan niet op de hoogte te zijn. Als de Amerikanen opzettelijk een zwakke plek (een 'achterdeur') in de software zouden hebben ingebouwd, zou dat henzelf ook kwetsbaar hebben gemaakt zegt Jacobs. 'Want zij gebruikten de apparaten zelf ook binnen de NAVO.'
Achterdeurtjes
Uit documenten van Snowden is vorig jaar gebleken dat de NSA graag dergelijke achterdeurtjes inbouwt in commerciële encryptiesoftware. Zo bleek vorig jaar dat de NSA ook een zwakke plek had laten maken in een algoritme van het bedrijf RSA. De commissie die president Obama adviseerde over de NSA pleitte er in december voor dat de dienst zich niet meer bemoeit met encryptiesoftware bij bedrijven. Of de NSA nog steeds apparatuur levert aan NAVO-landen is niet bekend. Jacobs: 'Ik kan me niet voorstellen van niet.'
Philips wil hierop niet inhoudelijk reageren, omdat het archief van de betrokken dochter USFA in 1989 via de verkoop van Holland Signaal is beland bij het Franse Thomson. Ook noemt een woordvoerder delen van het verhaal speculatief. 'Wij zien op grond hiervan geen aanleiding om eigen onderzoek te beginnen.'
Een woordvoerder van het ministerie van Defensie zegt dat het 'niet meer dan logisch is' dat bondgenoten met elkaar kunnen praten. 'Dan is het ook niet raar dat diensten voor encryptie van communicatieapparatuur met bedrijven samenwerken.'
quote:James Clapper Suggests Journalists Could Be Edward Snowden's 'Accomplices'
NEW YORK -– Director of National Intelligence James Clapper urged former NSA contractor Edward Snowden and his “accomplices” to return leaked documents during a hearing on Wednesday.
"Snowden claims that he’s won and that his mission is accomplished," Clapper said, according to a transcript from the Senate Intelligence Committee hearing, posted by the Washington Post. "If that is so, I call on him and his accomplices to facilitate the return of the remaining stolen documents that have not yet been exposed, to prevent even more damage to U.S. security."
So who, exactly, are Snowden’s “accomplices?”
Guardian national security editor Spencer Ackerman, among others, questioned on Twitter whether Clapper was referring to journalists.
HuffPost put the question to the Office of the Director of National Intelligence, which didn't rule out that journalists could be considered "accomplices."
The office's public affairs director Shawn Turner said in an email that “director Clapper was referring to anyone who is assisting Snowden to further threaten our national security through the unauthorized disclosure of stolen documents related to lawful foreign intelligence collection programs.”
The suggestion that Snowden is conspiring with journalists, rather than acting as their source, has come up ever since the National Security Agency surveillance story broke last spring.
In June, "Meet the Press" host David Gregory asked journalist Glenn Greenwald about having "aided and abetted" Snowden, language that suggests the reporter was a participant in a crime. Earlier this month, Rep. Peter King (R-N.Y.) described Greenwald as Snowden's "accomplice."
Members of Congress and government officials have long claimed, both anonymously and in TV interviews, that China and Russia likely obtained the leaked NSA documents and that Snowden may be a spy. Snowden was the eighth person charged under the Espionage Act for leaking information during the Obama administration.
Despite generating headlines, Snowden's critics haven't provided direct evidence to back up such claims. Last week, Snowden told The New Yorker that allegations he's a Russian spy are "absurd."
But Snowden did provide documents last year to Greenwald, and journalists Laura Poitras and Barton Gellman. The ongoing NSA coverage has detailed the extent of U.S. surveillance and sparked a worldwide debate.
The Guardian, where Greenwald previously worked, provided a subset of the documents to The New York Times and ProPublica. Meanwhile, Poitras and Greenwald, who are believed to have the full set, have continued reporting on specific documents with news organizations around the world. On Monday, for instance, Greenwald co-wrote an NBC News story about how the British government could spy on Facebook and YouTube users.
It doesn’t seem possible that all the documents could be returned by Snowden. Snowden has said he gave what he had to journalists in Hong Kong, so he no longer was carrying the documents when he arrived in Russia, where he remains under temporary asylum.
Still, the idea that Snowden might be capable of securing the leaked information has been floated before by a top government official.
Last month, NSA task force head Rick Ledgett told “60 Minutes” that any conversation with Snowden about amnesty could only take place if there were “assurances that the remainder of the data could be secured.”
quote:
quote:The document was published on an internal NSA site on the first day of the Denmark conference, December 7, 2009, and stated that “analysts here at NSA, as well as our Second Party partners, will continue to provide policymakers with unique, timely, and valuable insights into key countries’ preparations and goals for the conference, as well as the deliberation within countries on climate change policies and negotiation strategies.”
quote:
Het artikel gaat verder.quote:As the NSA leaks have expanded to detail spying activities in other countries, those governments affected have had a variety of reactions. In some cases, legitimately questionable tactics were exposed (potential economic espionage in Brazil, tapping German chancellor Angela Merkel's phone) and the responses were genuinely outraged. In other cases, the outrage was temporary and somewhat muted, suggesting these countries were allowing the NSA to take the heat for their own questionable surveillance programs aimed at their citizens.
When news broke of the NSA acquiring millions of metadata records from French phone companies, the response from the French government seemed like little more than an attempt to shift the focus off its own PRISM-esque collection programs. In response, the ODNI delivered a statement that rebutted the word salad created by an algorithmic translation of the original French article. Plausible deniability via translation tech. The NSA couldn't have asked for a better setup.
But the story swiftly faded into the background. The minimal outrage failed to sustain itself and was soon swept away by the exposure of more NSA documents. One French telco, Orange, has declared its intentions to sue the NSA for tapping its undersea cables, but further reaction from the government has remained almost nonexistent.
That the heat failed to stay on the NSA may prove to be a problem as more details have surfaced suggesting the French government respects its citizens no more than the US government does. Making things a bit messier is the fact that the French intelligence agencies' actions aren't subject to judicial control but rather answer solely to the executive branch (as it were) directly. While our judicial oversight may be more "rubber stamp" than "check and balance," it at least helps prevent agencies from operating completely under the cover of executive decisions.
But the limits, or lack thereof, are nearly identical to those of the NSA. According to its 2006 anti-terrorist law, agencies do not need warrants to access data or perform investigations that fall under the scope of the anti-terrorism legislation. Needless to say, the law has since expanded to cover even more data and content.
quote:
Het artikel gaat verder.quote:A top secret document retrieved by U.S. whistleblower Edward Snowden and obtained by CBC News shows that Canada's electronic spy agency used information from the free internet service at a major Canadian airport to track the wireless devices of thousands of ordinary airline passengers for days after they left the terminal.
After reviewing the document, one of Canada's foremost authorities on cyber-security says the clandestine operation by the Communications Security Establishment Canada ( CSEC) was almost certainly illegal.
Ronald Deibert told CBC News: "I can't see any circumstance in which this would not be unlawful, under current Canadian law, under our Charter, under CSEC's mandates."
