abonnement Unibet Coolblue Bitvavo
  woensdag 18 juni 2014 @ 14:27:01 #1
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141244588


quote:
quote:
On June 5, 2013, the Guardian broke the first story in what would become a flood of revelations regarding the extent and nature of the NSA’s surveillance programs. Facing an uproar over the threat such programs posed to privacy, the Obama administration scrambled to defend them as legal and essential to U.S. national security and counterterrorism. Two weeks after the first leaks by former NSA contractor Edward Snowden were published, President Obama defended the NSA surveillance programs during a visit to Berlin, saying: “We know of at least 50 threats that have been averted because of this information not just in the United States, but, in some cases, threats here in Germany. So lives have been saved.” Gen. Keith Alexander, the director of the NSA, testified before Congress that: “the information gathered from these programs provided the U.S. government with critical leads to help prevent over 50 potential terrorist events in more than 20 countries around the world.” Rep. Mike Rogers (R-Mich.), chairman of the House Permanent Select Committee on Intelligence, said on the House floor in July that “54 times [the NSA programs] stopped and thwarted terrorist attacks both here and in Europe – saving real lives.”

However, our review of the government’s claims about the role that NSA “bulk” surveillance of phone and email communications records has had in keeping the United States safe from terrorism shows that these claims are overblown and even misleading. An in-depth analysis of 225 individuals recruited by al-Qaeda or a like-minded group or inspired by al-Qaeda’s ideology, and charged in the United States with an act of terrorism since 9/11, demonstrates that traditional investigative methods, such as the use of informants, tips from local communities, and targeted intelligence operations, provided the initial impetus for investigations in the majority of cases, while the contribution of NSA’s bulk surveillance programs to these cases was minimal. Indeed, the controversial bulk collection of American telephone metadata, which includes the telephone numbers that originate and receive calls, as well as the time and date of those calls but not their content, under Section 215 of the USA PATRIOT Act, appears to have played an identifiable role in initiating, at most, 1.8 percent of these cases. NSA programs involving the surveillance of non-U.S. persons outside of the United States under Section 702 of the FISA Amendments Act played a role in 4.4 percent of the terrorism cases we examined, and NSA surveillance under an unidentified authority played a role in 1.3 percent of the cases we examined.
Het artikel gaat verder.



[ Bericht 1% gewijzigd door Papierversnipperaar op 18-06-2014 14:34:57 ]
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 18 juni 2014 @ 14:28:19 #2
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141244650
quote:
NSA Turned Germany Into Its Largest Listening Post in Europe

The National Security Agency has turned Germany into its most important base of operations in Europe, according to a story published by Der Spiegel this week.

The German magazine reports that documents provided by NSA whistleblower Edward Snowden “paint a picture of an all-powerful American intelligence agency that has developed an increasingly intimate relationship with Germany over the past 13 years while massively expanding its presence.” The magazine adds, “No other country in Europe plays host to a secret NSA surveillance architecture like the one in Germany…In 2007, the NSA claimed to have at least a dozen active collection sites in Germany.”

The story reveals that the NSA’s key facilities in Germany include Building 4009 at the “Storage Station” on Ludwig Wolker Street in Wiesbaden, which is in the southwest of the country. Officially known as the European Technical Center, the facility is the NSA’s “primary communications hub” in Europe, intercepting huge amounts of data and forwarding it to “NSAers, warfighters and foreign partners in Europe, Africa and the Middle East,” according to the documents.

Spiegel also reports that an even larger NSA facility is under construction three miles away, in the Clay Kaserne, which is a U.S. military complex. Called the Consolidated Intelligence Center, the facility will cost $124 million once it is completed, and will house data-monitoring specialists from the Storage Station.

The agency’s operations in Germany came under intense scrutiny earlier this year when Spiegel revealed that the NSA had eavesdropped on Chancellor Angela Merkel’s cellphone calls. In its latest issue, the magazine reports on a legal controversy over the NSA’s still-close relationship with its German partner, the Bundesnachrichtendienst (BND). The Snowden documents show that “the exchange of data, spying tools and know-how is much more intense than previously thought,” according to Spiegel—and this raises the question of whether the BND is violating constitutional protections on privacy for Germans abroad and foreigners in Germany.

The scope of the NSA’s activities in Germany is considerable. Another key NSA facility, Spiegel reports, is the “Dagger Complex” in Griesheim, a town about 25 miles from Wiesbaden. It is “the NSA’s most important listening station in Europe,” with around 240 intelligence analysts working there in 2011. The facility’s official name is the European Center for Cryptology. “NSA staff in Griesheim use the most modern equipment available for the analysis of the data streams, using programs like XKeyscore, which allows for the deep penetration of Internet traffic,” according to Spiegel.

The story also delves into the growth of facilities that house the NSA’s Special Collection Service, which is a joint operation with the CIA to collect targeted communications. There are more than 80 SCS stations around the world, and the Snowden documents indicate two sites are located in Germany—in the U.S. consulate in Frankfurt, and the U.S. embassy in Berlin, which is where the SCS is believed to have recorded Chancellor Merkel’s phone calls.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 18 juni 2014 @ 20:06:09 #3
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141259363
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 19 juni 2014 @ 17:46:40 #4
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141293105
quote:
quote:
quote:
Huge volumes of private emails, phone calls, and internet chats are being intercepted by the National Security Agency with the secret cooperation of more foreign governments than previously known, according to newly disclosed documents from whistleblower Edward Snowden.

The classified files, revealed today by the Danish newspaper Dagbladet Information in a reporting collaboration with The Intercept, shed light on how the NSA’s surveillance of global communications has expanded under a clandestine program, known as RAMPART-A, that depends on the participation of a growing network of intelligence agencies.

It has already been widely reported that the NSA works closely with eavesdropping agencies in the United Kingdom, Canada, New Zealand, and Australia as part of the so-called Five Eyes surveillance alliance. But the latest Snowden documents show that a number of other countries, described by the NSA as “third-party partners,” are playing an increasingly important role – by secretly allowing the NSA to install surveillance equipment on their fiber-optic cables.

The NSA documents state that under RAMPART-A, foreign partners “provide access to cables and host U.S. equipment.” This allows the agency to covertly tap into “congestion points around the world” where it says it can intercept the content of phone calls, faxes, e-mails, internet chats, data from virtual private networks, and calls made using Voice over IP software like Skype.

The program, which the secret files show cost U.S. taxpayers about $170 million between 2011 and 2013, sweeps up a vast amount of communications at lightning speed. According to the intelligence community’s classified “Black Budget” for 2013, RAMPART-A enables the NSA to tap into three terabits of data every second as the data flows across the compromised cables – the equivalent of being able to download about 5,400 uncompressed high-definition movies every minute.

In an emailed statement, the NSA declined to comment on the RAMPART-A program. “The fact that the U.S. government works with other nations, under specific and regulated conditions, mutually strengthens the security of all,” said NSA spokeswoman Vanee’ Vines. “NSA’s efforts are focused on ensuring the protection of the national security of the United States, its citizens, and our allies through the pursuit of valid foreign intelligence targets only.”
quote:
For any foreign government, allowing the NSA to secretly tap private communications is politically explosive, hence the extreme secrecy shrouding the names of those involved. But governments that participate in RAMPART-A get something in return: access to the NSAs sophisticated surveillance equipment, so they too can spy on the mass of data that flows in and out of their territory.

The partnership deals operate on the condition that the host country will not use the NSAs spy technology to collect any data on U.S. citizens. The NSA also agrees that it will not use the access it has been granted to collect data on the host countries citizens. One NSA document notes that there ARE exceptions to this rule though does not state what those exceptions may be.
Het artikel gaat verder.

[ Bericht 7% gewijzigd door Papierversnipperaar op 19-06-2014 17:59:49 ]
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 20 juni 2014 @ 15:44:31 #5
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141331670
quote:
House Passes Landmark Amendment To Stop Warrantless NSA Searches

The House overwhelmingly approved an amendment Thursday meant to block the National Security Agency from performing warrantless searches on Americans' communications, rejecting one of the most controversial forms of NSA surveillance revealed by the leaks of Edward Snowden.

The 293-123 vote on an amendment to the annual defense appropriations bill was a victory for civil libertarians on the heels of a gutted NSA reform measure the House approved in May. The amendment still faces an uncertain journey through Congress before it can become law.

"I think people are waking up to what's been going on," said the amendment's sponsor, Rep. Thomas Massie (R-Ky.). "Whether you're Republican or Democrat -- because, if you noticed, a majority of Republicans voted for this, as well as a majority of Democrats."

The NSA performs so-called back door searches on the content of Americans' communications without a warrant when they have been in contact with targeted foreigners. Given the vastness of the NSA's target database, and the irrelevance of international boundaries in the Internet age, privacy advocates say they worry an expanding number of Americans' emails and phone calls are being swept up. The House amendment specifically prohibits the NSA from using information identifying U.S. citizens to search communications data it collects under the Foreign Intelligence Surveillance Act.

NSA critics had warned about such searches for years. But the leaks of former NSA contractor Snowden, as reported in The Guardian, definitively revealed the spy agency's tactics. The NSA claims legal authority to perform the searches.

The amendment was sponsored by Massie, along with Rep. Zoe Lofgren (D-Calif.) and a host of co-sponsors of the earlier attempt at NSA reform, called the USA Freedom Act. The original co-sponsors of that bill included Rep. James Sensenbrenner (R-Wis.), Rep. John Conyers (D-Mich.), Rep. Jerrold Nadler (D-N.Y.) and Rep. Justin Amash (R-Mich.).

Supporters of that measure had surrendered to the Obama administration in dropping the prohibition on back door searches. But the defense appropriations bill gave them another chance.

"After the passage of the USA Freedom Act, this amendment is the logical next step to prevent improper surveillance," Nadler said in a statement before Thursday's vote. "I will continue to work to improve our nation’s privacy laws and to ensure that this Administration, and all those that follow it, respect the constitutional rights of all Americans."

The amendment also aims to block the NSA and CIA from forcing software and hardware providers to insert back doors into their products to allow the government agencies easy access to customer communications. The measure's backers include the American Civil Liberties Union and Google.

Massie pronounced himself "pleasantly surprised" with his amendment's passage. But he acknowledged it still faces a long road to passage.

"That's going to be the trick," Massie said. "It would take somebody to support it on the Senate side as well, and in conference," where the House and Senate reconcile companion bills.

Massie said he faced hurdles from House leaders -- particularly those in charge of the House Intelligence and Judiciary committees -- in winning approval for the amendment. "The leadership was not in favor of it," he said. "The whip's description of the bill, which you could pick up in the cloakroom, was very unflattering and misleading in my opinion.

"It was an amazing struggle to get it ruled in order," he said, referring to parliamentary rules around appropriations bills. He noted that a similar provision was stripped out of the "watered down" USA Freedom Act that passed last month.

But in the end, Massie said, co-sponsors from both parties were critical in getting the amendment approved.

The House passage of the amendment may create momentum for similar reform efforts in the Senate, where Oregon Democrat Ron Wyden has been fighting for years to expose and end the practice of back door searches.

Wyden warned in a recent Los Angeles Times opinion piece with Sens. Mark Udall (D-Colo.) and Rand Paul (R-Ky.) that "intelligence agencies are using a loophole in the law to read some Americans' emails without ever getting a warrant."

The senators wrote that the debate over NSA reforms "is likely to continue for at least the next few years as Americans continue to learn about the scale of ongoing government surveillance activities."
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 21 juni 2014 @ 08:28:21 #6
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141363234
quote:
Fisa court grants extension of licence for bulk collection of US phone records

Reauthorisation is fifth since the Guardian revealed existence of Section 215 telephony metadata program in June last year

US intelligence agencies have made a fifth attempt to extend their bulk collection of American telephone records – more than a year after the controversial practice was first revealed by National Security Agency whistleblower Edward Snowden.

Despite repeated calls from Congress and President Obama for the mass gathering of private US phone records to be banned, a court has approved the request in secret, allowing the NSA to continue collecting metadata until 12 September 2014.

In a joint statement released late on Friday afternoon, the justice department and director of national intelligence, James Clapper, said it was necessary to continue seeking such legal extensions because the Congressional reform process supported by Obama was not yet complete.

"Given that legislation has not yet been enacted, and given the importance of maintaining the capabilities of the Section 215 telephony metadata program, the government has sought a 90-day reauthorization of the existing program," said the joint statement.

The 90-day blanket licence granted by the secretive Foreign Intelligence Surveillance Court, or Fisa court, is the fifth such extension that has been requested, and granted, since the Guardian first revealed the existence of the Section 215 program on 5 June 2013.

Similar 90-day reauthorisations were subsequently declassified by the administration on 19 July 2013, 11 October 2013, 3 January 2014 and 11 April 2014.Yet in March, Obama reacted to growing criticism of the NSA's domestic surveillance acitivities by calling for an end to bulk collection under Section 215 and suggesting that records be retained instead by telephone companies, and only be available for specific searches following court requests.

In May, the House of Representatives overwhelmingly passed the USA Freedom Act, which sought to enshrine this ban in law, although civil liberties campaigners claimed it was significantly watered down after pressure on legislators by government regulators.

In a statement explaining the latest renewal request on Friday, the justice department and office of the director of national intelligence said that they still support the legislation and would work with Congress to try to clarify the language before it is voted on by the Senate.

"Overall, the bill's significant reforms would provide the public greater confidence in our programs and the checks and balances in the system, while ensuring our intelligence and law enforcement professionals have the authorities they need to protect the Nation," the statement said.

"The administration strongly supports the USA Freedom Act. We urge the Senate to swiftly consider it, and remain ready to work with Congress to clarify that the bill prohibits bulk collection as noted above, as necessary."
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 24 juni 2014 @ 22:25:58 #7
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141511645
quote:
Home secretary denies security services engaged in mass surveillance

May uses Mansion House speech to make case for reviving 'snooper's charter' legislation, calling it matter of 'life and death'

The home secretary has denied that the security services are engaged in a programme of mass surveillance as she made her most detailed case yet for a revival of a "snooper's charter" bill to give them extra powers to track everyone's internet and mobile phone use.
Wut? We luisteren niet massaal af en daarom moet er wetgeving komen die dit mogelijk maakt? :?
quote:
Theresa May said on Tuesday evening that new legislation was now a matter of "life and death", as well as national security, and was needed to maintain the ability of the police and security services to monitor communications – which was being undermined by rapidly changing technology. "We must keep on making the case until we get the changes we need," she said in her Mansion House speech on privacy and security.

May also made a sweeping attack on the claims of privacy campaigners in the wake of the Snowden disclosures of mass harvesting of personal communications data or metadata by Britain's GCHQ and America's NSA, denying that they amount to a programme of mass surveillance. "There is no surveillance state," she said

She insisted the security agencies had not acted illegally, including an explicit denial of a technical loophole being exploited to intercept overseas communications and claimed that the current system of oversight in Britain was unsurpassed in the world.

Although she did not repeat the Home Office claim made two years ago that they had already lost the capability to track 25% of communications data, the home secretary instead said the National Crime Agency had to drop at least 20 cases during a six-month period as a result of missing communications data: "Thirteen of these were threat-to-life cases in which a child was assessed to be at risk of immediate harm," she said without giving further details of why they were dropped.

May's speech follows evidence last week from Charles Farr, the head of the Home Office's security and counter-terrorism unit, that confirmed they could monitor the mass use of social media including Google searches and Facebook use without an individual warrant. Cressida Dick, the most senior police counter-terrorism officer, also warned that the daily loss of capability meant the authorities were "staring into the abyss" on the matter.

But a senior Liberal Democrat source confirmed the position had not changed and there would be no "snooper's charter" this side of the general election, fuelling speculation that the home secretary's campaign is being conducted with an eye on what happens after May 2015.

May said she would go on making the case, telling her Mansion House audience: "The real problem is not that we have built an over-mighty state but that the state is finding it harder to fulfil its most basic duty, which is to protect the public. That is why I have said before and go on saying that we need to make changes to the law to maintain the capabilities we need."

She drew a contrast between the global power of the internet companies, which harvest and trade in personal data from their online services and intrude daily on the privacy of our lives without any warrant, with the disadvantaged position of the state. May said that while such firms can "drive a car up your road and put an image of your home online for the world to observe" it was far harder for governments.

"Far from having some fictitious mastery over all this technology we, in democratic states, face a significant risk of being caught out by it. Governments have always reserved the power to monitor communications and to collect data about communications when it is necessary and proportionate to do so," she said.

"It is much harder now – there is more data, we do not own it and we can no longer always obtain it. I know some people will say 'hurrah for that' – but the result is that we are in danger of making the internet an ungoverned, ungovernable space, a safe haven for terrorism and criminality."

She added that the greatest danger now being faced was not mass surveillance nor illegal and unaccountable behaviour but the loss of capability.

May justified the mass harvesting of personal communications data, saying it relied on automated and remote access to data on the internet and other communications systems: "Computers search for only the communications relating to a small number of suspects under investigation. Once the content of these communications has been identified, and only then, is it examined by trained analysts. And every step of the way it is governed by strict rules, checked against Human Rights Act requirements."

But Julian Huppert, the Lib Dem home affairs spokesman, said it was clear from the Snowden revelations and other sources that "what we have in this country is not done proportionately and with effective oversight. What is needed is a complete review of the Regulation of Investigatory Powers Act, the Telecommunications Act, and everything that goes into the legislative framework of surveillance."
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 25 juni 2014 @ 22:42:10 #8
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141555376
quote:
US to extend privacy protection rights to EU citizens

EU and human rights and privacy groups welcome pledge, which follows pressure in wake of Snowden revelations

The Obama administration has caved in to pressure from the European Union in the wake of Edward Snowden's revelations on surveillance by promising to pass legislation granting European citizens many of the privacy protection rights enjoyed by US citizens.

The proposed law would apply to data on European citizens being transferred to the US for what Washington says is law enforcement purposes.

After the first Snowden revelations appeared in June last year, the Obama administration irritated many by insisting that while US citizens were protected by law from snooping by US spy agencies, this did not apply to non-Americans.

On Wednesday the US attorney general, Eric Holder, promised at a US-EU meeting of home affairs and justice ministers in Athens that legislation would be sent to Congress to extend the US Privacy Act to EU citizens.

The EU, as well as human rights and privacy groups, welcomed Holder's announcement but coupled it with expressions of scepticism, describing it as a vague promise.

Viviane Reding, the EU justice commissioner, said it was an important step in the right direction but added: "Words only matter if put into law. We are waiting for the legislative step."

Human rights groups said the US Privacy Act, in spite of being touted as a beacon for the rest of the world, had a relatively weak regulatory framework. They said Holder's pledge did not address many of the other issues raised by mass surveillance worldwide by the NSA and its partners, including Britain's GCHQ.

Speaking after the Athens meeting, the EU home affairs commissioner, Cecilia Malmstrom, said: "EU-US relations have been strained lately in the aftermath of the Snowden revelations but we have worked very hard to restore trust."

Holder said: "The Obama administration is committed to seeking legislation that would ensure that … EU citizens would have the same right to seek judicial redress for intentional or wilful disclosures of protected information and for refusal to grant access or to rectify any errors in that information, as would a US citizen under the Privacy Act.

"This commitment, which has long been sought by the EU, reflects our resolve to move forward not only on the data protection and privacy agreement but on strengthening transatlantic ties."

The US and the EU have been negotiating for three years over personal data protection, but the discussions took on a new immediacy with the Snowden revelations.

Emotions have been strongest in Germany, given the history of mass surveillance by the Stasi, and this was compounded when it was revealed that the US had been snooping on Angela Merkel. The German government has pressed Obama, Holder and other members of the US administration to set out how they would curb spying on non-Americans.

Over the last year Obama has made repeated overtures to Merkel and other EU leaders only to be rebuffed. European governments, as well as the European parliament, has called for concrete action rather than just soft words. Even a speech in January in which Obama said he had asked Holder and the intelligence community to develop safeguards for foreign citizens met with scepticism.

Holder said the data protection agreement under discussion related to personal data shared with the US by European countries for law enforcement purposes. He framed it in the context of transnational crime and terrorism, in particular fighters travelling to and from Syria.

"One consistent theme ran through all our discussions: in a world of globalised crime and terrorism, we can protect our citizens only if we work together," Holder said. "At the same time, we must ensure that we continue our long tradition of protecting privacy in the law enforcement context."

Gus Hosein, executive director of Privacy International, said: "It is a good step forward. Nonetheless, there are three massive impediments to achieving equivalent protection under law. First, Congress needs to act on this and we haven't seen many positive steps on protecting non-Americans' rights."

Secondly, Hosein described the US Privacy Act as "an unfortunately weak legal regime" and, thirdly, he wanted worldwide privacy protections against what he said was the accumulation of massive amounts of data by US intelligence against non-Americans.

Cynthia Wong, senior internet researcher at Human Rights Watch, said: "It may be a small step in the right direction but much more needs to be done to address data protection in the US and to rein in the sheer scale of what the NSA is collecting."
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 26 juni 2014 @ 09:20:08 #9
313372 Linkse_Boomknuffelaar
Stop de wapenlobby. Vrede!
  donderdag 26 juni 2014 @ 09:41:35 #10
313372 Linkse_Boomknuffelaar
Stop de wapenlobby. Vrede!
  donderdag 26 juni 2014 @ 22:43:01 #11
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141597545
quote:
NSA fears prompt Germany to end Verizon contract

BERLIN -- The German government is ending a contract with Verizon over fears the company could be letting U.S. intelligence agencies eavesdrop on sensitive communications, officials said Thursday.

The New York-based company has for years provided Internet services to a number of government departments, although not to German security agencies, said Interior Ministry spokesman Tobias Plate.

While Germany had been reconsidering those contracts for some time, they faced additional scrutiny after former National Security Agency contractor Edward Snowden revealed the extent of electronic eavesdropping by the U.S. intelligence agency and Britain's GCHQ.

German authorities were particularly irked by reports that the NSA had targeted Chancellor Angela Merkel. Berlin has also proposed building more secure networks in Europe to avoid having to rely on American Internet companies that manage much of the electronic traffic circulating the globe.

"There are indications that Verizon is legally required to provide certain things to the NSA, and that's one of the reasons the cooperation with Verizon won't continue," said Plate.

The current contract with Verizon will expire in 2015, he said.

The announcement follows reports this week that Verizon and British company Colt also provide Internet services to the German Parliament and to other official entities.

Verizon didn't immediately respond to emails seeking comment on Germany's decision.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 27 juni 2014 @ 00:09:27 #12
38114 beantherio
4900 op de schaal van Richter
pi_141602240
Net op BBC Newsnight: blijkbaar rapporteert een onderdeel van de BBC aan GCHQ en de CIA. Lekker onafhankelijke media. :{
  zaterdag 28 juni 2014 @ 10:03:52 #13
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141639064

quote:
'Illegal Spying Below': blimp flies over NSA data centre in surveillance protest

Stunt used to draw attention to new website rating members of Congress on their approach to data collection



Activists flew a blimp emblazoned with the words "Illegal Spying Below" over the National Security Agency's data centre in Utah on Friday in protest against the US government's mass surveillance programmes.

The one-hour flight was carried out by the environmental group Greenpeace, digital rights activists the Electronic Frontier Foundation and a conservative political organisation, the Tenth Amendment Centre.

The 41 metre (135ft) blimp, owned by Greenpeace, was adorned with a sign that read "NSA Illegal Spying Below".

In an email to Reuters the agency declined to comment. But a spokesman did note there was no restricted airspace over the data centre, housed on the grounds of the Utah National Guard's Camp Williams in Bluffdale, 23 miles (37km) south of Salt Lake City.

The NSA says the facility provides the government with intelligence and warnings about cyber security threats. It is thought to be the agency's largest data storage centre.

The blimp protest coincided with the launch of an online campaign that rates members of Congress on actions the activists say either further or stop data collection efforts by the NSA.

Greenpeace said the report cards on the site standagainstspying.org were created by analysing NSA reform bills in Congress and weighting proposals on the degree to which they would end mass data collection.

"Our right to privacy is not a partisan issue. It's a human rights issue," said Michael Boldin, founder of Tenth Amendment Centre, which advocates for decentralised government.

"This coalition gives great hope for the future because it shows that people across the political spectrum can set aside differences to work together."
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 28 juni 2014 @ 13:29:31 #14
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141643053
quote:
quote:
A small software app called Onionshare offers the most secure file sharing available. So why hasn't anyone heard of it? Well, mostly because it was released with just a tweet from its creator, and you have to go to Github to download it. But don't let its underground status fool you—this is a very important app.

Technologist Micah Lee debuted his peer-to-peer file sharing service with little fanfare, but what it does is big: Onionshare lets users share files securely and anonymously, without middlemen. Lee created it after reading about the trouble journalist Glenn Greenwald had accepting the NSA files from Edward Snowden. Now Lee works at The Interceptwith Greenwald, where the staff is already putting Onionshare to good use.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 30 juni 2014 @ 23:48:36 #15
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141749438
quote:
'NSA mag vrijwel iedereen bespioneren'

De Amerikaanse inlichtingendienst NSA heeft een veel groter mandaat om informatie over buitenlandse regeringen en internationale instellingen te verzamelen dan tot nu toe bekend was. Dat blijkt uit een lijst die klokkenluider Edward Snowden heeft gelekt en die The Washington Post in handen heeft.


Daaruit blijkt dat de NSA informatie mag verzamelen over 193 landen, waaronder Nederland. Datzelfde geldt voor een reeks internationale instellingen en organisaties als de Wereldbank, de Europese Unie en het Internationaal Agentschap voor Atoomenergie IAEA. Het in 1978 opgerichte hof dat toezicht op de NSA houdt, heeft met de ruime bevoegdheden voor de NSA ingestemd.

Volgens The Washington Post betekent dit niet noodzakelijkerwijze dat de NSA de blik op al die landen en organisaties heeft gericht, maar wel dat hij de bevoegdheid heeft om dat te doen.
quote:
Court gave NSA broad leeway in surveillance, documents show

Virtually no foreign government is off-limits for the National Security Agency, which has been authorized to intercept information from individuals concerning all but four countries on Earth, according to top-secret documents.

The United States has long had broad no-spying arrangements with those four countries Britain, Canada, Australia and New Zealand in a group known collectively with the United States as the Five Eyes. But a classified 2010 legal certification and other documents indicate the NSA has been given a far more elastic authority than previously known, one that allows it to intercept through U.S. companies not just the communications of its overseas targets, but any communications about its targets as well.

The certification approved by the Foreign Intelligence Surveillance Court and included among a set of documents leaked by former NSA contractor Edward Snowden lists 193 countries that would be of valid interest for U.S. intelligence. The certification also permitted the agency to gather intelligence about entities such as the World Bank, the International Monetary Fund, the European Union and the International Atomic Energy Agency, among others.

The NSA is not necessarily targeting all the countries or organizations identified in the certification, affidavits and an accompanying exhibit; it has only been given authority to do so. Still, the privacy implications are far-reaching, civil liberties advocates say, because of the wide spectrum of people who might be engaged in communication about foreign governments and entities and whose communications might be of interest to the United States.

These documents show both the potential scope of the governments surveillance activities and the exceedingly modest role the court plays in overseeing them, said Jameel Jaffer, deputy legal director for the American Civil Liberties Union, who had the documents described to him.

NSA officials, who declined to comment on the certification or acknowledge its authenticity, stressed the constraints placed on foreign intelligence-gathering. The collection must relate to a foreign intelligence requirement there are thousands set for the intelligence agencies by the president, director of national intelligence and various departments through the so-called National Intelligence Priorities Framework.

Furthermore, former government officials said, it is prudent for the certification to list every country even those whose affairs do not seem to immediately bear on U.S. national security interests or foreign policy.

Its not impossible to imagine a humanitarian crisis in a country thats friendly to the United States, where the military might be expected on a moments notice to go in and evacuate all Americans, said a former senior defense official, who spoke on condition of anonymity to discuss sensitive matters.

If that certification did not list the country, the NSA could not gather intelligence under the law, the former official said.

The documents shed light on a little-understood process that is central to one of the NSAs most significant surveillance programs: collection of the e-mails and phone calls of foreign targets under Section 702 of the 2008 FISA Amendments Act.

The foreign government certification, signed by the attorney general and director of national intelligence, is one of three approved annually by the Foreign Intelligence Surveillance Court, pursuant to the law. The other two relate to counterterrorism and counterproliferation, according to the documents and former officials.

Under the Section 702 program, the surveillance court also approves rules for surveillance targeting and for protecting Americans privacy. The certifications, together with the National Intelligence Priorities Framework, serve as the basis for targeting a person or an entity.

The documents underscore the remarkable breadth of potential foreign intelligence collection. Though the FISA Amendments Act grew out of an effort to place under statute a surveillance program devoted to countering terrorism, the result was a program far broader in scope.

An affidavit in support of the 2010 foreign government certification stated that the NSA believes foreigners who will be targeted for collection possess, are expected to receive and/or are likely to communicate foreign intelligence information concerning these foreign powers.

That language could allow for surveillance of academics, journalists and human-rights researchers. A Swiss academic who has information on the German governments position in the run-up to an international trade negotiation, for instance, could be targeted if the government has determined there is a foreign intelligence need for that information. If a U.S. college professor e-mails the Swiss professors e-mail address or phone number to a colleague, the Americans e-mail could be collected as well, under the programs court-approved rules.

Even the no-spy agreements with the Five Eye countries have exceptions. The agencys principal targeting system automatically filters out phone calls from Britain, Canada, Australia and New Zealand. But it does not do so for their 28 sovereign territories, such as the British Virgin Islands. An NSA policy bulletin distributed in April 2013 said filtering out those country codes would slow the system down.

Intelligence requirements, whether satisfied through human sources or electronic surveillance, involve information that may touch on almost every foreign country, said Timothy Edgar, former privacy officer at the Office of Director of National Intelligence and now a visiting fellow at Brown Universitys Watson Institute for International Affairs.

Those efforts could include surveillance of all manner of foreign intelligence targets anything from learning about Russian anti-submarine warfare to Chinese efforts to hack into American companies, he said. Its unlikely the NSA would target academics, journalists or human-rights researchers if there was any other way of getting information, Edgar said.

A spokeswoman for the NSA, Vanee Vines, said the agency may only target foreigners reasonably believed to be outside the United States.

Vines noted that in January, President Obama issued a policy directive that stated that U.S. surveillance shall be as tailored as feasible. He also directed that the United States no longer spy on dozens of foreign heads of state and that sensitive targeting decisions be subject to high-level review.

In short, there must be a particular intelligence need, policy approval and legal authorization for U.S. signals intelligence activities, including activities conducted pursuant to Section 702, Vines said.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 1 juli 2014 @ 02:46:01 #16
82207 Chokeme
DIY Viroloog
pi_141754174
Uit dit bericht uit de volkskrant:

quote:
Het in 1978 opgerichte hof dat toezicht op de NSA houdt, heeft met de ruime bevoegdheden voor de NSA ingestemd.
Dat hof, de FISA, is dus een Amerikaans overheidsorgaan -waarvan de wetten alleen in de VS geldig zijn- dat bepaalt dat de NSA over 193 landen (dat zijn dus alle bestaande landen) informatie mag verzamelen.
Misschien een open deur, maar ik neem aan dat niet al die landen daar mee instemmen.
Dat spionage sowieso wel plaats vindt snap ik ook wel, maar ik vraag me dus af of de VS nou echt zo bold zijn dat ze zichzelf 'wettelijke' toestemming geven om in de hele wereld te rotzooien, wat dus bij voorbaat al illegaal is.

[ Bericht 11% gewijzigd door Chokeme op 01-07-2014 03:28:55 ]
It's okay to be white
  dinsdag 1 juli 2014 @ 14:32:24 #17
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141764371
quote:
quote:
ProtonMail was supposed to be an easy email encryption tool that would finally give us an answer to Internet surveillance around the world.

Instead, PayPal has frozen over $275,000 in donations to the project because, a PayPal representative told the company, the American payment service is not sure if ProtonMail is legal.

Of course, it is absolutely legal to encrypt email. The freeze remains in place.

Most incredible of all, the PayPal representative was unsure if ProtonMail has the necessary government approval to encrypt emails, as though anyone who encrypts needs a license to do so.

ProtonMail doesn’t need government approval, by the way, but it has it anyway. The encryption used by ProtonMail has been unquestionably legal since the 1990s. If that’s not enough, the Constitution’s First Amendment protects encryption code and its Fourth Amendment guarantees against unreasonable searches, exactly what encryption protects against.

“At this time, it is not possible for ProtonMail to receive or send funds through PayPal,” ProtonMail co-founder Andy Yen announced this morning. “No attempt was made by PayPal to contact us before freezing our account, and no notice was given.”
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 1 juli 2014 @ 23:01:17 #18
403394 Tamabralski
forum hoppen
pi_141792448
Het spijt me als deze al een keer is geplaatst.



[ Bericht 0% gewijzigd door Tamabralski op 02-07-2014 04:47:21 ]
  woensdag 2 juli 2014 @ 15:11:44 #19
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141817360
quote:
Top-secret court to weigh ban on MI5 and GCHQ spying on MPs in public

Investigatory Powers Tribunal will hold public hearing brought by Greens on Wilson Doctrine, which bans spying on parliament

Britain's most secretive court is to hold a rare public hearing to decide whether there is any legal force behind the long-standing political doctrine that the country's intelligence agencies cannot bug the phones or spy on the emails of members of parliament.

The Investigatory Powers Tribunal agreed to the hearing after two Green party parliamentarians – Caroline Lucas, MP for Brighton Pavilion, and Lady Jones of Moulsecoomb – complained that disclosures by the whistleblower Edward Snowden made it clear that GCHQ was capturing their communications in breach of the so-called Wilson Doctrine.

Kate Grange, counsel for GCHQ, MI5 and MI6, told the IPT on Tuesday that her clients wanted to reserve the right to make submissions on the issue in "closed" – or secret – session, with the public and the media excluded. "It may well be that we would want to say something in closed about the past policy or practice in relation to the Wilson Doctrine," she said.

The convention is named after former prime minister Harold Wilson, who pledged in 1966 that MPs' and peers' phones would not be tapped. In December 1997, then prime minister Tony Blair said the doctrine extended to electronic communication, including emails.

Prime ministers have the power to reverse the policy. While they must inform MPs of the change, they can choose when to announce it. Lucas and Jones argue that the Wilson Doctrine must have legal force, and complain that GCHQ's bulk interception of electronic communications must be unlawful.

The president of the tribunal, Mr Justice Burton, said he wished first to give a judgment on whether or not the doctrine had legal force. At that point, he said, if it did have legal force "we will make our usual inquiries" of the agencies to establish whether the parliamentarians' communications had been intercepted.

Burton raised objections to the agencies' suggestion that the issue may need to be considered partly in closed session, on the grounds that it would fuel criticisms that the IPT operated in a Kafkaesque fashion, which he said it did not.

But he declined to provide lawyers for Lucas and Jones with a copy of an order that the tribunal had issued to the agencies after the parliamentarians' complaint had been lodged. The government's lawyers say they will neither confirm nor deny the existence of the interception programmes that were disclosed by Snowden.

The hearing was adjourned until October.

The IPT investigates complaints about the intelligence agencies and other bodies that have powers of surveillance. Almost all of its work is conducted behind closed doors, with complainants usually unaware that hearings are taking place.

This year the Guardian disclosed [http://www.theguardian.co(...)-clegg-miliband]that although the IPT claims to be independent of government, it had been secretly operating from within the Home Office since it was established 14 years earlier.

The IPT is also about to hear a challenge to the legality of the government's bulk interception practices, in a case brought by almost a dozen British and international rights groups.

It is also considering a complaint by a Libyan dissident who was kidnapped in 2004 and delivered to Muammar Gaddafi, along with his heavily pregnant wife, with the help of MI6. He alleged that the bulk interception operations had collected his legally privileged communications with lawyers who are bringing his damages claim against the British government and the former foreign secretary Jack Straw.

The IPT has dealt with about 1,500 complaints since it was established. It has not upheld any complaints about any of the UK's intelligence agencies.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 2 juli 2014 @ 16:50:06 #20
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141820300
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 3 juli 2014 @ 16:45:41 #21
13456 AchJa
Shut up!!!
pi_141856341
NSA bestempelt Tor-gebruikers massaal als 'extremist'

Gebruikers van het anonieme netwerk Tor worden door de NSA massaal bestempeld als 'extremist'. Gegevens van de mensen die de website van Tor bezoeken worden opgeslagen in een database.

Dat melden de Duitse radiozenders NDR en WDR op basis van een deel van de broncode van het NSA-spionageprogramma XKeyscore.

Tor, een afkorting voor The Onion Router, is een netwerk dat internetverbindingen versleutelt en door een reeks servers over de hele wereld stuurt, zodat het internet anoniem kan worden bezocht.

De dienst wordt gebruikt door mensen die bezorgd zijn over privacy en door dissidenten in landen als China, waar veel sites geblokkeerd zijn. Via Tor is echter ook het beruchte 'deep web', waaronder de inmiddels offline gehaalde digitale zwarte markt Silk Road, te bereiken.

Afgeluisterd

Uit de documenten van NDR en WDR blijkt dat de NSA het gemunt had op de 'directory authorities' van Tor. Die sturen gebruikers van het netwerk een lijst met alle beschikbare Tor-servers, voordat een beveiligde verbinding kan worden opgezet.

De verbindingen van deze servers worden afgeluisterd om de ip-adressen van Tor-gebruikers te identificeren, zo blijkt uit de broncode. Uit een opmerking in de code blijkt dat deze mensen worden bestempeld als 'extremist'.

Ook mensen die op internet zoeken naar het beveiligde besturingssysteem Tails, dat gebruikmaakt van het Tor-netwerk, komen in de database van de NSA. Daarnaast wordt de site van Tor in de gaten gehouden, en de ip-adressen van bezoekers vastgelegd.

Dat geldt niet voor bezoekers uit de 'Five Eyes'-landen, de VS en zijn belangrijkste partners Nieuw-Zeeland, Australië, het Verenigd Koninkrijk en Canada. Voor ip-adressen uit deze landen wordt een uitzondering gemaakt.

E-mails

Volgens NDR en WDR probeert de NSA ook de inhoud van e-mails over het Tor-netwerk op te slaan, en richt de dienst zich dus niet alleen op 'metadata'. Het is onduidelijk hoe dit kan, want het Tor-netwerk maakt gebruik van versleuteling die niet door de NSA te kraken zou moeten zijn.

Eerder bleek ook al uit documenten van de Britse krant The Guardian dat de NSA probeerde het Tor-netwerk te kraken, maar zonder succes. Uit een presentatie van de inlichtingendienst bleek dat de dienst hierover gefrustreerd was.

In een interview met de Duitse zenders zegt William Binney, voormalig directeur van de NSA, dat de spionnen zich juist op het netwerk richten omdat het zorgt voor anonimiteit. "Er mogen geen vrije, anonieme ruimtes zijn. Ze willen alles over iedereen weten."

nu.nl

'NSA richt zich op internetters die op Tails of Tor zoeken'

Uit de vermoedelijke plug-in-broncode voor een analysesysteem dat de NSA gebruikt om internetdata te vergaren, zou op te maken zijn dat de spionagedienst zich specifiek richt op gebruikers van en geïnteresseerden in anonimiseringssoftware als Tor en Tails.

Het zou gaan om een plug-in die verband houdt met NSA's omvangrijke en complexe systeem XKeyscore, waarvan het bestaan via Snowden-documenten uitlekte. De Amerikaanse spionagedienst zou XKeyscore gebruiken om wereldwijd vergaarde data en metadata te kunnen doorspitten. In een noot bij de broncode van die plug-in zou vermeld staan dat gebruikers van Tor en andere anonimiseringssoftware- en diensten te beschouwen zijn als extremisten. Wie waar ook ter wereld bijvoorbeeld de naam van het 'anonieme OS' Tails in zou voeren, zou gemarkeerd worden door XKeyscore en extra in de gaten gehouden worden.

Volgens een bron van BoingBoing die betrokken was bij het analyseren van de Snowden-documenten, is het doel van de NSA om internetters in twee groepen te verdelen: gebruikers die de technische kennis hebben om anoniem te kunnen internetten en mensen die dat niet hebben. De wens van de spionagedienst zou zijn om de communicatie van de eerste groep volledig te onderscheppen.

In de broncode van de plug-in zouden verder Duitse ip-adressen staan, claimen NDR en ZDF, die zeggen inzage in de broncode gehad te hebben. Een van de ip-adressen zou toebehoren aan een server van de Duitse student Sebastian Hahn. Deze ontwikkelaar is een van de drijvende krachten achter het netwerk voor anoniem internetten en hij draait onder ander een van de negen directory authorities: centrale servers waar clients de lijsten van alle Tor-relays met certificaten vandaan halen. Ook de codenaam voor de server, Gabelmoo, zou in de broncode terug te vinden zijn, net als de codenamen van de overige acht directory authorities. Daaronder zit ook een Nederlandse server met codenaam dizum.

De XKeyscore-plug-in zou via de servers kunnen filteren wie van het Tor-netwerk gebruikmaakt. Details verkrijgt de dienst daarbij waarschijnlijk niet: uit eerdere Snowden-documenten bleek dat de NSA er niet in slaagt om anonieme gebruikers van het Tor-netwerk op een directe manier te kunnen traceren, alleen via omwegen.

Wel zou de dienst niet alleen de metadata, maar ook de inhoud van e-mails die via Tor verstuurd worden kunnen onderscheppen, zo menen NDR en ZDF uit de broncode te kunnen opmaken. Het zou gaan om de coderegel '"email_body('https://bridges.torproject.org/' : c++ extractors:".

Tweakers
  donderdag 3 juli 2014 @ 23:12:05 #22
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141871723
Ik ben een extremist! *O*
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 3 juli 2014 @ 23:13:42 #23
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141871802
quote:
quote:
National Security Agency whistleblowers William Binney and Thomas Drake testified before a German parliamentary committee as part of an inquiry into NSA surveillance in Germany.

According to Deutsche Welle, Binney argued that the NSA had abandoned nearly all rule of law principles. It now has a “totalitarian mentality” and wants “total information control.”

He called NSA the “greatest threat” to America since the Civil War.

The committee asked him about a story that broke that day from Panorama on how NSA targets individuals who merely search for “privacy-enhancing software tools.” The agency tracks the IP address of the person and especially spies on the Tor network, which democracy activists are known to use to bypass authoritarian internet controls.

The NSA uses XKeyscore, a program that was first revealed when disclosures from NSA whistleblower Edward Snowden began in June 2013. It is a “collection and analysis tool” used to exploit computer networks. It can be used to gather data on “nearly everything a user does on the internet.”
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 4 juli 2014 @ 12:36:28 #24
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141884480
quote:
What do we want? CAT VIDEOS! How do we get them? TOR!

Anonymity outfit responds to NSA targeting allegations

The Onion Router project has fired back at the National Security Agency, after it emerged that those who use the network – and read Linux magazines – are considered worthy of surveillance.

Tor's blogged riposte points out that “Just learning that somebody visited the Tor or Tails website doesn't tell you whether that person is a journalist source, someone concerned that her Internet Service Provider will learn about her health conditions, or just someone irked that cat videos are blocked in her location.”

Cat videos are blocked in some places? Now that sounds like the kind of thing the NSA should be fighting!

The post we've linked to comes from an author named “Phobos”, a handle generally assumed to be a pen name for Tor executive director Andrew Lewman.

Whatever the author's true identity, he or she is clearly quite upset by NSA's alleged activities.

“... it's worth emphasizing that we designed bridges for users in countries like China and Iran, and here we are finding out about attacks by our own country,” Phobos writes. “Now I understand how the Google engineers felt when they learned about the attacks on their infrastructure.” ®
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 4 juli 2014 @ 17:10:58 #25
312994 deelnemer
ff meedenken
pi_141893946
maxseddon twitterde op vrijdag 04-07-2014 om 12:03:10 The Duma has just passed a law banning storing Russians' personal data — any and all of it — abroad: http://t.co/yNsOWEa7vH reageer retweet
The view from nowhere.
pi_141894099
quote:
0s.gif Op vrijdag 4 juli 2014 17:10 schreef deelnemer het volgende:
maxseddon twitterde op vrijdag 04-07-2014 om 12:03:10 The Duma has just passed a law banning storing Russians' personal data — any and all of it — abroad: http://t.co/yNsOWEa7vH reageer retweet
Volgens het artikel gaat dat vooral erom dat websites zoals Facebook en Booking.com van de Russische markt moeten worden geweerd, aangezien bij gebruik van die sites persoonlijke gegevens van Russen op locaties buiten Rusland worden opgeslagen.

[ Bericht 2% gewijzigd door #ANONIEM op 04-07-2014 17:17:42 ]
  vrijdag 4 juli 2014 @ 18:47:39 #27
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141897361
quote:
http://www.bbc.com/news/world-europe-28160767?ocid=socialflow_twitter

An employee of Germany's intelligence agency has been arrested on suspicion of spying for the US, reports say.

The man is said to have been trying to gather details about a German parliamentary committee that is investigating claims of US espionage.

The US National Security Agency (NSA) was last year accused of bugging the phone of Chancellor Angela Merkel as part of a huge surveillance programme.

The NSA revelations put a strain on ties between Germany and the US.

US officials at the embassy in Berlin have declined to comment on the latest development.


'Serious matter'

German media say the man arrested this week is a 31-year-old employee of the federal intelligence agency, known as the BND.

The German federal prosecutor's office confirmed the man's arrest, but gave no other details.

A spokesman for Ms Merkel said she had been informed of the arrest, as had the members of the nine-strong parliamentary committee investigating the activities of foreign intelligence agencies in Germany.

"The matter is serious, it is clear," spokesman Steffen Seibert told the Frankfurter Allgemeine newspaper,

Der Spiegel news magazine said the man was believed to have passed secret documents to a US contact in exchange for money.

However, one unnamed politician told Reuters news agency the suspect had offered his services to the US voluntarily.

"This was a man who had no direct contact with the investigative committee... He was not a top agent," the source said.

Germany is particularly sensitive to reports of espionage on its territory because many of its citizens from the formerly communist east of the country were spied upon by the Stasi secret police.

The scale of the NSA's global spy programme was revealed in documents leaked last year by a former intelligence contractor, Edward Snowden.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 5 juli 2014 @ 10:33:56 #28
312994 deelnemer
ff meedenken
pi_141922622
quote:
0s.gif Op vrijdag 4 juli 2014 17:15 schreef Igen het volgende:

[..]

Volgens het artikel gaat dat vooral erom dat websites zoals Facebook en Booking.com van de Russische markt moeten worden geweerd, aangezien bij gebruik van die sites persoonlijke gegevens van Russen op locaties buiten Rusland worden opgeslagen.
Klopt

StateOfUkraine twitterde op zaterdag 05-07-2014 om 06:51:41 Iron curtain 2: new law may allow #Russia to block Twitter, Facebook, Google & other Internet services within 2 years http://t.co/BoPn2MReqc reageer retweet
RutheniaRus twitterde op zaterdag 05-07-2014 om 10:17:17 Russian law on data storage means Google, Booking to open data centers and use Russian crypto procedures to be available to FSB. reageer retweet


[ Bericht 21% gewijzigd door deelnemer op 05-07-2014 12:21:06 ]
The view from nowhere.
  zaterdag 5 juli 2014 @ 17:03:12 #29
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141933173
quote:
quote:
An adviser to Edward Snowden said on Wednesday that an unfair legal landscape made it unlikely that the NSA whistleblower would take US secretary of state John Kerry up on his invitation to “man up” and return to the United States.

In a television appearance on Wednesday morning, Kerry said that if Snowden were a “patriot”, he would return to the United States from Russia to face criminal charges. Snowden was charged last June with three felonies under the 1917 Espionage Act.
quote:
quote:
At a time of renewed debate over the proper balance between secrecy and accountability for U.S. spy agencies, Scudder’s case reveals the extent to which there can be intense disagreement even inside agencies over how much information they should be allowed to withhold from the public and for how long.

Scudder’s case also highlights the risks to workers who take on their powerful spy-agency employers. Senior U.S. intelligence officials have repeatedly argued that Edward Snowden, the former National Security Agency contractor, should have done more to raise his concerns internally rather than exposing America’s espionage secrets to the world. Others who tried to do that have said they were punished.

Scudder’s actions appear to have posed no perceptible risk to national security, but he found himself in the cross hairs of the CIA and FBI.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 5 juli 2014 @ 23:01:39 #30
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141947693
quote:
quote:
This is a plot of the NSA programs revealed in the past year according to whether they are bulk or targeted, and whether the targets of surveillance are foreign or domestic. Most of the programs fall squarely into the agency’s stated mission of foreign surveillance, but some – particularly those that are both domestic and broad-sweeping – are more controversial.

Just as with the New York Magazine approval matrix that served as our inspiration, the placement of each program is based on judgments and is approximate.

For more details, read our FAQ or listen to our podcast. Also, take our quiz to test your NSA knowledge.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 6 juli 2014 @ 12:11:15 #31
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141963602
quote:
NSA intercepts: ordinary internet users 'far outnumbered' legal targets

Washington Post report says half surveillance files collected between 2009 and 2012 belonged to US citizens or residents

When the US National Security Agency (NSA) intercepted the online accounts of legally targeted foreigners over a four-year period it also collected the conversations of nine times as many ordinary internet users, both Americans and non-Americans, according to an investigation by the Washington Post.

Nearly half of those surveillance files contained names, email addresses or other details that the NSA marked as belonging to US citizens or residents, the Post reported in a story posted on its website on Saturday night. While the federal agency tried to protect their privacy by masking more than 65,000 such references to individuals, the newspaper said it found nearly 900 additional email addresses that could be strongly linked to US citizens or residents.

The intercepted messages contained material of considerable intelligence value, the Post reported, such as information about a secret overseas nuclear project, double-dealing by an ostensible ally, a military calamity that befell an unfriendly power and the identities of aggressive intruders into US computer networks.

As an example, the newspaper said the files showed that months of tracking communications across dozens of alias accounts led directly to the capture in 2011 of a Pakistan-based bomb builder suspected in a 2002 terrorist bombing in Bali. The Post said it was withholding other examples, at the request of the CIA, that would compromise ongoing investigations.

The material reviewed by the Post included roughly 160,000 intercepted email and instant-message conversations, some of them hundreds of pages long, and 7,900 documents taken from more than 11,000 online accounts. It spanned president Barack Obama's first term, 2009 to 2012, and was provided to the Post by the former NSA analyst Edward Snowden.

The daily lives of more than 10,000 account holders who were not targeted were catalogued and recorded, the Post reported. The newspaper described that material as telling "stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes".

The material collected included more than 5,000 private photos, the paper said.

The cache Snowden provided to the newspaper came from domestic NSA operations under the broad authority granted by Congress in 2008 with amendments to the Foreign Intelligence Surveillance Act, according to the Post.

By law, the NSA may "target" only foreign nationals located overseas unless it obtains a warrant based on probable cause from a special surveillance court, the Post said. "Incidental collection" of third-party communications is inevitable in many forms of surveillance, according to the newspaper.

In the case of the material Snowden provided, those in an online chat room visited by a target or merely reading the discussion were included in the data sweep, as were hundreds of people using a computer server whose internet protocol was targeted.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 6 juli 2014 @ 16:48:12 #32
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_141971431
quote:
If you read Boing Boing, the NSA considers you a target for deep surveillance

The NSA says it only banks the communications of "targeted" individuals. Guess what? If you follow a search-engine link to Boing Boing's articles about Tor and Tails, you've been targeted. Cory Doctorow digs into Xkeyscore and the NSA's deep packet inspection rules.

In a shocking story on the German site Tagesschau (Google translate), Lena Kampf, Jacob Appelbaum and John Goetz report on the rules used by the NSA to decide who is a "target" for surveillance.

Since the start of the Snowden story in 2013, the NSA has stressed that while it may intercept nearly every Internet user's communications, it only "targets" a small fraction of those, whose traffic patterns reveal some basis for suspicion. Targets of NSA surveillance don't have their data flushed from the NSA's databases on a rolling 48-hour or 30-day basis, but are instead retained indefinitely.

The authors of the Tagesschau story have seen the "deep packet inspection" rules used to determine who is considered to be a legitimate target for deep surveillance, and the results are bizarre.

According to the story, the NSA targets anyone who searches for online articles about Tails -- like this one that we published in April, or this article for teens that I wrote in May -- or Tor (The Onion Router, which we've been posted about since 2004). Anyone who is determined to be using Tor is also targeted for long-term surveillance and retention.

Tor and Tails have been part of the mainstream discussion of online security, surveillance and privacy for years. It's nothing short of bizarre to place people under suspicion for searching for these terms.

But it's not the first time the NSA has deployed specialized, highly counterintuitive wordsmithing to play games with the public, the law and its oversight. From James Clapper's insistence that he didn't lie to Congress about spying on Americans because he was only intercepting all their data, but not looking at it all; to the internal wordgames on evidence in the original Prism leak in which the NSA claimed to have "direct access" to servers from Google, Yahoo, Microsoft, Apple, etc, even though this "direct access" was a process by which the FBI would use secret warrants to request information from Internet giants without revealing that the data was destined for the NSA.

I have known that this story was coming for some time now, having learned about its broad contours under embargo from a trusted source. Since then, I've discussed it in confidence with some of the technical experts who have worked on the full set of Snowden docs, and they were as shocked as I was.

One expert suggested that the NSA's intention here was to separate the sheep from the goats -- to split the entire population of the Internet into "people who have the technical know-how to be private" and "people who don't" and then capture all the communications from the first group.

Another expert said that s/he believed that this leak may come from a second source, not Edward Snowden, as s/he had not seen this in the original Snowden docs; and had seen other revelations that also appeared independent of the Snowden materials. If that's true, it's big news, as Snowden was the first person to ever leak docs from the NSA. The existence of a potential second source means that Snowden may have inspired some of his former colleagues to take a long, hard look at the agency's cavalier attitude to the law and decency.

Update: Bruce Schneier also believes there is a second leaker.

Update 2: Appelbaum and others have posted an excellent English language article expanding on this in Der Erste. -Cory Doctorow
More importantly, this shows that the NSA uses "targeted surveillance" in a way that beggars common sense. It's a dead certainty that people who heard the NSA's reassurances about "targeting" its surveillance on people who were doing something suspicious didn't understand that the NSA meant people who'd looked up technical details about systems that are routinely discussed on the front page of every newspaper in the world.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 8 juli 2014 @ 01:33:49 #33
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142033390
quote:
The Latest Snowden Leak Is Devastating to NSA Defenders

The agency collected and stored intimate chats, photos, and emails belonging to innocent Americans—and secured them so poorly that reporters can now browse them at will.
quote:
Consider the latest leak sourced to Edward Snowden from the perspective of his detractors. The National Security Agency's defenders would have us believe that Snowden is a thief and a criminal at best, and perhaps a traitorous Russian spy. In their telling, the NSA carries out its mission lawfully, honorably, and without unduly compromising the privacy of innocents. For that reason, they regard Snowden's actions as a wrongheaded slur campaign premised on lies and exaggerations.

But their narrative now contradicts itself. The Washington Post's latest article drawing on Snowden's leaked cache of documents includes files "described as useless by the analysts but nonetheless retained" that "tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless."
quote:
I never thought I'd see this day: The founder of Lawfare has finally declared that a national-security-state employee perpetrated a huge civil-liberties violation! Remember this if he ever again claims that NSA critics can't point to a single serious abuse at the agency. Wittes himself now says there's been a serious abuse.

The same logic applies to Keith Alexander, James Clapper, Michael Hayden, Stewart Baker, Edward Lucas, John Schindler, and every other anti-Snowden NSA defender. So long as they insist that Snowden is a narcissistic criminal and possible traitor, they have no choice but to admit that the NSA collected and stored intimate photos, emails, and chats belonging to totally innocent Americans and safeguarded them so poorly that a ne'er-do-well could copy them onto thumb drives.

They have no choice but to admit that the NSA was so bad at judging who could be trusted with this sensitive data that a possible traitor could take it all to China and Russia. Yet these same people continue to insist that the NSA is deserving of our trust, that Americans should keep permitting it to collect and store massive amounts of sensitive data on innocents, and that adequate safeguards are in place to protect that data. To examine the entirety of their position is to see that it is farcical.

Here's the reality.

The NSA collects and stores the full content of extremely sensitive photographs, emails, chat transcripts, and other documents belong to Americans, itself a violation of the Constitution—but even if you disagree that it's illegal, there's no disputing the fact that the NSA has been proven incapable of safeguarding that data. There is not the chance the data could leak at sometime in the future. It has already been taken and given to reporters. The necessary reform is clear. Unable to safeguard this sensitive data, the NSA shouldn't be allowed to collect and store it.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 9 juli 2014 @ 15:26:00 #34
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142094864
quote:
Duitsland opent jacht op tweede Amerikaanse mol

Het spionageschandaal in Duitsland lijkt zich verder uit te breiden. Volgens Duitse media verdenken de autoriteiten een tweede medewerker van de inlichtingendienst BND ervan voor de Amerikanen te hebben gespioneerd. De spionage zou 'nog ernstiger' zijn dan het eerste spionagegeval. De woning en het kantoor van de verdachte werden vanochtend doorzocht. De verwachting is dat hij vandaag nog in hechtenis zal worden genomen.

De onthulling volgt een week na de arrestatie van een andere BND-medewerker die voor de Verenigde Staten zou hebben gespioneerd. Het jongste spionagegeval is volgens ingewijden 'ernstiger' dan het eerste. De verdachte zou op de militaire afdeling van de dienst hebben gewerkt.

De vorige week gearresteerde 31-jarige Duitser bespioneerde, voor de VS, de commissie die onderzoek deed naar de omstreden activiteiten op Duitse bodem van de Amerikaanse geheime dienst NSA. Vorig jaar werd na onthullingen van klokkenluider Edward Snowden bekend dat de NSA de afgelopen jaren miljarden Duitse gegevens heeft verzameld. Ook de smartphone van bondskanselier Angela Merkel was doelwit van de Amerikanen.

De gearresteerde mol is volgens Duitse media meermalen door de Amerikaanse geheime dienst ondervraagd. Hij zou minstens één keer in de VS zijn geweest om verslag uit te brengen en zou 25.000 euro hebben gekregen voor in totaal 218 documenten. Inmiddels heeft hij bekend.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 9 juli 2014 @ 17:07:10 #35
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142100122
quote:
quote:
The National Security Agency and FBI have covertly monitored the emails of prominent Muslim-Americansincluding a political candidate and several civil rights activists, academics, and lawyersunder secretive procedures intended to target terrorists and foreign spies.

According to documents provided by NSA whistleblower Edward Snowden, the list of Americans monitored by their own government includes:

Faisal Gill, a longtime Republican Party operative and one-time candidate for public office who held a top-secret security clearance and served in the Department of Homeland Security under President George W. Bush;

Asim Ghafoor, a prominent attorney who has represented clients in terrorism-related cases;

Hooshang Amirahmadi, an Iranian-American professor of international relations at Rutgers University;

Agha Saeed, a former political science professor at California State University who champions Muslim civil liberties and Palestinian rights;

Nihad Awad, the executive director of the Council on American-Islamic Relations (CAIR), the largest Muslim civil rights organization in the country.

The individuals appear on an NSA spreadsheet in the Snowden archives called FISA recapshort for the Foreign Intelligence Surveillance Act. Under that law, the Justice Department must convince a judge with the top-secret Foreign Intelligence Surveillance Court that there is probable cause to believe that American targets are not only agents of an international terrorist organization or other foreign power, but also are or may be engaged in or abetting espionage, sabotage, or terrorism. The authorizations must be renewed by the court, usually every 90 days for U.S. citizens.

The spreadsheet shows 7,485 email addresses listed as monitored between 2002 and 2008. Many of the email addresses on the list appear to belong to foreigners whom the government believes are linked to Al Qaeda, Hamas, and Hezbollah. Among the Americans on the list are individuals long accused of terrorist activity, including Anwar al-Awlaki and Samir Khan, who were killed in a 2011 drone strike in Yemen.

But a three-month investigation by The Interceptincluding interviews with more than a dozen current and former federal law enforcement officials involved in the FISA processreveals that in practice, the system for authorizing NSA surveillance affords the government wide latitude in spying on U.S. citizens.

The five Americans whose email accounts were monitored by the NSA and FBI have all led highly public, outwardly exemplary lives. All five vehemently deny any involvement in terrorism or espionage, and none advocates violent jihad or is known to have been implicated in any crime, despite years of intense scrutiny by the government and the press. Some have even climbed the ranks of the U.S. national security and foreign policy establishments.

I just dont know why, says Gill, whose AOL and Yahoo! email accounts were monitored while he was a Republican candidate for the Virginia House of Delegates. Ive done everything in my life to be patriotic. I served in the Navy, served in the government, was active in my communityIve done everything that a good citizen, in my opinion, should do.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 9 juli 2014 @ 23:55:47 #36
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142118929
Een zijstapje in deze thead was een rapport over/van de CIA die misschien gedeeltelijk vrijgegeven zou worden.

quote:
Files on UK role in CIA rendition accidentally destroyed, says minister

Rights groups say FCO claim records of flights in and out of Diego Garcia missing due to water damage 'smacks of cover-up'

The government's problems with missing files deepened dramatically when the Foreign Office claimed documents on the UK's role in the CIA's global abduction operation had been destroyed accidentally when they became soaked with water.

In a statement that human rights groups said "smacked of a cover-up", the department maintained that records of post-9/11 flights in and out of Diego Garcia, the British territory in the Indian Ocean, were "incomplete due to water damage".

The claim comes amid media reports in the US that a Senate report due to be published later this year identifies Diego Garcia as a location where the CIA established a secret prison as part of its extraordinary rendition programme. According to one report, classified CIA documents state that the prison was established with the "full cooperation" of the UK government.

It also comes at a time when MPs are demanding the Home Office urgently provide more information about 114 "missing" files that could have contained information about an alleged child abuse network in the 1980s.

Ministers of successive governments have repeatedly given misleading or incomplete information about the CIA's use of Diego Garcia. In February 2008, the then foreign secretary, David Miliband, was forced to apologise to MPs and explain that Tony Blair's "earlier explicit assurances that Diego Garcia had not been used for rendition flights" had not been correct. Miliband said at this point that two rendition flights had landed, but that the detainees on board had not disembarked.

Miliband's admission was made after human rights groups produces irrefutable evidence that aircraft linked to the rendition programme had landed on Diego Garcia. Since then, far more aircraft have been shown to have been involved in the operation.

The "water damage" claim was given in response to a parliamentary question by the Tory MP an chair of Treasury select committee, Andrew Tyrie, who has been investigating the UK's involvement in the rendition programme for several years.

When Tyrie asked the Foreign Office (FCO) to explain which government department keeps a list of flights which passed through Diego Garcia from January 2002 to January 2009, FCO minister Mark Simmonds replied: "Records on flight departures and arrivals on Diego Garcia are held by the British Indian Ocean Territory immigration authorities. Daily occurrence logs, which record the flights landing and taking off, cover the period since 2003. Though there are some limited records from 2002, I understand they are incomplete due to water damage."

There was no immediate FCO response to the Guardian's questions about where the records were held, the way in which the damage was said to have occurred, or whether any copies survived.

Cori Crider of the legal charity Reprieve said: "It's looking worse and worse for the UK government on Diego Garcia. First we learn the Senate's upcoming torture report says detainees were held on the island, and now – conveniently – a pile of key documents turn up missing with 'water damage'? The government might as well have said the dog ate their homework. This smacks of a cover-up. They now need to come clean about how, when, and where this evidence was lost."

Crider added that the claim that documents had been destroyed accidentally was "especially disturbing" given that Scotland Yard is investigating the role played by MI6 in the abduction of a Libyan dissident, Abdel Hakim Belhaj, who was flown to one of Muammar Gaddafi's prisons along with his pregnant wife in 2004.

The police investigation, Operation Lydd, is thought to have examined whether the couple were flown via Diego Garcia. A report is due to be handed shortly to the director of public prosecutions.

The White House and the CIA are working on final redactions to a 481-page executive summary of a classified report by the US Senate committee on intelligence on the rendition programme prior to its publication, possibly in September. The full 6,300-page report is said to be scathing of the way in which the CIA resorted rapidly to the abduction and torture of al-Qaida suspects after the attacks of 2001.

There have been a number of reports suggesting that allies of the US, including the UK and Poland, and been lobbying to ensure that all reference to their own involvement is removed from the summary before it is published. The Foreign Office refused to comment on these reports.

The British government is particularly sensitive about the allegations that Diego Garcia hosted one of the CIA's prisons, at times claiming that it knows only that which it is told by Washington. Although the island has operated as a US military base since the islanders were evicted in the 1960s, it remains a British territory, and its use during the rendition programme would have placed the UK in breach of a raft of international and domestic laws.

Belhaj and his wife are suing MI6, the agency's former head of counter-terrorism Sir Mark Allen and Jack Straw, who was foreign secretary at the time that the couple were abducted.

Last month, the Commons cross-party defence committee suggested that information about the extent to which the CIA used the island as a "black site" to transfer detainees was still being withheld. "Recent developments have once again brought into question the validity of assurances by the US about its use of Diego Garcia," it said.

The committee warned that it will assess the implications for Britain and for "public confidence" in its previous statements on US use of Diego Garcia, and said the US should not in future be permitted to use the island, to transfer terror suspects, for combat operations, "or any other politically sensitive activity", without the explicit authorisation from the UK government.

Although Miliband told MPs that detainees had not been held on Diego Garcia, others have contradicted this assertion.

Manfred Nowak, as United Nations special rapporteur on torture, said he had received "credible evidence from well-placed sources familiar with the situation on the island" that CIA detainees had been held there between 2002 and 2003.

General Barry McCaffrey, a former head of Southcom, the US military's southern command, has twice stated publicly that Diego Garcia has been used by the US to hold prisoners, saying in one radio interview in May 2004: "We're probably holding around 3,000 people, you know, Bagram air field, Diego Garcia, Guantánamo, 16 camps throughout Iraq."

In 2003, Time magazine quoted "a regional intelligence official" as saying that a man accused of plotting the 2002 Bali nightclub bombing was being interrogated on Diego Garcia. Five years later the magazine reported that a CIA counter-terrorism official said a high-value prisoner or prisoners were being held and interrogated on the island.

In August 2008, the Observer reported that former US intelligence officers "unofficially told senior Spanish judge Baltasar Garzón that Mustafa Setmarian, a Spanish-based Syrian accused of running terrorist training camps in Afghanistan, was taken to Diego Garcia in late 2005 and held there for months".

As a consequence of the repeated allegations, the foreign affairs select committee said in 2009 that it was "unacceptable" that the government had not taken steps to obtain the full details of the two individuals whom it had admitted to have been rendered through Diego Garcia.

The committee added: "We conclude that the use of Diego Garcia for US rendition flights without the knowledge or consent of the British government raises disquieting questions about the effectiveness of the government's exercise of its responsibilities in relation to this territory."
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 11 juli 2014 @ 15:27:27 #37
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142173015
quote:
NSA chief knew of Snowden file destruction by Guardian in UK

Revelation contrasts markedly with White House efforts to distance itself from UK government pressure to destroy disks

General Keith Alexander, the then director of the NSA, was briefed that the Guardian was prepared to make a largely symbolic act of destroying documents from Edward Snowden last July, new documents reveal.

The revelation that Alexander and Obama's director of national intelligence, James Clapper, were advised on the Guardian's destruction of several hard disks and laptops contrasts markedly with public White House statements that distanced the US from the decision.

White House and NSA emails obtained by Associated Press under freedom of information legislation demonstrate how pleased Alexander and his colleagues were with the developments. At times the correspondence takes a celebratory tone, with one official describing the anticipated destruction as "good news".

On 20 July 2013, three Guardian editors destroyed all copies of the its Snowden material held in London (video), under the supervision of two GCHQ staff following a period of intense political pressure in the UK.

The decision to destroy the UK copies of the material was taken in a climate of advancing legal threats from Cabinet Office and intelligence officials. The Guardian and its publishing partners, which included the New York Times and the not-for-profit news organisation ProPublica, held other copies of the material in the US, and continued reporting revelations from the documents.

When the Guardian revealed it had destroyed several computers a month later in August, the White House spokesman Josh Earnest initially remarked it was hard to "evaluate the propriety of what they did based on incomplete knowledge of what happened" but said it would be hard to imagine the same events occurring in the US.

"That's very difficult to imagine a scenario in which that would be appropriate," he concluded.

However, heavily redacted email correspondence obtained by AP reporter Jack Gillum shows senior NSA officials celebrating the destruction of the material, even before it had occurred.

An email to Alexander from Rick Ledgett, now deputy director of the NSA, has the subject line "Guardian data being destroyed", and is dated 19 July, a day before the destruction of the files. Most is heavily redacted, but Ledgett remarks: "Good news, at least on this front."

A day later, hours after the material was destroyed, Alexander follows up with Ledgett, asking: "Can you confirm this actually occurred?"

Later that day, Clapper emails Alexander under the same subject line, saying: "Thanks Keith … appreciate the conversation today".

The remainder of the emails are redacted, including the subject lines in many cases, meaning it is unclear who from the British government briefed the senior NSA and White House staff on the destruction, or whether US officials had any input to the decision to encourage destruction of journalistic material.

A spokeswoman for the Guardian said the revelation of the US-UK correspondence on the destruction was disappointing.

"We're disappointed to learn that cross-Atlantic conversations were taking place at the very highest levels of government ahead of the bizarre destruction of journalistic material that took place in the Guardian's basement last July," she said. "What's perhaps most concerning is that the disclosure of these emails appears to contradict the White House's comments about these events last year, when they questioned the appropriateness of the UK government's intervention."

The NSA and GCHQ declined to respond to AP's requests for comment on the email exchange.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 11 juli 2014 @ 18:36:13 #38
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142178713
quote:
Inhoud e-mails grondwettelijk beschermd

Ook de inhoud van e-mails moet straks grondwettelijk worden beschermd. Het kabinet heeft vandaag besloten een wetsvoorstel naar de Tweede Kamer te sturen waarin dat wordt geregeld.

Het huidige brief-, telefoon- en telegraafgeheim wordt vervangen door het 'brief- en telecommunicatiegeheim' in artikel 13 van de Grondwet. Niet alleen e-mails, maar ook telefoonverkeer via internet en besloten communicatie via sociale media vallen dan ook onder die bescherming.

Dat betekent dat de overheid niet mag bekijken wat er wordt gecommuniceerd, ongeacht het middel waarmee dat is gebeurd. Daarop zijn wel uitzonderingen mogelijk. Politie en inlichtingendiensten mogen de communicatie in bepaalde gevallen wel inzien, maar alleen na toestemming van hogerhand.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
pi_142183064
Goed nieuws. :)
  vrijdag 11 juli 2014 @ 23:20:38 #40
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142189804
Soms moeten journalisten werken voor hun geld.

quote:
quote:
NSA surveillance is a complex subject — legally, technically and operationally. We drafted the story carefully and stand by all of it. I want to unpack some of the main points and controversies, sprinkling in new material for context. In this format, I can offer more technical detail about the data set that Snowden provided and the methods we used to analyze it. I will also address some ethical and national security issues we faced. Along the way, I will explain why our story actually understated its findings, clear up speculation about spying on President Obama and fact-check a recent CIA tweet about lost passwords.
quote:
We did not have an official NSA list of targets. We had to find them in the pile ourselves. Soltani, an independent researcher, did most of the heavy lifting on that. Because the information was not laid out in rows and columns, the way it might be in a spreadsheet, Soltani wrote computer code to extract what we were looking for from something like a quarter-million pages of unstructured text.

Some of our questions could not be answered with the data we had. For that reason, our story did not say what some commentators have imputed to it.

These are fine distinctions, but they are important because we reported only what we could count. We did not say that the NSA intercepted a larger number of conversations or a higher volume of content belonging to bystanders than targets. We said there were more participants (unique online accounts) in those conversations who were not targets than participants who were.

We also did not say that there are more Americans than foreign targets in the pile. We suspect that proposition may be true, but we could not establish it reliably.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 13 juli 2014 @ 16:52:19 #41
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142245445
quote:
Juncker: spionage VS en gas Rusland zorgelijk

De aanstaande voorzitter van de Europese Commissie, de Luxemburger Jean-Claude Juncker, denkt dat de Amerikaanse spionagepraktijken in Europa voor een vertrouwensbreuk kunnen zorgen. Ook vindt hij dat Europa te afhankelijk is van Russisch gas en dat meer Europese samenwerking nodig is om die afhankelijkheid te verminderen.

Juncker zei dat in een interview met de Duitse krant Bild. Hij stelt dat 'men de Amerikanen moet uitleggen dat vrienden naar elkaar luisteren en niet elkaar afluisteren'. De Luxemburgse oud-premier vreest niet alleen een breuk van 'het trans-Atlantische vertrouwen, maar ook van het vertrouwen tussen burgers en de staat'.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 13 juli 2014 @ 19:51:00 #42
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142251932
quote:
Edward Snowden condemns Britain's emergency surveillance bill

Exclusive: NSA whistleblower says it 'defies belief' that bill must be rushed through after government ignored issue for a year

The NSA whistleblower Edward Snowden has condemned the new surveillance bill being pushed through the UK's parliament this week, expressing concern about the speed at which it is being done, lack of public debate, fear-mongering and what he described as increased powers of intrusion.

In an exclusive interview with the Guardian in Moscow, Snowden said it was very unusual for a public body to pass an emergency law such as this in circumstances other than a time of total war. "I mean we don't have bombs falling. We don't have U-boats in the harbour."

Suddenly it is a priority, he said, after the government had ignored it for an entire year. "It defies belief."

He found the urgency with which the British government was moving extraordinary and said it mirrored a similar move in the US in 2007 when the Bush administration was forced to introduce legislation, the Protect America Act, citing the same concerns about terrorist threats and the NSA losing cooperation from telecom and internet companies.

"I mean the NSA could have written this draft," he said. "They passed it under the same sort of emergency justification. They said we would be at risk. They said companies will no longer cooperate with us. We're losing valuable intelligence that puts the nation at risk."

His comments chime with British civil liberties groups who, having had time to read the small print, are growing increasingly sceptical about government claims last week that the bill is a stop-gap that will not increase the powers of the surveillance agencies.

David Cameron, searching for cross-party support, assured the Liberal Democrats and Labour that there would be no extension of the powers.

But internal Home Office papers seen by the Guardian appear to confirm that there would be an expansion of powers. Campaigners argue that the bill contains new and unprecedented powers for the UK to require overseas companies to comply with interception warrants and communications data acquisition requests and build interception capabilities into their products and infrastructure.

The interview with Snowden, in a city centre hotel, lasted seven hours. One of only a handful of interviews since he sought asylum in Russia a year ago, it was wide-ranging, from the impact of the global debate he unleashed on surveillance and privacy to fresh insights into life inside the NSA. The full interview will be published later this week.

His year-long asylum is due to expire on 31 July but is almost certain to be extended. Even in the unlikely event of a political decision to send him to the US, he would be entitled to a year-long appeal process.

During the interview, Snowden was taken aback on learning about the speed at which the British government is moving on new legislation and described it as "a significant change". He questioned why it was doing so now, more than a year after his initial revelations about the scale of government surveillance in the US, the UK and elsewhere around the world, a year in which the government had been largely silent.

He also questioned why there had been a move in the aftermath of a ruling by the European court of justice in April that declared some of the existing surveillance measures were invalid.

He said the government was asking for these "new authorities immediately without any debate, just taking their word for it, despite the fact that these exact same authorities were just declared unlawful by the European court of justice".

He added: "Is it really going to be so costly for us to take a few days to debate where the line should be drawn about the authority and what really serves the public interest?

"If these surveillance authorities are so interested, so invasive, the courts are actually saying they violate fundamental rights, do we really want to authorise them on a new, increased and more intrusive scale without any public debate?"

He said there had been government silence for the last year since he had exposed the scale of surveillance by the NSA and its British partner GCHQ. "And yet suddenly we're told there's a brand new bill that looks like it was written by the National Security Agency that has to be passed in the same manner that a surveillance bill in the United States was passed in 2007, and it has to happen now. And we don't have time to debate it, despite the fact that this was not a priority, this was not an issue that needed to be discussed at all, for an entire year. It defies belief."

It is questionable how much impact his comments will have on parliamentarians, even though he is an expert witness, with inside knowledge of the surveillance agencies.

Snowden has become a champion for privacy campaigners. But, though his revelations prompted inquiries by two parliamentary committees, he has won little vocal support among parliamentarians.

The Conservatives deny there is any need for a debate on surveillance versus privacy. Labour and Liberal Democrats have been hesitant too about joining the debate, fearful of a backlash in the event of a terrorist attack.

Even backbench MPs who think the intelligence agencies have a case to answer hold back from public expressions of support for a whistleblower sought by the US government.

The British government is justifying the proposed new legislation on the grounds not only of the European court ruling but of US intelligence fears of a terrorist attack, in particular concerns of an attempt to blow up a transatlantic airliner said to be emanating from an alleged al-Qaida bombmaker in Yemen linked to hardline Islamist groups in Syria and Iraq.

Snowden said the Bush administration had used the threat of another terrorist attack on America after 9/11 to push through the Protect America Act. The bill had to be brought in after the New York Times disclosed the surveillance agencies had been secretly engaged in wiretapping without a warrant.

Snowden said: "So what's extraordinary about this law being passed in the UK is that it very closely mirrors the Protect America Act 2007 that was passed in the United States at the request of the National Security Agency, after the warrantless wire-tapping programme, which was unlawful and unconstitutional, was revealed."

He said the bill was introduced into Congress on 1 August 2007 and signed into law on 5 August without any substantial open public debate. A year later it was renewed and the new version was even worse, he said, granting immunity to all the companies that had been breaking the law for the previous decade.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 14 juli 2014 @ 09:36:57 #43
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142274109
quote:
GCHQ surveillance hearing to begin

Investigatory powers tribunal will examine concerns that human rights groups may have been monitored via Tempora programme

The UK's most secretive court is beginning a week-long hearing – mostly in public – into complaints that GCHQ's mass surveillance of the internet violates human rights.

The case against the monitoring agency at the investigatory powers tribunal (IPT) is the result of revelations by the US whistleblower Edward Snowden. It has been brought by Privacy International, Liberty, Amnesty International, the American Civil Liberties Union and a number of other overseas human rights groups.

The legal challenge is the first of dozens of GCHQ-related claims to be examined in detail by the IPT, which hears complaints against British intelligence agencies and government bodies that carry out surveillance under the Regulation of Investigatory Powers Act (Ripa).