The spy agency is supposed to be collecting primarily foreign intelligence by intercepting overseas phone and internet traffic, and is prohibited by law from targeting Canadians or anyone in Canada without a judicial warrant.
As CSEC chief John Forster recently stated: "I can tell you that we do not target Canadians at home or abroad in our foreign intelligence activities, nor do we target anyone in Canada.
"In fact, it's prohibited by law. Protecting the privacy of Canadians is our most important principle."
But security experts who have been apprised of the document point out the airline passengers in a Canadian airport were clearly in Canada.
CSEC said in a written statement to CBC News that it is "mandated to collect foreign signals intelligence to protect Canada and Canadians. And in order to fulfill that key foreign intelligence role for the country, CSEC is legally authorized to collect and analyze metadata."
Metadata reveals a trove of information including, for example, the location and telephone numbers of all calls a person makes and receives — but not the content of the call, which would legally be considered a private communication and cannot be intercepted without a warrant.
"No Canadian communications were (or are) targeted, collected or used," the agency says.
In the case of the airport tracking operation, the metadata apparently identified travelers' wireless devices, but not the content of calls made or emails sent from them.
quote:Op donderdag 30 januari 2014 18:45 schreef Tamabralski het volgende:
"Snowden germany interview english"
quote:Footage released of Guardian editors destroying Snowden hard drives
GCHQ technicians watched as journalists took angle grinders and drills to computers after weeks of tense negotiations
quote:The bizarre episode in the basement of the Guardian's London HQ was the climax of Downing Street's fraught interactions with the Guardian in the wake of Snowden's leak the biggest in the history of western intelligence. The details are revealed in a new book published next week The Snowden Files: The Inside Story of the World's Most Wanted Man by the Guardian correspondent Luke Harding. The book describes how the Guardian took the decision to destroy its own Macbooks after the government explicitly threatened the paper with an injunction.
quote:"It was purely a symbolic act. We knew that. GCHQ knew that. And the government knew that," Johnson said. He added: "It was the most surreal event I have witnessed in British journalism."
quote:
quote:Once Obama became president, Snowden came to dislike him intensely. He criticised the White House's attempts to ban assault weapons. He was unimpressed by affirmative action. Another topic made him even angrier. The Snowden of 2009 inveighed against government officials who leaked classified information to newspapers – the worst crime conceivable, in Snowden's apoplectic view. In January of that year, the New York Times published a report on a secret Israeli plan to attack Iran. The Times said its story was based on 15 months' worth of interviews with current and former US officials, European and Israeli officials, other experts and international nuclear inspectors.
TheTrueHOOHA's response, published by Ars Technica, is revealing. In a long conversation with another user, he wrote the following messages:
"WTF NYTIMES. Are they TRYING to start a war?"
"They're reporting classified shit"
"moreover, who the fuck are the anonymous sources telling them this? those people should be shot in the balls"
"that shit is classified for a reason"
"it's not because 'oh we hope our citizens don't find out' its because 'this shit won't work if iran knows what we're doing'"
Snowden's anti-leaking invective seems stunningly at odds with his own later behaviour, but he would trace the beginning of his own disillusionment with government spying to this time. "Much of what I saw in Geneva really disillusioned me about how my government functions and what its impact is in the world. I realised that I was part of something that was doing far more harm than good," he later said.
quote:NY Times' Jill Abramson: Obama Crackdown Has Created 'Freeze' On Reporting
New York Times editor Jill Abramson once again condemned the Obama administration's crackdown on leaks, saying that the government's treatment of Edward Snowden has scared potential sources and created a "real freeze" on reporting.
Abramson said at a Columbia University School of Journalism panel Thursday that Snowden has brought into question matters of source protection, media shield laws and had a “profound effect on journalism,” the Wrap reported Friday.
One of the effects, Abramson said, is that The New York Times is forced to “hit the breaks a bit" now that larger issues of national security are involved.
The issue of U.S. government spying and whistleblowers came to a head last June when Edward Snowden first leaked the NSA documents revealing massive government surveillance programs and collection of phone and Internet records. Snowden sought asylum in Russia to escape espionage charges against him in the U.S. and claims he is still facing "significant threats" for his actions.
Snowden's story, and government crackdown on leakers as a whole, is what Abramson says now has other whistleblowers hesitant to come forward, significantly changing the relationship between sources and journalists.
"A real freeze is setting in on what had been to this point, I think, a healthy discourse between sources and journalists," she said. "Journalists are saying, ‘I will go to jail to protect your identity.... These words are now being uttered.”
Also with Abramson at the conference was Janine Gibson, editor-in-chief of the Guardian, the website Snowden leaked documents to that exposed the NSA surveillance. Abramson pointed out that the Obama administration has administered seven leak investigations to date, which is twice that of any other previous administration, according to the Wrap.
"The original, the ordinary way of chilling journalism won’t work," she said. "We’re not any more going to be worried about naming names. It’s going to be about proving that you’re not a co-conspirator."
quote:
quote:We've seen various government officials act in all sorts of bizarre ways after revelations of illegal spying on their own people (and foreigners), but none may be quite as bizarre as the response from the Canadian government, following the release late last night from the CBC (with help from Glenn Greenwald) that they're spying on public WiFi connections. That report had plenty of detail, including an internal presentation from the Canadian electronic spying agency, CSEC. In the Canadian Parliament today, Prime Minister Stephen Harper's parliamentary secretary, Paul Calandra, decided to respond to all of this by by insisting it's all a lie and then flat out insulting both the CBC and Glenn Greenwald.
quote:If you can't watch the video, here's what he says:
Mr. Speaker, last night the CBC aired a misleading report on Canada's signals intelligence agency, Communications Security Establishment Canada. These documents were stolen by former NSA contractor, Edward Snowden and sold to the CBC by Glenn Greenwald. Canada's signals intelligence agency has been clear that the CBC story is incorrect, yet the CBC went ahead and published it anyway.
Here are the facts: Before the story aired, CSEC made clear that nothing in the stolen documents showed that Canadians' communications were targeted, collected, or used, nor that travellers' movements were tracked.
In addition, CSEC's activities are regularly reviewed by an independent watchdog who has consistently found it has followed the law.
Why is furthering porn-spy Glenn Greenwald's agenda and lining his Brazilian bank account more important than maintaining the public broadcaster's journalistic integrity?
Wat Snowden heeft gedaan is de grootste diefstal uit de geschiedenis? De Amerikaanse overheid steelt jaarlijks prive informatie van miljarden burgers en miljoenen bedrijven. De diefstal van Snowden VERBLEEKT bij de diefstal van de Amerikanen.quote:Teruggeven
Wat Snowden heeft meegenomen 'gaat verder' dan de NSA-programma's voor het verzamelen telefoon- en internetdata, aldus directeur van de nationale inlichtingendiensten James Clapper.
"Minder dan tien procent gaat over binnenlandse surveillanceprogramma's." Clapper heeft Snowden en de mensen die hem helpen gevraagd de documenten die nog niet openbaar gemaakt zijn terug te geven.