The civil liberties organisations are concerned that their private communications may have been monitored under GCHQ's electronic surveillance programme Tempora, whose existence was revealed by Snowden. They also complain that information obtained through the US National Security Agency's Prism and Upstream programmes may have been shared with the British intelligence services, sidestepping protections provided by the UK legal system.

On 10 July the government announced emergency measures to preserve the legality of data retention and at the same time promised a review of how Ripa operates.

James Welch, Liberty's legal director, said: "As legislation is introduced to paper over one crack in the crumbling surveillance state, another faces challenge. Not content with forcing service providers to keep details of our calls and browsing histories, the government is fighting to retain the right to trawl through our communications with anyone outside and many inside the country. When will it learn that it is neither ethical nor efficient to turn everyone into suspects?"

Most IPT hearings are conducted behind closed doors. Since the tribunal was established 14 years ago, no complaint against the intelligence services has ever been upheld. There is no appeal against the court's decisions although the European court of human rights in Strasbourg has signalled that it will consider appeals from the IPT on the presumption that claimants have exhausted domestic remedies.

Mr Justice Burton, who became president of the court last October, describes it as an "open tribunal" and has vowed to make its procedures less clandestine. In a departure from previous practice, the IPT posted advance notice of this week's hearing on its website, explaining that the case is "against the intelligence agencies in respect of alleged interception activity involving UK and US access to communications".

In defence documents already submitted, the government's most senior security official, Charles Farr, has explained how searches on Google, Facebook, Twitter and YouTube, as well as emails to or from non-British citizens abroad, can be monitored legally by the security services without obtaining an individual warrant because they are deemed to be "external communications".

The IPT hearing, at the Rolls Building in central London, may hear some of the most sensitive evidence about interceptions in private. This claim is expected to concentrate on the legality of two interception programmes, Tempora and Prism, and their use by the UK's monitoring agency, GCHQ, and its US counterpart, the NSA.

In Farr's submission, he says he can "neither confirm or deny" the existence of Tempora, although he does acknowledge that Prism exists "because it has been expressly avowed by the executive branch of the US government".

Much of the tribunal's deliberations will therefore have to proceed on the basis of agreed hypothetical facts. For example, if Tempora exists, lawyers will ask, does it violate the rights to privacy and freedom of expression enshrined in articles 8 and 10 of the European convention on human rights?
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 14 juli 2014 @ 21:29:51 #44
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142300305
quote:
Hacking Online Polls and Other Ways British Spies Seek to Control the Internet



The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.

The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIG’s use of “fake victim blog posts,” “false flag operations,” “honey traps” and psychological manipulation to target online activists, monitor visitors to WikiLeaks, and spy on YouTube and Facebook users.

But as the U.K. Parliament today debates a fast-tracked bill to provide the government with greater surveillance powers, one which Prime Minister David Cameron has justified as an “emergency” to “help keep us safe,” a newly released top-secret GCHQ document called “JTRIG Tools and Techniques” provides a comprehensive, birds-eye view of just how underhanded and invasive this unit’s operations are. The document—available in full here—is designed to notify other GCHQ units of JTRIG’s “weaponised capability” when it comes to the dark internet arts, and serves as a sort of hacker’s buffet for wreaking online havoc.



The “tools” have been assigned boastful code names. They include invasive methods for online surveillance, as well as some of the very techniques that the U.S. and U.K. have harshly prosecuted young online activists for employing, including “distributed denial of service” attacks and “call bombing.” But they also describe previously unknown tactics for manipulating and distorting online political discourse and disseminating state propaganda, as well as the apparent ability to actively monitor Skype users in real-time—raising further questions about the extent of Microsoft’s cooperation with spy agencies or potential vulnerabilities in its Skype’s encryption. Here’s a list of how JTRIG describes its capabilities:

• “Change outcome of online polls” (UNDERPASS)

• “Mass delivery of email messaging to support an Information Operations campaign” (BADGER) and “mass delivery of SMS messages to support an Information Operations campaign” (WARPARTH)

• “Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.” (SILVERLORD)

• “Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.” (MINIATURE HERO)

• “Find private photographs of targets on Facebook” (SPRING BISHOP)

• “A tool that will permanently disable a target’s account on their computer” (ANGRY PIRATE)

• “Ability to artificially increase traffic to a website” (GATEWAY) and “ability to inflate page views on websites” (SLIPSTREAM)

• “Amplification of a given message, normally video, on popular multimedia websites (Youtube)” (GESTATOR)

• “Targeted Denial Of Service against Web Servers” (PREDATORS FACE) and “Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG” (ROLLING THUNDER)

• “A suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk)” (ELATE)

• “Ability to spoof any email address and send email under that identity” (CHANGELING)

• “For connecting two target phone together in a call” (IMPERIAL BARGE)

While some of the tactics are described as “in development,” JTRIG touts “most” of them as “fully operational, tested and reliable.” It adds: “We only advertise tools here that are either ready to fire or very close to being ready.”

And JTRIG urges its GCHQ colleagues to think big when it comes to internet deception: “Don’t treat this like a catalogue. If you don’t see it here, it doesn’t mean we can’t build it.”

The document appears in a massive Wikipedia-style archive used by GCHQ to internally discuss its surveillance and online deception activities. The page indicates that it was last modified in July 2012, and had been accessed almost 20,000 times.

GCHQ refused to provide any comment on the record beyond its standard boilerplate, in which it claims that it acts “in accordance with a strict legal and policy framework” and is subject to “rigorous oversight.” But both claims are questionable.

British watchdog Privacy International has filed pending legal action against GCHQ over the agency’s use of malware to spy on internet and mobile phone users. Several GCHQ memos published last fall by The Guardian revealed that the agency was eager to keep its activities secret not to protect national security, but because “our main concern is that references to agency practices (ie, the scale of interception and deletion) could lead to damaging public debate which might lead to legal challenges against the current regime.” And an EU parliamentary inquiry earlier this year concluded that GCHQ activities were likely illegal.

As for oversight, serious questions have been raised about whether top national security officials even know what GCHQ is doing. Chris Huhne, a former cabinet minister and member of the national security council until 2012, insisted that ministers were in “utter ignorance” about even the largest GCHQ spying program, known as Tempora—not to mention “their extraordinary capability to hoover up and store personal emails, voice contact, social networking activity and even internet searches.” In an October Guardian op-ed, Huhne wrote that “when it comes to the secret world of GCHQ and the [NSA], the depth of my ‘privileged information’ has been dwarfed by the information provided by Edward Snowden to The Guardian.”
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 15 juli 2014 @ 04:10:30 #45
313372 Linkse_Boomknuffelaar
Stop de wapenlobby. Vrede!
pi_142313556
http://www.welt.de/politi(...)Schreibmaschine.html

quote:
Es klingt zumindest ungewöhnlich. Der Vorsitzende des NSA-Untersuchungsausschusses, Patrick Sensburg, spricht ganz offen über skurril anmutende Schutzmaßnahmen. Im ARD-"Morgenmagazin" sagte der CDU-Politiker, man habe bereits über die Nutzung einer Schreibmaschine anstatt von Computern nachgedacht. "Tatsächlich haben wir das – und zwar eine nicht elektronische Schreibmaschine", antwortete Sensburg auf eine entsprechende Frage.

Die gute alte Schreibmaschine als Ultima Ratio im Aufklärungskampf gegen die massenhafte globale Ausspähung von Nachrichtendiensten? Man darf mit dem Kopf schütteln. Muss es aber nicht. Denn die Anmerkung des Ausschussvorsitzenden steht stellvertretend für eine Sorge, die in Berlin umgeht: Kann man sich irgendwie schützen?

Unendlich viele Möglichkeiten der Überwachung

Seit einem Jahr wird Schritt für Schritt offengelegt, welche Möglichkeiten es zur Überwachung im digitalen Zeitalter gibt. Edward Snowden hat gezeigt, wozu amerikanische und britische Nachrichtendienste fähig sind – technisch und logistisch. Und jeder kann daraus den Schluss ziehen, dass russische oder chinesische Dienste, aber auch hochtechnisierte Kriminelle durchaus ähnliche Kompetenzen entwickelt haben.

Elektronische Kommunikation kann heute nahezu umfassend ausgespäht werden. Das gilt nicht nur für E-Mails, private Einträge in Social Networks oder Telefongespräche. Mittlerweile wissen wir auch, dass die Benutzung von Anonymisierungsdiensten im Netz wohl keinen hundertprozentigen Schutz versprechen kann, sondern Nutzer eher interessant für Datendiebe macht. Selbst bei Kryptohandys, die manche Politiker besitzen, ist es offenbar immer nur eine Frage der Zeit, bis ihr Schutz erkannt und umgangen werden kann.
  dinsdag 15 juli 2014 @ 19:15:38 #46
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142332600
quote:
Google werkt samen met hackers aan 'veiliger internet'

Google heeft een speciaal team gevormd dat moet zorgen voor een veiliger internet. Op het bedrijfsblog wordt Project Zero onthuld. Het team bestaat uit hackers en talentvolle beveiligingsonderzoekers.
quote:
'Mensen moeten internet zonder angst kunnen gebruiken', zegt Chris Evans van het team. 'Niemand hoort bang te zijn dat criminelen of overheden via bugs in software informatie stelen of de computer overnemen.'
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 16 juli 2014 @ 17:35:01 #47
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142368278
quote:
UN: Nations hide rise in private digital snooping

GENEVA — Governments on every continent are hiding an increasing reliance on private companies to snoop on citizens’ digital lives, the U.N. human rights office said Wednesday.

Stepping into a fierce debate over digital privacy rights, the U.N. office says it has strong evidence of a growing complicity among private companies in government spying. It says governments around the world are using both the law and covert methods to access private content and metadata.

U.N. High Commissioner for Human Rights Navi Pillay said the lack of transparency and tactics extend to governments’ ”de facto coercion of companies to gain broad access to information and data on citizens without them knowing.”

Her office’s report to the U.N. General Assembly says concerns about the erosion in privacy have increased since last year’s revelations of U.S. and British mass surveillance. The report said stricter laws are needed to prevent violations and ensure accountability when digital technology and surveillance is misused. It warned that mass surveillance is becoming “a dangerous habit rather than an exceptional measure.”

By law, Pillay said, governments must demonstrate the interference isn’t arbitrary or illegal.

“Secret rules and secret interpretations — even secret judicial interpretations — of law do not have the necessary qualities of ‘law,’” the report says. “Any capture of communications data is potentially an interference with privacy.”

The report comes as American technology companies’ reputations suffer from the perception they can’t protect customer data from U.S. spy agencies. The German government said last month it is ending a contract with Verizon over security concerns.

But U.S. officials say European and other foreign intelligence agencies also routinely demand cooperation from their national companies.

“All countries should immediately start to review their digital surveillance practices and bring them in line with international rights standards,” Human Rights Watch researcher Cynthia Wong said.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 16 juli 2014 @ 18:49:02 #48
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142370463
quote:
Edward Snowden should not face trial, says UN human rights commissioner

Navi Pillay says of former NSA contractor: 'those who disclose human rights violations should be protected'

The United Nations's top human rights official has suggested that the United States should abandon its efforts to prosecute Edward Snowden, saying his revelations of massive state surveillance had been in the public interest.

The UN high commissioner for human rights, Navi Pillay, credited Snowden, a former US National Security Agency contractor, with starting a global debate that has led to calls for the curtailing of state powers to snoop on citizens online and store their data.

"Those who disclose human rights violations should be protected: we need them," Pillay told a news conference.

"I see some of it here in the case of Snowden, because his revelations go to the core of what we are saying about the need for transparency, the need for consultation," she said. "We owe a great deal to him for revealing this kind of information."

The United States has filed espionage charges against Snowden, charging him with theft of government property, unauthorised communication of national defence information and wilful communication of classified communications intelligence to an unauthorised person.

Pillay declined to say whether President Barack Obama should pardon Snowden, saying he had not yet been convicted. "As a former judge I know that if he is facing judicial proceedings we should wait for that outcome," she said. But she added that Snowden should be seen as a human rights defender.

"I am raising right here some very important arguments that could be raised on his behalf so that these criminal proceedings are averted," she said.

Pillay was speaking after issuing a report on government surveillance, The Right to Privacy in the Digital Age (pdf), which says governments must accept stronger checks on their data surveillance powers and companies must do more to stand up to the state's demands for data.

Revelations of mass US surveillance based on documents leaked by Snowden sparked outrage among American allies including Germany, Brazil and Mexico. He has sought asylum in Russia.

The leaked documents revealed massive programmes run by the NSA that gathered information on emails, phone calls and internet use by hundreds of millions of Americans.

Mona Rishmawi, head of the rule of law branch of Pillay's office, said: "In this particular case, the way we see the situation of Snowden is he really revealed information which is very, very important for human rights. We would like this to be taken into account in assessing his situation."

All branches of government must be involved in the oversight of surveillance programmes, and completely independent civilian institutions must also monitor surveillance, Pillay says in her report. Checks on government must also be clearly understandable by the public.

The report, which will be debated at the UN general assembly later this year, says any collection of communications data or metadata is potentially a breach of privacy.

Governments often force internet and telecoms firms to store metadata about their customers, which was neither necessary nor proportionate, Pillay said, adding that companies should always be ready to challenge government requests.

"This can mean interpreting government demands as narrowly as possible or seeking clarification from a government with regard to the scope and legal foundation for the demand; requiring a court order before meeting government requests for data; and communicating transparently with users about risks and compliance with government demands," she told reporters.

She added: "I would say there are serious questions over the extent to which consumers are truly aware of what data they are sharing, how, and with whom, and to what use they will be put.

"And for how long is this data going to be out there? I would say that the same rights that people have offline must be protected online."

An emergency data collection law being rushed through the British parliament may not address concerns raised by the European court of justice and is difficult to justify, Pillay said.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 18 juli 2014 @ 17:34:40 #49
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142450350
quote:
Journalists will face jail over spy leaks under new security laws

George Brandis's new spying laws will include measure to criminalise media reporting of Snowden-style leaks


Australian journalists could face prosecution and jail for reporting Snowden-style revelations about certain spy operations, in an “outrageous” expansion of the government’s national security powers, leading criminal lawyers have warned.

A bill presented to parliament on Wednesday by the attorney general, George Brandis, would expand the powers of the Australian Security Intelligence Organisation (Asio), including creation of a new offence punishable by five years in jail for “any person” who disclosed information relating to “special intelligence operations”.

The person would be liable for a 10-year term if the disclosure would “endanger the health or safety of any person or prejudice the effective conduct of a special intelligence operation”.

Special intelligence operations are a new type of operation in which intelligence officers receive immunity from liability or prosecution where they may need to engage in conduct that would be otherwise unlawful.

The bill also creates new offences that only apply to current and former intelligence operatives and contractors in a move which appeared to directly address the risk of documentary disclosures being made following revelations by the US National Security Agency whistleblower Edward Snowden – whom Brandis has previously labelled a “traitor”.

On Thursday Brandis dismissed suggestions he was specifically going after journalists who reported information.

"No we're not and I think there has been a little bit of erroneous commentary on that provision," Brandis told the ABC.

"It's designed to plug a gap in the existing legislation. Under the existing legislation it's a criminal offence for an officer of a national security agency to disclose intelligence material to a third party, but it's not an offence for an officer to copy or wrongfully remove that material.

"In other words, communication with a third party is an element of the current offence but it seems to us that it should be wrong and it should be an offence to illicitly remove intelligence material from an agency. That's all that's about."

But the leading criminal barrister and Australian Lawyers Alliance spokesman Greg Barns said a separate provision in the “troubling” legislation could be used to prosecute and jail journalists who reported on information they received about special intelligence operations.

The offences relating to the unauthorised disclosure of information are outlined in section 35P of the national security legislation amendment bill, which was presented to the Senate on Wednesday and is set to face parliamentary debate after the winter recess.

The explanatory memorandum to the bill said the offence applied to “disclosures by any person, including participants in an SIO [special intelligence operation], other persons to whom information about an SIO has been communicated in an official capacity, and persons who are the recipients of an unauthorised disclosure of information, should they engage in any subsequent disclosure”.

Barns said: “I thought the Snowden clause [in the bill] was bad enough but this takes the Snowden clause and makes it a Snowden/Assange/Guardian/New York Times clause.”

“It’s an unprecedented clause which would capture the likes of Wikileaks, the Guardian, the New York Times, and any other media organisation that reports on such material.”

Barns, who has worked on terrorism cases and has also advised Wikileaks, said Asio could secretly declare many future cases to be special intelligence operations. This would trigger the option to prosecute journalists who subsequently discover and report on aspects of those operations.

He said it would be easy for Asio to declare special intelligence operations because it simply required the security director-general or deputy director-general to approve.

“Their own boss says, ‘I think we better call this a special intelligence operation, don’t you?’ ‘Yes, sir,’ close it down. The more you talk about it the more outrageous it becomes,” Barns said.

Barns said operations in which Asio officers broke laws were the very ones that the community may regard as abuses of power. He argued Brandis wanted powers not available to governments in the UK and the US where citizens enjoyed greater protections for freedom of speech.

“In Australia we lack that fundamental human rights protection and therefore Brandis can get away with inserting a clause into a bill which you wouldn’t be able to do in the UK or in the US,” Barns said.

“It’s the sort of clause you’d expect to see in Russia or in China and in other authoritarian states but you don’t expect to see it in a democracy. I hope the Senate rejects it because it takes the law further than in jurisdictions which are similar to Australia.”

Leading criminal law barrister Shane Prince said the new offences relating to special operations were “quite draconian”.

“The five-year offence would seem to be able to apply even if the person had no idea about the special intelligence operation and they happened to release information which coincidentally was part of or related to the special intelligence operation,” he said.

“Add on to that the fact you probably in a trial wouldn’t be able to know what the special intelligence operation was about, would mean that you could have the situation where a person could be on trial for disclosing information which they say is related to a special intelligence operation, even if the person didn’t know that the information related to a special intelligence operation and they would never get to know in their trial.”

The Greens senator Scott Ludlam said the new offence could criminalise the actions of journalists. “I can’t see anything that conditions it or carves out any public interest disclosures. I can’t see anything that would protect journalists,” he said.

Electronic Frontiers Australia chief executive Jon Lawrence said the clause covering security personnel “appears to be a clear attempt to stamp down on whistleblowers to avoid an Australian Ed Snowden.

“The fact that they’re making that illegal doesn’t necessarily stop a whistleblower though I think in the general context of what is a pretty extreme crackdown on whistleblowers generally.”

The amendments would explicitly bring private contractors under the definition of intelligence operatives to make them subject to prosecution, and include any person “performing functions or services for the organisations in accordance with a contract, agreement or other arrangement”.

The new penalties criminalise copying, transcribing, retaining or recording intelligence material in any way, and carry a maximum penalty of three years. Evidence of disclosure is not required for these penalties.

Brandis said this measure filled a gap in existing legislation whereby it was not unlawful for an officer of Asio to illicitly copy or remove material from Asio. He said it was already an offence for officers to disclose confidential information to a third party, punishable by up to two years in jail, and that penalty would increase to 10 years.

The president of the NSW Council for Civil Liberties, Stephen Blanks, said the penalties raised serious concerns.

“When things go awry total secrecy is not desirable. When something is seriously awry whistleblowers play a vital role in the provision of good governance. The recent case relating to East Timor has thrown some light on this balance in Australia.”

The bill is the first element of the government’s planned national security reforms, with further changes set to target the risk posed by Australians who fight in Syria and Iraq and then return home.

Independent MP Andrew Wilkie, a former intelligence analyst, said on Wednesday it was important for intelligence officers to be able to make public interest disclosures. Australia’s whistleblower legislation leaves a narrow window for disclosure of intelligence information.

“It must be accompanied by protection for intelligence officials who copy and disseminate material in the public interest,” Wilkie said.

Brandis referred the bill to the parliamentary joint committee on intelligence and security for a report by September, when MPs are set to debate the law.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 18 juli 2014 @ 22:38:22 #50
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142461034
quote:
The Trans-Pacific Partnership Will Make NSA Spying Easier

With paranoia over NSA surveillance reaching a fever pitch, foreign governments are making a reasonable plea: bring our data home.

But the Americans are doing their best to ensure that the world’s Internet data stays on U.S. soil, well within the reach of their spies.

To do so, American negotiators are leveraging trade deals with much of the developed world, inserting language to ensure “cross-border data flows”—a euphemism that actually means they want to inhibit foreign governments from keeping data hosted domestically.

The trade deals they’re influencing—the Trans-Atlantic Partnership (TPP), the Trade in Services Agreement (TiSA), and the Transatlantic Trade and Investment Partnership (TTIP)—are all so secretive that nobody but the governments themselves are privy to the details.

But thanks to the Australians and Wikileaks, both of whom have leaked details on TPP, we have a pretty good idea of what’s going on in the latest Trans-Pacific Partnership—a trade agreement that will act as a sort of NAFTA for Asia-Pacific region nations.

America is, essentially, the world’s data server. Since the dawn of the internet itself, every database of import has been hosted in the grand US of A. But now, foreign governments are starting to see the benefit of patriating their citizens’ private information.

Canada was an early adopter of the idea. Federal procurement regulations often require government departments to insert local data requirements, stating that businesses who wish to administer or host Canadians’ information must keep the information within Canadian borders. Most recently, the Canadian Government put out a tender for a company to merge and host the email servers for all their departments. In doing so, they stuck in a national security exemption, forbidding foreign contractors from applying.

Nova Scotia and British Columbia went a step further, flatly requiring any government-hosted personal data to be physically located in Canada.

Australia has taken similar steps, including setting up firm requirements for how companies store offshore data.

But the American government is not having any of it and is using TPP negotiations to strong-arm new provisions that favour American hosted data.

“In today’s information-based economy, particularly where a broad range of services are moving to ‘cloud’ based delivery where U.S. firms are market leaders; this law hinders U.S. exports of a wide array of products and services,” reads a report on Canada from the office of the United States trade commissioner.

The only reason the world is aware of the provisions in TPP on data hosting, is because the Australian negotiators, facing American insistence on the matter, leaked it to the press. Along with the New Zealanders, the Aussies are proposing changes to the agreement to short-circuit America’s proposal.

The TPP negotiations are top-secret, and highly controversial. As VICE reported earlier this month, provisions of the agreement could force American anti-piracy provisions onto the signatory countries.

“We know there is an e-commerce chapter and the general understanding is that the U.S. is pressing for a provision that would bar the ability to require localization of data,” says University of Ottawa professor Michael Geist, who is also the Canada Research Chair in Internet and E-commerce Law. “That has big implications.”

The Americans aren’t even making secret their insistence on the matter. On the American website for the trade deal, it clearly states there’s a priority for the TPP to include: “requirements that support a single, global Internet, including ensuring cross-border data flows, consistent with governments’ legitimate interest in regulating for purposes of privacy protection.”

And they’re not taking their concerns lightly. An Access to Information Request obtained by the B.C. Freedom of Information and Privacy Association shows that the Americans were furious over the Canada email tender barring foreign bidders.

A representative from the U.S. trade office insisted on a meeting with Canadian representatives after the tender went online. They later forwarded angry responses from American industry entities, featuring a list of questions from a technology association:

“Why did Canada feel compelled to issue the blanket [Natural Security Exemption] on May 25, 2012? Who was involved in making this decision to invoke a blanket NSE?…How does Canada justify all of these e-mail, data center, and networking projects as rising to the level of national security?”

What makes the TPP agreement so extreme is that it could allow those corporations to sue governments that don’t respect the data flow provisions. For example, an American cloud server company could sue Canada for slipping in a “Canadians only” provision on the contract tender to merge its email servers.

What is unclear, thanks to the cloak-and-dagger approach that the twelve participating countries are taking on the matter, is if there are any exceptions carved out in the latest draft of the TPP.

Indeed, we don’t even know if the provision is in there at all but, given American determination on the matter, it seems almost certain that it is.

One analyst, working for a think tank monitoring the talks, said that there could be caveats stuck in the eventual agreement allowing for governments to claim national security exemptions. It could also allow sub-national governments—provincial or territorial—to still implement laws requiring local data hosting.

But there’s no indication one way or the other. “It’s undoing privacy laws through the back door,” said the analyst, who was not authorized to comment publicly. “British Columbia and Nova Scotia are in the U.S. Government’s sights.”

Even if it is eventually removed from the TPP agreement, talk is also swirling that the language is included in the TTIP—which is basically the Atlantic equivalent of the Pacific deal, tying in America and much of Europe. It, too, is secretly being negotiated.

For TiSA, there’s no doubt that the data flow provisions have been stuck in. We only know this, again, because of Wikileaks.

“No Party shall take measures that prevent transfers of information or the processing of financial information, including transfers of data by electronic means, into and out of its territory,” reads language in the agreement, which only affects certain financial transactions.

Ultimately, keeping data within reach of the NSA puts it under the jurisdiction of the secretive United States Foreign Intelligence Surveillance Courts—spoken in hushed tones among privacy activists as the all-powerful FISA courts that hand over blank cheques to the American spies for warrants and the like.

“It means that the NSA has a more direct line and fewer restrictions,” says Tamir Israel, lawyer at the Canadian Internet Policy & Public Interest Clinic. “If the server is in Canada, and I’m in Canada, it’s going to be harder for them to get.”

Practically, Israel points out, the NSA will have an easier time of installing physical signals interception hardware or software. Because, functionally, the server is closer and more accessible.

“The practical matters are what’s important, because the legal barriers mean nothing,” he says. “It’s a lot harder for them to set up a wire tapping machine in Canada.”

The second is that, for countries with limits on how their own intelligence agencies can operate, offshoring the data is an open invitation to perform bulk collection programs. For Canadian spy shop CSEC, it’s an easy side-step of the legal limits on their ability to snoop Canadians on home turf.

The Canadians, Israel points out, “can assume that it’s foreign because it’s transiting the border.”

Bill Robinson, a keen watcher of CSEC who runs the blog Lux Ex Umbra (“Light From Darkness,” in case you’re not fluent in Latin) has a similar theory on the cross-national sharing of data.

“When a Canadian is dealing with Google or Yahoo in the United States, is that considered communicating with a foreigner?” he said. “We don’t really know where the line is drawn, in that respect.”

Given that uncertainty, the sort of data that could be captured by both domestic surveillance programs and the NSA’s “bulk trolling,” as Robinson puts it, is limited only by your paranoia.

Police reports, emails, phone calls, health records, tax information, credit card details, and much more. Admittedly, some of this data is already susceptible, considering that America does host much of the world’s private data already.

Government data, however, is the real problem. And, as countries look to update their hardware, opting for the cheaper and more efficient option of cloud servers rather than sticking servers in their basement—the issue will be hugely important.

If a government agency tenders a cloud server contract, and it is awarded to an American company, there’s no turning back. While the NSA might be a big winner from these changes, it’s not the spies that are driving these changes.

The language of TiSA, especially the language around cross-border data flows, was “a bunch of companies’ wish list that they gave a government and the government said ‘let’s do it,’” says Israel.

TPP is much of the same. It basically awards American companies the luxury of pushing out smaller, local, cloud companies that offer governments and citizens a piece of mind, while making sure that the mega Yankee server farms are never required to set foot outside of Iowa.

But the language around allowing the free flow of data across borders is a bit of a straw-man argument, says Israel.

“Data can already flow freely across borders. That’s the point of the internet,” he says. The real question is whether countries should be able to put up trade barriers in order to leverage their citizens’ privacy.

“A ‘digital economy’ can only truly flourish without restrictive legislative boundaries,” says Robert Hart, CEO of the Canadian Cloud Council, which represents Canuck server companies.

“Canadian data centre companies have a unique opportunity to go to market with ‘data-safe’ cloud computing services, but how long will this opportunity truly remain?” said Hart.

Hart does believe there is cause for concern over language in the TPP. “A ban on such requirements could potentially place Canadian data at risk and run counter to the government’s own policies on the storage of its email data,” he says.

But, at the end of the day, governments might not care. Some, in fact, might relish the ability to dispatch their domestic spies to snoop their citizens’ foreign-hosted data.

“Maybe they’re using it as a way of policy laundering,” says Israel.

Problem is: we have no clue. The meetings may as well be held 20,000 leagues under the sea.

“The government has been so secretive with the text on these treaties that, by the time you provide input on any of these things, things may have already moved, or it’s too late: because there’s already a deal in place,” says Geist.

The last round of TPP negotiations, which just wrapped up in Ottawa, could be finalized at any time. Geist figures Prime Minister Stephen Harper would readily jettison privacy concerns if it means securing new markets for Canadian goods.

“We’re talking about a government that hasn’t been particularly sympathetic to a lot of privacy concerns, at least not lately, so the notion that somehow this would stand in the way of the deal strikes many as incredibly unlikely,” says Geist.

In the end, he’s not optimistic privacy concerns will outweigh economic benefit, especially with a ruling party championing the economy and the signing of several other monumental trade deals.

In other words, look out Canada, here comes the TPP.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 20 juli 2014 @ 14:39:28 #51
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142512646
quote:
quote:
It was just a week ago that Techdirt warned about a new "Snooper's Charter" that would be rammed through the British Parliament in record time. As feared, that has happened, and the Data Retention and Investigatory Powers Bill -- DRIP to its friends -- has received the Royal Assent and is now law in the UK. That's the bad news; the good news is that the fight back has already begun. Today, the UK's Open Rights Group (ORG) announced that it would be challenging DRIP in the courts:
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
pi_142515087
Het is een hele lap i.i.g. :s)
  zondag 20 juli 2014 @ 23:20:25 #53
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142534963
Ah! Glenn Greenwald is een terrorist! :o

quote:
Snowden Mouthpiece Greenwald Shills For Islamist Terror Targets

War On Terror: It's now clear that ex-NSA contractor Ed Snowden and his journalist sidekick Glenn Greenwald have an agenda beyond exposing spying abuses. They're really aiding and abetting the Islamist enemy.

By releasing the names of several Muslim terrorist targets under surveillance by the NSA and FBI in a new expose — "Under Surveillance: Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On" — Snowden and his mouthpiece Greenwald have tipped off the enemy and jeopardized major counterterror investigations.

They make it seem as if the five American Muslim leaders they found listed in NSA and FBI surveillance records were victims of anti-Muslim prejudice, while glossing over the raft of counterterror evidence against them. In fact, the government has court-approved cause to spy on them.

One of the FBI's terrorist targets — a subject of a FISA court warrant — is the executive director of the Council on American-Islamic Relations in Washington, a group Greenwald describes as a harmless "civil-rights organization," though the FBI has called it a "Hamas front" and the Justice Department has implicated it in a plot to raise millions for Palestinian terrorists.

A federal judge OK'd warrants to read CAIR chief Nihad Awad's email accounts. The FBI showed Awad may be engaged in "certain criminal activity on behalf of a foreign power." No wonder the agency cut off ties to CAIR and its Palestinian leader.

Greenwald has pocketed thousands of dollars speaking at CAIR fundraising banquets.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 21 juli 2014 @ 19:22:45 #54
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142565861
quote:
Snowden: Dropbox is an NSA surveillance target, use Spideroak instead

A remarkable moment from last night's remarkable Snowden video from the Guardian.

In a discussion (around the 7:40 mark) of zero-knowledge systems whose operators can't spy on you even if they want to, Snowden reminds us that Dropbox is an NSA surveillance target cited in the original Prism leaks, and that the company has since added Condoleeza Rice, "probably the most anti-privacy official we can imagine," to its Board of Directors.

He contrasts Dropbox with its competitor, Spideroak, whose system is structured so that it can't betray you, even if Condi Rice wanted it to.

Edward Snowden: 'If I end up in chains in Guantánamo I can live with that' - video interview [The Guardian]
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 22 juli 2014 @ 18:25:11 #55
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142604623
quote:
Lawyers blocked our Black hat demo on de-anonymising Tor

Shelved Black Hat presentation would have explained why you don't have to be the NSA to break Tor

The Tor network promises online privacy by routing users' internet traffic through a number of servers – or layers – while encrypting data.

The surveillance whistleblower Edward Snowden is known to have used Tor to maintain his privacy, while the documents he leaked showed that the US National Security Agency (NSA) struggled to uncover identities of those on the network.

However, a presentation promising to detail flaws in the anonymising network has been cancelled, organisers of a major hacker conference have confirmed.

The talk, called "You don't have to be the NSA to break Tor: de-anonymising users on a budget", was due to be delivered by the Carnegie Mellon researchers Alexander Volynkin and Michael McCord, but a notice on the Black Hat conference website said lawyers from the university had stepped in.

The counsel for Carnegie Mellon said that neither the university nor its Software Engineering Institute (SEI), had given approval for public disclosure of the material set to be detailed by Volynkin and McCord, according to the Black Hat organisers.

Their talk was one of the most anticipated sessions at this year’s conference, which starts on 2 August in Las Vegas. They promised to explain how anyone with $3,000 could de-anonymise users of Tor.

Details on the presentation, which have now been removed from the Black Hat site, suggested that a determined hacker could “de-anonymise hundreds of thousands Tor clients and thousands of hidden services within a couple of months”.

Besides individual users, there are numerous criminal websites making use of Tor, including sites offering hitman services and illegal drugs, even though the most prominent example, Silk Road, was shut down in 2013.

Organisers from the Tor Project said they were working with the Computer Emergency Response Team (CERT) at Carnegie Mellon, which is sponsored by the US Department of Homeland Security, to release information on the problems identified by the researchers.

“We did not ask Black Hat or CERT to cancel the talk. We did (and still do) have questions for the presenter and for CERT about some aspects of the research, but we had no idea the talk would be pulled before the announcement was made,” said Tor Project president Roger Dingledine.

“We never received slides or any description of what would be presented in the talk itself beyond what was available on the Black Hat webpage. Researchers who have told us about bugs in the past have found us pretty helpful in fixing issues, and generally positive to work with.”

Carnegie Mellon had not responded to a request for comment by the Guardian at the time of publication.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 23 juli 2014 @ 14:22:05 #56
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142636608
quote:
quote:
De Nederlandse geheime diensten AIVD en MIVD mogen telecommunicatie uitwisselen met de Amerikaanse veiligheidsdienst NSA. Dat kan door de de beugel, besloot de rechtbank in Den Haag vandaag in de zaak die was aangespannen door de gelegenheidscoalitie Burgers tegen Plasterk.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 25 juli 2014 @ 20:12:19 #57
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142728700
quote:
Russia offers 3.9m roubles for 'research to identify users of Tor'

Analysts say tender for research on service that anonymises browsing sends signal to online community amid crackdown on Russian internet

Russia's interior ministry has offered up to 3.9m roubles (£65,000) for research on identifying the users of the anonymous browsing network Tor, raising questions of online freedom amid a broader crackdown on the Russian internet.

The interior ministry's special technology and communications group published a tender earlier this month on the government procurement website offering the sum for "research work, Tor cipher".

Before changes to the tender were published on Friday, numerous news outlets reported that it originally sought "research work on the possibility to obtain technical information about users (user equipment) of the anonymous network Tor".

According to Andrei Soldatov, an expert on surveillance and security services, the interior ministry might be exploring possible ways to restrict Tor. But the fact that the tender was publicly announced meant that those seeking greater government control of the internet had defined their next target and were sending "yet another signal" to the online community, he argued.

"It's not important if the Russian government is able to block Tor or not," Soldatov said. "The importance is that they're sending signals that they are watching this. People will start to be more cautious."

The interior ministry refused to comment on Friday afternoon.

Originally developed by the US Naval Research Laboratory as an "onion routing project", Tor is a network of virtual tunnels that allows users to hide the source and destination of their internet browsing and keeps websites from tracking them. It is often used by whistleblowers and residents of countries where the authorities restrict access to the internet, but has also been known to be used for criminal activity. A famous example was the Tor-based online market Silk Road, which was known as an "eBay for drugs" before the FBI shut it down in 2013.

Although many news outlets reported on the recent tender as a reward for "cracking Tor", internet security experts doubted Tor could be successfully decrypted, let alone for a mere 3.9m roubles.

Of all countries, the fifth largest contingent of Tor users come from Russia, where the network's popularity more than doubled in June, going from about 80,000 directly connecting users to more than 210,000. The growth followed a "bloggers law" – signed by the president, Vladimir Putin, in May – requiring any site with more than 3,000 visitors daily to register with the government. Media experts argued that the legislation would stifle opposition voices and restrict government criticism on the internet.

The move was part of a wider campaign to regulate the internet which saw the authorities block three major opposition news sites as well as the blog of anti-corruption crusader Alexei Navalny in March. Users located in Russia can now only access the news sites through anonymising services such as Tor.

This week, Putin signed a law requiring internet companies to store Russian user data in-country, where intelligence services enjoy sweeping access to electronic information through telecoms companies. Critics worry that websites such as Facebook and Twitter, which the opposition used to organise a string of huge rallies in 2011-2013, would be forced to stop operating in Russia when it comes into effect in 2016.

Unlike the Chinese system of internet censorship, which directly blocks websites such as Google, the Russian one is built on intimidation so that users "themselves become more cautious, and internet companies think up ways to block certain sites," Soldatov said.

But blogger, journalist and web entrepreneur Anton Nosik doubted that the Tor research tender would have any effect, arguing that the interior ministry was not a serious player among the various government agencies surveilling the internet but was now "trying to make a name for itself".

"The only significance [of the tender] is the money being paid and the PR surrounding it, showing that the ministry of interior is seriously working on issues of anonymising technology, so that everybody's talking about it. And everybody is talking about it," Nosik said.

More worrying, Nosik said, was leading communications provider Rostelecom's investment in Deep Packet Inspection technology that would filter web traffic based on its content rather than its source. This would severely reduce users' anonymity on the web, although Tor should be able to somewhat limit DPI capabilities, Nosik said.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
pi_142768456
As the officer took her away, she recalled that she asked,
"Why do you push us around?"
And she remembered him saying,
"I don't know, but the law's the law, and you're under arrest."
  donderdag 31 juli 2014 @ 22:02:35 #59
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_142936350
Oh ja, de CIA en dat rapport over martelen:

quote:
CIA admits to spying on Senate staffers

John Brennan issues apology after acknowledging that agency spied on Senate intelligence committee’s staff members
quote:
The director of the Central Intelligence Agency, John Brennan, issued an extraordinary apology to leaders of the US Senate intelligence committee on Thursday, conceding that the agency employees spied on committee staff and reversing months of furious and public denials.

Brennan acknowledged that an internal investigation had found agency security personnel transgressed a firewall set up on a CIA network, which allowed Senate committee investigators to review agency documents for their landmark inquiry into CIA torture.

The admission brings Brennan’s already rocky tenure at the head of the CIA under renewed question. One senator on the panel said he had lost confidence in the director, although the White House indicated its support for a man who has been one of Barack Obama’s most trusted security aides.

CIA spokesman Dean Boyd acknowledged that agency staff had improperly monitored the computers of committee staff members, who were using a network the agency had set up, called RDINet. “Some CIA employees acted in a manner inconsistent with the common understanding reached between [the committee] and the CIA in 2009 regarding access to the RDINet,” he said.

Asked if Brennan had or would offer his resignation, a different CIA spokesman, Ryan Trapani, replied: “No.”

In March, the committee chairwoman, Senator Dianne Feinstein of California, accused the agency of violating constitutional boundaries by spying on the Senate.

Feinstein said the vindication, from CIA inspector general David Buckley, and Brennan’s apology were “positive first steps,” suggesting that the director had further work to do before she would consider the matter closed.

She stopped short of calling for Brennan’s resignation, and said she expected a prompt declassification of Buckley’s findings. But her fellow committee member Mark Udall, a Colorado Democrat, called Brennan’s future into question.

“From the unprecedented hacking of congressional staff computers and continued leaks undermining the Senate intelligence committee’s investigation of the CIA’s detention and interrogation program to his abject failure to acknowledge any wrongdoing by the agency, I have lost confidence in John Brennan,” Udall said.

“I also believe the administration should appoint an independent counsel to look into what I believe could be the violation of multiple provisions of the Constitution as well as federal criminal statutes and executive order 12333,” he added, referring to a Reagan-era presidential directive defining the roles of the intelligence agencies.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 3 augustus 2014 @ 12:41:52 #60
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_143012572
quote:
Vertrouweling Snowden weigert medewerking aan spionageonderzoek

Snowden-vertrouweling en journalist Glenn Greenwald weigert mee te werken aan een Duits parlementair onderzoek naar de spionagepraktijken van de Amerikaanse geheime dienst NSA. Als de parlementariërs niet met 'kroongetuige' Edward Snowden praten, dan ook niet met hem.

Eerder besloten de Duitse parlementariërs Snowden niet uit te nodigen om de Verenigde Staten niet voor het hoofd te stoten. Volgens Greenwald betekent dit dat ze de relatie met Amerika boven hun eigen onderzoek stellen. 'Ik ben niet bereid om aan een vertoning mee te werken die de schijn van een oprecht onderzoek moet wekken,' zei Greenwald.

Greenwald zegt dat een 'serieus onderzoek' vermeden wordt. 'Het gaat puur om de symboliek', schrijft hij in een e-mail aan de Bondsdag.
De journalist zei in april nog bereid zijn voor het Duitse parlement te getuigen. Eerder deed hij dat al voor het Amerikaanse Congres, de Braziliaanse Senaat en het Europees Parlement. Greenwald pleitte ook meteen voor een Duitse verblijfsvergunning voor Snowden, die al ruim een jaar in Rusland zit.

Afgelopen donderdag om middernacht verliep Snowdens Russische verblijfsvergunning. Zijn aanvraag voor verlenging is tot dusverre niet goedgekeurd.

Partijen oneens over getuigenis Snowden
De Duitse parlementsleden willen onderzoek doen naar de afluisterpraktijken die vorig jaar door Snowden onthuld werden. Klokkenluider Snowden en journalist Greenwald brachten vorige zomer samen de NSA-documenten naar buiten, die voor enkele maanden de wereld in hun greep hielden.

In het Duitse parlement lagen verschillende partijen overhoop over de mogelijke getuigenis van Snowden. De linkse oppositiepartijen, die herhaaldelijk de getuigenis van de klokkenluider bepleitten, trokken aan het kortste eind. Snowden heeft na deze lange strijd gezegd voorlopig niet aan een onderzoek mee te willen werken.

Na de kroongetuige valt nu met Greenwald een tweede belangrijke getuige voor het Duitse onderzoek weg. Maar de lijst houdt hiermee niet op. Nog zo'n honderd experts en getuigen zullen voor het onderzoek worden ondervraagd.

De CEO's Mark Zuckerberg van Facebook, Eric Schmidt van Google, Tim Cook van Apple en Dick Costolo van Twitter zijn daar ook bij.

Mocht het Duitse parlement toch moedig genoeg zijn om Snowden te ondervragen, dan is hij alsnog bereid mee te werken, liet de onderzoeksjournalist weten.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 3 augustus 2014 @ 13:01:58 #61
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_143013089
quote:
"Kerry afgeluisterd door Mossad"

De Israëlische geheime dienst heeft vorig jaar telefoontjes van de Amerikaanse minister Kerry afgeluisterd. Dat schrijft het Duitse weekblad Der Spiegel, dat zich baseert op bronnen bij verscheidene westerse geheime diensten.

Kerry bemiddelde vorig jaar tussen Israël en de Palestijnen. Hij nodigde vertegenwoordigers van beide landen uit naar Washington en vloog zelf meerdere keren naar het Midden-Oosten om gesprekken te voeren. Dat deed hij volgens Der Spiegel niet altijd in beveiligde ruimtes of via speciale telefoonlijnen. Telefoontjes met gewone mobiele telefoons kon de Mossad moeiteloos onderscheppen.

Meer afluisteraars

Volgens het weekblad heeft zeker één andere geheime dienst ook meegeluisterd. Welke dat is, wordt niet vermeld.

Israël zou de onderschepte informatie hebben gebruikt bij de onderhandelingen, die dit voorjaar strandden. Kerry schetste daarna een buitengewoon somber beeld van het vredesproces.

Gazastrook

Een oplossing van het conflict tussen Israël en de Palestijnen lijkt verder weg dan ooit, nu in de Gazastrook een grondoorlog woedt. De afgelopen weken kwamen volgens Palestijnse autoriteiten meer dan 1700 inwoners van Gaza om het leven bij aanvallen en bombardementen. Aan Israëlische zijde vielen tot nu toe 67 slachtoffers.
Zal Amerika nu Israël gaan boycotten?
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 4 augustus 2014 @ 12:18:29 #62
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_143047742
quote:
Klokkenluiders negatief over gevolgen melding

Werknemers bij de overheid en in het bedrijfsleven ervaren vaak negatieve gevolgen van het melden van strafbare feiten en andere misstanden op het werk.

In een uitgebreide evaluatie van allerhande klokkenluidersregelingen constateert onderzoeksbureau Berenschot dat 32 procent van de klokkenluiders de persoonlijke gevolgen als negatief beoordeelt. Misstanden worden in circa de helft van de gevallen niet aangepakt of opgelost.

Slechts een vijfde van de klokkenluiders zegt positieve ervaringen te hebben met het melden van misstanden, blijkt uit het maandag verschenen rapport 'Veilig misstanden melden op het werk', gemaakt in opdracht van het ministerie van Binnenlandse Zaken.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 4 augustus 2014 @ 14:38:24 #63
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_143051994
quote:
Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack

The U.S. government has long lavished overwhelming aid on Israel, providing cash, weapons and surveillance technology that play a crucial role in Israel’s attacks on its neighbors. But top secret documents provided by NSA whistleblower Edward Snowden shed substantial new light on how the U.S. and its partners directly enable Israel’s military assaults – such as the one on Gaza.

Over the last decade, the NSA has significantly increased the surveillance assistance it provides to its Israeli counterpart, the Israeli SIGINT National Unit (ISNU; also known as Unit 8200), including data used to monitor and target Palestinians. In many cases, the NSA and ISNU work cooperatively with the British and Canadian spy agencies, the GCHQ and CSEC.

The relationship has, on at least one occasion, entailed the covert payment of a large amount of cash to Israeli operatives. Beyond their own surveillance programs, the American and British surveillance agencies rely on U.S.-supported Arab regimes, including the Jordanian monarchy and even the Palestinian Authority Security Forces, to provide vital spying services regarding Palestinian targets.

The new documents underscore the indispensable, direct involvement of the U.S. government and its key allies in Israeli aggression against its neighbors. That covert support is squarely at odds with the posture of helpless detachment typically adopted by Obama officials and their supporters.

President Obama, in his press conference on Friday, said ”it is heartbreaking to see what’s happening there,” referring to the weeks of civilian deaths in Gaza – “as if he’s just a bystander, watching it all unfold,” observed Brooklyn College Professor Corey Robin. Robin added: ”Obama talks about Gaza as if it were a natural disaster, an uncontrollable biological event.”

Each time Israel attacks Gaza and massacres its trapped civilian population – at the end of 2008, in the fall of 2012, and now again this past month – the same process repeats itself in both U.S. media and government circles: the U.S. government feeds Israel the weapons it uses and steadfastly defends its aggression both publicly and at the U.N.; the U.S. Congress unanimously enacts one resolution after the next to support and enable Israel; and then American media figures pretend that the Israeli attack has nothing to do with their country, that it’s just some sort of unfortunately intractable, distant conflict between two equally intransigent foreign parties in response to which all decent Americans helplessly throw up their hands as though they bear no responsibility.

“The United States has been trying to broker peace in the Middle East for the past 20 years,” wrote the liberal commentator Kevin Drum in Mother Jones, last Tuesday. The following day, CNN reported that the Obama administration ”agreed to Israel’s request to resupply it with several types of ammunition … Among the items being bought are 120mm mortar rounds and 40mm ammunition for grenade launchers.”

The new Snowden documents illustrate a crucial fact: Israeli aggression would be impossible without the constant, lavish support and protection of the U.S. government, which is anything but a neutral, peace-brokering party in these attacks. And the relationship between the NSA and its partners on the one hand, and the Israeli spying agency on the other, is at the center of that enabling.

Last September, the Guardian revealed that the NSA “routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens.” The paper published the full top secret Memoranadum of Understanding between the two agencies governing that sharing. But the NSA/ISNU relationship extends far beyond that.

One newly disclosed top secret NSA document, dated April 13, 2013 and published today by the Intercept, recounts that the “NSA maintains a far-reaching technical and analytic relationship with the Israeli SIGINT National Unit (ISNU) sharing information on access, intercept, targeting, language, analysis and reporting.”

Specifically, “this SIGINT relationship has increasingly been the catalyst for a broader intelligence relationship between the United States and Israel.” Moreover, “NSA’s cyber partnerships expanded beyond ISNU to include Israeli Defense Intelligence’s [Special Operation Division] SOD and Mossad.”

Under this expanded cooperation, the Americans and Israelis work together to gain access to “geographic targets [that] include the countries of North Africa, the Middle East, the Persian Gulf, South Asia, and the Islamic republics of the former Soviet Union.” It also includes “a dedicated communications line between NSA and ISNU [that] supports the exchange of raw material, as well as daily analytic and technical correspondence.”

The relationship has provided Israel with ample support for both intelligence and surveillance: “The Israeli side enjoys the benefits of expanded geographic access to world-class NSA cryptanalytic and SIGINT engineering expertise, and also gains controlled access to advanced U.S. technology and equipment via accommodation buys and foreign military sales.” Among Israel’s priorities for the cooperation are what the NSA calls “Palestinian terrorism.”

The cooperation between the NSA and ISNU began decades ago. A top secret agreement between the two agencies from July 1999 recounts that the first formal intelligence-sharing agreement was entered into in 1968 between U.S. President Lyndon Johnson and Israeli Prime Minister Levi Eshkol, and informally began in the 1950s. But the relationship has grown rapidly in the last decade.

In 2003 and 2004, the Israelis were pressuring the NSA to agree to a massively expanded intelligence-sharing relationship called “Gladiator.” As part of that process, Israel wanted the Americans to pay hundreds of millions of dollars to fund Israeli activities. The specific proposed “Gladiator” agreement appears never to have been consummated, derailed by Israeli demands that the U.S. bear the full cost, but documents in the Snowden archive pertaining to those negotiations contain what appear to be two receipts for one or more payments of $500,000 in cash to Israeli officials for unspecified purposes:
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 5 augustus 2014 @ 22:08:35 #64
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_143104302
quote:
'Amerika vreest dat er een nieuwe klokkenluider actief is'

De Amerikaanse regering houdt er rekening mee dat een nieuwe klokkenluider actief is. Dat meldt CNN op basis van regeringsfunctionarissen. De vrees is ontstaan doordat berichten over documenten van het Amerikaanse Antiterrorisme Centrum opdoken op The Intercept, een website van klokkenluiders.

Het gaat om documenten over de groei van opgeslagen informatie over terrorismeverdachten. De documenten daarover dateren van augustus 2013. Dat is na de vlucht van klokkenluider Edward Snowden naar Rusland.

De website The Intercept, waar de de artikelen over de documenten verschenen, is opgezet door voormalig The Guardian-journalist Glenn Greenwald die ook informatie van Snowden wereldkundig maakte.
quote:
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 7 augustus 2014 @ 12:58:13 #65
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_143161027
quote:
Snowden mag nog drie jaar in Rusland blijven

De Amerikaanse klokkenluider Edward Snowden heeft van de Russiche autoriteiten een verblijfsvergunning van 3 jaar gekregen. Dat heeft zijn Russische advocaat vandaag laten weten.

Snowdens politiek asiel liep officieel op 1 augustus af. Hij had gezegd langer in Rusland te willen blijven.

Snowden wordt door de VS gezocht, omdat hij geheimen van de NSA (Nationaal Security Agency) wereldkundig maakte. De enorme omvang van de wereldwijde spionagepraktijken van deze dienst schokte vriend en vijand van Washington.

De voortvluchtige klokkenluider arriveerde 23 juni 2013 vanuit Hongkong op de luchthaven Sjeremetjevo van Moskou. Hij was eigenlijk van plan door te reizen naar Latijns-Amerika. Hij vertoefde enige tijd in de vertrekhal. Pas op 1 augustus 2013 passeerde hij de douane na asiel in Rusland te hebben gekregen.

Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 8 augustus 2014 @ 18:07:20 #67
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_143206592
quote:
Politie gebruikt mogelijk omstreden spionagesoftware

Digitale activisten hebben een Duits-Brits bedrijf gehackt dat geheime spionagesoftware aan overheden en opsporingsautoriteiten verkoopt. De Nederlandse politie lijkt ook tot de klanten te behoren.

Gisteren verscheen op internet een enorme berg aan technische en klanteninformatie van het bedrijf Gamma International. Dat is de maker van FinFisher, een softwareprogramma waarmee computers kunnen worden geïnfecteerd om op afstand bestanden te kopiëren, beeldschermkopieën te maken en toetsaanslagen te registreren. Spionagesoftware dus, die alleen wordt verkocht aan overheden.

De hack is een grote overwinning voor burgerrechtenactivisten. FinFisher werd onder meer door de overheid van Bahrein gebruikt om de computers van dissidenten te bespioneren gedurende de Arabische Lente. Sindsdien liggen het programma en het bedrijf onder vuur. Er wordt onder meer gepleit voor exportregels voor dergelijke software.

Politie mogelijk ook klant
Ook de Nederlandse politie lijkt gebruik te maken van het programma. In de gehackte klantenbestanden werd een versleutelingscode gevonden die toebehoort aan een lid van de Nationale Eenheid, de landelijke politie in Driebergen. De match werd gevonden door de Nederlandse hacker Jurre van Bergen, die zich met andere digitale experts op de geopenbaarde informatie had gestort.

Vervolgens werd duidelijk dat deze klant, waarschijnlijk de Nederlandse politie dus, gebruik maakt van drie van Gamma's softwareprogramma's. De licentie zou lopen van 2012 tot 2015.

In Nederland is het op afstand hacken en overnemen van verdachte computers door de politie niet toegestaan. Er is een nieuwe wet in de maak (Wet Computercriminaliteit III), die daar verandering in moet brengen.

Wob-verzoek
'Het is raar dat de politie die producten nu al in gebruik heeft', zegt Rejo Zenger van digitale burgerrechtenorganisatie Bits of Freedom. 'Bovendien hebben ze dat altijd verzwegen.' Zenger diende in 2012 een Wob-verzoek in om te vragen naar het gebruik van spyware. Toen kreeg hij als antwoord dat er geen documenten over waren gevonden.

Een woordvoerder van het ministerie van Veiligheid en Justitie benadrukt dat het gebruik van spyware onder voorwaarden al is toegestaan. Dan gaat het om de installatie van deze software ter plekke, niet om het van afstand overnemen (en live volgen) van de activiteiten op de computer.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 13 augustus 2014 @ 17:18:32 #68
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_143383787
quote:
Snowden casts doubt on NSA investigation into security disclosures

NSA whistleblower says he left detectable digital traces of his removal of documents which the agency did not pick up on

National Security Agency whistleblower Edward Snowden has called into question the competence of the investigation into the aftermath of his disclosures, which was overseen by the NSA’s new deputy director, Rick Ledgett.

In a new cover story for Wired magazine, the former NSA contractor provided writer James Bamford with previously unreported allegations of NSA cyberattack tools, including a piece of software, codenamed MonsterMind, that would automate a hostile response when it detected a network intrusion. He also alleged that a 2012 incident that took Syria’s internet offline was the fault of the NSA.

Snowden told Bamford, a longtime chronicler of the agency, that he left detectable digital traces of his removal of scores of documents from the technically sophisticated agency, allowing the NSA to know precisely what he did and did not take. Yet making a specific determination of the extent of the data breach has escaped the agency, which has simultaneously made vast and dire claims about the damage Snowden caused.

The head of the NSA’s digital forensics investigation into the Snowden disclosures, considered the most extensive in the agency’s history, was Ledgett, who has since been promoted to deputy director, its most senior civilian position.

Ledgett told CBS’s 60 Minutes in December that he “wouldn’t dispute” that Snowden took with him from the NSA 1.7m documents – although subsequent clarifications by the NSA and its congressional allies indicate that the basis for that figure is the number of documents that Snowden was able to access, not what he actually took.

If Snowden’s allegation is true, it raises questions about the technical expertise and competence of Ledgett’s investigation, which informed months of NSA public pushback against Snowden. It would also call into question assurances, made by Ledgett in a December interview with Reuters and other NSA officials, that the agency has implemented robust post-Snowden technical defenses to forestall another mass breach of classified information.

“I figured they would have a hard time,” Snowden told Bamford in an interview in Moscow, where he received asylum last year after his intended plans for asylum in Latin America were blocked, in part by US government officials.

“I didn’t figure they would be completely incapable.”

Earlier this year, Lt Gen Michael Flynn, then the director of the Defense Intelligence Agency, told Congress that the intelligence community’s understanding of how many documents Snowden took was a blanket assessment, not verified fact.

“We assume that Snowden, everything that he touched, we assume that he took, stole,” Flynn testified in February.

That assessment provided NSA and its allies with a basis for publicly alleging that Snowden had done widespread damage to US intelligence efforts worldwide, endangered US military personnel and prompted terrorist organizations to harden their cyber defenses. It has provided public evidence for none of those assertions, the most dire of which the new director, Admiral Michael Rodgers, has abandoned.

The NSA did not address questions about what Bamford called Snowden’s “digital breadcrumbs”. It provided the Guardian with an omnibus response that did not deny any allegation Snowden made to Bamford.

“If Mr Snowden wants to discuss his activities, that conversation should be held with the US Department of Justice. He needs to return to the United States to face the charges against him,” NSA spokeswoman Vanee Vines said. It is the same response she provided to Bamford for his story.

The piece features dramatic photographs by the acclaimed photographer Platon of Snowden in Moscow, including a cover photo of Snowden gripping an American flag to his face. Another photo, presumably provided by Snowden, shows the future whistleblower in a tuxedo with a smiling Michael Hayden, the former NSA and CIA director who began the constellation of post-9/11 warrantless bulk surveillance programs, the extent of which Snowden exposed.

Snowden also told Bamford about two other previously unknown NSA efforts. Both concern cyberattacks.

The MonsterMind software is a digital tool that would detect the beginnings of a hostile cyber incursion and automates a hostile response. If true, the software would turn a potential act of war into an automated command, without input from the chain of command, and not necessarily target at the culprit of the incursion, as many such digital penetrations are routed through third countries.

It is also unclear whether MonsterMind distinguishes between incursions aimed at data destruction, data exfiltration and network disruption; nor if it automates a proportional response.

As well, Snowden identified the elite NSA hacking unit, called Tailored Access Operations, accidentally cut off Syria’s access to the internet in 2012. The unit allegedly attempted to install an exploit in the hardware of an unnamed service provider that would have provided NSA with mass access to internet usage, communications and patterns in Syria, where a civil war was metastasizing into an Islamist insurgency destabilizing the Middle East.

Instead of gaining mass visibility into the internet habits of Syrians, Snowden alleged, a glitch took Syria offline. On 29 November 2012, the analysis firm Renesys reported that 92% of the routed networks providing internet connectivity for Syria, 77 of them, had gone dark.

Snowden told Bamford that NSA officials joked that if they were discovered, they would blame the outage on Israel.

At the time, the government of dictator Bashar al-Assad, blamed the outage on “terrorists”, while opposition groups fighting Assad suspected his government itself was responsible.

NSA did not respond to questions about Ledgett, MonsterMind or the Syrian outage.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 15 augustus 2014 @ 21:55:42 #69
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_143461284
quote:
'Geheime dienst Duitsland luisterde Hillary Clinton af'

De Duitse geheime dienst BND heeft zeker één telefoongesprek van de de vroegere Amerikaanse minister van Buitenlandse Zaken Hillary Clinton afgeluisterd.

Ook gaf de Duitse overheid opdracht tot het afluisteren van een (niet nader genoemde) NAVO-bondgenoot. Dat blijkt volgens de Duitse krant Süddeutsche Zeitung uit documenten die een voormalig medewerker van de BND aan de Amerikaanse inlichtingendienst CIA heeft gegeven. De spion is in juli gearresteerd.

De Duitse overheid ontkent dat de BND systematisch de VS afluistert. Het bewuste telefoongesprek zou toevallig zijn opgenomen. Clinton was minister van januari 2009 tot en met januari 2013.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 16 augustus 2014 @ 22:40:07 #70
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_143493951
quote:
quote:
Since the early days of TCP, port scanning has been used by computer saboteurs to locate vulnerable systems. In a new set of top secret documents seen by Heise, it is revealed that in 2009, the British spy agency GCHQ made port scans a "standard tool" to be applied against entire nations (Figure 1, see the picture gallery). Twenty-seven countries are listed as targets of the HACIENDA program in the presentation (Figure 2), which comes with a promotional offer: readers desiring to do reconnaissance against another country need simply send an e-mail (Figure 3).
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 17 augustus 2014 @ 00:10:59 #71
134103 gebrokenglas
Half human, half coffee
pi_143497455
Wat een beerput. Heb het idee dat er nog een hele grote onthullende klapper moet komen.
How can I make this topic about me?
  donderdag 21 augustus 2014 @ 06:43:01 #72
313372 Linkse_Boomknuffelaar
Stop de wapenlobby. Vrede!
pi_143655548
BRICS Nations Plan New Internet, Opening Soon


_O_

Die Youssef laat zich niet meer bespioneren en onderneemt actie, terwijl Rutte zich graag anaal laat nemen door Obama en zijn grote NSA-oren. :')
  zondag 24 augustus 2014 @ 00:47:59 #73
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_143760058
quote:
'Duitsland bespioneerde Turkije en Albanië'

De Duitse geheime dienst BND (Bundesnachrichtendienst) bespioneert Turkije al sinds 1976. Dat blijkt uit een publicatie van het Duitse tijdschrift Focus. Tot nu toe was alleen officieel bekend dat Duitsland de collega-lidstaat van de NAVO afluisterde sinds de regering-Schröder, die in 1998 aantrad. Turkije heeft de Duitse ambassadeur op het matje geroepen.

Het Duitse weekblad Der Spiegel onthulde dat ook Albanië op de lijst van afgeluisterde landen staat. Reden daarvoor was onder meer Duitslands belangstelling in de Albanese georganiseerde misdaad. De publicatie komt op een gevoelig moment; op 28 augustus ontmoet bondskanselier Angela Merkel de premier van Albanië, Edi Rama.

Duitsland wordt in toenemende mate hypocrisie verweten nu blijkt dat het zelf ook bondgenoten bespioneert. Eerder ontstond een vertrouwenscrisis met de Verenigde Staten vanwege afluisterpraktijken in Duitsland. Onder meer de telefoon van bondskanselier Angela Merkel werd afgeluisterd.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 25 augustus 2014 @ 13:14:29 #74
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_143810849
quote:
quote:
Among other things here at Linux Format we are also a bit clairvoyant. We decided that it was the right moment to look at 'anonymous' Linux distributions many weeks before mainstream media started discussing PRISM.

Of course, even if nothing like that existed, there would still be many good reasons to protect at least part of what you want or need to do online: the examples go from whistle-blowing to home banking or super-invasive advertising. In all these cases, proper configuration of (at least!) the tools you use for web surfing, email, instant messaging and file sharing is crucial.

Linux 'anonymous' distros are designed to help in just these kinds of situations. As a minimum, these systems are pre-configured to make it easier to surf the web without telling everybody in clear text where, or who, you really are.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 25 augustus 2014 @ 21:49:10 #75
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_143828623
quote:
quote:
The National Security Agency is secretly providing data to nearly two dozen U.S. government agencies with a “Google-like” search engine built to share more than 850 billion records about phone calls, emails, cellphone locations, and internet chats, according to classified documents obtained by The Intercept.

The documents provide the first definitive evidence that the NSA has for years made massive amounts of surveillance data directly accessible to domestic law enforcement agencies. Planning documents for ICREACH, as the search engine is called, cite the Federal Bureau of Investigation and the Drug Enforcement Administration as key participants.

ICREACH contains information on the private communications of foreigners and, it appears, millions of records on American citizens who have not been accused of any wrongdoing. Details about its existence are contained in the archive of materials provided to The Intercept by NSA whistleblower Edward Snowden.

Earlier revelations sourced to the Snowden documents have exposed a multitude of NSA programs for collecting large volumes of communications. The NSA has acknowledged that it shares some of its collected data with domestic agencies like the FBI, but details about the method and scope of its sharing have remained shrouded in secrecy.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 2 september 2014 @ 23:49:26 #76
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144122396
quote:
GCHQ backlash? Anonymous website hacked following privacy rights protest

Anonymous UK’s website was recently targeted and taken down in the midst of a four-day privacy rights protest organized by the collective. The demonstration was held outside Britain’s Government Communications Headquarters (GCHQ).

A spokesman for the hacktivist group believes the targeted attack was carried out by GCHQ officials.

The protest, which began outside Britain’s Cheltenham-based spy base last Friday, was reportedly launched to highlight an ongoing assault on Britons’ privacy rights against a backdrop of increasing mass surveillance. But prior to the main day of protest scheduled for Saturday, Anonymous UK’s website was taken down. The incident occurred late Friday evening.

This is not the first time the group has had such an experience. A spokesperson for the hacktivist collective, who runs Anonymous UK's online radio station, insists they have been unjustly targeted by GCHQ on multiple occasions.

“One of our servers was destroyed and our UK radio station has been shut down,” the spokesperson told RT on Friday, adding that the group's site was also taken down following the launch of a campaign to feed homeless people.

Commenting on the cyber attack, the spokesman said that if a member of the public targeted a government site in this manner, they could "get up to five years in prison the UK." Yet “GHHQ has no one to answer to.”

“This is why we protest,” he stressed.

Although GCHQ allegedly attempted to liaise with Anonymous UK in advance of the demonstration, a spokesperson for the collective said the group declined to respond. The collective believes privacy rights advocates have a democratic right to protest peacefully, and shouldn't have to justify their desire to do so to UK authorities.

Probed as to whether Anonymous UK plans to issue a formal complaint about the targeting of its website, a spokesperson said “we can’t complain to anyone” because “GCHQ would just deny it.”

Central to the group’s privacy rights concerns is an alleged UK intelligence operation called Tempora. Covert documents sent to the Guardian by US whistleblower Edward Snowden state that the program facilitates British intelligence officers’ access to private data. Such information relates specifically to email, social networking, and telephone conversations.

Britain’s Investigatory Powers Tribunal is currently seeking to discern whether Tempora exists, and if it violates Article 8 of the European Convention on Human Rights – which deals with citizens’ right to privacy. A final judgment on the case is yet to emerge, and the group of high profile UK and international civil liberties groups that launched the proceedings is currently awaiting an outcome.

Anonymous UK told RT on Friday that the collective is doubtful the final judgement will favor the public’s right to privacy.

According to the hacktivist collective, approximately 60 protesters attended the demonstration over the weekend in a bid to raise awareness about the intrusive nature of GCHQ mass surveillance. Others estimate the number of attendees may have been more moderate. Anonymous UK stated all activists demonstrated in a peaceful and lawful manner, and there were no arrests. Nevertheless, its site remains inaccessible visitors.

The UK-based collective is a subset of Anonymous, a nebulous international network of activists and hacktvists known for politically charged, subversive maneuvers worldwide. Recent actions carried out by the broader group include efforts to tackle global inequality, operations to counter government attacks on citizens’ privacy rights, efforts to mitigate child pornography, and a “cyber assault” against Israel to counter IDF operations in Gaza.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 3 september 2014 @ 00:24:14 #77
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144123270
quote:
NSA bulk collection of phone data under scrutiny as federal case opens

Justice Department officials face pointed questions on opening day of case that could push NSA privacy to supreme court

Federal judges pointedly questioned a Justice Department lawyer on Tuesday about the National Security Agency’s bulk collection of US phone data, in the opening day of case that represents a major step toward a supreme court ruling on the constitutionality of the program.

A three-judge panel from the second circuit court of appeals aimed skeptical questions at assistant attorney general Stuart Delery about the scope and breadth of the call-records dragnet, reported last year by the Guardian thanks to leaks from Edward Snowden.

Judge Gerard Lynch, a Barack Obama appointee, asked what was “so uniquely valuable about phone records” that compelled the NSA to collect all domestic phone records, in bulk, without individual suspicion of terrorism, espionage or any other wrongdoing.

Getting the data “rapidly has to be what this is about”, said Lynch, a former New York federal prosecutor. “Some of us up here have done this in criminal investigations.”

Delery was put in the position of defending a program that Obama no longer supports in public. The president earlier this year endorsed divesting NSA of its phone records databases, which struck the judges as curious.

The Justice Department official’s more immediate task was to convince the judges that they lacked the authority to consider the legality of the bulk call-records collection. “Congress has not provided jurisdiction to the court to reach statutory claims,” he argued. The judges noted that his contention left the panel in the position of considering constitutionality ahead of legality, an inversion of US legal doctrine.

While none of the three judges were inclined to rule from the bench Tuesday, they peppered Delery with sharp questions for over half an hour. Some were curious about factual aspects of the phone records program and appeared mildly frustrated at their inability to get public answers about what until last year was among the US government’s most closely held secrets.

“You seem to rely on declassified material,” judge Robert D Sack, a Bill Clinton appointee, told Delery. “What else aren’t you telling us?”

The case reached the appeals court after a December ruling from Judge William Pauley declined to grant its petitioner, the American Civil Liberties Union (ACLU), an injunction to stop the bulk records collection. That ruling contradicted one barely a week earlier from a Washington DC judge, Richard Leon, that called the collection “almost Orwellian”. Judges wondered aloud about the implications if they ordered a halt to the bulk collection while a DC appeals court, scheduled to hear a government appeal in the case Leon ruled on, reaches the opposite conclusion.

Alexander Abdo, an attorney for the ACLU, said the supreme court would likely have to resolve the dispute, something that legal scholars and observers on both sides of the past year’s surveillance debate have anticipated.

Abdo received a grilling from the judges as well, if not quite as intensely. They pushed Abdo to define a “reasonable” expectation of privacy over metadata, even as they later asked Delery if bulk phone data was “content-divulging.”

Underscoring an element of the case likely to be stated openly should the supreme court rule, Lynch mused to Abdo: “Say we’re wrong and somebody blows up a subway train.”

Since Pauley and Leon’s ruling, Congress, the NSA and the Obama administration have begun to embrace a legislative effort that would end the NSA’s direct bulk collection of domestic phone records, but permit the government to collect thousands of phone records based on a single court order, alarming privacy advocates. While the House passed the bill in May, the Senate still has not, and the legislative calendar is ticking down ahead of November’s congressional elections.

Until then, Abdo said, “the injury is ongoing on a daily basis”, as the NSA, through the secret Fisa court, continues to collect phone data in bulk ahead of legislative action, albeit on a somewhat circumscribed scale.

Judges on the appeals court openly joked about their likely status as a stepping stone for a landmark high-court decision on surveillance and privacy.

“We gave you probably more time than you’ll get in the supreme court,” Lynch told Delery as the assistant attorney general concluded his presentation.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 3 september 2014 @ 22:05:40 #78
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144151932
quote:
Judge may hold Microsoft in contempt after refusal to hand over foreign data

Obama administration contends that company with operations in US must comply with warrants for data, even if stored abroad

A federal judge may hold Microsoft in contempt of court this week over its refusal to give the US government data stored overseas.

Judge Loretta Preska, chief of the US district court in New York, gave the company until Friday to comply with an order which could further dent trust in the cloud.

In a statement on Tuesday Microsoft, citing privacy concerns, told Ars Technica it would continue to defy the court order. “We will not be turning over the email.”

US prosecutors who are investigating narcotic trafficking obtained a search warrant last December to access an email account controlled and maintained by Microsoft servers in Dublin, Ireland.

The Redmond-based technology company resisted, arguing that emails belong to its customers and that the servers are beyond US jurisdiction, a challenge to the Obama administration’s contention that a company with operations in the US must comply with warrants for data, even if stored abroad.

Judge Preska ruled in July that Microsoft must comply because it was a US company and controlled the data. She suspended enforcement of the order pending an appeal by the company.

In a procedural wrangle the judge lifted the suspension last week, saying the ruling was not appealable, but added that Microsoft could in fact obtain an appeal if it refused to comply and was found in contempt. “If Microsoft refuses to comply, the court could find Microsoft in contempt, which would be a final order subject to appellate review,” the judge wrote.

Microsoft said all sides agreed the case should and would go to appeal. “This is simply about finding the appropriate procedure for that to happen.”

The government asked Judge Preska to hold Microsoft in contempt, leading to a “properly appealable final order”.

By handing over the data Microsoft would violate Irish law. A graver concern for the company, and other US technology giants, is another blow to public trust in their ability to protect privacy.

Several companies, including AT&T Inc, Apple Inc, Cisco Systems Inc and Verizon Communications Inc, have filed court briefs supporting Microsoft. They fear losing billions of dollars in revenue to foreign competitors who could be perceived as better guardians of privacy.

The German government has reportedly told Microsoft it will shun data storage from US companies unless the ruling is overturned.

In seeking the emails the US government was looking to sidestep legal protections enshrined in the constitution’s fourth amendment, Brad Smith, Microsoft’s general counsel, wrote in the Wall Street Journal. “Timeless values should endure, and digital commons sense should prevail.”

Trust in the cloud has been battered by Edward Snowden’s revelations about US surveillance and by the recent hacking of hundreds of celebrities’ photos.

It is unclear which government agency is seeking the emails stored in Dublin because the warrant and all related documents are sealed.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 4 september 2014 @ 17:43:41 #79
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144174535
quote:
quote:
Inlichtingendienst AIVD heeft bij het onderzoek naar sociale media de privacyregels overtreden. Daarnaast heeft de dienst bij het hacken van een aantal grote algemene webfora ten onrechte alle informatie over bezoekers van deze fora verzameld. Dat concludeert de CTIVD, de toezichthouder op de veiligheidsdiensten, in het rapport dat vanmiddag naar de Tweede Kamer is gestuurd.

NRC Handelsblad onthulde eind vorig jaar op basis van documenten van de Amerikaanse inlichtingendienst NSA dat de AIVD webfora hackt en daarmee informatie verzamelt over alle bezoekers van die fora. Indertijd meldde zowel de AIVD als minister Plasterk van Binnenlandse Zaken dat het hacken van deze webfora valt binnen de wettelijke bevoegdheden van de dienst.

Bij vijf hackoperaties van webfora waarbij agenten zijn ingezet schiet de motivering voor de operatie tekort. Daarom beoordeelt de CTIVD de inzet van dit middel als “onrechtmatig”. Het gaat hierbij om hacks die zij uitgevoerd op verzoek van buitenlandse inlichtingendiensten.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 5 september 2014 @ 13:34:57 #80
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144200713
quote:
quote:
A prominent national security reporter for the Los Angeles Times routinely submitted drafts and detailed summaries of his stories to CIA press handlers prior to publication, according to documents obtained by The Intercept.

Email exchanges between CIA public affairs officers and Ken Dilanian, now an Associated Press intelligence reporter who previously covered the CIA for the Times, show that Dilanian enjoyed a closely collaborative relationship with the agency, explicitly promising positive news coverage and sometimes sending the press office entire story drafts for review prior to publication. In at least one instance, the CIA’s reaction appears to have led to significant changes in the story that was eventually published in the Times.

“I’m working on a story about congressional oversight of drone strikes that can present a good opportunity for you guys,” Dilanian wrote in one email to a CIA press officer, explaining that what he intended to report would be “reassuring to the public” about CIA drone strikes. In another, after a series of back-and-forth emails about a pending story on CIA operations in Yemen, he sent a full draft of an unpublished report along with the subject line, “does this look better?” In another, he directly asks the flack: “You wouldn’t put out disinformation on this, would you?”
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 5 september 2014 @ 17:24:37 #81
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144208146
quote:
quote:
Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China’s infiltrations of Google, Nortel, and other corporate targets. So critical is this denial to the U.S. government that last August, an NSA spokesperson emailed The Washington Post to say (emphasis in original): “The department does ***not*** engage in economic espionage in any domain, including cyber.”

After that categorical statement to the Post, the NSA was caught spying on plainly financial targets such as the Brazilian oil giant Petrobras; economic summits; international credit card and banking systems; the EU antitrust commissioner investigating Google, Microsoft, and Intel; and the International Monetary Fund and World Bank. In response, the U.S. modified its denial to acknowledge that it does engage in economic spying, but unlike China, the spying is never done to benefit American corporations.

Director of National Intelligence James Clapper, for instance, responded to the Petrobras revelations by claiming: “It is not a secret that the Intelligence Community collects information about economic and financial matters…. What we do not do, as we have said many times, is use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of—or give intelligence we collect to—U.S. companies to enhance their international competitiveness or increase their bottom line.”

But a secret 2009 report issued by Clapper’s own office explicitly contemplates doing exactly that. The document, the 2009 Quadrennial Intelligence Community Review—provided by NSA whistleblower Edward Snowden—is a fascinating window into the mindset of America’s spies as they identify future threats to the U.S. and lay out the actions the U.S. intelligence community should take in response. It anticipates a series of potential scenarios the U.S. may face in 2025, from a “China/Russia/India/Iran centered bloc [that] challenges U.S. supremacy” to a world in which “identity-based groups supplant nation-states,” and games out how the U.S. intelligence community should operate in those alternative futures—the idea being to assess “the most challenging issues [the U.S.] could face beyond the standard planning cycle.”

One of the principal threats raised in the report is a scenario “in which the United States’ technological and innovative edge slips”— in particular, “that the technological capacity of foreign multinational corporations could outstrip that of U.S. corporations.” Such a development, the report says “could put the United States at a growing—and potentially permanent—disadvantage in crucial areas such as energy, nanotechnology, medicine, and information technology.”
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
pi_144228424
quote:
7s.gif Op donderdag 4 september 2014 17:43 schreef Papierversnipperaar het volgende:

[..]

[..]

Het artikel gaat verder.
Jup, en owee als je een uitgesproken mening hebt, zelfs wanneer die genuanceerd is.
  zondag 7 september 2014 @ 21:58:39 #83
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144292049
quote:
quote:
Leiderman’s been called Anonymous’ lawyer of choice, and has defended or advised Anons from political refugee Commander X through LulzSec, AntiSec, incarcerated Anonymous spokesman Barrett Brown, and more. We asked him why he chose this field rather than something that might buy him a yacht or at least the ability to sleep at night. He replied that it was certainly anything but a calculated careerist move, and less his choice than the inevitable result of recent changes in the way the courts are used by The Powers That be.
quote:
Now that all the news about the NSA and private security contractors is out in public what is the point of locking up Barrett Brown now? Barn door, horse, all that jazz?

Well isn’t that a great question? All the stuff that Barrett alleged turned out to be true! People made fun of him! “He’s a crackpot, saying these things,” but they actually were happening.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 9 september 2014 @ 11:28:10 #84
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144343753
quote:
'Five Eyes' surveillance pact should be published, Strasbourg court told

Appeal lodged at European court of human rights for disclosure of intelligence sharing policies of UK and foreign agencies

The secret "Five Eyes" treaty that authorises intelligence sharing between the UK, US, Australia, Canada and New Zealand should be published, according to an appeal lodged on Tuesday at the European court of human rights.