Geschiedenis
Clapper leek terug te komen op zijn bewering vorige week dat de onthullingen van Snowden 'de grootste diefstal van informatie van inlichtingendiensten in onze geschiedenis is'.
In plaats daarvan zei Clapper dinsdag dat de diefstal van gegevens 'mogelijk de grootste in de geschiedenis is'. Bronnen bij de Amerikaanse regering gaan ervan uit dat Snowden ongeveer 1,7 miljoen documenten heeft gedownload.
http://www.nu.nl/buitenla(...)kken-documenten.html
Heb je het ARD interview bekeken?quote:Op dinsdag 4 februari 2014 21:57 schreef polderturk het volgende:
[..]
Wat Snowden heeft gedaan is de grootste diefstal uit de geschiedenis? De Amerikaanse overheid steelt jaarlijks prive informatie van miljarden burgers en miljoenen bedrijven. De diefstal van Snowden VERBLEEKT bij de diefstal van de Amerikanen.
Nope. Vertel.quote:Op dinsdag 4 februari 2014 22:01 schreef Pietverdriet het volgende:
[..]
Heb je het ARD interview bekeken?
Ik dacht dat je je reactie had geplaatst omdat je het niet eens was met wat ik geschreven had. Of was je het er wel mee eens?quote:
Ik ben een groot fan van snowdenquote:Op dinsdag 4 februari 2014 22:10 schreef polderturk het volgende:
[..]
Ik dacht dat je je reactie had geplaatst omdat je het niet eens was met wat ik geschreven had. Of was je het er wel mee eens?
Ik ook. Er zouden eigenlijk van die Snowden T-shirts verkocht moeten worden, zoals die Che Gueverra T-shirts. Snowden zou een icoon moeten worden van deze tijd.quote:Op dinsdag 4 februari 2014 22:11 schreef Pietverdriet het volgende:
[..]
Ik ben een groot fan van snowden
quote:
quote:Congressman Mike Rogers, chairman of the House intelligence committee, suggested Greenwald was a “thief” after he worked with news organizations who paid for stories based on the documents.
“For personal gain, he’s now selling his access to information, that’s how they’re terming it … A thief selling stolen material is a thief,” Politico quoted Rogers as saying after a committee hearing on Tuesday. Rogers said his source for the information was “other nations' press services”.
Greenwald said that the claim was foolish, unfounded, and designed to intimidate journalists. “The main value in bandying about theories of prosecuting journalists is the hope that it will bolster the climate of fear for journalism,” he tweeted Tuesday.
Wat een hypocrisie. En de NSA is geen dief? De NSA steelt geen informatie van honderden miljoenen mensen?quote:
quote:Read the Snowden Documents From the NSA
Here Uppdrag granskning [Mission: Investigation] the documents leaked by Edwards Snowden and retrieved from Glenn Greenwald that are the basis for the report about Sweden's collaboration with the NSA and the GCHQ.
quote:In an internal, top-secret document dated 18 April this year, the NSA summarises its relations with Sweden. The document states that since 1954 Sweden has been a part of an intelligence collaboration with what is often called “The Five Eyes”, UKUSA, which refers to the US, UK, Canada, Australia and New Zealand. This is despite the fact that Sweden was officially neutral, an image that has been maintained outwardly for decades by multiple governments of different political persuasions. The document also states that the UKUSA contract was discontinued in 2004 and replaced with bilateral agreements for signals intelligence and wiretapping. As of 2011, the Swedish FRA provides its American partner with extensive access to data from its cable collection.
quote:
quote:Countries ranging from France to Finland have started responding to NSA revelations in different ways, ranging from new fiber optic cables to government-backed industrial espionage. By 2015, some European countries will start implementing surveillance programs that go even beyond the NSA — and are explicitly meant to protect not only national security, but also economic interests.
Last week, Europe was rocked by the claim that Sweden has been one of the key allies of NSA in a global surveillance program. Sweden may have tapped into the undersea fiber optic cables running under the Baltic sea to deliver massive amounts of intel about countries across Nordic and Baltic regions. According to Wikileaks, Finland has now committed to building a new fiber optic cable to Germany specifically to prevent Sweden from intercepting data and passing it on to NSA. The project is run by Governia, a state-owned company.
Nee, dit is propaganda, victim blaming en shooting the messenger. Assange is een autistische verkrachter en Glenn Greenwald is een buitenlandse dief.quote:Op dinsdag 4 februari 2014 23:51 schreef polderturk het volgende:
[..]
Wat een hypocrisie. En de NSA is geen dief? De NSA steelt geen informatie van honderden miljoenen mensen?
Het klopt voor geen meter wat hij zegt. Wie gestolen waar verhandelt is hooguit een heler, geen dief. En ook in het Engels is een heler geen "thief".quote:
Spin, een specifieke manier van propaganda.quote:Op dinsdag 4 februari 2014 23:58 schreef Papierversnipperaar het volgende:
[..]
Nee, dit is propaganda, victim blaming en shooting the messenger. Assange is een autistische verkrachter en Glenn Greenwald is een buitenlandse dief.
quote:
quote:Minister Plasterk van Binnenlandse Zaken en minister Hennis-Plasschaert van Defensie schrijven nu dat Nederland die informatie zelf onderschepte en vervolgens deelde met de NSA. Het kabinet maakt daarmee een flinke draai. In oktober meldde Plasterk nog dat het kabinet zich ervan bewust is dat de NSA telefoongesprekken kan aftappen en dat er met de Amerikanen over de kwestie gesproken werd.
Volgens de ministers betreft het 'uitdrukkelijk data verzameld
in het kader van de wettelijke taakuitoefening'. Het delen van de informatie is volgens Plasterk en Hennis op rechtmatige wijze gebeurd in het kader van terrorismebestrijding en militaire operaties in het buitenland.
quote:
Het artikel gaat verder.quote:A secret British spy unit created to mount cyber attacks on Britain’s enemies has waged war on the hacktivists of Anonymous and LulzSec, according to documents taken from the National Security Agency by Edward Snowden and obtained by NBC News.
The blunt instrument the spy unit used to target hackers, however, also interrupted the web communications of political dissidents who did not engage in any illegal hacking. It may also have shut down websites with no connection to Anonymous.
According to the documents, a division of Government Communications Headquarters Communications (GCHQ), the British counterpart of the NSA, shut down communications among Anonymous hacktivists by launching a “denial of service” (DDOS) attack – the same technique hackers use to take down bank, retail and government websites – making the British government the first Western government known to have conducted such an attack.
The documents, from a PowerPoint presentation prepared for a 2012 NSA conference called SIGDEV, show that the unit known as the Joint Threat Research Intelligence Group, or JTRIG, boasted of using the DDOS attack – which it dubbed Rolling Thunder -- and other techniques to scare away 80 percent of the users of Anonymous internet chat rooms.
The existence of JTRIG has never been previously disclosed publicly.
The documents also show that JTRIG infiltrated chat rooms known as IRCs and identified individual hackers who had taken confidential information from websites. In one case JTRIG helped send a hacktivist to prison for stealing data from PayPal, and in another it helped identify hacktivists who attacked government websites.