The application by Privacy International (PI), which campaigns on issues of surveillance, to the Strasbourg court is the latest in a series of legal challenges following the revelations of the US whistleblower Edward Snowden aimed at forcing the government to disclose details of its surveillance policies.

The civil liberties group alleges that the UK is violating the right to access information by "refusing to disclose the documents that have an enormous impact on human rights in the UK and abroad".

PI says that it has exhausted all domestic legal remedies because its freedom of information request for the document, detailing how the UK's security services collaborate with the National Security Agency (NSA) in the US and other foreign intelligence agencies, met with outright refusal.

"The UK government's GCHQ monitoring service invoked a blanket exemption that excuses it from any obligation to be transparent about its activities to the British public," said PI.

Eric King, deputy director of PI, said: "More than a year after Snowden, the British government continues to dodge the question of just how integrated the operations of GCHQ and NSA truly are. Key documents like the Five Eyes arrangement remain secret, despite them being critical to proper scrutiny of the spy agencies.

"The hushing-up of the extent of the alliance is shameful. The public deserve to know about the dirty deals going on between the Five Eyes, who trade and exploit our private information through this illicit pact. For trust to be restored, transparency around these secret agreements is a crucial first step."

Rosa Curling, of the law firm Leigh Day, which represents PI, said: "The UK's Freedom of Information Act precludes government authorities from disclosing to the public information directly or indirectly supplied by GCHQ.

"This absolute exemption is unlawful and contrary to article 10 of the European convention on human rights, which provides for the right to freedom of expression, which includes the right to receive information.

"It cannot be correct that all information, without exception, directly or indirectly supplied by GCHQ is exempt from public disclosure. With the credibility and public confidence in the activities of the UK's secret service at an all-time low, it is crucial that the [Strasbourg] court considers whether the current darkness in which GCHQ operates is allowed to continue."
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 12 september 2014 @ 15:21:07 #85
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144456272
quote:
Europe gears up to fight back against giant US beasts of the internet

EU regulators are confronting the 'voluntary self-subjugation' of Europe to the dominance of Google, Amazon and Facebook

In Germany, they have a term for silicon valley companies like Google, Amazon and Facebook, the big beasts of the internet that have come to dominate our online lives. They are known as the datenkraken. The word means data octopuses, and it is intended to frighten – in Norse myth, the Kraken was a murderous sea monster.

Today's datenkraken do not drag mariners into the deep, but they have tentacles that reach around the world, gathering the data of private citizens on a scale that, since Snowden's revelations about US surveillance, has created huge unease in Europe.

Last Monday, the European Commission's outgoing competition commissioner, Joaquín Almunia, decided to reopen his five-year investigation into Google's search rankings. Finishing the job will fall to Almunia's replacement, the former Danish finance minister Margrethe Vestager. Her colleague, Europe's new digital economy commissioner Guenther Oettinger, has already made his feelings known. On Wednesday, he said Google's market power could be limited, adding that he would work to ensure that the search engine's services preserve neutrality and objectivity.

The message from Brussels is clear, according to Ian Maude, new media expert at Enders Analysis: "Google is the new Microsoft. As far as the regulators are concerned, it is the big bad wolf."

Over the course of investigations and legal battles that ran from 1993 to 2013, the commission imposed more than ¤2bn in fines on Microsoft. There were probes into licensing practices, and orders to unbundle its products, so that European Windows users had a choice of web browsers and media players other than those produced by Microsoft.

The relationship between the US group and Brussels was highly confrontational. Microsoft did not send its executives to woo the commissioners, it sent armies of lawyers to fight each proposal. But now, the shoe is on the other foot.

Google has become as dominant on our personal computers – laptops, phones and tablets – as Microsoft was a decade ago. In search, its position seems unassailable. An estimated 90% of user queries pass through Google in Europe, according to StatCounter. As one of the lead plaintiffs against Google in Brussels, Microsoft is now only too willing to use the regulatory powers of the commission against its rival.

Google's strategy has been to send its chairman, Eric Schmidt, on diplomatic missions to Brussels, and work with the commission to find a solution. The controversy is over natural search – as opposed to the paid-for results that appear on the right hand side or at the top of the Google page. Rather than producing a series of blue links in response to queries, Google has begun answering questions itself. Ask for the weather today, and you will be shown a forecast for your region. Look up French food in Nottingham, and you will be shown a map with pins locating each restaurant, plus a list of establishments with addresses and star ratings.

Rivals complain this diverts traffic away from specialist websites offering the same information, like OpenTable or TripAdvisor. Google offered to change the way it presented search results. Its first two solutions were rejected by Almunia, but the third was accepted. It would involve two boxes – one containing Google's own information, and another showing information from rivals, with places auctioned to the highest bidder. Research by Microsoft shows that even with these changes, the Google links box, which is more prominent, will attract 99 times more clicks than the rival links box.

Google insists it does not promote its own products at the expense of others. Schmidt said in a letter to the Financial Times last week: "We aim to show results that answer the user's queries directly (after all we built Google for users, not websites) … To date, no regulator has objected to Google giving people direct answers to their questions for the simple reason that it is better for users."

Google's constructive, conciliatory approach initially convinced Almunia. But in February 2014, when he gave the US group's third proposal a preliminary thumbs up, the result was uproar, not just from competitors but from the French and German governments.

Egged on by European media companies and telecoms firms, whose sectors are most threatened by the digital revolution, politicians rushed to criticise the decision. In France, opposition was led by Arnaud Montebourg, who was economy minister until president François Hollande dissolved his government last month. Along with his German counterpart, Sigmar Gabriel, he wrote to Almunia demanding a rethink.

"We don't want to become a digital colony of global internet giants," Montebourg said in May. "What's at stake is our sovereignty itself."

In parts of Europe, Google is more than the next Microsoft. It is an agent of American colonialism. By gathering the private data of European citizens, Montebourg believes that Facebook and Amazon are creating databases that can be exploited for virtually tax-free commercial gain, or mined by intelligence experts in Washington DC.

In the German press, Gabriel wrote: "Every time we "search" for something on Google, Google searches us and captures information about ourselves which can not only be sold for targeted personalised advertising, but is, essentially, also available to our bank, our health insurance company, our car or life insurance company, or – if the need arises – to the secret service.

"There's no such thing as a free lunch – we pay for these services with our personal data – and, unless we are careful, at the end of the day with our personal and social freedom as well. It is the core task of liberalism and social democracy to tame and restrain data capitalism gone wild."

Sigmar's words read like a political manifesto. It is a manifesto that has been adopted by Jean-Claude Juncker, the European Commission's newly elected president. "Europe's path to growth is paved with tablets and smartphones," the former Luxembourg prime minister states on his personal website. While Europe led the world in mobile technology, it has trailed America in the creation of internet corporations and jobs. Juncker believes bringing Eruope's 500m citizens into a single market for technology – with common laws for things like copyright, co-ordinated mobile phone spectrum auctions, and regional regulators – will create strong businesses and jobs. It is his top priority, above even energy security.

Among Google's most powerful critics is Mathias Döpfner, whose Axel Springer group publishes the tabloid Bild, Germany's most widely read newspaper. When Angela Merkel humiliated David Cameron by switching sides and supporting Juncker for the top job in Europe, fingers were pointed at Döpfner. Convinced that the Luxembourgian politician would back his calls for tougher sanctions on Google, he is said to have used Bild's influence to turn Merkel.

In an open letter to Google's Schmidt, penned in April, Döpfner warned: "Voluntary self-subjugation cannot be the last word from the Old World. On the contrary, the desire of the European digital economy to succeed could finally become something for European policy, which the EU has so sorely missed in the past few decades: an emotional narrative."

It is a narrative that has cast the American datenkraken as the arch enemy. Brussels would like to dismantle their low tax corporate structures, and Almunia made a first move in June, announcing a probe into tax arrangements used by Apple in Ireland and Starbucks in the Netherlands.

Now the Google search inquiry has been re-opened. Another, delving into Google's Android mobile platform, and how phone makers are required to pre-install its Chrome internet browser and other services, is waiting in the wings.

The Berlin wall has fallen, but Europe is erecting new defences: it is building a firewall to protect the Old World from becoming a digital colony of the New World.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 15 september 2014 @ 17:37:55 #86
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144555917
quote:
Greenwald, Dotcom, Snowden and Assange take on 'adolescent' John Key

Internet interceptors unfazed by mega-drills or media drilling as they reveal Moment of Truth to New Zealand ahead of election

An international all-star lineup of the White House's most-loathed shared a stage in New Zealand's largest city for a rally billed by the event's host, Kim Dotcom, as the "Moment of Truth".

Bathed in red and white lights and cheered on by a capacity audience of about 1,500 at the Auckland town hall, the internet entrepreneur turned political party founder sat alongside journalist Glenn Greenwald at a table emblazoned, in case there were any doubt, with the words THE MOMENT OF TRUTH.

On the big screen above, Greenwald's famous source, NSA whistleblower Edward Snowden, was beamed in live from Moscow, while fellow fugitive Julian Assange peered from a screen beside him, also beamed in live but this time from the Ecuadorian embassy in London.

All were given thundering ovations from a crowd who, five days away from New Zealand's general election, were energised by articles published hours earlier by Greenwald and Snowden alleging mass surveillance in New Zealand and duplicity on the part of the prime minister, John Key.

Greenwald, whose arrival in New Zealand on Friday ignited another powder keg in an already explosive election campaign, began by marvelling at the criticisms he has faced from Key, who has labelled him "Dotcom's little henchman" and a "loser".

"It is not all that common to arrive in a country, and within 24 hours, literally, find oneself being publicly maligned and attacked by the nation's head of state, using the most adolescent epithets imaginable," said Greenwald to applause, and peels of laughter from Dotcom.

He went on to dismiss the prime minister's claim of political motives as "reckless accusations". Key has repeatedly rubbished Greenwald's claims of mass surveillance by the New Zealand spy agency, the Government Security Communications Bureau, a member of the NSA-led Five Eyes alliance, saying that while the government had considered a programme for "mass protection", he had rejected the GCSB proposal.

Within hours of Greenwald and Snowden's articles being published on the Intercept website – drawing on NSA documents that detailed a programme called "Speargun" which involved a "cable access" tap, apparently into the undersea cable that connects the New Zealand internet to the world – Key had responded by releasing declassified documents which proved, he said, that the claims were "simply wrong" and "based on incomplete information".

Greenwald hit back with an express-pace address at the town hall. "He's not releasing that classified information for any other reason than protecting his reputation and for political gain," he said, pausing to sip on a can of Diet Coke.

Retracing the evidence in the Intercept report and an accompanying article by Snowden, Greenwald said: "The Key government has radically misled and deceived the New Zealand citizenry. I don't make that accusation lightly … unless I have the evidence to back it up. And in this case I can categorically and with great confidence say that it is."

The biggest roar of the night greeted the arrival on the big screen of Snowden, white earphones dangling from his ears. His contribution, the most compelling of the night, began with a new piece of information: the NSA had a facility somewhere in Auckland, and another further north.

As to the prime minister's denials, Snowden detected a "careful parsing of words". His own experience as an NSA analyst, he said, left him with no doubt that New Zealanders' communications were swept up by the XKeyScore mass surveillance programme.

"Maybe the people of New Zealand think that's appropriate," he said. "Maybe they think that they want to sacrifice a certain measure of their liberty … That's what democracy is about; that's what self-government is about. But that decision doesn't belong to John Key or officials in the GCSB making these decisions behind closed doors."

Next came Assange. The WikiLeaks founder first apologised for the background noise of mysterious "tunnelling" – building works were under way in the flat below the embassy. He went on to lay out the "wider context" for the spying revelations: New Zealand had been "effectively annexed", he said, a tired voice competing with the incessant hammering of a power tool.

Dotcom is sought by the US for extradition from New Zealand in relation to alleged copyright infringements around his now defunct Megaupload site. He lavished praise on his guests.

"You are heroes and I thank you very much for letting humanity know what is going on," he enthused in his distinctive staccato German accent.

There was no "moment of truth" from Dotcom, however. The Internet party's founder and "visionary" – as a non-citizen resident he is prohibited from standing for parliament – had promised to produce evidence to support his belief that Key had colluded with Hollywood executives to reverse a decision to deny him residency in New Zealand in 2010, in preparation for an extradition attempt from the US. Key has consistently said he knew nothing of Dotcom's existence until the eve of the dramatic FBI-backed raid on his north Auckland mansion in January 2012.

The anticipated "big reveal" had been published in the New Zealand Herald several hours before the Town Hall extravaganza. It came in the form of a purported email from 2010, in which the Warner Brothers chairman informs a Motion Picture Association of America executive: "John Key told me in private that they are granting Dotcom residency despite pushback from officials about his criminal past. His AG [attorney general] will do everything in his power to assist us with our case. VIP treatment and then a one-way ticket to Virginia [where charges would be filed]."

The email which, according to the Herald, was "the evidence Dotcom is planning on producing at the Moment of Truth event", was quickly dismissed as a fake by Warner Bros and the MPAA, while Key said no such conversation ever took place.

The disputed email was mentioned only fleetingly during the Monday night rally by lawyer Robert Amsterdam, who said it had been referred to the parliamentary privileges committee. However it dominated a heated press conference afterwards. Attempts to prevent discussion of the disputed email on the basis it would be the subject of an inquiry were scoffed at by journalists seeking information on its provenance and authenticity.

Greenwald was largely a bystander as Dotcom responded to questions by chiding the media: "You have failed us in the past. You need to wake up and do your jobs."

Dotcom insisted the email was genuine. "I believe it to be 100% real," he said. "Everything I've produced in the past, everything I've said in the past, has been proved true."

He may need to produce proof promptly if he is likely to dent Key's chances of surviving Saturday's election.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 15 september 2014 @ 19:19:26 #87
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144559470
quote:
EU court to investigate laws allowing GCHQ to snoop on journalists

Bureau of Investigative Journalism files application with European court of human rights over protection of sources

The European court of human rights (ECHR) is to investigate British laws that allow GCHQ and police to secretly snoop on journalists.

The Bureau of Investigative Journalism has gone straight to Strasbourg in a bid to get a finding that domestic law is incompatible with provisions in European law which give journalists the right to keep sources confidential from police and others.

Its application was filed on Friday and has been accepted by the ECHR, which has indicated in the past it will expedite cases on surveillance through its legal system.

The move follows concerns arising out of Edward Snowden’s revelations last year that GCHQ had been secretly gathering intelligence from the country’s largest telecoms companies using a secret computer system code-named Tempora without the knowledge of the companies.

Also of concern is a recent revelation, which has alarmed journalists and lawyers, that the police secretly obtained the records of the Sun’s political editor after he refused to reveal the identity of sources in his Plebgate story about an altercation between police and the then Tory whip Andrew Mitchell.

Gavin Millar, QC, who is working on the case with the BIJ, said if the application was successful, the Regulation of Investigatory Powers Act 2000 (Ripa) should be torn up.

“The whole thing is completely incompatible with European law, we’ve got to go back to the drawing board and find a statutory framework that says only in the most exceptional circumstances would it be okay to collect journalists metadata or content of their phones.”

Both Tempora and the Metropolitan Police actions against the Sun’s political editor were enabled by Ripa.

Part 1, chapter 11 of the Act allows a police officer of superintendent rank or above to seize the phone records of a journalist without the journalist even knowing.

Part 1 Chapter 1 of the Act enables GCHQ to collect metadata on the agreement of the Secretary of State.

The revelation that the Sun’s Tom Newton Dunn’s telephone records were requisitioned from Vodafone and those of the paper’s newsdesk, sent alarm bells throughout the industry with fears that this could have a chilling effect on press freedom with fewer whistleblowers willing to take the risk of phoning a journalists.

Millar said he believed the UK authorities were routinely carrying out data collection of journalists and their organisations to build up a picture of their sources and their lines of inquiry.

Christopher Hird, chair of the BIJ’s editorial board, said he understood why the government feels the need to have the power to intercept communications.

But Hird added that he did not believe there were “sufficient safeguards to ensure the protection of journalists’ sources”. This, he said, amounted to a restriction on the free press.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 17 september 2014 @ 14:51:19 #88
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144624172
quote:
NSA spying can't be ruled out: PM

Prime Minister John Key cannot rule out that the United States National Security Agency is undertaking mass surveillance of New Zealanders' data but has rejected claims New Zealand spies would have access to such information.

"What I can say is the GCSB [Government Communications Security Bureau] does not have access to any information through XKeyscore or any other database, unless they basically comply with the New Zealand law, and the New Zealand law forbids that unless there is a warrant to do so," he said.

Asked whether that was an admission GCSB spies on occasion used the controversial XKeyscore programme, Key declined to elaborate.

"I don't talk about whatever programmes they have," he said.

"You can talk about whatever ones they might use, and there're lots of them out there."

With the general election just three days away, Key is under pressure to explain documents released by NSA whistleblower Edward Snowden pointing to wholesale spying of New Zealand citizens using XKeyscore.

At an event hosted by the Internet Party on Monday, Snowden and US journalist Glenn Greenwald claimed that NSA agents had sites of operation in New Zealand.

Greenwald's reporting has led to the Government admitting this week that the GCSB was working on a mass surveillance programme that Key canned because it was deemed too intrusive.

Key said today that he was unaware of any NSA site in New Zealand. If there were, they were operating without his knowledge and illegally.

"I don't run the NSA any more than I run any other foreign intelligence agency or any other country," he said.
Key welcomed today's statement from the Inspector-General of Intelligence and Security, Cheryl Gwyn, who has backed his version of the story.

Gwyn said she reviewed whether the GCSB complied with restrictions on intercepting New Zealanders' communications as part of her role.

While she could only comment on specific GCSB activities through her annual and inquiry reports, Gwyn said she had not identified any indiscriminate interception of New Zealanders' data in her work to date.

The review of GCSB activities was ongoing, and she would continue to monitor the bureau to ensure communications were intercepted only for authorised purposes, she said.

Key said it was "pleasing to have someone that's completely independent of the political process coming out very clearly and very strongly, saying there is no evidence to support there has been mass surveillance by the GCSB on New Zealanders".

"That is absolutely the correct position," he said.

"I can say it. I hope New Zealanders will accept my word on it because we've got the inspector-general saying it, you've got the former head of the GCSB and the current head of the GCSB saying it."

Key said he had provided strong evidence of what the GCSB had and had not carried out, but the other side had failed to do that.

He defended Gwyn against claims by some critics that she was politicising her role, saying she was "completely neutral".

She is conducting an investigation into the SIS over allegations made in Nicky Hager's book, Dirty Politics, that classified information was declassified and handed to a blogger for political gain.

"She went out there and did that in the middle of an election campaign," Key said.

"She is in a position to see under the covers, what's really taking place, and give an objective view to New Zealanders."

But she could not see what activities, if any, the NSA might be carrying out in New Zealand.

"We've always said, in the end, there are other agencies around the world either legally as a result of their own laws or illegally will be out there potentially collecting information on New Zealanders," Key said.

"But the big control check from New Zealand's point of view is we absolutely do not circumnavigate the law and use our departments to do that.

"The United States of America has some interesting issues it's having to deal with, and tangentially there's always a risk that a New Zealander is involved in that, whether as a foreign fighter or whatever it might be.

"But New Zealand is not the primary interest of the United States."
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 20 september 2014 @ 12:33:17 #89
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144719606
quote:
Former UK ambassador to the United States given data-access role

Sir Nigel Sheinwald will work to ensure British spies and police officers can access data from overseas firms

A former senior diplomat has been appointed by the prime minister to work with the United States and other countries to ensure that British spies and police officers can access data from overseas firms.

Sir Nigel Sheinwald, former ambassador to the United States, has been appointed as special envoy on intelligence and law enforcement data sharing.

He will lead discussions with governments and communications service providers on ways to improve access to and sharing of law enforcement and intelligence data in different jurisdictions.

David Cameron set out the need for the post when he announced emergency legislation on data sharing in July.

He said: "A number of overseas companies have asserted that their ability to work with the UK government is being severely constrained by international conflicts of jurisdiction.

"For example, where they think they have a British law saying that they should share data, and an American law saying that they shouldn't."

He said the envoy would work to ensure that "lawful and justified transfer of information across borders takes place to protect our people's safety and security".

Home affairs select committee chairman Keith Vaz said: "The prime minister has made an excellent choice in selecting Sir Nigel Sheinwald for this post.

"It is vital that we work in partnership with other countries on this serious matter, particularly given the security implications of data sharing. I firmly believe that Sir Nigel has the necessary expertise and experience to carry out this role effectively.

"The committee is looking forward to working with Sir Nigel in the near future."
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 22 september 2014 @ 10:50:04 #90
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144782310
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
pi_144813359
Puik werk dit topic :) keep it up
  dinsdag 23 september 2014 @ 17:25:27 #92
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144828078
quote:
0s.gif Op dinsdag 23 september 2014 08:18 schreef Jibberism_ het volgende:
Puik werk dit topic :) keep it up
Dank je.
U vraagt, wij draaien:
quote:
Snowden: New Zealand’s Prime Minister Isn’t Telling the Truth About Mass Surveillance

Like many nations around the world, New Zealand over the last year has engaged in a serious and intense debate about government surveillance. The nation’s prime minister, John Key of the National Party, has denied that New Zealand’s spy agency GCSB engages in mass surveillance, mostly as a means of convincing the country to enact a new law vesting the agency with greater powers. This week, as a national election approaches, Key repeated those denials in anticipation of a report in The Intercept today exposing the Key government’s actions in implementing a system to record citizens’ metadata.

Let me be clear: any statement that mass surveillance is not performed in New Zealand, or that the internet communications are not comprehensively intercepted and monitored, or that this is not intentionally and actively abetted by the GCSB, is categorically false. If you live in New Zealand, you are being watched. At the NSA I routinely came across the communications of New Zealanders in my work with a mass surveillance tool we share with GCSB, called “XKEYSCORE.” It allows total, granular access to the database of communications collected in the course of mass surveillance. It is not limited to or even used largely for the purposes of cybersecurity, as has been claimed, but is instead used primarily for reading individuals’ private email, text messages, and internet traffic. I know this because it was my full-time job in Hawaii, where I worked every day in an NSA facility with a top secret clearance.

The prime minister’s claim to the public, that “there is no and there never has been any mass surveillance” is false. The GCSB, whose operations he is responsible for, is directly involved in the untargeted, bulk interception and algorithmic analysis of private communications sent via internet, satellite, radio, and phone networks.

If you have doubts, which would be quite reasonable, given what the last year showed us about the dangers of taking government officials at their word, I invite you to confirm this for yourself. Actual pictures and classified documentation of XKEYSCORE are available online now, and their authenticity is not contested by any government. Within them you’ll find that the XKEYSCORE system offers, but does not require for use, something called a “Five Eyes Defeat,” the Five Eyes being the U.S., U.K., Canada, Australia, and yes, New Zealand.

This might seem like a small detail, but it’s very important. The Five Eyes Defeat is an optional filter, a single checkbox. It allows me, the analyst, to prevent search results from being returned on those countries from a particular search. Ask yourself: why do analysts have a checkbox on a top secret system that hides the results of mass surveillance in New Zealand if there is no mass surveillance in New Zealand?

The answer, one that the government of New Zealand has not been honest about, is that despite claims to the contrary, mass surveillance is real and happening as we speak. The GCSB provides mass surveillance data into XKEYSCORE. They also provide access to the communications of millions of New Zealanders to the NSA at facilities such as the GCSB station at Waihopai, and the Prime Minister is personally aware of this fact. Importantly, they do not merely use XKEYSCORE, but also actively and directly develop mass surveillance algorithms for it. GCSB’s involvement with XKEYSCORE is not a theory, and it is not a future plan. The claim that it never went ahead, and that New Zealand merely “looked at” but never participated in the Five Eyes’ system of mass surveillance is false, and the GCSB’s past and continuing involvement with XKEYSCORE is irrefutable.

But what does it mean?

It means they have the ability see every website you visit, every text message you send, every call you make, every ticket you purchase, every donation you make, and every book you order online. From “I’m headed to church” to “I hate my boss” to “She’s in the hospital,” the GCSB is there. Your words are intercepted, stored, and analyzed by algorithms long before they’re ever read by your intended recipient.

Faced with reasonable doubts, ask yourself just what it is that stands between these most deeply personal communications and the governments of not just in New Zealand, but also the U.S., Canada, the U.K., and Australia?

The answer is that solitary checkbox, the Five Eyes Defeat. One checkbox is what separates our most sacred rights from the graveyard of lost liberty. When an officer of the government wants to know everything about everyone in their society, they don’t even have to make a technical change. They simply uncheck the box. The question before us is no longer “why was this done without the consent and debate of the people of this country,” but “what are we going to do about it?”

This government may have total control over the checkbox today, but come Sept. 20, New Zealanders have a checkbox of their own. If you live in New Zealand, whatever party you choose to vote for, bear in mind the opportunity to send a message that this government won’t need to spy on us to hear: The liberties of free people cannot be changed behind closed doors. It’s time to stand up. It’s time to restore our democracies. It’s time to take back our rights. And it starts with you.

National security has become the National Party’s security. What we’re seeing today is that in New Zealand, the balance between the public’s right to know and the propriety of a secret is determined by a single factor: the political advantage it offers to a specific party and or a specific politician. This misuse of New Zealand’s spying apparatus for the benefit of a single individual is a historic concern, because even if you believe today’s prime minister is beyond reproach, he will not remain in power forever. What happens tomorrow, when a different leader assumes the same power to conceal and reveal things from the citizenry based not on what is required by free societies, but rather on what needs to be said to keep them in power?
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 24 september 2014 @ 19:13:57 #93
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144865593
quote:
Edward Snowden and Alan Rusbridger receive Right Livelihood award

Award for whistleblower and Guardian editor recognises their work in exposing mass surveillance by the NSA and others

NSA whistleblower Edward Snowden and Guardian editor-in-chief Alan Rusbridger have been jointly given the 2014 Right Livelihood honorary award.

The award, from Swedish charity the Right Livelihood Award Foundation, recognised Snowden’s “courage and skill in revealing the unprecedented extent of state surveillance violating basic democratic processes and constitutional rights”.

Rusbridger’s citation recognised his role in “building a global media organisation dedicated to responsible journalism in the public interest, undaunted by the challenges of exposing corporate and government malpractices”.

The foundation said it would fund legal support for Snowden.

The Right Livelihood award was established in 1980 to honour and support those “offering practical and exemplary answers to the most urgent challenges facing us today”, with 153 laureates from 64 countries.

It is presented annually at a ceremony at the Swedish parliament and there are normally four winners.

Three other 2014 laureates will share the cash award of SEK1.5million equally: Pakistani human rights lawyer and activist Asma Jahangir; Basil Fernando of the Asian Human Rights Commission; and American environmentalist, author and journalist Bill McKibben.

Ole von Uexkull, executive director of the Right Livelihood Award Foundation, said: “This year’s Right Livelihood laureates are stemming the tide of the most dangerous global trends. With this year’s awards, we want to send a message of urgent warning that these trends – illegal mass surveillance of ordinary citizens, the violation of human and civil rights, violent manifestations of religious fundamentalism, and the decline of the planet’s life-supporting systems – are very much upon us already.

“If they are allowed to continue, and reinforce each other, they have the power to undermine the basis of civilised societies.”

The Right Livelihood Foundation promotes scientific research, education and public understanding of issues related to global ecological balance, eliminating material and spiritual poverty and contributing to lasting world peace and justice.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 25 september 2014 @ 18:21:13 #94
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144898834
quote:
quote:
Australian spies will soon get unprecedented powers to help fight terrorism, including giving ASIO operatives the ability to monitor phones, iPads, laptops and any other devices at and address with just one search warrant.

And anyone who outs a member of the security services faces ten years behind bars - a tenfold increase in the penalty.

The government's first tranche of tougher anti-terrorism laws, which beef up the domestic spy agency's powers, passed the Senate on Thursday with bipartisan support.

Attorney-General George Brandis said in a 'newly dangerous age' it was vital that those protecting Australia were equipped with the powers and capabilities they needed.

The bill will now be sent to the House of Representatives, where passage is all but guaranteed.

The legislation addresses a number of recommendations of a bipartisan joint parliamentary inquiry into Australia's national security laws.

It allows ASIO to access third party computers and apply one warrant to multiple devices.

After concerns were raised by Labor and Liberal Democratic Senator David Leyonhjelm, the government agreed to amend the legislation to specifically rule out ASIO using torture.

'ASIO cannot, does not and has never engaged in torture,' Senator Brandis said.

The Palmer United Party was successful in amending the law so anyone who exposes an undercover ASIO operative could face up to 10 years behind bars instead of one.

This included 'reckless' journalists, whistleblowers and bloggers who disclose sensitive information, Fairfax Media report.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 26 september 2014 @ 06:59:13 #95
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144915027
quote:
quote:
The internet is a serious threat because it can be used to orchestrate and undertake criminal behaviour across the world, Australia's Palmer United party senator Glenn Lazarus said during a debate on national security laws giving sweeping new powers to Australian intelligence services


[ Bericht 66% gewijzigd door Papierversnipperaar op 26-09-2014 09:35:43 ]
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 27 september 2014 @ 17:18:06 #96
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144958529
quote:
Signaling Post-Snowden Era, New iPhone Locks Out N.S.A.

WASHINGTON — Devoted customers of Apple products these days worry about whether the new iPhone 6 will bend in their jean pockets. The National Security Agency and the nation’s law enforcement agencies have a different concern: that the smartphone is the first of a post-Snowden generation of equipment that will disrupt their investigative abilities.

The phone encrypts emails, photos and contacts based on a complex mathematical algorithm that uses a code created by, and unique to, the phone’s user — and that Apple says it will not possess.

The result, the company is essentially saying, is that if Apple is sent a court order demanding that the contents of an iPhone 6 be provided to intelligence agencies or law enforcement, it will turn over gibberish, along with a note saying that to decode the phone’s emails, contacts and photos, investigators will have to break the code or get the code from the phone’s owner.

Breaking the code, according to an Apple technical guide, could take “more than 5 1/2 years to try all combinations of a six-character alphanumeric passcode with lowercase letters and numbers.” (Computer security experts question that figure, because Apple does not fully realize how quickly the N.S.A. supercomputers can crack codes.)

Already the new phone has led to an eruption from the director of the F.B.I., James B. Comey. At a news conference on Thursday devoted largely to combating terror threats from the Islamic State, Mr. Comey said, “What concerns me about this is companies marketing something expressly to allow people to hold themselves beyond the law.”

He cited kidnapping cases, in which exploiting the contents of a seized phone could lead to finding a victim, and predicted there would be moments when parents would come to him “with tears in their eyes, look at me and say, ‘What do you mean you can’t’ ” decode the contents of a phone.

“The notion that someone would market a closet that could never be opened — even if it involves a case involving a child kidnapper and a court order — to me does not make any sense.”

Apple declined to comment. But officials inside the intelligence agencies, while letting the F.B.I. make the public protests, say they fear the company’s move is the first of several new technologies that are clearly designed to defeat not only the N.S.A., but also any court orders to turn over information to intelligence agencies. They liken Apple’s move to the early days of Swiss banking, when secret accounts were set up precisely to allow national laws to be evaded.

“Terrorists will figure this out,” along with savvy criminals and paranoid dictators, one senior official predicted, and keep their data just on the iPhone 6. Another said, “It’s like taking out an ad that says, ‘Here’s how to avoid surveillance — even legal surveillance.’ ”

The move raises a critical issue, the intelligence officials say: Who decides what kind of data the government can access? Until now, those decisions have largely been a matter for Congress, which passed the Communications Assistance for Law Enforcement Act in 1994, requiring telecommunications companies to build into their systems an ability to carry out a wiretap order if presented with one. But despite intense debate about whether the law should be expanded to cover email and other content, it has not been updated, and it does not cover content contained in a smartphone.

At Apple and Google, company executives say the United States government brought these changes on itself. The revelations by the former N.S.A. contractor Edward J. Snowden not only killed recent efforts to expand the law, but also made nations around the world suspicious that every piece of American hardware and software — from phones to servers made by Cisco Systems — have “back doors” for American intelligence and law enforcement.

Surviving in the global marketplace — especially in places like China, Brazil and Germany — depends on convincing consumers that their data is secure.

Timothy D. Cook, Apple’s chief executive, has emphasized that Apple’s core business is to sell devices to people. That distinguishes Apple from companies that make a profit from collecting and selling users’ personal data to advertisers, he has said.

This month, just before releasing the iPhone 6 and iOS 8, Apple took steps to underscore its commitment to customer privacy, publishing a revised privacy policy on its website.

The policy described the encryption method used in iOS 8 as so deep that Apple could no longer comply with government warrants asking for customer information to be extracted from devices. “Unlike our competitors, Apple cannot bypass your passcode, and therefore cannot access this data,” the company said.

Under the new encryption method, only entering the passcode can decrypt the device. (Hypothetically, Apple could create a tool to hack into the device, but legally the company is not required to do that.)

Jonathan Zdziarski, a security researcher who has taught forensics courses to law enforcement agencies on collecting data from iPhones, said to think of the encryption system as a series of lockers. In the older version of iOS, there was always at least one locker that was unlocked, which Apple could enter to grab certain files like photos, call history and notes, in response to a legal warrant.

“Now what they’re saying is, ‘We stopped using that locker,’ ” Mr. Zdziarski said. “We’re using a locker that actually has a combination on it, and if you don’t know the combination, then you can’t get inside. Unless you take a sledgehammer to the locker, there’s no way we get to the files.”

The new security in iOS 8 protects information stored on the device itself, but not data stored on iCloud, Apple’s cloud service. So Apple will still be able to obtain some customer information stored on iCloud in response to government requests.

Google has also started giving its users more control over their privacy. Phones using Google’s Android operating system have had encryption for three years. It is not the default setting, however, so to encrypt their phones, users have to go into their settings, turn it on, and wait an hour or more for the data to be scrambled.

That is set to change with the next version of Android, set for release in October. It will have encryption as the default, “so you won’t even have to think about turning it on,” Google said in a statement.

A Google spokesman declined to comment on Mr. Comey’s suggestions that stronger encryption could hinder law enforcement investigations.

Mr. Zdziarski said that concerns about Apple’s new encryption to hinder law enforcement seemed overblown. He said there were still plenty of ways for the police to get customer data for investigations. In the example of a kidnapping victim, the police can still request information on call records and geolocation information from phone carriers like AT&T and Verizon Wireless.

“Eliminating the iPhone as one source I don’t think is going to wreck a lot of cases,” he said. “There is such a mountain of other evidence from call logs, email logs, iCloud, Gmail logs. They’re tapping the whole Internet.”
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 27 september 2014 @ 18:53:03 #97
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_144961093
quote:
quote:
Photos published by the journalist Erich Möchel in a blog post seems to confirm the presence of an NSA surveillance infrastructure, mentioned in the Snowden’s leaked documents “Vienna Annex”, in the attics of IZD Towers next to the UNO-City.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 1 oktober 2014 @ 16:49:24 #98
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145095948
quote:
quote:
Today, we're releasing several key documents about Executive Order 12333 that we obtained from the government in response to a Freedom of Information Act lawsuit that the ACLU filed (along with the Media Freedom and Information Access Clinic at Yale Law School) just before the first revelations of Edward Snowden. The documents are from the National Security Agency, the Defense Intelligence Agency, and others agencies. They confirm that the order, although not the focus of the public debate, actually governs most of the NSA's spying.

In some ways, this is not surprising. After all, it has been reported that some of the NSA's biggest spying programs rely on the executive order, such as the NSA's interception of internet traffic between Google's and Yahoo!'s data centers abroad, the collection of millions of email and instant-message address books, the recording of the contents of every phone call made in at least two countries, and the mass cellphone location-tracking program. In other ways, however, it is surprising. Congress's reform efforts have not addressed the executive order, and the bulk of the government's disclosures in response to the Snowden revelations have conspicuously ignored the NSA's extensive mandate under EO 12333.

The order, issued by President Ronald Reagan in 1981, imposes the sole constraints on U.S. surveillance on foreign soil that targets foreigners. There's been some speculation, too, that the government relies directly on the order — as opposed to its statutory authority — to conduct surveillance inside the United States.

There's a key difference between EO 12333 and the two main legal authorities that have been the focus of the public debate — Section 215 of the Patriot Act and the FISA Amendments Act, which the government relies on to justify the bulk collection of Americans' phone records and the PRISM program. Because the executive branch issued and now implements the executive order all on its own, the programs operating under the order are subject to essentially no oversight from Congress or the courts. That's why uncovering the government's secret interpretations of the order is so important. We've already seen that the NSA has taken a "collect it all" mentality even with the authorities that are overseen by Congress and the courts. If that history is any lesson, we should expect — and, indeed, we have seen glimpses of — even more out-of-control spying under EO 12333.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 1 oktober 2014 @ 18:47:13 #99
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145100095
quote:
The Guardian wins an Emmy for coverage of NSA revelations

Interactive NSA Decoded explained implications of the Edward Snowden leaks on mass surveillance by intelligence agencies

* NSA Decoded: the award-winning interactive

quote:
The Guardian US has won an Emmy for its groundbreaking coverage of Edward Snowden’s disclosures about mass surveillance by US intelligence agencies.

The Guardian’s multimedia interactive feature NSA Decoded was announced as the winner in the new approaches: current news category at the news and documentary Emmy awards in New York on Tuesday night.

The comprehensive interactive walks the audience through the facts and implications of the NSA’s mass surveillance program, revealed by the Guardian last year in coverage based on leaks by Snowden.

The interactive includes interviews and discussions with key players including the journalist Glenn Greenwald, former NSA employees, senators and members of US congress.

The project was led by interactives editor and reporter Gabriel Dance, reporter Ewen MacAskill and producers Feilding Cage and Greg Chen.

The Guardian’s former US editor-in-chief Janine Gibson accepted the award.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 3 oktober 2014 @ 22:10:09 #100
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145171188
quote:
quote:
It was July 8, 1981, a broiling Wednesday in Harvard Square, and I was in a quiet corner of the Algiers Coffee House on Brattle Street. A cool, souk-like basement room, with the piney aroma of frankincense, it made for a perfect hideout to sort through documents, jot down notes, and pore over stacks of newspapers while sipping bottomless cups of Arabic coffee and espresso the color of dark chocolate.

For several years I had been working on my first book, The Puzzle Palace, which provided the first in-depth look at the National Security Agency. The deeper I dug, the more troubled I became. Not only did the classified file from the Justice Department accuse the NSA of systematically breaking the law by eavesdropping on American citizens, it concluded that it was impossible to prosecute those running the agency because of the enormous secrecy that enveloped it. Worse, the file made clear that the NSA itself was effectively beyond the law—allowed to bypass statutes passed by Congress and follow its own super-classified charter, what the agency called a “top-secret birth certificate” drawn up by the White House decades earlier.

Knowing the potential for such an unregulated agency to go rogue, I went on to write two more books about the NSA, Body of Secrets, in 2001, and The Shadow Factory, in 2008. My goal was to draw attention to the dangers the agency posed if it is not closely watched and controlled—dangers that would be laid bare in stark detail by Edward Snowden years later.

quote:
But the NSA knew nothing about one of my biggest finds, which took place on the campus of the Virginia Military Institute. Nicknamed “the West Point of the South,” VMI housed the papers of William F. Friedman, a founder of both the NSA and of American cryptology. The NSA’s own auditorium is named after him. Yet Friedman had soured on the agency by the time he retired, and deliberately left his papers to a research library at VMI to get them as far away from the NSA as possible.