In connection with this report, NBC is publishing documents that Edward Snowden took from the NSA before fleeing the U.S. The documents are being published with minimal redactions.
Intelligence sources familiar with the operation say that the British directed the DDOS attack against IRC chat rooms where they believed criminal hackers were concentrated. Other intelligence sources also noted that in 2011, authorities were alarmed by a rash of attacks on government and corporate websites and were scrambling for means to respond.
“While there must of course be limitations,” said Michael Leiter, the former head of the U.S. government’s National Counterterrorism Center and now an NBC News analyst, “law enforcement and intelligence officials must be able to pursue individuals who are going far beyond speech and into the realm of breaking the law: defacing and stealing private property that happens to be online.”
“No one should be targeted for speech or thoughts, but there is no reason law enforcement officials should unilaterally declare law breakers safe in the online environment,” said Leiter.
But critics charge the British government with overkill, noting that many of the individuals targeted were teenagers, and that the agency’s assault on communications among hacktivists means the agency infringed the free speech of people never charged with any crime.
“Targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs,” said Gabriella Coleman, an anthropology professor at McGill University and author of an upcoming book about Anonymous. “Some have rallied around the name to engage in digital civil disobedience, but nothing remotely resembling terrorism. The majority of those embrace the idea primarily for ordinary political expression.” Coleman estimated that the number of “Anons” engaged in illegal activity was in the dozens, out of a community of thousands.
Alsof het een het ander uitsluit...quote:
twitter:ggreenwald twitterde op woensdag 05-02-2014 om 13:40:01Is NBC News now one of Snowden's criminal "accomplices"? Are they criminally buying stolen property? Speak up, James Clapper & Mike Rogers. reageer retweet
The NYTimes werd nav de publicatie van The Pentagon Papers ook beschuldigd van heling.quote:Op woensdag 5 februari 2014 13:48 schreef Papierversnipperaar het volgende:
twitter:ggreenwald twitterde op woensdag 05-02-2014 om 13:40:01Is NBC News now one of Snowden's criminal "accomplices"? Are they criminally buying stolen property? Speak up, James Clapper & Mike Rogers. reageer retweet
quote:Snowden Still Outwitting U.S. Spies
Sometimes, the three hardest words to say in the English language are: “I don’t know.” For the U.S. intelligence community, those words could be very useful when it comes to Edward Snowden, the NSA-contractor-turned-leaker. Because when it comes to Snowden, the spooks know precious little—despite the over-sized claims made in Congress, allegedly on the spies’ behalf.
Last month, the Defense Intelligence Agency (DIA) completed a classified assessment of the damage caused by Snowden’s breach and began briefing the findings to Congress. The report is now driving a new round of claims by senior U.S. officials and members of Congress about what has been called the worst leak in U.S. history.
Director of National Intelligence James Clapper said a week ago that Snowden’s activities have placed the lives of intelligence officers and assets at risk. Sen. Susan Collins, a Republican from Maine, said if one were to stack the documents stolen by Snowden it would be three miles high. On Wednesday, Rep. Mac Thornberry, the Texas Republican who is next in line to be the chairman of the House Armed Services Committee, said the damage done by Snowden “will certainly cost billions to repair.”
But the DIA assessment is based on two important assumptions. First, it assumes that Snowden’s master file includes data from every network he ever scanned. Second, it assumes that this file is already in or will end up in the hands of America’s adversaries. If these assumptions turn out to be true, then the alarm raised in the last week will be warranted. The key word here is “if.”
What the DIA actually knows, according to U.S. officials briefed on its report, is that Snowden fabricated the digital keys—essentially assuming the identity—of multiple senior intelligence officials to gain access to classified intelligence systems well outside of the NSA like the military’s top secret Joint World-Wide Intelligence Communications System. One U.S. intelligence official briefed on the report said the DIA concluded that Snowden visited classified facilities outside the NSA station where he worked in Hawaii while he was downloading the documents he would eventually leak to journalists Glenn Greenwald and Barton Gellman. On Tuesday, Clapper himself estimated that less than 10 percent of the documents Snowden took were from the NSA. The implication was that the other 90 percent were from other spy agencies, and from the American military.
Those findings are important. But they do not necessarily mean the sky is falling. The DIA’s assessment assumed that every classified system Snowden visited was sucked dry of its data and placed in a file. DIA director Gen. Michael Flynn put it this way on Tuesday in testimony before the House Permanent Select Committee on Intelligence: “We assume that Snowden, everything that he touched, we assume that he took, stole.”
The U.S. intelligence official briefed on the report said the DIA was able to retrace the steps Snowden took inside the military’s classified systems to find every site where he rummaged around. “Snowden had a very limited amount of time before he would be detected when he did this, so we assume he zipped up the files and left,” this official said.
Bruce Schneier, a cybersecurity expert and cryptographer who Greenwald has consulted on the Snowden archive, said it was prudent to assume that lest some of Snowden’s documents could wind up in the hands of a foreign government.
The easiest way, he added, would be to go after the journalists who received Snowden’s leaks. “If anybody wants the documents, they go after Greenwald, (Laura Poitras) or Gellman.”
But he also said that this file would likely be encrypted—and that encryption today is powerful enough to be essentially unbreakable. So intelligence services may have the documents without being able to read them.
And those journalists might only have a fraction of what Snowden took. In statements and interviews, Snowden himself has been tight-lipped about any kind of master file that may exist containing everything he took from the U.S. intelligence community. In June, Greenwald told the Daily Beast that he did not know whether or not Snowden had additional documents beyond the ones he gave him. “I believe he does. He was clear he did not want to give to journalists things he did not think should be published.”
Snowden, however, has implied that he does not have control over the files he took. “No intelligence service—not even our own—has the capacity to compromise the secrets I continue to protect,” he wrote in July in a letter to former New Hampshire Republican senator Gordon Humphrey. “While it has not been reported in the media, one of my specializations was to teach our people at DIA how to keep such information from being compromised even in the highest threat counter-intelligence environments (i.e. China). You may rest easy knowing I cannot be coerced into revealing that information, even under torture.”
Some allies of Snowden have speculated that any kind of master file of Snowden documents could only be accessed through a pass code or cryptographic key broken out into pieces controlled by several people in multiple jurisdictions throughout the world. That way. No one government could force a single person to give up access to Snowden’s motherlode.
But these kinds of security measures are not comforting to others. Rep. Mike Rogers, the Republican chairman of the House Permanent Select Committee on Intelligence told two reporters Tuesday that Snowden would be foolish to think he could outsmart Russia’s intelligence agencies.
“If he really believes he has created something the Russian intelligence services can’t get through, then he is more naïve than I think he already is,” Rogers said. “That makes a huge leap of assumption that a guy by the way who has not been quite honest about how he got where he was and what he stole and for what purpose to believe the fact that no one can get to this but me. I don’t believe it.”
In an email to the Daily Beast, Gellman said he was taking many precautions to protect the Snowden archives. “I assume that I am more interesting than I used to be to foreign intelligence services,” he said. “I’m well aware of my responsibility to protect the Snowden archive. The Post and I have taken very considerable measures to secure the material physically and electronically, with the benefit of top-flight expert advice. That’s all I want to say about it.”
Het artikel gaat verder.quote:IRC network calls for investigations over GCHQ's attack on Anonymous
QuakeNet calls the GCHQ's actions grossly hypocritical...
QuakeNet, one of the oldest IRC networks on the Web, has condemned Britain's GCHQ for their hypocrisy - after it was revealed the agency launched DDoS attacks against IRC servers used by supporters of Anonymous.
The story broke on Wednesday. NBC News reported that the GCHQ's Joint Threat Research Intelligence Group (JTRIG) bragged about using Distributed Denial of Service (DDoS) attacks, during an operation called Rolling Thunder. These attacks were part of a campaign targeting supporters of Anonymous, outlined during a 2012 NSA conference called SIGDEV.
During their presentation, JTRIG says they scared away 80 percent of the server's users. In addition, NBC News also reported that JTRIG visited chat rooms on AnonOps (one of the Anonymous IRC servers) and interacted with users, sometimes spreading malware, in order to collect additional intelligence. Such intelligence led to at least one prison sentence, and additional identification of potential suspects.
As I wrote in my previous post, what the GCHQ did was reprehensible. They've broken their own nation's laws, in order to target people gathered in a single location to express themselves and communicate their thoughts. Adding insult to injury, they gave themselves immunity, so no one will be facing any legal problems because of this.
Yet, as of today, anyone in the U.K. (or U.S. for that matter), who encourages, assists with, or conducts a DDoS attack, for any reason, will face up to 10 years in prison and heavy fines. It's complete hypocrisy.
DDoS is disruptive. In addition to recovery and mitigation costs, even if those costs are just personal time lost due to the act, there's collateral damage to consider. When a server is attacked, and it crashes, everything hosted on it goes down too.
In the case of the GCHQ's attack, not only did the Anonymous IRC server go offline, but websites hosted on the same server went offline as well. In addition, the people paying the bills on the server had to pay bandwidth overage fees because of government sanctioned attack. Moreover, the ISPs that provide the connections to the IRC servers themselves were attacked, and faced problems of their own. By going after Anonymous, the GCHQ also attacked groups of innocent people, in what amounts to nothing more than aggravated censorship.
- See more at: http://blogs.csoonline.co(...)sthash.DJIOVZNb.dpuf
quote:Snowden Docs: British Spies Used Sex and 'Dirty Tricks'
British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”
Documents taken from the National Security Agency by Edward Snowden and exclusively obtained by NBC News describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG) as part of a growing mission to go on offense and attack adversaries ranging from Iran to the hacktivists of Anonymous. According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agency’s goal was to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications.
Both PowerPoint presentations describe “Effects” campaigns that are broadly divided into two categories: cyber attacks and propaganda operations. The propaganda campaigns use deception, mass messaging and “pushing stories” via Twitter, Flickr, Facebook and YouTube. JTRIG also uses “false flag” operations, in which British agents carry out online actions that are designed to look like they were performed by one of Britain’s adversaries.
In connection with this report, NBC is publishing documents that Edward Snowden took from the NSA before fleeing the U.S., which can be viewed by clicking here and here. The documents are being published with minimal redactions.
The spy unit’s cyber attack methods include the same “denial of service” or DDOS tactic used by computer hackers to shut down government and corporate websites.
Other documents taken from the NSA by Snowden and previously published by NBC News show that JTRIG, which is part of the NSA’s British counterpart, the cyber spy agency known as GCHQ, used a “denial of service” (DDOS) attack to shut down Internet chat rooms used by members of the hacktivist group known as Anonymous.
Read the first NBC report on JTRIG and the Snowden documents.
Read an earlier exclusive NBC report on the Snowden documents.
Civil libertarians said that in using a DDOS attack against hackers the British government also infringed free speech by individuals not involved in any illegal hacking, and may have blocked other websites with no connection to Anonymous. While GCHQ defends the legality of its actions, critics question whether the agency is too aggressive and its mission too broad.
Eric King, a lawyer who teaches IT law at the London School of Economics and is head of research at Privacy International, a British civil liberties advocacy group, said it was “remarkable” that the British government thought it had the right to hack computers, since none of the U.K.’s intelligence agencies has a “clear lawful authority” to launch their own attacks.
“GCHQ has no clear authority to send a virus or conduct cyber attacks,” said King. “Hacking is one of the most invasive methods of surveillance.” King said British cyber spies had gone on offense with “no legal safeguards” and without any public debate, even though the British government has criticized other nations, like Russia, for allegedly engaging in cyber warfare.
But intelligence officials defended the British government’s actions as appropriate responses to illegal acts. One intelligence official also said that the newest set of Snowden documents published by NBC News that describe “Effects” campaigns show that British cyber spies were “slightly ahead” of U.S. spies in going on offense against adversaries, whether those adversaries are hackers or nation states. The documents also show that a one-time signals surveillance agency, GCHQ, is now conducting the kinds of active espionage operations that were once exclusively the realm of the better-known British spy agencies MI5 and MI6.
According to notes on the 2012 documents, a computer virus called Ambassadors Reception was “used in a variety of different areas” and was “very effective.” When sent to adversaries, says the presentation, the virus will “encrypt itself, delete all emails, encrypt all files, make [the] screen shake” and block the computer user from logging on.
But the British cyber spies’ operations do not always remain entirely online. Spies have long used sexual “honey traps” to snare, blackmail and influence targets. Most often, a male target is led to believe he has an opportunity for a romantic relationship or a sexual liaison with a woman, only to find that the woman is actually an intelligence operative. The Israeli government, for example, used a “honey trap” to lure nuclear technician Mordechai Vanunu from London to Rome. He expected an assignation with a woman, but instead was kidnapped by Israel agents and taken back to Israel to stand trial for leaking nuclear secrets to the media.
The version of a “honey trap” described by British cyber spies in the 2012 PowerPoint presentation sounds like a version of Internet dating, but includes physical encounters. The target is lured “to go somewhere on the Internet, or a physical location” to be met by “a friendly face.” The goal, according to the presentation, is to discredit the target.
A “honey trap,” says the presentation, is “very successful when it works.” But the documents do not give a specific example of when the British government might have employed a honey trap.
An operation described in the 2010 presentation also involves in-person surveillance. “Royal Concierge” exploits hotel reservations to track the whereabouts of foreign diplomats and send out “daily alerts to analysts working on governmental hard targets.” The British government uses the program to try to steer its quarry to “SIGINT friendly” hotels, according to the presentation, where the targets can be monitored electronically – or in person by British operatives.
quote:
Het artikel gaat verder.quote:One of the three reporters at the center of NSA contractor Edward Snowden’s leaks is planning to enter the country that charged Snowden with espionage. Glenn Greenwald plans to “force the issue” by returning to the United States despite the possibility that he may be arrested.
Recent comments by government officials have made the situation even more tenuous such as House Intelligence Committee Chairman Mike Rogers who called Greenwald “a thief” who was “selling” national security secrets based on Greenwald’s freelance work. An accusation that came after Director of National Intelligence James Clapper referred to Greenwald and other journalists as “accomplices” of Snowden’s leaks.