After Friedman’s death, and without his permission, agency officials traveled to the library, pulled out hundreds of his personal letters, and ordered them locked away in a secure vault. When I discovered what the NSA had done, I persuaded the library’s archivist to give me access to the letters, all of which were unclassified. Many were embarrassingly critical of the agency, describing its enormous paranoia and obsession with secrecy. Others contained clues to a secret trips that Friedman had made to Switzerland, where he helped the agency gain backdoor access into encryption systems that a Swiss company was selling to foreign countries.

I also discovered that a former NSA director, Lt. Gen. Marshall Carter, had left his papers – including reams of unclassified documents from his NSA office – to the same research library at VMI. They included personal, handwritten correspondence from Carter’s British counterpart about listening posts, cooperative agreements, and other sensitive topics. Later, Carter gave me a long and detailed interview about the NSA. The agency knew nothing about either the documents or the interview.

Following the publication of my book, the NSA raided the research library, stamped many of the Friedman documents secret, and ordered them put back into the vault. “Just because information has been published,” NSA director Lincoln Faurer explained to The New York Times, “doesn’t mean it should no longer be classified.” Faurer also flew to Colorado, where Gen. Carter was living in retirement, met with him at the NSA listening post at Buckley Air Force Base, and threatened him with prosecution if he ever gave another interview or allowed anyone else access to his papers.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 4 oktober 2014 @ 14:02:39 #101
94358 xepera9
soms met een korrel zout
pi_145185481
Goed bezig, Papierversnipperaar.

Ik las dit vandaag:
RT: Germany handed law-protected private data to NSA for years
quote:
Intelligence service BND failed to protect the private data of German citizens as it handed over internet data collected at a Frankfurt traffic hub to the US, German media report citing secret documents.[...]
Duitstalig: http://www.sueddeutsche.de/thema/NSA
  zaterdag 4 oktober 2014 @ 19:24:37 #102
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145193403
quote:
0s.gif Op zaterdag 4 oktober 2014 14:02 schreef xepera9 het volgende:
Goed bezig, Papierversnipperaar.

Ik las dit vandaag:
RT: Germany handed law-protected private data to NSA for years

[..]

Duitstalig: http://www.sueddeutsche.de/thema/NSA
Dank je wel.

Hier het artikel in het Nederlands

'Berlijn gaf VS jarenlang toegang tot internetverkeer'
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 7 oktober 2014 @ 15:24:35 #103
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145295538
quote:
Plasterk houdt hoeveelheid afluisteroperaties AIVD geheim

Minister Ronald Plasterk (Binnenlandse Zaken) wil niet bekendmaken hoeveel personen door de Algemene Inlichtingendienst en Veiligheidsdienst (AIVD) zijn afgeluisterd en bij hoeveel operaties de afluisterbevoegdheid wordt ingezet.

De Commissie van Toezicht betreffende de Inlichtingen- en Veiligheidsdiensten (CTIVD) had deze getallen opgenomen in een rapport (pdf) over het functioneren van de AIVD.

Plasterk besloot echter om de getallen onleesbaar te maken in de uiteindelijk gepubliceerde versie van het rapport, omdat deze te veel inzicht geven in de werkwijze van de inlichtingendienst.

In een brief aan de Tweede Kamer (pdf) stelt Plasterk dinsdag dat de informatie "zich niet leent voor openbaarmaking, zeker wanneer die vanaf nu over meerdere jaren zou worden verstrekt". De 'Commissie Stiekem', bestaande uit alle fractieleiders van de Tweede Kamer, krijgt wel inzicht in de cijfers.

De CTIVD ging van september 2012 tot en met augustus 2013 na hoe de AIVD de afluisterbevoegdheid inzet. Uit het rapport wordt wel duidelijk dat in het onderzochte jaar 11 procent meer personen werden afgeluisterd dan een jaar eerder.

Veiligheid

Ook schrijft de toezichthouder over de "bevoegdheid tot selectie van sigint", waarmee de AIVD bijvoorbeeld activiteit op telefoonnummers of e-mailadressen in de gaten kan houden. Er worden "duizenden" van zulke adressen in de gaten gehouden, stelt de CTIVD.

Burgerrechtenbeweging Bits of Freedom is ontevreden met de geheimhouding van de gegevens, en wil deze via een verzoek op de Wet openbaarheid van bestuur (Wob) alsnog duidelijkheid krijgen.

"De CTIVD kan zelf beter dan minister Plasterk bepalen of dit de nationale veiligheid raakt", aldus Ton Siedsma van Bits of Freedom.

D66-Kamerlid Gerard Schouw zegt te willen weten waarom de cijfers zijn achtergehouden. Hij noemt dit "wonderlijk" en zegt zich af te vragen of dit neerkomt op censuur van de toezichthouder.

Geheimhouding

De Commissie concludeert dat de AIVD in het onderzochte jaar meermaals onrechtmatig heeft gehandeld. Zo zijn tweemaal gesprekken afgeluisterd met 'verschoningsgerechtigden', bijvoorbeeld artsen en advocaten die recht hebben op geheimhouding van communicatie met cliënten. Ook is twee keer te lang afgeluisterd.

Bij een afluisteroperatie naar iemand die samenwerkte met de AIVD, is minister Plasterk niet op de hoogte gebracht van deze samenwerking. Volgens de Commissie was dit "essentieel" voor de beoordeling van het afluisterverzoek en had dat dus wel moeten gebeuren.

Verder gaat de CTIVD in op de mogelijkheid van de AIVD om een gehele organisatie in de gaten te houden, de zogenoemde 'organisatielast'. Hierbij kunnen nieuwe leden van een organisatie worden afgeluisterd zonder dat daar opnieuw toestemming voor hoeft te worden gevraagd aan de minister.

Deze organisatielast is één keer ingezet tegen een groep mensen die volgens de wet niet kan worden gezien als een organisatie, stelt de CTIVD. Ook vindt de Commissie het onduidelijk in welke gevallen mensen kunnen worden toegevoegd aan de organisatielast.

Identiteiten

Het is volgens de Commissie illegaal om in bulk verzamelde gegevens te doorzoeken op zoek naar potentiële doelwitten. Een wetswijziging moet hier verandering in brengen, maar ondertussen doet de AIVD dit al wel.

De CTIVD wil daarom dat het gebruik van de data wordt beperkt tot het vaststellen van identiteiten en het bepalen van de relevantie voor een bepaald onderzoek. Ook moet goed worden geregistreerd welke communicatie is ingezien en wat de uitkomst was.

"Het is hoog tijd dat er een wetswijziging komt, zodat de Kamer zich kan uitlaten over dit soort kwesties", zegt Siedsma van Bits of Freedom.

Minister Plasterk zegt alle aanbeveligen van de Commssie aan te nemen. In sommige gevallen is de werkwijze van de AIVD al aangepast, of wordt de organisatie gevraagd om een betere werkwijze te formuleren.
quote:
quote:
Reporter Radio stapt naar de rechter omdat minister van Binnenlandse Zaken Ronald Plasterk (PvdA) weigert vrij te geven hoeveel mensen door de AIVD worden afgeluisterd.


[ Bericht 5% gewijzigd door Papierversnipperaar op 07-10-2014 18:57:44 ]
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 7 oktober 2014 @ 23:02:48 #104
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145315355
quote:
Politie breekt met spyware op afstand in computers in

De Nederlandse politie dringt met spyware op afstand computers binnen. De wet wordt erg opgerekt, zeggen deskundigen.
quote:
In een brief aan de Tweede Kamer erkent minister Opstelten van Veiligheid en Justitie voor het eerst deze praktijk. Volgens hem mag de politie 'op afstand een computersysteem betreden en gegevensbestanden in beslag nemen'.

Dat is gebeurd 'in een aantal strafzaken waarin het ging om zeer ernstige feiten', schrijft hij in antwoord op vragen van SP-kamerlid Sharon Gesthuizen. Over de precieze werkwijze en effectiviteit wil Opstelten niets zeggen.

De minister reageert hiermee op onthullingen dat de Nederlandse politie het spionageprogramma FinFisher zou gebruiken. In augustus werd de producent van die software, Gamma Intenational, door activisten gehackt. Uit de buitgemaakte bestanden bleek de Landelijke Eenheid van de politie een van de klanten. FinFisher is ook gebruikt door de overheid in Bahrein om dissidenten in de gaten te houden. In het VPRO-programma Tegenlicht, aanstaande zondag, figureert FinFisher als bedrijf dat bugs verkoopt om in computers in te breken.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 10 oktober 2014 @ 19:21:38 #105
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145405034
quote:
EE, Vodafone and Three give police mobile call records at click of a mouse

Three of UK’s big four mobile phone networks are providing customer data to police forces automatically through Ripa

Three of the UK’s four big mobile phone networks have made customers’ call records available at the click of a mouse to police forces through automated systems, a Guardian investigation has revealed.

EE, Vodafone and Three operate automated systems that hand over customer data “like a cash machine”,as one phone company employee described it.

Eric King, deputy director of Privacy International, a transparency watchdog, said: “If companies are providing communications data to law enforcement on automatic pilot, it’s as good as giving police direct access [to individual phone bills].”

O2, by contrast, is the only major phone network requiring staff to review all police information requests, the company said.

Mobile operators must by law store a year of call records of all of their customers, which police forces and other agencies can then access without a warrant using the controversial Regulation of Investigatory Powers Act (Ripa).

Ripa is the interception law giving authority to much of GCHQ’s mass surveillance. The law was again under the spotlight recently after it was used to identify sources of journalists from at least two national newspapers, the Sun and the Mail on Sunday.

Documents from software providers and conversations with mobile companies staff reveal how automatic this system has become, with the “vast majority” of records demanded by police delivered through automated systems, without the involvement of any phone company staff.

The Home Office argues communications data is “a critical tool” and its use of Ripa was “necessary and proportionate”.

Despite politicians’ assurances that the UK laws requiring phone companies to keep records would not create a state database of private communications, critics argue that the practice comes very close to doing so. King warned that “widespread, automatic access of this nature” meant the UK telecoms industry “essentially already provides law enforcement with the joined-up databases they claimed they didn’t have when pushing for the ‘snooper’s charter’.”

In the automated systems used by the phone companies, police officers seeking phone records must gain permission from another officer on the same force, who then enters the details into an online form. That mirrors the US Prism programme, revealed by Edward Snowden, which in effect created a backdoor into the products of US tech corporations. In the vast majority of cases, the information is then delivered without any further human role.

One document prepared by Charter Systems, which sells the type of software used by police forces to connect with mobile phone companies, explains the automated process saves “32 minutes” of human time per application.

“Charter Systems have worked in partnership with the Home Office and Detica [a firm providing data interception for security services and the police, now called BAE Systems Applied Intelligence].

to develop a solution that links directly to all CSPs [communication service providers, a term covering phone companies],” it states. The document explains the system produces “an automated solution for gathering electronic data information. The new solution saves time and effort for the authority in requesting and receiving ever increasing amounts of data.”

The systems were so interconnected, a separate sales document produce by Charter reveals, that “[d]ata can be retrieved from multiple CSPs in one request”.

Privacy groups reacted angrily to the details of how little day-to-day scrutiny records requests receive, warning that the automation of the system removes even the limited oversight ability – the right to refer requests to oversight agencies – phone networks have over Ripa requests.

“We urgently need clarity on just how unquestioning the relationship between telecommunications companies and law enforcement has become,” said King. “It’s crucial that each individual warrant for communications data is independently reviewed by the companies who receive them and challenged where appropriate to ensure the privacy of their customers is not being inappropriately invaded.”

Privacy advocates are also concerned that the staff within phone companies who deal with Ripa and other requests are often in effect paid by the Home Office – a fact confirmed by several networks – and so may, in turn, be less willing to challenge use of surveillance powers.

Several mobile phone networks confirmed the bulk of their queries were handled without human intervention. “We do have an automated system,” said a spokesman for EE, the UK’s largest network, which also operates Orange and T-Mobile. “[T]he vast majority of Ripa requests are handled through the automated system.” The spokesman added the system was subject to oversight, with monthly reports being sent to the law enforcement agency requesting the data, and annual reports going to the interception commissioner and the Home Office.

A spokesman for Vodafone said the company processed requests in a similar way. “The overwhelming majority of the Ripa notices we receive are processed automatically in accordance with the strict framework set out by Ripa and underpinned by the code of practice,” he said. “Even with a manual process, we cannot look behind the demand to determine whether it is properly authorised.”

A spokesman for Three, which is also understood to use a largely automated system, said the company was simply complying with legal requirements. “We take both our legal obligations and customer privacy seriously,” he said. “Three works with the government and does no more or less than is required or allowed under the established legal framework.”

Unlike the other networks, O2 said it did manually review all of its Ripa requests. “We have a request management system with which the law enforcement agencies can make their requests to us,” said the O2 spokeswoman. “All O2 responses are validated by the disclosure team to ensure that each request is lawful and the data provided is commensurate with the request.

Mike Harris, director of the Don’t Spy On Us campaign, said the automated systems posed a serious threat to UK freedom of expression. “How do we know that the police through new Home Office systems aren’t making automated requests that reveal journalist’s sources or even the private contacts of politicians?” he said.

“Edward Snowden showed that both the NSA and GCHQ had backdoor access to our private information stored on servers. Now potentially the police have access too, when will Parliament stand up and protect our fundamental civil liberties?”

A spokesman for the Home Office declined to respond to specific queries about the use of automatic systems to retrieve call records, but defended police forces’ use of Ripa. “Communications data is an absolutely critical tool used by police and other agencies to investigate crime, preserve national security and protect the public,” he said in a statement.

“This data is stored by communications service providers themselves and can only be acquired by public authorities under the Regulation of Investigatory Powers Act 2000 on a case by case basis, and where it is necessary and proportionate to do so.

“The acquisition of communications data under RIPA is subject to stringent safeguards in existing legislation and is independently overseen by the Interception of Communications Commissioner.”

Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 11 oktober 2014 @ 10:04:20 #106
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145422065
quote:
Second leaker in US intelligence, says Glenn Greenwald

Citizenfour, new film on spying whistleblower Edward Snowden, shows journalist Greenwald discussing other source

The investigative journalist Glenn Greenwald has found a second leaker inside the US intelligence agencies, according to a new documentary about Edward Snowden that premiered in New York on Friday night.

Towards the end of filmmaker Laura Poitras’s portrait of Snowden – titled Citizenfour, the label he used when he first contacted her – Greenwald is seen telling Snowden about a second source.

Snowden, at a meeting with Greenwald in Moscow, expresses surprise at the level of information apparently coming from this new source. Greenwald, fearing he will be overheard, writes the details on scraps of paper.

The specific information relates to the number of the people on the US government’s watchlist of people under surveillance as a potential threat or as a suspect. The figure is an astonishingt 1.2 million.

The scene comes after speculation in August by government officials, reported by CNN, that there was a second leaker. The assessment was made on the basis that Snowden was not identified as usual as the source and because at least one piece of information only became available after he ceased to be an NSA contractor and went on the run.

The two-hour documentary was the highlight of the New York Film Festival.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 12 oktober 2014 @ 21:17:20 #107
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145470446
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 14 oktober 2014 @ 15:35:02 #108
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145533085
quote:
UK intelligence agencies need stronger oversight, says David Blunkett

Former home secretary tells committee continued secrecy is undermining public confidence in wake of Snowden revelations

The former home secretary David Blunkett has called for stronger oversight of the UK’s intelligence agencies and warned that the “old-fashioned paternalism” of secrecy based on perceived security interests was undermining public confidence in their activities.

Blunkett called for the legal framework on mass surveillance to be updated on a regular basis and for judicial oversight to be made much more robust and transparent.

The Labour MP’s call came during only the second public evidence session ever held by the intelligence and security committee. Its inquiry into security and privacy was set up following the disclosures by Edward Snowden of the scale of the bulk collection of personal data by GCHQ and the NSA.

The committee heard evidence from the heads of the intelligence agencies earlier this year – its first public evidence session. The inquiry is to take evidence in public from Nick Clegg and Yvette Cooper on Wednesday and from the home secretary, Theresa May, on Thursday. Half of May’s two-hour session will be held in secret.

The chair of the Equality and Human Rights Commission, Baroness Onora O’Neill, told the committee’s MPs and peers that the privacy implications of big data and data mining were such that “the Stasi would have loved it. Thank god they didn’t have it.”

Blunkett, who as home secretary oversaw the introduction of the complex rules surrounding the use of the 2000 Regulation of Investigatory Powers Act (Ripa), which legislates surveillance, warned the committee that it was no longer good enough for the security services to argue that “we know and you mustn’t know” to maintain public confidence in their activities.

He said Britain’s most sophisticated opponents already had a good idea of the capacity of the UK’s security services, and in some cases were ahead of them. Blunkett said it was necessary to tell the public about the methods of the security services to reassure them and to secure their consent: “That is the essence of a free democracy,” he said. “Therefore ensuring people feel comfortable and know enough about what we are doing to feel it is in their interests.

“Sometimes we have to be more sophisticated than saying ‘we can’t tell you anything because it might be a danger’. That actually undermines confidence and consent. It is real old-fashioned paternalism because it is ‘we know but you mustn’t know’.”

Blunkett said the need to update Ripa, which has been described as an “analogue law in a digital age”, was obvious. He reflected that when he first introduced the regulations surrounding the law they were already out of date and needed a ‘second go’.”

Blunkett said the legal framework surrounding surveillance needed updating “each fixed-term parliament” if it was to continue to command public confidence “because people are pushing the boundaries all the time.”

Blunkett also called for a much stronger judicial oversight regime saying the secretive Investigatory Powers Tribunal , which is the only court that can hear complaints of illegal surveillance or human rights breaches by the security services, was in need of a radical overhaul.

“The Investigatory Powers Tribunal needs to be ramped up completely. People need to know a lot more about it. It needs to be a lot more transparent and it needs to demonstrate that it is worth having,” said the former home secretary.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
pi_145538437
Zou Snowden ooit de nobelprijs voor de vrede gegund worden?
  dinsdag 14 oktober 2014 @ 18:07:51 #110
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145538676
quote:
0s.gif Op dinsdag 14 oktober 2014 17:59 schreef polderturk het volgende:
Zou Snowden ooit de nobelprijs voor de vrede gegund worden?
Na de Nobelprijs voor Obama zal me dat aan mijn reet roesten.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
pi_145538722
quote:
7s.gif Op dinsdag 14 oktober 2014 18:07 schreef Papierversnipperaar het volgende:

[..]

Na de Nobelprijs voor Obama al me dat aan mijn reet roesten.
Snowden is wel degene die het echt verdient.
pi_145538754
quote:
0s.gif Op dinsdag 14 oktober 2014 17:59 schreef polderturk het volgende:
Zou Snowden ooit de nobelprijs voor de vrede gegund worden?
De EU gaf geen kick toen twee van haar lidstaten samenspanden om via dubieuze juridische constructies Assange uit te leveren aan een schurkenstaat zonder dat hij in de betrokken landen terzake de wet overtreden had, en die EU kreeg wel de nobelprijs.

Dus nee, ik denk niet dat die legaatrovers en helers hem aan Snowden gaan uitreiken.
Wees gehoorzaam. Alleen samen krijgen we de vrijheid eronder.
pi_145539221
quote:
0s.gif Op dinsdag 14 oktober 2014 18:09 schreef Weltschmerz het volgende:

[..]

De EU gaf geen kick toen twee van haar lidstaten samenspanden om via dubieuze juridische constructies Assange uit te leveren aan een schurkenstaat zonder dat hij in de betrokken landen terzake de wet overtreden had, en die EU kreeg wel de nobelprijs.

Dus nee, ik denk niet dat die legaatrovers en helers hem aan Snowden gaan uitreiken.
Het is dus gewoon een politieke prijs.
pi_145539498
quote:
1s.gif Op dinsdag 14 oktober 2014 18:23 schreef polderturk het volgende:
[..]
Het is dus gewoon een politieke prijs.
Nee, het is iemands erfenis die uit politieke motieven geplunderd wordt.
Wees gehoorzaam. Alleen samen krijgen we de vrijheid eronder.
  donderdag 16 oktober 2014 @ 11:55:38 #115
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145598629
Vreemd. Te veel knippen en plakken levert een lege post op.

BUG / Editten posts --> leeg veld.

[ Bericht 90% gewijzigd door Papierversnipperaar op 16-10-2014 12:01:24 ]
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 16 oktober 2014 @ 11:59:51 #116
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145598765
quote:
quote:
The United Nations’ top official for counter-terrorism and human rights (known as the “Special Rapporteur”) issued a formal report to the U.N. General Assembly today that condemns mass electronic surveillance as a clear violation of core privacy rights guaranteed by multiple treaties and conventions. “The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether,” the report concluded.

Central to the Rapporteur’s findings is the distinction between “targeted surveillance” — which “depend[s] upon the existence of prior suspicion of the targeted individual or organization” — and “mass surveillance,” whereby “states with high levels of Internet penetration can [] gain access to the telephone and e-mail content of an effectively unlimited number of users and maintain an overview of Internet activity associated with particular websites.” In a system of “mass surveillance,” the report explained, “all of this is possible without any prior suspicion related to a specific individual or organization. The communications of literally every Internet user are potentially open for inspection by intelligence and law enforcement agencies in the States concerned.”

Mass surveillance thus “amounts to a systematic interference with the right to respect for the privacy of communications,” it declared. As a result, “it is incompatible with existing concepts of privacy for States to collect all communications or metadata all the time indiscriminately.”

In concluding that mass surveillance impinges core privacy rights, the report was primarily focused on the International Covenant on Civil and Political Rights, a treaty enacted by the General Assembly in 1966, to which all of the members of the “Five Eyes” alliance are signatories. The U.S. ratified the treaty in 1992, albeit with various reservations that allowed for the continuation of the death penalty and which rendered its domestic law supreme. With the exception of the U.S.’s Persian Gulf allies (Saudi Arabia, UAE and Qatar), virtually every major country has signed the treaty.

Article 17 of the Covenant guarantees the right of privacy, the defining protection of which, the report explained, is “that individuals have the right to share information and ideas with one another without interference by the State, secure in the knowledge that their communication will reach and be read by the intended recipients alone.”
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 16 oktober 2014 @ 20:49:19 #117
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145615634
quote:
FBI director attacks tech companies for embracing new modes of encryption

James Comey says data encryption could deprive police and intelligence companies of potentially live-saving information

The director of the FBI savaged tech companies for their recent embrace of end-to-end encryption and suggested rewriting laws to ensure law enforcement access to customer data in a Thursday speech.

James Comey said data encryption such as that employed on Apple’s latest mobile operating system would deprive police and intelligence companies of potentially life-saving information, even when judges grant security agencies access through a warrant.

“Criminals and terrorists would like nothing more than for us to miss out,” he said. Technologists have found such statements reminiscent of the “Crypto Wars” of the 1990s, an earlier period in which the US government warned about encryption constraining law enforcement.

Framing his speech at the Brookings Institution as kickstarting a “dialogue” and insisting he was not a “scare-monger”, Comey said “encryption threatens to lead us all to a very, very dark place.”

Comey also posed as a question “whether companies not subject currently to Calea should be required to build lawful intercept capabilities for law enforcement,” something he contended would not “expand” FBI authorities.” Calea is a 1994 surveillance law mandating that law enforcement and intelligence agencies have access to telecommunications data, which Comey described as archaic in the face of technological innovation.

“I’m hoping we can now start a dialogue with Congress on updating it,” Comey said.

Privacy advocates contend Comey is demagoguing the issue.

It took a June supreme court ruling, they point out, for law enforcement to abandon its contention that it did not require warrants at all to search through smartphones or tablets, and add that technological vulnerabilities can be exploited by hackers and foreign intelligence agencies as the US government. Additionally, the FBI and police retain access to data saved remotely in the so-called “cloud” – where much data syncs for storage from devices like Apple’s – for which companies like Apple keep the encryption keys.

Comey, frequently referring to “bad guys” using encryption, argued access to the cloud is insufficient.

“Uploading to the cloud doesn’t include all the stored data on the bad guy’s phone,” he said.

“It’s the people who are most worried what’s on the device who will be most likely to avoid the cloud.”

Tech companies contend that their newfound adoption of encryption is a response to overarching government surveillance, much of which occurs either without a warrant, subject to a warrant broad enough to cover indiscriminate data collection, or under a gag order following a non-judicial subpoena. Comey did not mention such subpoenas, often in the form of National Security Letters, in his remarks.

The National Security Agency, whistleblower Edward Snowden revealed, accesses customer information in transit between Google and Yahoo data centers, as one of its surveillance tools.

“The people who are criticizing this are the ones who should have expected this,” Google CEO Eric Schmidt said last week.

Christopher Soghoian, the chief technologist for the American Civil Liberties Union, called Comey’s speech “disappointing”.

“What was missing from his remarks was an acknowledgement that when Congress passed Calea in 1994, they explicitly protected the rights of companies that wanted to build encryption into their products – encryption with no backdoors, encryption with no keys that are held by the company,” Soghoian said.

“So if he wants to get what he’s describing, not only is he talking about expanding Calea to technology companies and not just communications companies, but to be successful, he would have to remove that provision of Calea, and that would be a major and negative step.”

Comey praised Apple and Google as run by “good people” and said he recognized their embrace of encryption responded to “perceive[d]” market pressures in the wake of Snowden’s disclosures. But Comey suggested that end-to-end mobile device encryption amounted to a safe haven for criminals.

“Are we no longer a country that is passionate both about the rule of law and about their being no zones in this country beyond the reach of that rule of law? Have we become so mistrustful of government and law enforcement in particular that we are willing to let bad guys walk away, willing to leave victims in search of justice?” he said.

Comey acknowledged that the Snowden disclosures caused “justifiable surprise” among the public about the breadth of government surveillance, but hoped to mitigate it through greater transparency and advocacy.

Yet the FBI keeps significant aspects of its surveillance reach hidden even from government oversight bodies. Intelligence officials said in a June letter to a US senator that the FBI does not tally how often it searches through NSA’s vast hoards of international communications, without warrants, for Americans’ identifying information.

Comey frequently described himself as being technologically unprepared to offer specific solutions, and said he meant to begin a conversation, even at the risk of putting American tech companies at a competitive disadvantage.

“Where we may get is to a place where the US, through its Congress, says, ‘You know what, we need to force this on American companies,’ and maybe they’ll take a hit. Someone in some other country will say, ‘Ah, we sell a phone that even with lawful authority people can’t get into.’ But that we as a society are willing to have American companies take that hit. That’s why we have to have this conversation,” Comey said.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 17 oktober 2014 @ 20:16:10 #118
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145648336
quote:
Apple defies FBI and offers encryption by default on new operating system

New version of Mac OS X will encrypt users’ hard drives unless they explicitly decline, in spite of pleas by the FBI not to

The latest version of Apple’s operating system for desktop and laptop computers, Mac OS X 10.10 “Yosemite”, encourages users to turn on the company’s FileVault disk encryption, as the company hardens its pro-security stance.

The decision to encourage encryption, so that users must opt out – rather than opting in as has been the case since FileVault was introduced in 2003 – shows the company refusing to back down to pressure from the US government to restrict the availability of cryptographic tools to the public.

On Thursday, the FBI’s director, James Comey, decried the company’s decision to offer similar tools on mobile devices running iOS 8.

“With Apple’s new operating system, the information stored on many iPhones and other Apple devices will be encrypted by default,” Comey told the Brookings Institute in Washington DC. “Shortly after Apple’s announcement, Google announced plans to follow suit with its Android operating system. This means the companies themselves won’t be able to unlock phones, laptops, and tablets to reveal photos, documents, email, and recordings stored within.”

Comey continued: “At the outset, Apple says something that is reasonable – that it’s not that big a deal … Apple argues, for example, that its users can back up and store much of their data in ‘the cloud’ and that the FBI can still access that data with lawful authority. But uploading to the cloud doesn’t include all of the stored data on a bad guy’s phone, which has the potential to create a black hole for law enforcement.”

But despite Comey’s pleas, the company shipped Yosemite with the FileVault option intact. The install process for the new operating system asks users if they would “like to use FileVault to encrypt the disk” on their Macs. Ticked by default are two boxes, “Turn on FileVault disk encryption” and “Allow my iCloud account to unlock my disk”.

That means that unless the user actively declines the offer, their hard drives will be encrypted.

Unlike a standard password-protected computer, which leaves the contents of a hard-drive accessible to anyone with the patience to remove the drive, FileVault encrypts the entire contents of a device at disk level, rendering it impossible for anyone without the login password to access the data on the computer.

While the FBI has condemned Apple’s new commitment to security, civil liberties organisations have welcomed the decision. “We applaud tech leaders like Apple and Google that are unwilling to weaken security for everyone to allow the government yet another tool in its already vast surveillance arsenal,” said the American Civil Liberties Union’s Laura Murphy following Comey’s speech. “We hope that others in the tech industry follow their lead and realize that customers put a high value on privacy, security and free speech.”

Users on older versions of Mac OS X can still enable FileVault, but must dig into the operating system’s settings to do so; the feature is buried under the Security & Privacy option in the system preferences. Windows users have long had access to a similar tool, also not enabled by default, called BitLocker, which can be turned on using Windows Explorer. It is not yet known whether Microsoft will make BitLocker use opt-out in its forthcoming Windows 10 release, expect next year and presently in developer testing.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 18 oktober 2014 @ 01:11:40 #119
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145658939
quote:
Senior NSA official moonlighting for private cybersecurity firm

- Patrick Dowd recruited by former NSA director Keith Alexander
- Unusual for US official to work for private, for-profit company


The former director of the National Security Agency has enlisted the US surveillance giant’s current chief technology officer for his lucrative cybersecurity business venture, an unusual arrangement undercutting Keith Alexander’s assurances he will not profit from his connections to the secretive, technologically sophisticated agency.

Patrick Dowd continues to work as a senior NSA official while also working part time for Alexander’s IronNet Cybersecurity, a firm reported to charge up to $1m a month for advising banks on protecting their data from hackers. It is exceedingly rare for a US official to be allowed to work for a private, for-profit company in a field intimately related to his or her public function.

Reuters, which broke the story of Dowd’s relationship with IronNet, reported that the NSA is reviewing the business deal.

Since retiring from the NSA in March and entering the burgeoning field of cybersecurity consulting, Alexander has vociferously defended his ethics against charges of profiting off of his NSA credentials. Alexander was the founding general in charge of US Cyber Command, the first military command charged with defending Defense Department data and attacking those belonging to adversaries. Both positions provide Alexander with unique and marketable insights into cybersecurity.

His final year as the agency’s longest serving director was characterised by reacting to Edward Snowden’s disclosures – and the embarrassment of presiding over the largest data breach in the agency’s history – and publicly urging greater cybersecurity cooperation between the agency and financial institutions.

“I’m a cyber guy. Can’t I go to work and do cyber stuff?” Alexander told the Associated Press in August.

Alexander, whose adult life was spent in uniform, intends to file patents for what he has described obliquely as a new forecasting model for detecting network intrusions. His assurance prompted speculation that the retired general is profiting from technical sophistication that competitors who do not have a US intelligence pedigree cannot hope to replicate.

Alexander portrayed Dowd’s unusual joint positions with the NSA and IronNet as a way for the public to keep benefitting from Dowd’s expertise, while saying less about how Alexander will profit from the same skill set.

“I just felt that his leaving the government was the wrong thing for NSA and our nation,” Alexander told Reuters.

The NSA, whose operations are almost entirely secret, has long been criticised for its close corporate ties. One long-serving official, William Black Jr, left the agency for Science Applications International Corporation, before returning in 2000 as deputy director.

While Black was in his senior position, SAIC won an NSA contract to develop a data-mining programme, called Trailblazer, that was never implemented, despite a cost of over $1bn. Whistleblowers have charged that Trailblazer killed a more privacy-protective system called ThinThread.

Black, however, did not serve simultaneously at the NSA and SAIC.

Compounding the potential financial conflicts at the NSA, Buzzfeed reported that the home of chief of its Signals Intelligence Directorate, Teresa Shea, has a signals-intelligence consulting firm operating out of it. The firm is run by her husband James, who also works for a signals-intelligence firm that Buzzfeed said appears to do business with the NSA; and Teresa Shea runs an “office and electronics” business that lists a Beechcraft plane among its assets.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 19 oktober 2014 @ 15:43:42 #120
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145701244
quote:
quote:
The chief executive of the “anonymous” social media app Whisper broke his silence late on Saturday, saying he welcomed the debate sparked by Guardian US revelations about his company’s tracking of users and declaring “we realise that we’re not infallible”.

Michael Heyward’s statement was his first public response to a series of articles published in the Guardian which revealed how Whisper monitors the whereabouts of users of an app he has in the past described as “the safest place on the internet”.

Whisper hosts 2.6 million messages a day posted through its app, which promises users a place to “anonymously share your thoughts and secrets” and has billed itself as a platform for whistleblowers.

The Guardian’s disclosures, which were based on a visit to Whisper’s headquarters and detailed conversations with its executives, prompted privacy experts to call for a federal inquiry into the company.

Heyward, who stayed silent for more than 48 hours, came under intense pressure to respond to the controversy. His statement was posted on a blog late on Saturday.

Unlike other Whisper representatives, who have strongly denied the disclosures, Heyward did not dispute the accuracy of the Guardian’s reporting. But he insisted his company was founded on “honesty and transparency” and indicated Whisper would take firm action against employees who breach those values.

“Above all else, we always strive to do right by our users,” he said. “We have zero tolerance for any employee who violates that trust.”

Heyward expressed “dismay” that the Guardian, which had previously collaborated with Whisper on three small projects, “published a series of stories questioning our commitment to your privacy”.

“While we’re disappointed with the Guardian’s approach, we welcome the discussion,” Heyward said. “We realise that we’re not infallible, and that reasonable people can disagree about a new and quickly evolving area like online anonymity.”

In formal responses to the Guardian’s reports, Whisper had insisted it “does not follow or track users”. Heyward, however, said only that Whisper does not “actively” track users.

The 27-year-old CEO’s remarks contrast with those of his editor-in-chief, Neetzan Zimmerman, who mounted an offensive immediately after the reports were published, accusing Guardian journalists of fabricating quotes and denouncing the reports as “a pack of vicious lies”.

The Guardian witnessed how Zimmerman’s editorial team monitors the movements of certain users during a three-day visit to the company’s California headquarters to explore the possibility of future editorial collaboration. Two Guardian reporters were given access to Whisper’s back-end tools and spoke extensively with company executives.

Zimmerman’s team uses an in-house mapping tool to research the movements of users who have opted into geolocation services, using GPS data which is “fuzzed” to be accurate within 500 metres of where messages are posted. The reporters witnessed how Zimmerman’s team tried to determine the “veracity” of potentially newsworthy users by researching their location, sifting through their trail of previous posts and and tracing their movements over time.

When researching users who had disabled geolocation services – preventing the company from accessing their GPS-based data – Whisper executives explained how the editorial team instead relied on IP data to work out a targeted user’s approximate location.

Zimmerman contested the Guardian’s detailed account of those practices, saying it was “100% false” and “a 100% lie” to say the editorial team ever accessed rough location data for people who have opted out. “When I specifically say that they are lying, that’s what I mean – that does not happen, and it simply can’t happen,” he told the tech news site Gigaom.

However, Whisper’s senior vice-president, Eric Yellin, had already acknowledged the practice, telling the Guardian before the stories were published: “We occasionally look at user IP addresses internally to determine very approximate locations.” The admission was made in an email exchange about the location-tracking practices of Whisper’s editorial team.

Heyward acknowledged in his statement on Saturday that Whisper collects IP data which can infer rough location data but did not specify how that information is used – except to say it is sometimes shared with law enforcement. Heyward also acknowledged that Whisper does look at the past activity of some users on the app to “assess the authenticity” of their posts.

Heyward also responded to the Guardian’s disclosure that Whisper was sharing user information with a suicide prevention study run by the Pentagon, based on smartphones the social media app can pinpoint to military bases. Users had not been told about the research. Heyward said Whisper was “proudly working with organisations to lower suicide rates, including the Department of Defense’s Suicide Prevention Office”. He added: “We can’t wait to establish more of these relationships and effect real change.”

The Guardian also revealed on Thursday that Whisper was developing a version of its app to comply with Chinese censorship laws, and indefinitely archiving data, including messages users may think they have deleted, in a database. Heyward’s statement did not address those disclosures.

His company had built media partnerships with the cable TV channel Fusion and the online news website Buzzfeed, and was searching for new partners. Heyward said a key part of Whisper’s mission was to “shine a light” on important social issues, and his blogpost linked to stories that have been published on Buzzfeed. “We look forward to continuing this important work with our partners,” Heyward said.

Both Buzzfeed and Fusion have suspended their partnerships with the social media app in the wake of the Guardian’s revelations.

Heyward said changes to Whisper’s terms of use and privacy policy were “not related” to the Guardian’s reporting. Whisper rewrote its terms of service on Monday – four days after learning the Guardian planned to publish details about its business practices.

Heyward said these changes were finalised in July and were due to be published in October, along with a new website. Heyward did not mention the update to Whisper’s terms of service that occurred in September. Explaining the decision to change the terms of service, again, on Monday, he said: “Our communications with the Guardian made it clear that our users would benefit from seeing them sooner”.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 20 oktober 2014 @ 15:25:07 #121
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145735440
quote:
‘Crypto wars’ return to Congress

FBI Director James Comey has launched a new “crypto war” by asking Congress to update a two-decade old law to make sure officials can access information from people’s cell phones and other communication devices.

The call is expected to trigger a major Capitol Hill fight about whether or not tech companies need to give the government access to their users.

“It's going to be a tough fight for sure,” Rep. James Sensenbrenner (R-Wis.), the Patriot Act’s original author, told The Hill in a statement.

He argues Apple and other companies are taking the privacy of consumers into their own hands because Congress has failed to pass legislation in response to public anger over the National Security Agency’s surveillance programs.

“While Director Comey says the pendulum has swung too far toward privacy and away from law enforcement, he fails to acknowledge that Congress has yet to pass any significant privacy reforms,” he added. “Because of this failure, businesses have taken matters into their own hands to protect their consumers and their bottom lines.”

Comey argues that trend will make it harder to solve crimes.

“If this becomes the norm, I suggest to you that homicide cases could be stalled, suspects walked free, child exploitation not discovered and prosecuted,” he said last week.

Comey is asking that Congress update the Communications Assistance for Law Enforcement Act (CALEA), a 1994 law that required telephone companies make it possible for federal officials to wiretap their users.

Many new mobile applications and other modern devices aren’t included under the law, however, making it difficult if not impossible for police to get a suspect’s records — even with a warrant.

Forcing companies to put in a “back door” to give officials access would also open them up to hackers in China and Russia, opponents claim, as well as violate Americans’ privacy rights.

Comey claimed the FBI was not looking for a “back door” into people’s devices.

“We want to use the front door with clarity and transparency,” he said.

But for critics, that’s a distinction without a difference.

“The notion that it’s not a back door; it’s a front door — that’s just wordplay,” said Bruce Schneier, a computer security expert and fellow at Harvard’s Berkman Center for Internet and Society. “It just makes no sense.”

It was reminiscent, he said, of the mid-1990s debate over the “Clipper Chip,” an electronic chip that federal officials wanted to insert in devices allowing them to get access to people’s communications. In the end, Congress did not require that companies use that chip in their technology.

Similar arguments have emerged every few years, as technology has gotten better and government agents have feared being left behind.

“This is the third or fourth replay,” said Greg Nojeim, senior counsel at the Center for Democracy and Technology. “So far Congress has done the right thing and stood aside when companies are given the latitude they need to make communications devices and services more secure.”

Early indications are that it could be an uphill push for the FBI.

“I’d be surprised if more than a handful of members would support the idea of backdooring Americans’ personal property,” Sen. Ron Wyden (D-Ore.), who would staunchly oppose the measure, said in a statement shared with The Hill.

Rep. Darrell Issa (R-Calif.), the chairman of the House Oversight Committee, on Friday tweeted that the administration would be making a “tough sell” by pushing an update to CALEA.

“To FBI Director Comey and the [administration] on criticisms of legitimate businesses using encryption: you reap what you sow,” he wrote.

Rep. Zoe Lofgren (D-Calif.) predicted that any bill would have “zero chance” of passing.

Earlier this year, she and Rep. Thomas Massie (R-Ky.) introduced a measure to the defense spending bill banning the National Security Agency from using “backdoor” searches to spy on Americans through a legal provision targeting foreigners. That measure overwhelmingly passed the House 293-123.

While the NSA’s spying is different from the FBI’s requested updated to CALEA, the spirit is the same, she said.

“I think the public would not support it, certainly industry would not support it, civil liberties groups would not support it,” Lofgren told The Hill. “I think [Comey is] a sincere guy, but there’s just no way this is going to happen.”

Still, the FBI is unlikely to drop the pressure, especially if tech companies keep putting a focus on their privacy protections.

“This is a long-term discussion that has been coming and I expect to continue,” said Carl Szabo, a lobbyist for NetChoice, a trade group for online businesses including Google, eBay and Yahoo.

As for the chances of a CALEA update, he is opposed but isn’t assuming the FBI will stand down.

“I never underestimate anything,” he said.

“I always think that there is a chance, even if it’s not as sweeping as installing a front door master key on every mobile device, it could be installing a small backdoor.”
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 21 oktober 2014 @ 02:02:32 #122
313372 Linkse_Boomknuffelaar
Stop de wapenlobby. Vrede!
  donderdag 23 oktober 2014 @ 20:34:45 #123
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145863840
quote:
Ministers should assess UK surveillance warrants, says Philip Hammond

Foreign secretary rejects judicial scrutiny, saying political judgment is required to assess validity of GCHQ operations

The foreign secretary, Philip Hammond, on Thursday rejected suggestions that judges should approve electronic surveillance warrants, arguing that only ministers could exercise the political judgment necessary to ensure that such surveillance was necessary and proportionate.

Hammond was giving evidence to parliament’s intelligence and security committee, which is reviewing the need for new oversight legislation to regulate the UK’s electronic espionage agency, GCHQ, in the light of the revelations on bulk data collection made by the former US intelligence contractor Edward Snowden.

Hammond told the committee that GCHQ’s bulk collection of private data from emails, internet activity and telephone usage did not amount to mass surveillance because the state did not have the resources to trawl through the huge volume of information involved, and because of legal safeguards on how the data was used.

“There’s also a very important safeguard provided by the culture within the agencies, which is the exact opposite of what some movies might like to suggest,” he said.

“The agencies are extremely cautious, extremely focused on their responsibility to maintain the culture of proportionality and necessity in everything they do. And there is an atmosphere … which is very far from a gung-ho approach. It is very cautious, very measured.”

Hammond – who oversees the work of GCHQ and the Secret Intelligence Service, MI6 – confirmed that any email or internet search that went through a foreign server was treated as an external communication and therefore subject to a different clause in the Intelligence Services Act. That in turn allows the foreign secretary to authorise much broader examination by the intelligence agencies than is the case with domestic communications. However, he insisted that once it becomes clear someone on British soil is party to the communication, there is a legal mechanism that once more narrows the scope of warrant.

Privacy and civil rights groups have argued that, in light of the Snowden revelations, all electronic surveillance warrants should go before a judge to ensure the phenomenal power available to government as a result of modern surveillance technology should be subject to some form of judicial constraint. Hammond countered that judges would assess surveillance warrant requests primarily from a legal standpoint. Only an elected official could properly apply political judgment on the necessity and proportionality of an eavesdropping operation.

The foreign secretary said that in issuing surveillance warrants he was subject not just to legal but also to political constraints, which were narrower.

“Perhaps it is a feature of the times that we live in, but I’m sure I can speak for all my colleagues who sign warrants that we all have, in the back of our minds, that at some point in the future we will – not might be, but will – be appearing before some inquiry or tribunal or court to account for the decisions we’ve made,” Hammond said.

Mike Harris, the campaign director of Don’t Spy on Us, a coalition of privacy and digital rights advocacy groups, argued that ministers should indeed make political judgments on warrants, but their decisions should then be reviewed by judges.

“The safeguards he talks about are not safeguards at all. It is very hard to tell in practice who is a UK-based party to a communication,” Harris said. “This comes in the context of an absence of judicial oversight and a lack of scrutiny from parliament and an under-resourcing of the intelligence commissioners, so in effect the public can’t be certain that the reassurances from the minister are upheld in any way by intelligence agencies.”
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 24 oktober 2014 @ 20:39:18 #124
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145901152
quote:
quote:
A few days ago, the FTC announced that it had appointed Ashkan Soltani as its chief technology officer. Soltani is a well-known (and often outspoken) security researcher who has worked at the FTC in the past. Nothing about this appointment should be all that surprising or even remotely controversial. However, recently, Soltani had been doing a lot of journalism work, as a media consultant at the Washington Post helping Barton Gellman and other reporters really understand the technical and security aspects of the Snowden documents. His name has appeared as a byline in a number of stories about the documents, detailing what is really in those documents, and how they can impact your privacy.

Apparently, this has upset the usual crew of former NSA officials.

Let's start with former NSA director Michael Hayden. The publication FedScoop heard the news about Soltani, and decided to ask Hayden and other NSA-types their thoughts. You can tell by the opening paragraph what angle FedScoop is digging for with its article:
Het artikel gaat verder.

[ Bericht 100% gewijzigd door Papierversnipperaar op 24-10-2014 22:35:11 ]
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 26 oktober 2014 @ 11:40:54 #125
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_145952840
quote:
quote:
Deception and Propaganda in Social Media

A year after the revelations by Edward Snowden, more or less everybody is aware of the astonishing extent of online surveillance. An outcome of this increased awareness is the development of various protective measures, including encryption practices, privacy protection measures as well as the development of anonymised platforms, such as Kwikdesk, an anonymous and ephemeral version of Twitter. However, other aspects of state and corporate control of social media have received less attention. In the face of rising inequality and increasing political mobilisation from the bottom, the ruling class must pro-actively defend the current power structures and a way to do this includes not only surveillance, but also deception and propaganda in social media. The really dark Internet is a reference to this layer of surveillance and disinformation – the spread of false information which intends to undermine, confuse, disrupt, and eventually defuse any socio-political action that threatens to unsettle the status quo.

With surveillance a given, we must now begin to learn about strategies and tactics of deception and disinformation, coming from states, reactionary and fascist political groupings, and corporations.

While a lot has been written on the signal intelligence contents of the NSA documents, less is known about the kinds of human intelligence used by government agencies and corporations. In a leaked NSA presentation which would have made Goebbels proud, a British spy agency – the Joint Threat Research Intelligence Group (JTRIG) – explicitly refers to its digital propaganda tactics: the circulation of false information aimed at destroying the reputation of its targets and the use of insights from the social sciences in order to manipulate online communications in line with their political objectives.

The presentation goes on to list techniques for dissimulation or ‘hiding the real’ through ‘masking, repackaging, and dazzling’, and for simulation, or ‘showing the false’ through ‘mimicking, inventing and decoying’; it goes on to refer to techniques for managing attention, infiltrating networks, planting ruses and causing disruption. The aim is to build ‘cyber-magicians’, who can confuse and manipulate ‘targets’. The presentation concludes by estimating that ‘by 2013 JTRIG will have a staff of 150+, fully trained’. Though we cannot be sure of the status of such plans following the leaks, it would be naïve to assume that they have been dropped.
- See more at: http://theoccupiedtimes.org/?p=13166#sthash.2yopTRUk.dpuf
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 28 oktober 2014 @ 15:41:23 #126
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146036605
AnonyOps twitterde op dinsdag 28-10-2014 om 14:45:06 The FBI has reportedly raided the home of a "2nd Snowden". Watch how they treat them for an example of how they would have treated Snowden reageer retweet
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 28 oktober 2014 @ 16:25:15 #127
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146038560
quote:
Feds identify suspected 'second leaker' for Snowden reporters

The FBI recently searched a government contractor's home, but some officials worry the Justice Department has lost its 'appetite' for leak cases

The FBI has identified an employee of a federal contracting firm suspected of being the so-called "second leaker" who turned over sensitive documents about the U.S. government's terrorist watch list to a journalist closely associated with ex-NSA contractor Edward Snowden, according to law enforcement and intelligence sources who have been briefed on the case.

The FBI recently executed a search of the suspect's home, and federal prosecutors in Northern Virginia have opened up a criminal investigation into the matter, the sources said.

But the case has also generated concerns among some within the U.S. intelligence community that top Justice Department officials — stung by criticism that they have been overzealous in pursuing leak cases — may now be more reluctant to bring criminal charges involving unauthorized disclosures to the news media, the sources said. One source, who asked not to be identified because of the sensitivity of the matter, said there was concern "there is no longer an appetite at Justice for these cases."

Marc Raimondi, a spokesman for the Justice Department, declined to comment on the investigation into the watch-list leak, citing department rules involving pending cases.

As for the department's overall commitment to pursue leak cases, he added: "We're certainly going to follow the evidence wherever it leads us and take appropriate action."

Another source familiar with the case said: "Investigators are continuing to pursue it, but are not ready to charge yet."

The case in question involves an Aug. 5 story published by The Intercept, an investigative website co-founded by Glenn Greenwald, the reporter who first published sensitive NSA documents obtained from Snowden.

Headlined "Barack Obama's Secret Terrorist-Tracking System, by the Numbers," the story cited a classified government document showing that nearly half the people on the U.S. government's master terrorist screening database had "no recognized terrorist affiliation."

The story, co-authored by Jeremy Scahill and Ryan Devereaux, was accompanied by a document "obtained from a source in the intelligence community" providing details about the watch-listing system that were dated as late as August 2013, months after Snowden fled to Hong Kong and revealed himself as the leaker of thousands of top secret documents from the NSA.

This prompted immediate speculation that there was a "second leaker" inside the U.S. intelligence community providing material to Greenwald and his associates.

That point is highlighted in the last scene of the new documentary about Snowden released this weekend, called "Citizenfour," directed by filmmaker Laura Poitras, a co-founder with Greenwald and Scahill of The Intercept.

Greenwald tells a visibly excited Snowden about a new source inside the U.S. intelligence community who is leaking documents. Greenwald then scribbles notes to Snowden about some of the details, including one briefly seen about the U.S. drone program and another containing a reference to the number of Americans on the watch list.

"The person is incredibly bold," Snowden says. Replies Greenwald: "It was motivated by what you did."

In an interview on the radio show "Democracy Now," Scahill, who also briefly appears in "Citizenfour," says the new source described in the film provided him with a document that "outlines the rulebook for placing people on a variety of watch lists." The source is "an extremely principled and brave whistleblower" who made his disclosures "at great personal risk," Scahill says in the interview.

Contacted Monday, Scahill declined any comment about his source, but said neither he nor The Intercept had been notified by federal officials about the investigation. He added, however, that he is not surprised to learn of the probe: "The Obama administration in my view is conducting a war against whistleblowers and ultimately against independent journalism."

John Cook, editor of The Intercept, said the website's stories had revealed "crucial information" about the excesses of the U.S. watch-listing system. "Any attempt to criminalize the public release of those stories benefits only those who exercise virtually limitless power in secret with no accountability," he told Yahoo News.

Sources familiar with the investigation say the disclosures prompted the National Counterterrorism Center to file a "crimes report" with the Justice Department — an official notification that classified material has been compromised and a violation of federal law may have taken place.

The documents in question disclose multiple details about how federal intelligence agencies provide entries and track suspects on the Terrorist Identities Datamart Environment, or TIDE — a master database with over 1 million names that provides the basis for watch-listing individuals and placing them on "no fly" lists when there are sufficient links to terrorism.

One document is stamped as "Secret" and "NOFORN," meaning it cannot be shared with foreign governments. These, however, are far less sensitive than some of the NSA materials leaked by Snowden.

During Obama's first five years as president, the Justice Department and the U.S. military brought seven criminal prosecutions for national security leaks — more than twice as many as all previous presidents put together.

But the Obama administration's aggressive anti-leak efforts triggered a firestorm of criticism last year after disclosures that, in pursuing these cases, prosecutors had secretly subpoenaed phone records from the Associated Press and filed a search warrant identifying a Fox News reporter as a potential "co-conspirator" under the Espionage Act for his efforts to coax information from a confidential source.

Since September of last year, when a former FBI agent pleaded guilty to disclosing details about an al-Qaida bomb plot to the AP, the Justice Department has brought no further leak cases. Attorney General Eric Holder — who sources say was personally stung by the criticism — has also unveiled new "guidelines" that restrict how the Justice Department would seek information from the news media in leak cases.

Holder, who recently announced his plans to step down, also appeared to signal that he was eager to avoid further confrontations with the press when he was asked whether he would seek to incarcerate New York Times reporter James Risen if he refused to testify in an upcoming trial of a former CIA officer accused of leaking him information about a covert effort to disrupt Iran's nuclear program. Risen has vowed he will never testify about a confidential source.

"As long as I am attorney general, no reporter who is doing his job will go to jail," Holder said at a meeting with news media representatives when asked about the Risen case.

But Steve Aftergood, who closely tracks government secrecy efforts, said, "It's an open question at this point whether the administration will indict any other leakers or pursue other prosecutions."

He noted that, despite Holder's comments, Justice Department prosecutors had yet to formally inform a federal judge whether they will call Risen at the trial of the former CIA officer — a move that could result in a direct confrontation with the reporter if he is asked to identify his source.

"These leaks are taken extremely seriously," he said. If prosecutors have sufficient evidence against the suspected new leaker, "I don't think they will let it slide."
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 29 oktober 2014 @ 12:01:48 #128
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146068178
quote:
GCHQ views data without a warrant, government admits

GCHQ’s secret ‘arrangements’ for accessing bulk material revealed in documents submitted to UK surveillance watchdog

British intelligence services can access raw material collected in bulk by the NSA and other foreign spy agencies without a warrant, the government has confirmed for the first time.

GCHQ’s secret “arrangements” for accessing bulk material are revealed in documents submitted to the Investigatory Powers Tribunal, the UK surveillance watchdog, in response to a joint legal challenge by Privacy International, Liberty and Amnesty International. The legal action was launched in the wake of the Edward Snowden revelations published by the Guardian and other news organisations last year.

The government’s submission discloses that the UK can obtain “unselected” – meaning unanalysed, or raw intelligence – information from overseas partners without a warrant if it was “not technically feasible” to obtain the communications under a warrant and if it is “necessary and proportionate” for the intelligence agencies to obtain that information.

The rules essentially permit bulk collection of material, which can include communications of UK citizens, provided the request does not amount to “deliberate circumvention” of the Regulation of Investigatory Powers Act (Ripa), which governs much of the UK’s surveillance activities.

This point – that GCHQ does not regard warrants as necessary in all cases – is explicitly spelled out in the document. “[A] Ripa interception warrant is not as a matter of law required in all cases in which unanalysed intercepted communications might be sought from a foreign government,” it states. The rules also cover communicationsdata sent unsolicited to the UK agencies.

Campaigners say that this contrasts with assurances by parliament’s Intelligence and Security Committee in July last year that a warrant signed by a minister was in place whenever GCHQ obtained intelligence from the US.

The data can then be stored for up to two years, the same duration as information collected directly by the agency. This can be extended unilaterally if a senior official believes it to be necessary and proportionate for national security purposes.

Privacy International, one of several advocacy groups mounting legal challenges against GCHQ and NSA surveillance, said the revelation should cast further doubts on legal safeguards in the UK.

“We now know that data from any call, internet search, or website you visited over the past two years could be stored in GCHQ’s database and analysed at will, all without a warrant to collect it in the first place,” said deputy director Eric King. “It is outrageous that the government thinks mass surveillance, justified by secret “arrangements” that allow for vast and unrestrained receipt and analysis of foreign intelligence material is lawful.”

The group also said information obtained through these overseas “arrangements” was treated as if it were targeted surveillance, removing a requirement under UK law not to search for UK citizens and residents in such data troves. This means that British citizens could, in theory, be subject to warrantless monitoring by GCHQ.

Amnesty International and Liberty, the co-complainants in the IPT case, echoed Privacy International’s call for reform of surveillance safeguards.

“It is time the government comes clean on such crucial issues for people’s privacy as the sharing of communications intercepts with foreign governments,” said Amnesty International director of law and policy Mike Bostock. “Secret rules are woefully inadequate.”

Liberty’s legal director James Welsh said the tribunal submissions contradicted public statements from the government.

“The line the Government took at the hearing was that there were adequate safeguards, they just couldn’t be made public,” he said. “Leaving aside whether secret safeguards can ever be adequate, this reluctantly-made disclosure suggests otherwise.”

Last week, the foreign secretary, Phillip Hammond, told parliament’s Intelligence and Security Committee he expected that minister who signed surveillance warrants would likely have to justify themselves in front of a public inquiry at some point in the future.

“I’m sure I can speak for all of my colleague who sign warrants that we all have, in the back of our minds, that at some point in the future we will – not might be, but will – be appearing before some inquiry or tribunal or court accounting for the decisions that we’ve made and essentially accounting for the way we’ve applied the proportionality and necessity tests,” he said.

Hammond was also criticised for some of his answers to the committee, with experts suggesting the foreign secretary appeared not to understand the legal framework for the warrants he was signing , following a mischaracterisation of which types of communication would or would not require individual warrants.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 29 oktober 2014 @ 21:11:43 #129
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146090768
quote:
FBI demands new powers to hack into computers and carry out surveillance

Agency requests rule change but civil liberties groups say ‘extremely invasive’ technique amounts to unconstitutional power grab

The FBI is attempting to persuade an obscure regulatory body in Washington to change its rules of engagement that would grant it significant new powers to hack into and carry out surveillance of computers throughout the US and around the world.

Civil liberties groups warn that the proposed rule change amounts to a power grab by the agency that would ride roughshod over strict limits to searches and seizures laid out under the fourth amendment of the US constitution, as well as violating first amendment privacy rights. They have protested that the FBI is seeking to transform its cyber capabilities with minimal public debate and with no congressional oversight.

The regulatory body to which the Department of Justice has applied to make the rule change, the advisory committee on criminal rules, will meet for the first time on November 5 to discuss the issue. The panel will be addressed by a slew of technology experts and privacy advocates concerned about the possible ramifications were the proposals allowed to go into effect next year.

“This is a giant step forward for the FBI’s operational capabilities, without any consideration of the policy implications. To be seeking these powers at a time of heightened international concern about US surveillance is an especially brazen and potentially dangerous move,” said Ahmed Ghappour, an expert in computer law at UC Hastings college of the law who will be addressing next week’s hearing.

The proposed operating changes related to rule 41 of the federal rules of criminal procedure, the terms under which the FBI is allowed to conduct searches under court-approved warrants. Under existing wording, warrants have to be highly focused on specific locations where suspected criminal activity is occurring and approved by judges located in that same district.

But under the proposed amendment, a judge can issue a warrant that would allow the FBI to hack into any computer, no matter where it is located. The change is designed specifically to help federal investigators carry out surveillance on computers that have been “anonymized” – that is, their location has been hidden using tools such as Tor.

The amendment inserts a clause that would allow a judge to issue warrants to gain “remote access” to computers “located within or outside that district” (emphasis added) in cases in which the “district where the media or information is located has been concealed through technological means”. The expanded powers to stray across district boundaries would apply to any criminal investigation, not just to terrorist cases as at present.

Were the amendment to be granted by the regulatory committee the FBI would have the green light to unleash its capabilities – known as “network investigative techniques” – on computers across America and beyond. The techniques involve clandestinely installing malicious software, or malware, onto a computer that in turn allows federal agents effectively to control the machine, downloading all its digital contents, switching its camera or microphone on or off, and even taking over other computers in its network.

“This is an extremely invasive technique,” said Chris Soghoian, principal technologist of the American Civil Liberties Union, who will also be addressing the hearing. “We are talking here about giving the FBI the green light to hack into any computer in the country or around the world.”

A glimpse into the kinds of operations that could multiply under the new powers was gained this week when Soghoian discovered from documents obtained by the Electronic Frontier Foundation that in 2007 the FBI had faked an Associated Press story as a ruse to insert malware into the computer of a US-based bomb plot suspect. The revelation prompted angry responses from the AP and from the Seattle Times, whose name was also invoked in the documents, though the FBI said it had not in the end imitated the newspaper.

Civil liberties and privacy groups are particularly alarmed that the FBI is seeking such a huge step up in its capabilities through such an apparently backdoor route. Soghoian said of next week’s meeting: “This should not be the first public forum for discussion of an issue of this magnitude.”

Jennifer Granick, director of civil liberties at the Stanford center for internet and society, said that “this is an investigative technique that we haven’t seen before and we haven’t thrashed out the implications. It absolutely should not be done through a rule change – it has to be fully debated publicly, and Congress must be involved.”

Ghappour has also highlighted the potential fall-out internationally were the amendment to be approved. Under current rules, there are no fourth amendment restrictions to US government surveillance activities in other countries as the US constitution only applies to domestic territory.

However, the US government does accept that it should only carry out clandestine searches abroad where the fourth amendment’s “basic requirement of reasonableness” applies. In a letter setting out its case for the Rule 41 reform, the department of justice states that new warrants issued to authorise FBI hacking into computers whose location was unknown would “support the reasonableness of the search”.

Ghappour fears that such a statement amounts to “possibly the broadest expansion of extraterritorial surveillance power since the FBI’s inception”. He told the Guardian that “for the first time the courts will be asked to issue warrants allowing searches outside the country”.

He warned that the diplomatic consequences could be serious, with short-term FBI investigations undermining the long-term international relationship building of the US state department. “In the age of cyber attacks, this sort of thing can scale up pretty quickly.”

Another insight into the expansive thrust of US government thinking in terms of its cyber ambitions was gleaned recently in the prosecution of Ross Ulbricht, the alleged founder of the billion-dollar drug site the Silk Road. Experts suspect that the FBI hacked into the Silk Road server, that was located in Reykjavik, Iceland, though the agency denies that.

In recent legal argument, US prosecutors claimed that even if they had hacked into the server without a warrant, it would have been justified as “a search of foreign property known to contain criminal evidence, for which a warrant was not necessary”.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 30 oktober 2014 @ 17:59:28 #130
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146119885
quote:
Brazil Is Keeping Its Promise to Avoid the U.S. Internet

Brazil was not bluffing last year, when it said that it wanted to disconnect from the United States-controlled internet due to the NSA's obscenely invasive surveillance tactics. The country is about to stretch a cable from the northern city of Fortaleza all the way to Portugal, and they've vowed not to use a single U.S. vendor to do it.

At first glance, Brazil's plan to disconnect from the U.S. internet just seemed silly. The country was not happy when news emerged that the NSA's tentacles stretched all the way down to Brazil. And the country was especially not happy when news emerged that the NSA had been spying on the Brazilian government's email for years. But really, what are you gonna do?

Brazil made a bunch of bold promises, ranging in severity from forcing companies like Facebook and Google to move their servers inside Brazilian borders, to building a new all-Brazilian email system—which they've already done. But the first actionable opportunity the country was presented with is this transatlantic cable, which had been in the works since 2012 but is only just now seeing construction begin. And with news that the cable plan will not include American vendors, it looks like Brazil is serious; it's investing $185 million on the cable project alone. And not a penny of that sum will go to an American company.

The implications of Brazil distancing itself from the US internet are huge. It's not necessarily a big deal politically, but the economic consequences could be tremendously destructive. Brazil has the seventh largest economy in the world, and it continues to grow. So when Brazil finally does divorce Uncle Sam—assuming things continue at this rate—a huge number of contracts between American companies and Brazil will simply disappear. On the whole, researchers estimate that the United States could lose about $35 billion due to security fears. That's a lot of money.

We knew there would be backlash to the Snowden leaks, but it's not just political; Edward Snowden cost the United States a lot of money, even if that wasn't his plan. Yet here we are, waving goodbye to information technology revenues from one of the world's largest countries. Still, that's a small price to pay for knowing just how little privacy we've had all along.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 4 november 2014 @ 10:46:44 #131
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146284932
quote:
GCHQ chief accuses US tech giants of becoming terrorists' 'networks of choice'

New director of UK eavesdropping agency accuses US tech firms of becoming ‘networks of choice’ for terrorists

Privacy has never been “an absolute right”, according to the new director of GCHQ, who has used his first public intervention since taking over at the helm of Britain’s surveillance agency to accuse US technology companies of becoming “the command and control networks of choice” for terrorists.

Robert Hannigan said a new generation of freely available technology has helped groups like Islamic State (Isis) to hide from the security services and accuses major tech firms of being “in denial”, going further than his predecessor in seeking to claim that the leaks of Edward Snowden have aided terror networks.

GCHQ and sister agencies including MI5 cannot tackle those challenges without greater support from the private sector, “including the largest US technology companies which dominate the web”, Hannigan argued in an opinion piece written for the Financial Times just days into his new job.

Arguing that GCHQ needed to enter into the debate about privacy, Hannigan said: “I think we have a good story to tell. We need to show how we are accountable for the data we use to protect people, just as the private sector is increasingly under pressure to show how it filters and sells its customers’ data.

“GCHQ is happy to be part of a mature debate on privacy in the digital age. But privacy has never been an absolute right and the debate about this should not become a reason for postponing urgent and difficult decisions.”

Hannigan, who was born in Gloucestershire, not far from GCHQ’s base, has advised the prime minister on counter-terrorism, intelligence and security policy, goes on to take aim at the role of major technology companies. A senior Foreign Office official, Hannigan succeeded Sir Iain Lobban at the Cheltenham-based surveillance agency.

While not naming any company in particular, the GCHQ director writes: “To those of us who have to tackle the depressing end of human behaviour on the internet, it can seem that some technology companies are in denial about its misuse.

“I suspect most ordinary users of the internet are ahead of them: they have strong views on the ethics of companies, whether on taxation, child protection or privacy; they do not want the media platforms they use with their friends and families to facilitate murder or child abuse.”

Hannigan asserts that the members of the public “know” the internet grew out of the values of western democracy and insists that customers of the technology firms he criticises would be “comfortable with a better, more sustainable relationship between the agencies and the technology companies.”

Heading towards the 25th anniversary of the creation of the world wide web, he calls for a “new deal” between democratic governments and the technology companies in the area of protecting citizens.

“It should be a deal rooted in the democratic values we share. That means addressing some uncomfortable truths. Better to do it now than in the aftermath of greater violence.”

In the same piece, Hannigan says Isis differs from its predecessors in the security of its communications, presenting an even greater challenge to the security services.

He writes: “Terrorists have always found ways of hiding their operations. But today mobile technology and smartphones have increased the options available exponentially.

“Techniques for encrypting messages or making them anonymous which were once the preserve of the most sophisticated criminals or nation states now come as standard. These are supplemented by freely available programs and apps adding extra layers of security, many of them proudly advertising that they are ‘Snowden approved’. There is no doubt that young foreign fighters have learnt and benefited from the leaks of the past two years.”

Among the advocates of privacy protection who reacted to Hannigan’s comments, the deputy director of Privacy International, Eric King, said: “It’s disappointing to see GCHQ’s new director refer to the internet – the greatest tool for innovation, access to education and communication humankind has ever known – as a command-and-control network for terrorists.”

King added: “Before he condemns the efforts of companies to protect the privacy of their users, perhaps he should reflect on why there has been so much criticism of GCHQ in the aftermath of the Snowden revelations. GCHQ’s dirty games – forcing companies to handover their customers’ data under secret orders, then secretly tapping the private fibre optic cables between the same companies’ data centres anyway – have lost GCHQ the trust of the public, and of the companies who services we use. Robert Hannigan is right, GCHQ does need to enter the public debate about privacy - but attacking the internet isn’t the right way to do it.”

The Electronic Frontier Foundation (EFF) meanwhile rejected the notion that an agreement between companies and governments was needed.

Jillian York, director of international free expression at EFF said: “A special “deal” between governments and companies isn’t necessary - law enforcement can conduct open source intelligence on publicly-posted content on social networks, and can already place legal requests with respect to users. Allowing governments special access to private content is not only a violation of privacy, it may also serve to drive terrorists underground, making the job of law enforcement even more difficult.”

Welcoming Hannigan’s participation in the public debate, the Labour Party MP Tom Watson said it helped to map out where we should draw the line on privacy and helps the same agencies “to rebuild their legitimacy post-Snowden”.

But he added: “I hope they do not confuse the use of public propaganda through social media by extremists with the use of the covert communications. It is illogical to say that because Isis use Twitter, all our metadata should be collected without warrant.”

Hannigan’s comments come after the director of the FBI, James Comey, called for “a regulatory or legislative fix” for technology companies’ expanding use of encryption to protect user privacy.

Reacting last month to the introduction of strong default encryption by Apple and Google on their latest mobile operating systems, Comey said “the post-Snowden pendulum has swung too far in one direction - in a direction of fear and mistrust.”

“Justice may be denied because of a locked phone or an encrypted hard drive,” said Comey. Without a compromise, “homicide cases could be stalled, suspects could walk free, and child exploitation victims might not be identified or recovered.”
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 9 november 2014 @ 20:10:53 #132
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146475518
quote:
Federal Judge Says Public Has a Right to Know About FBI’s Facial Recognition Database

A federal judge has ruled that the FBI's futuristic facial-recognition database is deserving of scrutiny from open-government advocates because of the size and scope of the surveillance technology.

U.S. District Judge Tanya Chutkan said the bureau's Next Generation Identification program represents a "significant public interest" due to concerns regarding its potential impact on privacy rights and should be subject to rigorous transparency oversight.

"There can be little dispute that the general public has a genuine, tangible interest in a system designed to store and manipulate significant quantities of its own biometric data, particularly given the great numbers of people from whom such data will be gathered," Chutkan wrote in an opinion released late Wednesday.

Her ruling validated a Freedom of Information Act lawsuit filed by the Electronic Privacy Information Center that last year made a 2010 government report on the database public and awarded the group nearly $20,000 in attorneys' fees. That government report revealed the FBI's facial-recognition technology could fail up to 20 percent of the time. Privacy groups believe that failure rate may be even higher, as a search can be considered successful if the correct suspect is listed within the top 50 candidates.

"The opinion strongly supports the work of open-government organizations and validates their focus on trying to inform the public about government surveillance programs," said Jeramie Scott, national security counsel with EPIC.

Privacy groups, including EPIC, have long assailed Next Generation Identification, which they argue could be used as an invasive means of tracking that collects images of people suspected of no wrongdoing. The program—a biometric database that includes iris scans and palm prints along with facial recognition—became "fully operational" this summer, despite not undergoing an internal review, known as a Privacy Impact Assessment, since 2008. Government officials have repeatedly pledged they would complete a new privacy audit.

FBI Director James Comey has told Congress that the database would not collect or store photos of ordinary citizens, and instead is designed to "find bad guys by matching pictures to mug shots." But privacy groups contend that the images could be shared among the FBI and other agencies, including the National Security Agency, and even with state motor-vehicle departments.

In his testimony, given in June, Comey did not completely refute that database information could potentially be shared with states, however.

Government use of facial-recognition technology has undergone increasing scrutiny in recent years, as systems once thought to exist only in science fiction movies have become reality. TheNew York Times reported on leaks from Edward Snowden revealing that the NSA intercepts "millions of images per day" across the Internet as part of an intelligence-gathering program that includes a daily cache of some 55,000 "facial-recognition quality images."

The Justice Department did not immediately return a request for comment regarding whether it will appeal Chutkan's decision.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 14 november 2014 @ 10:42:26 #133
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146639352
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 16 november 2014 @ 17:13:11 #134
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146713529
quote:
IAB Statement on Internet Confidentiality

IAB Statement on Internet Confidentiality

In 1996, the IAB and IESG recognized that the growth of the Internet
depended on users having confidence that the network would protect
their private information. RFC 1984 documented this need. Since that
time, we have seen evidence that the capabilities and activities of
attackers are greater and more pervasive than previously known. The IAB
now believes it is important for protocol designers, developers, and
operators to make encryption the norm for Internet traffic. Encryption
should be authenticated where possible, but even protocols providing
confidentiality without authentication are useful in the face of
pervasive surveillance as described in RFC 7258.

Newly designed protocols should prefer encryption to cleartext operation.
There may be exceptions to this default, but it is important to recognize
that protocols do not operate in isolation. Information leaked by one
protocol can be made part of a more substantial body of information
by cross-correlation of traffic observation. There are protocols which
may as a result require encryption on the Internet even when it would
not be a requirement for that protocol operating in isolation.

We recommend that encryption be deployed throughout the protocol stack
since there is not a single place within the stack where all kinds of
communication can be protected.

The IAB urges protocol designers to design for confidential operation by
default. We strongly encourage developers to include encryption in their
implementations, and to make them encrypted by default. We similarly
encourage network and service operators to deploy encryption where it is
not yet deployed, and we urge firewall policy administrators to permit
encrypted traffic.

We believe that each of these changes will help restore the trust users
must have in the Internet. We acknowledge that this will take time and
trouble, though we believe recent successes in content delivery networks,
messaging, and Internet application deployments demonstrate the
feasibility of this migration. We also acknowledge that many network
operations activities today, from traffic management and intrusion
detection to spam prevention and policy enforcement, assume access to
cleartext payload. For many of these activities there are no solutions
yet, but the IAB will work with those affected to foster development of
new approaches for these activities which allow us to move to an Internet
where traffic is confidential by default.
Internet Architecture Board
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 18 november 2014 @ 19:30:26 #135
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146783125
quote:
Judge threatens detective with contempt for declining to reveal cellphone tracking methods

Baltimore prosecutors withdrew key evidence in a robbery case Monday rather than reveal details of the cellphone tracking technology police used to gather it.

The surprise turn in Baltimore Circuit Court came after a defense attorney pressed a city police detective to reveal how officers had tracked his client.

City police Det. John L. Haley, a member of a specialized phone tracking unit, said officers did not use the controversial device known as a stingray. But when pressed on how phones are tracked, he cited what he called a "nondisclosure agreement" with the FBI.

"You don't have a nondisclosure agreement with the court," Baltimore Circuit Judge Barry G. Williams replied. Williams threatened to hold Haley in contempt if he did not respond. Prosecutors decided to withdraw the evidence instead.

The tense exchange during a motion to suppress evidence in the robbery trial of 16-year-old Shemar Taylor was the latest confrontation in a growing campaign by defense attorneys and advocates for civil liberties nationwide to get law enforcement to provide details of their phone tracking technology, and how and when they use it.

Law enforcement officials in Maryland and across the country say they are prohibited from discussing the technology at the direction of the federal government, which has argued that knowledge of the devices would jeopardize investigations.

"Courts are slowly starting to grapple with these issues," said Nathan Freed Wessler, an attorney with the American Civil Liberties Union who is tracking stingray cases. "What we're talking about is basic information about a very commonly used police tool, but because of the extreme secrecy that police have tried to invoke, there are not many court decisions about stingrays."

Defense attorney Joshua Insley still believes that police used a stingray to find Taylor. He cited a letter in which prosecutors said they were prohibited by the Department of Justice from disclosing information about methods used in their investigation.

The portable device was developed for the military to help zero in on cellphones. It mimics a cellphone tower to force nearby phones to connect to it.

Records shows that the Baltimore Police Department purchased a stingray for $133,000 in 2009.

Some critics say the use of such technology might be appropriate, with court approval, to help law enforcement locate a suspect. But in the secrecy surrounding its use, they say, it's not always clear that law enforcement officials have secured the necessary approval, or stayed within their bounds.

They also express concern for the privacy of other cellphones users whose data are caught up in a search.

In the case before the court Monday, two teens are accused of robbing a Papa John's pizza delivery driver at gunpoint in April.

Police say phone records show that the phone that was used to call in the delivery was also used to make and receive hundreds of calls to and from Taylor's phone. Police believe the first phone belonged to Taylor's co-defendant. They say Taylor confessed after he was arrested.

Taylor is being tried as an adult. The other suspect is being tried as a juvenile.

In court Monday, the robbery detective who prepared the warrant to search Taylor's home testified that members of the department's Advanced Technical Team did a "ride-by" — described in court papers as "sophisticated technical equipment" — to determine one of the phones was inside the home. Detective Alan Savage said he did not know what technology or techniques the unit employs.

The defense then called Haley to the stand. He said police can use data from the cellphone companies to locate phones in real time.

Insley asked Haley whether police can ascertain a phone's location "independently," without the help of a phone company. Haley said yes.

When asked how, he balked.

"I wouldn't be able to get into that," Haley said.

Insley tried again later. Haley responded that police can get GPS location data from phone companies.

"Then there's equipment we would use that I'm not going to discuss that would aid us in that investigation," Haley said.

Williams, the judge, instructed Haley to answer the question. Haley invoked the nondisclosure agreement.

"I can't. I'm sorry. I can't," Haley said.

Williams called Insley's question "appropriate," and threatened to hold Haley in contempt if he did not answer.

Haley demurred again, and Assistant State's Attorney Patrick R. Seidel conferred with other prosecutors in court to observe the hearing.

Finally, Seidel said prosecutors would drop all evidence found during the search of the home — including, authorities have said, a .45-caliber handgun and the cellphone. The prosecutor said the state would continue to pursue the charges.

Wessler, of the ACLU, said Williams was right to ignore the nondisclosure agreement with the FBI.

"You can't contract out of constitutional disclosure obligations," Wessler said. "A secret written agreement does not invalidate the Maryland public records law [and] does not invalidate due process requirements of giving information to a criminal defendant."

Attorneys say they have suspected for years that police were employing secret methods to track cellphones. But only recently have they begun to find what they believe are clear examples.

Police and prosecutors in another case ran into a similar problem in September, when they were asked to reveal how a cellphone was tracked.

Sgt. Scott Danielczyk, another member of the Advanced Technical Team, testified in that home invasion case — also before Judge Williams — that police used data from a court order to track a cellphone to the general area of the 1400 block of E. Fayette St.

Danielczyk and three other members of the unit were tasked to "facilitate finding it," he testified, and determined the phone was in the possession of someone on a bus.

Williams asked how Danielczyk concluded the phone was being carried by the suspect.

"Um, we had information that he had the property on him," the officer said.

Williams pressed.

"This kind of goes into Homeland Security issues, your honor," Danielczyk said.

"If it goes into Homeland Security issues, then the phone doesn't come in," Williams said. "I mean, this is simple. You can't just stop someone and not give me a reason."

In that case, too, the phone evidence is no longer in play. Prosecutors are proceeding without it.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 19 november 2014 @ 16:56:16 #136
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146813336
quote:
quote:
The “USA Freedom Act” – which its proponents were heralding as “NSA reform” despite its suffocatingly narrow scope – died in the august U.S. Senate last night when it attracted only 58 of the 60 votes needed to close debate. All Democratic and independent Senators except one (Bill Nelson of Florida) voted in favor, as did three tea-party GOP Senators (Ted Cruz, Mike Lee and Dean Heller). One GOP Senator, Rand Paul, voted against it on the ground that it did not go nearly far enough in reining in the NSA. On Monday, the White House issued a statement “strongly supporting” the bill.