Nee, altijd verwijzing naar het artikel. En de quote lijkt mij verder voldoende.quote:Op vrijdag 7 februari 2014 18:37 schreef JerryWesterby het volgende:
Oftewel, graag in je eigen woorden, met eventueel verwijzing naar het artikel.
ik lees liever gewoon het bronartikel, zijn eigen bewoordingen interesseren me niet.quote:Op vrijdag 7 februari 2014 19:53 schreef JerryWesterby het volgende:
Nee, liever in je eigen woorden. Het is een forum, geen prikbord.
Dank u wel.quote:Op vrijdag 7 februari 2014 19:55 schreef Schunckelstar het volgende:
[..]
ik lees liever gewoon het bronartikel, zijn eigen bewoordingen interesseren me niet.
dus goed bezig papierversnipperaar
Je hebt antwoord op je vraag.quote:
quote:'NSA kan het bellen niet bijhouden'
De Amerikaanse geheime dienst NSA verzamelt lang niet alle telefoongegevens in de Verenigde Staten, zoals wordt gedacht. De dienst kan de explosieve stijging van het aantal mobiele gesprekken namelijk niet bijhouden.
Foto: Getty
Dat meldt de Washington Post vrijdag.
De NSA zou minder dan 30 procent van de telefoontjes registreren, aldus huidige en vroegere functionarissen. Het nieuws slaat een behoorlijk hiaat in de algemene opvatting dat de NSA vrijwel al het binnenlandse telefoonverkeer in Amerika bijhoudt.
Tegelijkertijd rijst in de VS de vraag of het programma van de NSA wel goed genoeg is en of er geen belangrijke gegevens gemist worden in de strijd tegen terrorisme.
In 2006 verzamelde de NSA volgens de berichten nog bijna al het telefoonverkeer in de VS. Afgelopen zomer was dat gezakt naar minder dan een derde. De VS neemt maatregelen om de NSA weer naar het oude niveau te helpen.
quote:
en dan krijg je daar achteraan:quote:The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes an unreliable tactic that results in the deaths of innocent or unidentified people.
Boehoehoe we willen meer bevoegdheden.quote:
quote:
quote:Jacob Appelbaum is one of the leading US computer security activists and, along with Laura Poitras, a confidant of former NSA contractor Edward Snowden. DW spoke to Appelbaum about the NSA and living in exile.
Al die Amerikanen in ballingschap: Glenn Greenwald, Snowden, Applebaum. Al die buitenlanders die niet naar Amerika durven: Assange, Birgitta Jónsdóttir, Rob Gongrijp.quote:I feel like a human being in exile. But I don't wear that on my sleeve as a victim, I'm just tired of it. You know, detained at airports, having my property stolen, stuff like that and I thought, well, maybe I should live in Europe for a while.
quote:
quote:About a year ago, Lissounov joined a hackathon sponsored by his employer, BitTorrent Inc., a company that seeks to transform the peer-to-peer protocol into a legitimate means of file-sharing for both consumers and businesses, and in a matter of hours, he slapped together a new BitTorrent tool that let him quickly and easily send encrypted photos of his three children across dodgy Eastern European network lines to the rest of his family. The tool won first prize at the hackathon, and within a few more months, after Lissounov honed the tool alongside various other engineers, the company delivered BitTorrent Sync, a Dropbox-like service that lets you seamlessly synchronize files across computers and mobile devices.
The difference is that, thanks to the BitTorrent protocol, which connects machines without the help of a central server, the service isn’t controlled by Dropbox or any other organization, including BitTorrent itself. This means it could be less vulnerable to surveillance by the NSA and other government organizations, and that seems to have struck a chord with many people across the net. Each month, according to BitTorrent, about 2 million people now use Sync, including not only individuals but businesses looking for simpler, safer, and more secure ways of sharing data across systems. “It immediately proved magical,” says BitTorrent CEO Eric Klinker.
Klinker believes his ten-year-old company’s fortunes are closely tied to this new tool. But beyond that, Sync is part of a larger trend towards internet services that are operated not by a central commercial company, but by independent machines spread across the internet. This includes everything from the bitcoin digital currency to open source tools that seek to replace social networking services like Twitter. They all do very different things, but the common denominator is that they put more control in the hands of the people — and less in the hands of corporations and governments.
quote:Op maandag 10 februari 2014 16:29 schreef Papierversnipperaar het volgende:
Glenn Greenwald heeft zijn nieuwe project in de lucht:
[..]
[..]
en dan krijg je daar achteraan:
[..]
Boehoehoe we willen meer bevoegdheden.
quote:
quote:The European parliament is to ditch demands on Wednesday that EU governments give guarantees of asylum and security to Edward Snowden, the National Security Agency whistleblower.
The parliament's civil liberties committee is to vote on more than 500 amendments to the first ever parliamentary inquiry into the NSA and GCHQ scandal, a 60-page report that is damning about the scale and the impact of mass surveillance.
But there is no consensus on an amendment proposed by the Greens calling on EU governments to assure Snowden of his safety in the event that he emerges from hiding in Russia and comes to Europe.
Amid what key MEPs have described as intense pressure from national governments on parliament – from the Conservatives and their allies, from the mainstream centre-right and from social democrats – the asylum call has no chance of passing.
"The amendment asking for asylum won't go through," said Claude Moraes, the British Labour MEP who is the principal author of the report. "That was a red line for the right. There was never going to be a realistic majority for that."
The proposed change to the report would have read: "[Parliament] calls on EU member states to drop criminal charges, if any, against Edward Snowden and to offer him protection from prosecution, extradition or rendition by third parties, in recognition of his status as whistleblower and international human rights defender."
Instead the report will call for international protection for whistleblowers without mentioning Snowden by name. Another amendment calling on the Americans not to prosecute Snowden is also unlikely to be adopted, parliamentary sources said.
"The only reason for this whole thing is Snowden and now he doesn't get mentioned. It's ridiculous," said Jan-Philip Albrecht, a German Green and co-author of the amendment.
The failure to make Snowden-specific demands comes amid wrangling over whether the whistleblower will and should be able to testify to the committee.
His lawyers told leading MEPs last week that he was prepared to testify via video from Moscow and questions have been sent to him. While the Conservatives opposed allowing him to testify on the NSA furore, parliamentary leaders have backed the idea by a majority.
But they are still arguing over the format of the testimony - whether live or pre-recorded video or in written answers to submitted questions. They are to meet next week to try to settle the issue.
The Americans are strongly opposed to Snowden testifying and MEPs say there has been enormous pressure from EU governments on the parliament to drop or dilute the report, which is to go before the full chamber in March.
"There has been a huge amount of pressure in the past few weeks," said Moraes. "From the member states. Most have not been friendly. They regard all this as a national competence and nothing to do with us."
quote:
quote:The logic of the Utah campaign is straightforward. Running the data center requires a lot of water – some 1.7m gallons daily, the activists estimate – to cool the anticipated 100,000 square feet of powerful computers and support equipment the NSA needs for storing a tremendous amount of data. The Wall Street Journal estimated this to be in the range of exabytes or even zettabytes (an exabyte is a billion gigabytes.)
Making it illegal to supply the water will cripple the data center, already beset with electrical problems, before it opens and complicate the NSA’s plans for expanding its storage capacity. For an agency that hoovers up a wide swath of the data communicated across the internet, not to mention the phone records of Americans that it can store for up to five years, it’s a problem.
But Utah is only the latest of about a dozen states to consider measures designed to restrict the NSA’s activities.
In the NSA’s home state of Maryland, eight lawmakers are backing a bill to stymie the provision of water and electricity to the agency’s Fort Meade headquarters. A similar measure, based off an initiative Maherrey’s organization calls the 4th Amendment Protection Act, has been introduced in California, Arizona, Oklahoma, Indiana, Mississippi, Washington state and Vermont.
“The provision of resources like water and electricity is a no-brainer in a state’s plenary authority,” said Buttar.
Four other states – Kansas, New Hampshire, Alaska and Missouri – are considering a related measure to prevent the sharing of NSA-derived data without a warrant.
The campaign faces unfavorable odds. The 4th Amendment Protection Act in Mississippi was referred to the state senate rules committee on 20 January, where it died on 4 February.
“I know it’s not going to pass in every state,” Maharrey said. But in Utah particularly, “we’re going to push it as hard as we can.”
quote:Republikein klaagt Obama aan wegens spionage NSA
De Republikeinse senator Rand Paul sleept de Amerikaanse president Barack Obama en enkele nationale veiligheidsfunctionarissen voor de rechter in een zogenaamde 'class action' zaak. Paul wil zo een einde maken aan de afluisterpraktijken van de spionagedienst NSA.
'Al te lang zijn Amerikanen bereid hun burgerlijke vrijheden opzij te schuiven in naam van de nationale veiligheid', stelt FreedomWorks. 'Ondanks herhaaldelijke verzoeken is de NSA nog niet in staat geweest enig bewijs te leveren dat de telefoongegevens nuttig geweest zijn om terroristische aanslagen te detecteren of voorkomen.'
quote:
quote:A number of media organizations have published stories based on a leaked National Security Agency memo that suggests NSA whistleblower Edward Snowden “swiped” the password of a co-worker, a civilian NSA employee, who has been forced to resign for sharing his password. The forced resignation by the civilian NSA employee is being reported as part of disciplining people for allowing breaches of security to happen, not as a part of the NSA’s effort to find people to take the fall for something the agency did not prevent from happening.
The memo, obtained and published by NBC News—and dated February 10, 2014, three days ago—provides an update to members of Congress of the House Judiciary Committee on “steps that the National Security Agency (NSA) has taken to assign accountability related to the unauthorized disclosure of classified information by former contractor Edward Snowden.”
“Three NSA affiliates have been implicated in this matter: an NSA civilian employee, an active duty military member and a contractor. The civilian employee recently resigned from employment at NSA,” the memo reports.
It adds, “On June 18, 2013, the NSA civilian admitted to FBI Special Agents that he allowed Mr. Snowden to use his (the NSA civilian’s) Public Key Infrastructure (PKI) certificate to access classified information on NSANet; access that he knew had been denied to Mr. Snowden. Further, at Mr. Snowden’s request, the civilian entered his PKI password at Mr. Snowden’s computer terminal. Unbeknownst to the civilian, Mr. Snowden was able to capture the password, allowing him even greater access to classified information. The civilian was not aware the Mr. Snowden intended to unlawfully disclose classified information. However, by sharing his PKI certificate, he failed to comply with security obligations.”
Notice what is not included in that description: when this password “swiping” occurred, whether Snowden actually needed to have the PKI to complete a task assigned to him, whether the employee typed the password in himself or actually wrote it down and handed it to him and whether this conduct would have actually been suspicious in the NSA whenever it took place.
NBC News clarifies the content of the memo with the phrase, “while the memo’s account is sketchy.” Yet, despite its “sketchiness,” NBC News published the report and presented it in a way that reinforces the narrative that Snowden did not blow the whistle and had accomplices to commit his dastardly deed.
The memo states the civilian employee was forced to resign on January 10, 2014. An active military member and contractor lost their access to NSA information and spaces in August 2013. However, there is virtually no evidence in this memo that these people being held responsible for the NSA actually had any role in helping Snowden.
Kirk Wiebe, a former NSA employee and whistleblower, suggested, “Such an act would not have been a reason for “firing” an NSA IT [information technology] guy 10 years ago, or even before the Snowden revelations in my opinion.”
“Part of the reason for tolerating such behavior before the Snowden leaks is that NSA does not have enterprise IT support. In other words, standards that make supporting NSA IT infrastructure – including data management – easy.”
The NSA does not really know the extent of what Snowden took and how he really did it. The forced resignation of this civilian employee and the decision to strip three people of their security clearances is reflective of an agency floundering in the aftermath of one of the most massive security breaches in its history.
The contact Snowden had with these employees are data points in the time Snowden worked for the agency. The confirmation bias of NSA leaders has driven them to take those data points and create causal relationships between events that took place. They decided that the civilian employee, wittingly or unwittingly, is a part of a conspiracy by Snowden because being victim of a conspiracy makes them look better than being a victim of an independent whistleblower.
Thomas Drake, a former NSA employee and whistleblower prosecuted by the administration of President Barack Obama for his act of trying to inform the public, recalled, “I had people pressured by NSA into making up stuff (including statements) about me and my character and obtaining information as well as purloining and stealing documents from NSA for the purposes of disclosing them to people”—reporters—”not authorized to receive them.” But, like Snowden, “I acted alone without any ‘help.’”
“NSA is simply choosing to believe that Snowden did not act alone. They are demonstrating something called confirmation bias.” They are looking for and manufacturing evidence to “prove” their allegations.” Or, by the simple act of forcing people out of the agency, they are creating the perception that those people played a role in Snowden’s act.
Even though unidentified FBI agents from the Washington field office, leading the investigation into Snowden, told the New York Times in December they believe Snowden “methodically downloaded the files over several months while working as a government contractor at the Hawaii facility” and “worked alone,” the story that Snowden did not do this by himself has continued to surface in the media without being appropriately questioned. (The Times did note again in January it was still the FBI’s conclusion Snowden acted alone.)
Though NBC News fails to make the connection, this civilian employee may be what House Intelligence Committee chairman was referring to when he said on NBC’s “Meet the Press” some of what he had done was “beyond his technical capabilities.” And, “He had some help and he stole things that had nothing to do with privacy.”
“Some help” could be limited to the civilian NSA employee sharing the password that is mentioned in the memo. The phrase “beyond his technical capabilities” may be a way of saying he was not cleared for access in this instance and had to ask for a password to gain access to NSANet. Of course, the innuendo used by Rogers is much more effective in making Americans fear what Snowden did was malicious, especially since Rogers wants people to believe he did this with assistance from Russian foreign intelligence.
Het artikel gaat verder.quote:As another whistleblower and former whistleblower William Binney explained to Firedoglake in December, NSA never developed and implemented technology in order to have the capabilities to track activities by employees on the agencys systems. The reason was because of two groups of people: analysts and management.
The analysts realized that what that would be doing is monitoring everything they did and assessing what they were doing. They objected. They didnt want to be monitored and have their privacy violated.
Management resisted because it meant one would be able to assess returns on all the programs around the world. It would be possible to lay out all the programs in the world and map [them] against the spending and the return on investment.
It meant the agency would be exposed to Congress for auditing, Binney added. Management, those leading the NSA, did not want that.
quote:
quote:Private contractors play a huge role in the government, particularly in civilian intelligence services like the CIA. Contracting critics say it's an addiction whose overhead costs drive up the federal budget and leads to data breaches like the kind perpetrated by former NSA contractor Edward Snowden.
In the wake of last year's NSA revelations, many agencies have been reviewing their contracting policies. But few people have a good grasp on just how many contractors the government employs. What's worse, the country's eight civilian intelligence agencies often can't sufficiently explain what they use those contractors for, according to a Government Accountability Office report.
quote:
quote:Spione aus dem Westen sollen es auf deutschem Boden künftig schwerer haben: Die Bundesregierung erwägt, die Tätigkeit westlicher Geheimdienste in Deutschland durch eigene Agenten beobachten zu lassen. Nach SPIEGEL-Informationen gibt es neun Monate nach Beginn der NSA-Affäre im Bundesamt für Verfassungsschutz bereits Pläne, die Abteilung Spionageabwehr massiv auszubauen und etwa die Botschaften von Partnerländern wie den USA und Großbritannien einer "Sockelbeobachtung" zu unterziehen.
quote:
quote:A lawyer who represents National Security Agency whistleblower Edward Snowden and has spoken on his behalf numerous times was detained while going through customs at Heathrow airport in London.
Jesselyn Radack told Firedoglake she was directed to a specific Heathrow Border Force agent. He “didn’t seem interested” in her passport. She was then subjected to “very hostile questioning.”
As Radack recalled, she was asked why she was here. “To see friends,” she answered. “Who will you be seeing?” She answered, “A group called Sam Adams Associates.”
quote:Her interrogation by a Border Force agent comes just after The New York Times reported, based off a document from Snowden, that NSA ally, Australia, has used the Australian Signals Directorate to spy on American lawyers.
quote:
quote:WASHINGTON (AP) - Hoyt Sparks says he has no use for liberal Democrats and their "socialistic, Marxist, communist" ways.
Toni Lewis suspects tea party Republicans are "a bunch of people who probably need some mental health treatment."
Politically speaking, the tea-party supporter in rural North Carolina and the Massachusetts liberal live a world apart.
Who or what could get them thinking the same?
Edward Snowden and the National Security Agency.
quote:Why does the NSA unite the right and left ends of the political spectrum?
"More extreme political views lead to more distrust of government," said George Mason University law professor Ilya Somin, who's studied the tea party's focus on the Constitution. People at the far ends of the political spectrum are less likely than middle-of-the-road voters to feel government is responsive to them.
On the flip side, Somin said, moderates generally don't follow politics as closely as people at the extremes, so they may be less aware of the scope of the NSA's activities.
quote:
Het artikel gaat verder.quote:Top-secret documents from the National Security Agency and its British counterpart reveal for the first time how the governments of the United States and the United Kingdom targeted WikiLeaks and other activist groups with tactics ranging from covert surveillance to prosecution.
The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous.
One classified document from Government Communications Headquarters, Britain’s top spy agency, shows that GCHQ used its surveillance system to secretly monitor visitors to a WikiLeaks site. By exploiting its ability to tap into the fiber-optic cables that make up the backbone of the Internet, the agency confided to allies in 2012, it was able to collect the IP addresses of visitors in real time, as well as the search terms that visitors used to reach the site from search engines like Google.
Another classified document from the U.S. intelligence community, dated August 2010, recounts how the Obama administration urged foreign allies to file criminal charges against Assange over the group’s publication of the Afghanistan war logs.
A third document, from July 2011, contains a summary of an internal discussion in which officials from two NSA offices – including the agency’s general counsel and an arm of its Threat Operations Center – considered designating WikiLeaks as “a ‘malicious foreign actor’ for the purpose of targeting.” Such a designation would have allowed the group to be targeted with extensive electronic surveillance – without the need to exclude U.S. persons from the surveillance searches.
In 2008, not long after WikiLeaks was formed, the U.S. Army prepared a report that identified the organization as an enemy, and plotted how it could be destroyed. The new documents provide a window into how the U.S. and British governments appear to have shared the view that WikiLeaks represented a serious threat, and reveal the controversial measures they were willing to take to combat it.
In a statement to The Intercept, Assange condemned what he called “the reckless and unlawful behavior of the National Security Agency” and GCHQ’s “extensive hostile monitoring of a popular publisher’s website and its readers.”
“News that the NSA planned these operations at the level of its Office of the General Counsel is especially troubling,” Assange said. “Today, we call on the White House to appoint a special prosecutor to investigate the extent of the NSA’s criminal activity against the media, including WikiLeaks, its staff, its associates and its supporters.”
Illustrating how far afield the NSA deviates from its self-proclaimed focus on terrorism and national security, the documents reveal that the agency considered using its sweeping surveillance system against Pirate Bay, which has been accused of facilitating copyright violations. The agency also approved surveillance of the foreign “branches” of hacktivist groups, mentioning Anonymous by name.
The documents call into question the Obama administration’s repeated insistence that U.S. citizens are not being caught up in the sweeping surveillance dragnet being cast by the NSA. Under the broad rationale considered by the agency, for example, any communication with a group designated as a “malicious foreign actor,” such as WikiLeaks and Anonymous, would be considered fair game for surveillance.
Julian Sanchez, a research fellow at the Cato Institute who specializes in surveillance issues, says the revelations shed a disturbing light on the NSA’s willingness to sweep up American citizens in its surveillance net.
“All the reassurances Americans heard that the broad authorities of the FISA Amendments Act could only be used to ‘target’ foreigners seem a bit more hollow,” Sanchez says, “when you realize that the ‘foreign target’ can be an entire Web site or online forum used by thousands if not millions of Americans.”
quote:
quote:Oppositiebronnen benadrukken tegenover NRC dat het politieke belang van de informatie in hun ogen op 12 december niet duidelijk was.
En dat moet de regering controleren, wat een prutsersquote:
quote:Clapper said that the controversy would not have occurred had the security apparatus been more open before. “I probably shouldn’t say this, but I will. Had we been transparent about this from the outset right after 9/11 – which is the genesis of the 215 program – and said both to the American people and to their elected representatives, we need to cover this gap, we need to make sure this never happens to us again, so here is what we are going to set up, here is how it’s going to work, and why we have to do it, and here are the safeguards … We wouldn’t have had the problem we had.”
His admission contradicts months of warnings, from his office and from elsewhere in the administration, that disclosure of the bulk data collection jeopardized US national security.
Forum Opties | |
---|---|
Forumhop: | |
Hop naar: |