The “debate” among the Senators that preceded the vote was darkly funny and deeply boring, in equal measure. The black humor was due to the way one GOP Senator after the next – led by ranking Senate Intelligence Committee member Saxby Chambliss (pictured above) – stood up and literally screeched about 9/11 and ISIS over and over and over, and then sat down as though they had made a point. Their scary script was unveiled earlier that morning by a Wall Street Journal op-ed by former Bush Attorney General Mike Mukasey and former CIA and NSA Director Mike Hayden warning that NSA reform would make the terrorists kill you; it appeared under this Onion-like headline:



So the pro-NSA Republican Senators were actually arguing that if the NSA were no longer allowed to bulk-collect the communication records of Americans inside the U.S., then ISIS would kill you and your kids. But because they were speaking in an empty chamber and only to their warped and insulated D.C. circles and sycophantic aides, there was nobody there to cackle contemptuously or tell them how self-evidently moronic it all was. So they kept their Serious Faces on like they were doing The Nation’s Serious Business, even though what was coming out of their mouths sounded like the demented ramblings of a paranoid End is Nigh cult.
quote:
There is a real question about whether the defeat of this bill is good, bad, or irrelevant. To begin with, it sought to change only one small sliver of NSA mass surveillance (domestic bulk collection of phone records under section 215 of the Patriot Act) while leaving completely unchanged the primary means of NSA mass surveillance, which takes place under section 702 of the FISA Amendments Act, based on the lovely and quintessentially American theory that all that matters are the privacy rights of Americans (and not the 95% of the planet called “non-Americans”).

There were some mildly positive provisions in the USA Freedom Act: the placement of “public advocates” at the FISA court so that someone contests the claims of the US Government; the prohibition on the NSA holding Americans’ phone records, requiring instead that they obtain FISA court approval before seeking specific records from the telecoms (which already hold those records for at least 18 months); and reducing the agency’s “contact chaining” analysis from three hops to two. One could reasonably argue (as the ACLU and EFF did) that, though woefully inadequate, the bill was a net-positive as a first step toward real reform, but one could also reasonably argue, as Marcy Wheeler has with characteristic insight, that the bill is so larded with ambiguities and fundamental inadequacies that it would forestall better options and advocates for real reform should thus root for its defeat.

When pro-privacy members of Congress first unveiled the bill many months ago, it was actually a good bill: real reform. But the White House worked very hard – in partnership with the House GOP – to water that bill down so severely that what the House ended up passing over the summer did more to strengthen the NSA than rein it in, which caused even the ACLU and EFF to withdraw their support. The Senate bill rejected last night was basically a middle ground between that original, good bill and the anti-reform bill passed by the House.

All of that illustrates what is, to me, the most important point from all of this: the last place one should look to impose limits on the powers of the U.S. Government is . . . the U.S. Government. Governments don’t walk around trying to figure out how to limit their own power, and that’s particularly true of empires.
quote:
Those who like to claim that nothing has changed from the NSA revelations simply ignore the key facts that negate that claim, including the serious harm to the U.S. tech sector from these disclosures, driven by the newfound knowledge that U.S. companies are complicit in mass surveillance. Obviously, tech companies don’t care at all about privacy, but they care a lot about that.
quote:
Increased individual encryption use is a serious impediment to NSA mass surveillance: far stronger than any laws the U.S. Congress might pass. Aside from the genuine difficulty the agency has in cracking well-used encryption products, increased usage presents its own serious problem. Right now, the NSA – based on the warped mindset that anyone who wants to hide what they’re saying from the NSA is probably a Bad Person – views “encryption usage” as one of its key factors in determining who is likely a terrorist. But that only works if 10,000 people around the world use encryption. Once that number increases to 1 million, and then to 10 million, and then to default usage, the NSA will no longer be able to use encryption usage as a sign of Bad People. Rather than being a red flag, encryption will simply be a brick wall: one that individuals have placed between the snooping governments and their online activities. That is a huge change, and it is coming.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 20 november 2014 @ 18:44:50 #137
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146848258
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 21 november 2014 @ 09:21:40 #138
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146862236
quote:
'Brits telecombedrijf was betrokken bij afluisterschandaal NSA'

Een groot telecombedrijf uit Groot-Brittannië heeft een belangrijke rol gespeeld in het afluisterschandaal rond de Amerikaanse inlichtingendiensten NSA, dat werd onthuld door Edward Snowden.

Dat meldt het Britse Channel 4 News.

Het zou gaan om een bedrijf dat in juli 2012 is overgenomen door Vodafone: Cable and Wireless.

De Britse tv-zender zou door Snowden gelekte documenten hebben ingezien. Daaruit blijkt dat het bedrijf onderdeel was van een geheim project, waarvoor bedrijven grote hoeveelheden internetverkeer verzamelden: een kwart van dat verkeer loopt door het Verenigd Koninkrijk.

De Britse inlichtingendienst GCHQ zou volgens Channel 4 News met particuliere bedrijven zoals Cable and Wireless een soort geheime vennootschappen hebben ontwikkeld. De bedrijven werden vermeld onder codenamen. Zo heette Cable and Wireless 'Gerontic'.

Het bedrijf zou de GCHQ onder andere hebben geholpen bij het testen van afluisterapparatuur. Cable and Wireless zou zelfs een medewerker van de Britse inlichtingendienst in voltijd-dienst hebben.

Ook zou het bedrijf ervoor hebben gezorgd dat Britse spionnen de privé-communicatie van miljoenen internetgebruikers over de hele wereld konden verzamelen.

Vodafone

In een reactie benadrukte Vodafone dat de GCHQ nooit directe toegang tot haar netwerk is verleend. Volgens het telecombedrijf had de inlichtingendienst enkel toegang tot de klantengegevens kunnen krijgen met toestemming van Vodafone zelf. Dat zou ook gelden voor andere telecombedrijven.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 21 november 2014 @ 21:38:22 #139
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146882457
quote:
Plasterk: diensten moeten kabelgebonden data kunnen onderscheppen

Het kabinet wil de bevoegdheden van de inlichtingendiensten verruimen. Ook communicatie via de kabel zou in de toekomst massaler mogen worden onderschept. Wel moet dat doelgericht en stapsgewijs gebeuren.
quote:
Met het langverwachte voorstel geeft het kabinet gevolg aan de commissie-Dessens, die in december vorig jaar concludeerde dat de huidige spionagewet achterhaald is. Daarin wordt onderscheid gemaakt tussen kabelgebonden en draadloze communicatie. Nu mag het verkeer alleen in het laatste geval (als het via satellieten of portofoons verloopt) in 'bulk' worden onderschept. Dit terwijl 90 procent van de communicatie tegenwoordig via de kabel gaat (denk aan communicatie via internet en smartphone). Dat onderscheid zal straks verdwijnen.

NSA

De verruiming zal door privacyvoorvechters met argusogen worden bekeken. Hiermee krijgen de Nederlandse diensten AIVD en MIVD wettelijke mogelijkheden die enigszins lijken op de praktijken van de Amerikaanse inlichtingendienst NSA, die zijn sleepnetten ongebreideld over de wereld kon uitwerpen.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 22 november 2014 @ 10:41:12 #140
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146893285
quote:
quote:
In juni begon een commissie een onderzoek naar de praktijken. 'De uitkomst is nul. Het is hete lucht. Er zijn geen feiten', aldus de bron binnen Openbaar Ministerie.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 22 november 2014 @ 20:03:49 #141
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146906986
quote:
Edward Snowden: state surveillance in Britain has no limits

Whistleblower and former NSA analyst says UK regulation allows GCHQ snooping to go beyond anything seen in US

The UK authorities are operating a surveillance system where “anything goes” and their interceptions are more intrusive to people’s privacy than has been seen in the US, Edward Snowden said.

Speaking via Skype at the Observer Ideas festival, held in central London, the whistleblower and former National Security Agency specialist, said there were “really no limits” to the GCHQ’s surveillance capabilities.

He said: “In the UK … is the system of regulation where anything goes. They collect everything that might be interesting. It’s up to the government to justify why it needs this. It’s not up to you to justify why it doesn’t … This is where the danger is, when we think about … evidence being gathered against us but we don’t have the opportunity to challenge that in courts. It undermines the entire system of justice.”

He also said he thought that the lack of coverage by the UK papers of the story, or the hostile coverage of it, other than by the Guardian, “did a disservice to the public”.

His appearance at the festival on Sunday marked the end of a weekend of almost frenetic social activity by his highly reclusive standards: he appeared at two public events and was the absent star of Laura Poitras’ documentary, Citizenfour, which premiered in New York on Friday.

Collectively, the events revealed a more rounded, human, portrait of the former NSA analyst than had been seen before, and offered a few telling glimpses of what his life was now like in Moscow.

The coverage revealed that Snowden does not drink alcohol, has never been drunk, and that he misses his “old beat-up car”. He also revealed that he has got a job, working on “a very significant grant for a foundation” on a project “for the benefit of the press and journalists working in threatened areas”.

Poitras’ documentary included the revelation that his girlfriend, Lindsay Mills, had joined him in Moscow, and at the New Yorker festival on Saturday he was asked by a member of the audience if “she had been mad” at him given that he had left without warning to find a refuge.

She was not “entirely pleased” he said. “But at the same time it was an incredible reunion because she understood and that meant a lot to me. Although she had a very, very, challenging year. and I leave it to her to discuss that when and if she is ever ready. It was a meeting I’ll never forget.”

A member of the audience at Observer Ideas pointed out that he had been living in paradise with a dancer for a girlfriend and asked, are you mad? He laughed and talked about all the things that he had given up: his job, his home, his family. “And I can’t return to the home country and that’s a lot to give up.”

But, he said: “What kind of world do we want to live in? Do you want to live in a world in which governments make decisions behind closed doors? And when you ask me, I say no.”

He also issued his strongest warning yet about how Silicon Valley firms were compromising the privacy of the public. Google and Facebook, he said, were “dangerous services”. His strongest condemnation was against Dropbox and urged erasure of it from computers. It encrypted your data, he told the audience, but kept the key and would give that to any government which asked.

The irony of the fact that he was appearing via Google Hangout and Skype was not lost on the audience. Later, he said: “No kidding, right? I’m about to disconnect this machine and toss it into a fire, though.”

His more serious point was that he said he believed the battle against the intrusions of big corporations into privacy was a much harder battle to win than the governments’.

He said later: “The unexplored elephant is the corporations – so privileged, so powerful in access, so unregulated – [and] are then tapped by the government.[…] I don’t think it’s unreasonable to think that major corporations have a hand in setting government policy today. Certainly in the US, given our campaign finance issues.”
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 23 november 2014 @ 17:14:51 #142
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146930376
quote:
quote:
Hackers targeted and hacked Ecuador President Rafael Correa’s computers and internet systems on 20th November. Telesur, the official Ecuadorian press agency said that the attacks were carried out through out the day on 2oth November. Meanwhile President Correa has alleged that American spy agencies are behind the attacks.
quote:
He accused the US of “systematic, high-tech” cyber-attacks on his private internet accounts and computers which according to him were was traced back to American servers.
quote:
Though President Correa gave very few details in the Twitter posts except the fact that they were systematic attacks with high technology and very huge resources, the Latin media was more forthcoming on this issue. Telesur said that the attacks carried on throughout all of last Thursday, November 20, and that they are an American effort. Another paper which carries President weekly broadcast called Citizen Link no.399 stated,
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 24 november 2014 @ 17:08:51 #143
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146959948
koenrh twitterde op zondag 23-11-2014 om 21:41:58 Q&A with Laura Poitras, Sarah Harrison, Jacob Appelbaum after the Dutch premiere of Citizenfour. #IDFA http://t.co/1qcppLVOwO reageer retweet
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 24 november 2014 @ 19:31:30 #144
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146964209
quote:
Latest Snowden leak shows UK, US behind Regin malware, attacked European Union

Blame the British and American spy agencies for the latest state-sponsored malware attack, say reporters at The Intercept.

The publication, which in the wake of Glenn Greenwald's departure from The Guardian continued to publish documents leaked by Edward Snowden, said on Monday the recently discovered malware, known as Regin, was used against targets in the European Union.

One of those targets included Belgian telecommunications company Belgacom, which had its networks broken into by the British spy agency the Government Communications Headquarters (GCHQ).

Regin was first publicly talked about over the weekend after Symantec discovered the "sophisticated" malware, though is understood to have been in circulation since 2008.

Compared to Stuxnet, the state-sponsored malware whose creators have never been confirmed, the recently-discovered trojan steals data from machines and networks it infects, disguised as Microsoft software.

Some began to point the finger at Russia and China, but these were quickly discounted by industry experts. Others suspected the U.S. and Israel — a deal already exists that allows the Middle Eastern allied state to access raw and "unchecked" U.S. collected intelligence.

They weren't far off. According to Monday's report, the U.S. working in conjunction with Britain, a European member state (though perhaps not for much longer) attacked Belgacom using the Regin malware.

Though the Belgacom hack was disclosed by Snowden's leaks, the malware used had never been revealed.

The new details from The Intercept show how GCHQ embarked upon its "hacking mission," known as Operation Socialist, by accessing Belgacom's networks in 2010. By targeting engineers through a faked LinkedIn page, GCHQ was able to get deep inside the Internet provider to steal data.

One of Belgacom's main clients was the European Commission, the European Parliament, and the European Council of member state leaders.

Exactly how member states of the European Union — there are 28 of them including the U.K. — will react to one of its own member states launching a successful hacking attack against their executive body, remains unknown.

But while members of the Parliament and Commission staff have, over the years, seen the U.S. as one of the greatest threats to the region's data protection and privacy policies, they should have been looking a little closer to home.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 25 november 2014 @ 19:04:43 #145
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_146997933
e3i5 twitterde op dinsdag 25-11-2014 om 15:15:43 Wow. Full list of undersea fibre optic cables GCHQ is accessing has been published. http://t.co/hsMtCcMHiC http://t.co/ZqpJpkXpqA reageer retweet
quote:
quote:
Previously unpublished documents show how the UK telecom firm Cable & Wireless, acquired by Vodafone in 2012, played a key role in establishing one of the Government Communications Headquarters’ (GCHQ) most controversial surveillance programs.

A joint investigation by NDR, WDR, Süddeutsche Zeitung and Channel 4 based on documents leaked by whistleblower Edward Snowden, reveals that Cable & Wireless actively shaped and provided the most data to GCHQ mass surveillance programs, and received millions of pounds in compensation. The documents also suggest that Cable & Wireless assisted GCHQ in breaking into a competitor’s network.

In response to these allegations, Vodafone said that an internal investigation found no evidence of unlawful conduct, but the company would not deny it happened.

"What we have in the UK is a system based on warrants, where we receive a lawful instruction from an agency or authority to allow them to have access to communications data on our network. We have to comply with that warrant and we do and there are processes for us to do that which we’re not allowed to talk about because the law constrains us from revealing these things. We don’t go beyond what the law requires” a Vodafone spokesperson told Channel 4.

In August 2013 Süddeutsche Zeitung and NDR first named Vodafone as one of the companies assisting the GCHQ. Reports that Vodafone secretly provided customer data to intelligence agencies damaged the company’s relation to German customers. Few months later Der Spiegel reported that the NSA had spied on Chancellor Angela Merkel, whose cell phone was on a Vodafone contract.

This could be a coincidence. No evidence suggests that Vodafone was involved in the “Merkelphone” scandal. But unlike Facebook, Yahoo, or other companies forced to cooperate with the intelligence services, Vodafone has yet to challenge the GCHQ publicly. Konstantin von Notz, a German member of the Bundestag for the Green Party, urges Vodafone to take legal action: „A company such as Vodafone, which has responsibility for so many customers, has to take a clear stand against these data grabs.“

Similarly, Vodafone has provided no explanation as to why GCHQ discussed “potential new deployment risks identified by GERONTIC” in June 2008. According to the Snowden-documents “GERONTIC” was the GCHQ codename for Cable & Wireless, and after acquisition in 2012 (at least for a while) presumably for Vodafone.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 29 november 2014 @ 19:21:22 #146
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147124463
quote:
German loophole allows BND spy agency to snoop on own people

Intelligence agency can legally intercept calls and emails from Germans working abroad for foreign firms, MPs discover

German MPs examining the surveillance activities the US National Security Agency have found a legal loophole that allows the Berlin’s foreign intelligence agency to spy on its own citizens.

The agency, known by its German acronym BND, is not usually allowed to intercept communications made by Germans or German companies, but a former BND lawyer told parliament this week that citizens working abroad for foreign companies were not protected.

The German government confirmed on Saturday that work-related calls or emails were attributed to the employer. As a result, if the employer is foreign, the BND could legally intercept them.

Opposition politicians have accused Angela Merkel’s government of pretending to be outraged about alleged spying by the NSA while condoning illegal surveillance itself.

The revelation comes after a BND employee was arrested in July on suspicion of selling secret documents to a CIA contact. Rather than report the contact to their allied German counterparts, the US spy agency was reported to have paid the agent ¤25,000 (£20,000) for 218 documents classified as confidential or top secret.

The incident prompted Germany to consider stepping up its counter-espionage efforts. Possible measures include monitoring the intelligence activities of nominal Nato allies such as the US, Britain and France, and expelling US agents from Germany.

In June the BND officially revealed some of its worst-kept secrets by acknowledging that half a dozen facilities are in fact spy stations.

The agency had for decades maintained that it had nothing to do with sites bearing cryptic names such as the Ionosphere Institute, but amateur sleuths long suspected their true identities and posted them online.

At a ceremony in the Bavarian town of Bad Aibling, the agency’s chief, Gerhard Schindler, officially attached the BND’s logo to the entrance of a site previously called the Telecommunications Traffic Office of the German Armed Force.

The facility features several giant golf ball-shaped radio domes commonly used for eavesdropping on radio, data and phone traffic.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 30 november 2014 @ 21:46:24 #147
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147163686
quote:
UK Police Accidentally Sent Documents Admitting To Spying On Journalists To Newspaper, Asked Not To Publish

UK police in Cleveland accidentally sent documents revealing that it has used controversial anti-terror laws to spy on journalists who had not committed any crimes to an area newspaper.

The Cleveland Police “erroneously” sent information to industry paper the Press Gazette indicating that it had used the Regulation of Investigatory Powers Act (RIPA) to obtain telecommunications data while searching for a journalist’s source.

The publication reports that police asked them to delete the documents but says they were unwilling to do so because, “there is a strong public interest in disclosing it.”

RIPA, which regulates how authorities can intercept and monitor communications, is under increased scrutiny as it has emerged that at least four other U.K. police forces have used it to seize telecommunications data while hunting for journalists’ sources. The journalists affected have not been accused of any criminal wrongdoing.

Earlier this week it emerged that after the Metropolitan Police used RIPA to try and access the details of a single journalist in March after wireless carrier Vodafone accidentally provided the phone records of more than 1,500 users. Rather than deleting the data, the department analyzed it in a spreadsheet and stored it for seven months.”

In another incident, a local council used RIPA to follow and spy on a journalist meeting a source at a café as she investigated “allegations of wrongdoing within the council’s environmental services department,” ultimately “scuppering” her investigation.

Testifying before the Home Affairs Select Committee, the National Union of Journalists has also condemned police use of RIPA as “systemic,” arguing that it risks doing “irreparable damage.”

There is now an ongoing investigation into misuse of the Act by the Interception of Communications Commissioner’s Office (IOCCO), which is to be published in January 2015.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 1 december 2014 @ 17:52:09 #148
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147190923
quote:
Amazon’s frightening CIA partnership: Capitalism, corporations and our massive new surveillance state

When Internet retailer and would-be 21st century overlord Amazon.com kicked WikiLeaks off its servers back in 2010, the decision was not precipitated by men in black suits knocking on the door of one of Jeff Bezos’ mansions at 3 a.m., nor were any company executives awoken by calls from gruff strangers suggesting they possessed certain information that certain individuals lying next to them asking “who is that?” would certainly like to know.

Corporations, like those who lead them, are amoral entities, legally bound to maximize quarterly profits. And rich people, oft-observed desiring to become richer, may often be fools, but when it comes to making money even the most foolish executive knows there’s more to be made serving the corporate state than giving a platform to those accused of undermining national security.

The whistle-blowing website is “putting innocent people in jeopardy,” Amazon said in a statement released 24 hours after WikiLeaks first signed up for its Web hosting service. And the company wasn’t about to let someone use their servers for “securing and storing large quantities of data that isn’t rightfully theirs,” even if much of that data, leaked by Army private Chelsea Manning, showed that its rightful possessors were covering up crimes, including the murder of innocent civilians from Yemen to Iraq.

The statement was over the top — try as it might, not even the government has been able to point to a single life lost due to Manning’s disclosures — but, nonetheless, Amazon’s capitalist apologists on the libertarian right claimed the big corporation had just been victimized by big bad government. David Henderson, a research fellow at Stanford University’s Hoover Institution, explained that those calling for a boycott of Amazon were out of line, as the real enemy was “megalomaniacal Senator Joe Lieberman,” who had earlier called on Amazon to drop WikiLeaks (and is, admittedly, a rock-solid choice for a villain).

“The simple fact is that we live in a society whose governments are so big, so powerful, so intrusive, and so arbitrary, that we have to be very careful in dealing with them,” Henderson wrote. That Amazon itself cited a purported violation of its terms of service to kick WikiLeaks off its cloud was “a lie,” according to Henderson, meant to further protect Amazon from state retribution. Did it make him happy? No, of course not. “But boycotting one of the government’s many victims? No way.”

But Amazon was no victim. Henderson, like many a libertarian, fundamentally misreads the relationship between corporations and the state, creating a distinction between the two that doesn’t really exist outside of an intro-to-economics textbook. The state draws up the charter that gives corporations life, granting them the same rights as people — more rights, in fact, as a corporate person can do what would land an actual person in prison with impunity or close to it, as when Big Banana was caught paying labor organizer-killing, right-wing death squads in Colombia and got off with a fine.

Corporations are more properly understood not as victims of the state, but its for-profit accomplices. Indeed, Amazon was eager to help the U.S. government’s campaign against a website that — thanks almost entirely to Chelsea Manning — had exposed many embarrassing acts of U.S. criminality across the globe: the condoning of torture by U.S. allies in Iraq; the sexual abuse of young boys by U.S. contractors in Afghanistan; the cover-up of U.S. airstrikes in Yemen, including one that killed 41 civilians, 21 of them children. The decision to boot WikiLeaks was, in fact, one that was made internally, no pressure from the deep state required.

“I consulted people I knew fairly high up in the State Department off the record, and they said that they did not have to put pressure … on Amazon for that to happen,” said Robert McChesney, a professor of communication at the University of Illinois, in an appearance on “Democracy Now!.” “It was not a difficult sell.”

And it paid off. A little more than a year later, Amazon was awarded a generous $600 million contract from the CIA to build a cloud computing service that will reportedly “provide all 17 [U.S.] intelligence agencies unprecedented access to an untold number of computers for various on-demand computing, analytic, storage, collaboration and other services.” As The Atlantic noted, and as former NSA contractor Edward Snowden revealed, these same agencies collect “billions and perhaps trillions of pieces of metadata, phone and Internet records, and other various bits of information on an annual basis.”

That is to say: On Amazon’s servers will be information on millions of people that the intelligence community has no right to possess — Director of National Intelligence James Clapper initially denied the intelligence community was collecting such data for a reason — which is used to facilitate corporate espionage and drone strikes that don’t just jeopardize innocent lives, but have demonstrably ended hundreds of them.

Instead of helping expose U.S. war crimes, then, Amazon’s cloud service could be used to facilitate them, for which it will be paid handsomely — which was, in all likelihood, the whole point of the company proving itself a good corporate citizen by disassociating itself from an organization that sought to expose its future clients in the intelligence community.

“We look forward to a successful relationship with the CIA,” Amazon said in a 2013 statement after winning that long-sought contract (following a protracted battle for it with a similarly eager tech giant, IBM).

If it were more honest, Amazon might have said “We look forward to a successful relationship with the [coup d’état-promoting, drone-striking, blood-stained] CIA.”

And if it were more honest, Amazon could have said the same thing in 2010.

So long as there are giant piles of money to be made by systematically violating the privacy of the public (the CIA and NSA together enjoy a budget of over $25 billion), corporations will gladly lie in the same bed as those who created them, which is, yes, gross. Protecting consumer privacy is at best an advertising slogan, not a motivating principle for entities whose sole responsibility to shareholders is to maximize quarterly profits. This isn’t an admission of defeat — and when companies fear state-sanctioned invasions of privacy will cost them customers in the private sector or contracts with foreign states, they do sometimes roll back their participation — but a call to recognize the true villain: If we desire more than just an iPhone with encryption, we must acknowledge the issue is not just a few individual megalomaniacs we call senators, but a system called capitalism that systemically encourages this behavior.

In the 1970s, following the resignation of President Richard Nixon, the Church Committee exposed rampant spying on dissidents that was illegal even according to the loose legal standards of the time. Speeches were made, reforms were demanded and new laws were passed. The abuses, it was claimed, were relegated to history. What happened next? Look around: The total surveillance we enjoy today, enabled by high-tech military contractors including AT&T and Google and Verizon and every other nominally private tech company that capitalism encourages to value profits over privacy — a public-private partnership that grants those in power a means of spying on the powerless beyond the wildest dreams of any 20th century totalitarian. Sure, ostensibly communist states can of course be quite awful too, but the difference is that, in capitalist nations, the citizens actually place the eavesdropping devices in their own homes.

Now, whether the reforms of the 1970s were inadequate or were just plain ignored by those who were to be reformed is sort of beside the point; the status quo is what it is and, at least if one values privacy and the ability to organize and engage in political discussion and search the Internet without fear a spy agency or one of its contractors is monitoring it all in real-time, it sure isn’t good. So when groups such as the Electronic Frontier Foundation and progressive magazines such as The Nation call for “another Church Committee,” the question we ought to ask them is: “Fucking really?”

Abolishing capitalism is indeed a utopian goal, but when corporations routinely go above and beyond their legal duties to serve the state — granting police and intelligence agencies access to their customers’ data without so much as a judge’s rubberstamp on a warrant — expecting meaningful change from a few hearings or legislative reforms will only leave the reformers disappointed to find their efforts have just led to dystopia. So long as there’s money to be made serving the corporate state, that is what corporations will do; there’s no need to resort to conspiracy for it’s right there in their corporate. And that’s not to be defeatist, but to suggest we ought to try a different approach: we ought to be organizing to put a stop to public-private partnerships altogether.

Right-wing libertarians and other defenders of capitalism are absolutely right when they say that the profit motive is a mighty motive indeed — and that’s precisely why we should seek to remove it; to take away even just the prospect of a federal contract. If the demands of privacy advocates are limited by myopic concerns of what’s politically possible here and now, all they will have to show for their advocacy will be a false sense of achievement. The problem isn’t, as some imagine it, a state spying without appropriate limits, but the fact that capitalism erases the distinction between public and private, making it so non-state actors gleefully act as the state’s eyes and ears. This isn’t about just Google or the government, but both: the capitalist state. And until we start recognizing that and saying as much, the result of our efforts will be more of the same.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 1 december 2014 @ 18:02:26 #149
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147191241
quote:
quote:
De Amerikaanse klokkenluider Edward Snowden is maandag in Stockholm geëerd met de alternatieve Nobelprijs, de Right Livelihood Award 2014. Snowden, die politiek asiel in Rusland heeft gekregen, was bij de ceremonie niet aanwezig.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 4 december 2014 @ 15:26:57 #150
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147280324
quote:
Operation Auroragold

How the NSA Hacks Cellphone Networks Worldwide
quote:
In March 2011, two weeks before the Western intervention in Libya, a secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military’s Africa Command needed help to hack into Libya’s cellphone networks and monitor text messages.

For the NSA, the task was easy. The agency had already obtained technical information about the cellphone carriers’ internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks.

The NSA’s assistance in the Libya operation, however, was not an isolated case. It was part of a much larger surveillance program—global in its scope and ramifications—targeted not just at hostile countries.

According to documents contained in the archive of material provided to The Intercept by whistleblower Edward Snowden, the NSA has spied on hundreds of companies and organizations internationally, including in countries closely allied to the United States, in an effort to find security weaknesses in cellphone technology that it can exploit for surveillance.

The documents also reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers.

Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks.

One high-profile surveillance target is the GSM Association, an influential U.K.-headquartered trade group that works closely with large U.S.-based firms including Microsoft, Facebook, AT&T, and Cisco, and is currently being funded by the U.S. government to develop privacy-enhancing technologies.

Karsten Nohl, a leading cellphone security expert and cryptographer who was consulted by The Intercept about details contained in the AURORAGOLD documents, said that the broad scope of information swept up in the operation appears aimed at ensuring virtually every cellphone network in the world is NSA accessible.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 5 december 2014 @ 22:35:08 #151
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147322215
quote:
Witness: German intelligence helped NSA to tap Internet hub

A German parliamentary inquiry has been told that German intelligence fed America's NSA filtered data from an Internet hub in Frankfurt, after clearance from Berlin. The "Eikonal" project ended in 2008.

A witness told a German parliamentary inquiry on Thursday that America's NSA was fed filtered data from an internet exchange point in Frankfurt, after an OK from the Chancellery in Berlin.

The Eikonal project leader within Germany's BND foreign intelligence agency - identified only as S.L. - said the exchange's own operator had legal doubts, but was convinced once confirmation came from the-then chancellery.

Germany's federal intelligence service (BND) delivered filtered information from 2004 until 2008, when the "Americans saw that we could not extract anything more for them," said the witness, who was quoted by Germany's main news agency DPA.

Over that period, Germany was first governed by a center-left coalition headed by Social Democrat Chancellor Gerhard Schröder, and from October 2005 by Chancellor Angela's first grand coalition cabinet.

Anchored in Germany's constitution are strict data privacy laws in reaction to the Hitler dictatorship and Stasi eavesdropping in former communist East Germany.

The project leader said the BND used NSA equipment and know-how to tap the hub's lines, including telephone calls, for data which passed through multiple "cascade" filters and then to a BND/NSA facility at Bad Aibling near Munich.

Several hundred items were eventually forwarded each year to the NSA after checking by staff to make sure data about Germans had been removed

In October, the newspaper Süddeutsche Zeitung in an investigative report said these filters had not worked sufficiently to filter out all data on Germans.

Mass NSA monitoring of mobile phone operators

The website The Intercept claimed on Thursday that papers from the US whistleblower Edward Snowden showed that the NSA spied on hundreds of mobile phone operators.

In an operation codenamed "AURORAGOLD," the NSA kept watch on 1200 email accounts of operators, looking for security weaknesses in their systems, gleaned especially when they exchanged advice on roaming for customers abroad.

During 2012, information was gathered in this way from more than 70 percent of the mobile operators worldwide, The Intercept said, adding the newly known factor was the mass scale of the observation.

Last year, it emerged that the NSA - deciphering the widely used GSM wireless standard - had tapped into one of Merkel's mobile phones.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 7 december 2014 @ 15:53:31 #152
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147360832
quote:
quote:
quote:
A video released by hacker collective Anonymous purports to show evidence of warrantless wiretapping in Chicago during a #blacklivesmatter protest. According to the video, a vehicle moved through the streets during protests, listening in on conversations.

The video (shared in its entirety below) opens with a scene of President Barack Obama addressing the nation. “Nobody is listening to your telephone calls,” he assures viewers. It goes on to show specific promises and assurances, quotes from the NSA, stating that no one will be subject to wiretapping without a warrant.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 7 december 2014 @ 19:22:28 #153
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147367945
quote:
7s.gif Op donderdag 31 juli 2014 22:02 schreef Papierversnipperaar het volgende:
Oh ja, de CIA en dat rapport over martelen:

[..]

[..]

Het artikel gaat verder.
quote:
quote:
The chairman of the House intelligence committee said on Sunday the release of a Senate report examining the use of torture by the CIA a decade ago will cause violence and deaths abroad.

Representative Mike Rogers, a Michigan Republican, is regularly briefed on intelligence analyses. He told CNN that the US intelligence community had assessed that the release of the report would be used by extremists to incite violence.

The Senate intelligence committee is poised to release the first public accounting of the CIA’s use of torture on al-Qaida detainees held in secret facilities in Europe and Asia in the years after the terrorist attacks of 11 September 2001. It will come in the form of a 480-page executive summary of the 6,200-page report by Democrats on the committee, who spent six years reviewing millions of secret CIA documents.

On Friday, secretary of state John Kerry urged the senator in charge of the report to consider the timing of its release.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 8 december 2014 @ 14:35:44 #154
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147390609
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 8 december 2014 @ 14:38:27 #155
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147390711
quote:
quote:
The U.S. National Security Agency should have an unlimited ability to collect digital information in the name of protecting the country against terrorism and other threats, an influential federal judge said during a debate on privacy.

“I think privacy is actually overvalued,” Judge Richard Posner, of the U.S. Court of Appeals for the Seventh Circuit, said during a conference about privacy and cybercrime in Washington, D.C., Thursday.

“Much of what passes for the name of privacy is really just trying to conceal the disreputable parts of your conduct,” Posner added. “Privacy is mainly about trying to improve your social and business opportunities by concealing the sorts of bad activities that would cause other people not to want to deal with you.”

Congress should limit the NSA’s use of the data it collects—for example, not giving information about minor crimes to law enforcement agencies—but it shouldn’t limit what information the NSA sweeps up and searches, Posner said. “If the NSA wants to vacuum all the trillions of bits of information that are crawling through the electronic worldwide networks, I think that’s fine,” he said.

In the name of national security, U.S. lawmakers should give the NSA “carte blanche,” Posner added. “Privacy interests should really have very little weight when you’re talking about national security,” he said. “The world is in an extremely turbulent state—very dangerous.”
ggreenwald twitterde op maandag 08-12-2014 om 13:41:07 Why isn't Judge Richard Posner putting all his emails and call transcripts online? What warped acts is he hiding?? https://t.co/NQYaml9jzk reageer retweet
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 8 december 2014 @ 22:44:56 #156
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147408776
quote:
quote:
New legislation designed to challenge the ingrained secrecy of the US government and open up federal agencies to greater public scrutiny is on the verge of collapse after a single Democratic senator, Jay Rockefeller of West Virginia, effectively blocked its passage.

The Foia Improvement Act of 2014 has cleared all its major procedural hurdles with unanimous support in both the House of Representatives and the Senate judiciary committee. Its overwhelming bipartisan backing has offered a rare glimmer of hope in an otherwise gridlocked Congress.

But unless Rockefeller agrees to drop his last-minute objections to the legislation by the end of Monday, its chances of coming to a vote by the end of this Congress are all but dead. The bill, which has been two years in the making, is backed by more than 70 good governance organisations and is seen as a critical step towards a more open and accountable flow of public information.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 8 december 2014 @ 22:45:52 #157
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147408829
quote:
Mass surveillance exposed by Snowden ‘not justified by fight against terrorism’

Report by Nils Mui¸nieks, commissioner for human rights at the Council of Europe, says ‘secret, massive and indiscriminate’ intelligence work is contrary to rule of law

The “secret, massive and indiscriminate” surveillance conducted by intelligence services and disclosed by the former US intelligence contractor Edward Snowden cannot be justified by the fight against terrorism, the most senior human rights official in Europe has warned.

In a direct challenge to the United Kingdom and other states, Nils Mui¸nieks, the commissioner for human rights at the Council of Europe, calls for greater transparency and stronger democratic oversight of the way security agencies monitor the internet. He also said that so-called Five Eyes intelligence-sharing treaty between the UK, US, Australia, New Zealand and Canada should be published.

“Suspicionless mass retention of communications data is fundamentally contrary to the rule of law … and ineffective,” the Latvian official argues in a 120-page report, The Rule of Law on the Internet in the Wider Digital World. “Member states should not resort to it or impose compulsory retention of data by third parties.”

As human rights commissioner, Mui¸nieks has the power to intervene as a third party in cases sent to the European court of human rights (ECHR) in Strasbourg. His report is published the week after the UK’s Investigatory Powers Tribunal (IPT) found that the legal regime governing mass surveillance of the internet by the monitoring agency GCHQ is “human rights compliant”.

In his report, Mui¸nieks wrote: “In connection with the debate on the practices of intelligence and security services prompted by Edward Snowden’s revelations, it is becoming increasingly clear that secret, massive and indiscriminate surveillance programmes are not in conformity with European human rights law and cannot be justified by the fight against terrorism or other important threats to national security. Such interferences can only be accepted if they are strictly necessary and proportionate to a legitimate aim.”

The civil liberties organisations which brought the claim in the IPT case are planning to appeal against the ruling to the ECHR - a case in which the commissioner could participate.

Mui¸nieks told the Guardian: ”I’m interested in weighing in on such cases about surveillance. Surveillance has gone beyond the bounds of the rule of law and democratic oversight needs to be more robust.

“We have seen examples where there’s a clear lack of oversight of security: the first was black sites, torture and rendition; the second was the revelations about mass surveillance. I want to influence the working of the court and its thinking.

“These recommendations [in the report] are my interpretation of basic human rights principles. The court often refers to my work in their judgments. There’s no substantial case law in internet-related issues so far.

“The UK is a country we are watching closely on these issues. It has a huge influence on whether or not the rule of law will prevail in the digital environment. All of these data sharing agreements should be as transparent as possible so we can assess the extent to which they are abiding by the law. Our right to privacy has been compromised on a regular basis and on a mass scale. I find that very worrying.”

Mui¸nieks said he expects to visit the UK next year and examine the UK’s record on surveillance. Asked about the IPT ruling, he commented: “I would note that very few complaints to this tribunal have been upheld in the last few years which raises many questions for me.”

He supported calls for publication of the so-called Five Eyes treaty that authorises intelligence sharing between the UK, US, Australia, Canada and New Zealand as a contribution to greater transparency. A case requesting its release has already been lodged at the ECHR.

His report contained a number of recommendations including:

• No states … European or otherwise, should access data stored in another country without the express consent of the other country or countries involved unless there is a clear, explicit and sufficiently circumscribed legal basis in international law for such access.

• Member states should ensure that their law-enforcement agencies do not obtain data from servers and infrastructure in another country under informal arrangements.

• [Countries] should stop relying on private companies that control the internet and the wider digital environment to impose restrictions that are in violation of the state’s human rights obligations.

• The activities of national security and intelligence agencies [should be brought within] an overarching legal framework. Until there is increased transparency on the rules under which these services operate their activities cannot be assumed to be in accordance with the rule of law.

• States should ensure that effective democratic oversight over national security services is in place. For effective democratic oversight, a culture of respect for human rights and the rule of law should be promoted, in particular among security service officers.

The Council of Europe, which has 47 member states including the UK, Russia and Turkey, is the body that oversees the European court of human rights in Strasbourg.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 9 december 2014 @ 18:01:47 #158
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147427938
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 11 december 2014 @ 19:22:48 #159
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147491265
quote:
Philip Hammond ‘confused’ about extent of UK surveillance powers

Foreign secretary accused by campaigners of not understanding warrants he has been signing into force

Philip Hammond has been criticised for not understanding the legislation surrounding government powers to sweep up and analyse huge volumes of electronic communications such as email.

Eric King, from rights group Privacy International, said the foreign secretary appeared “confused” while giving evidence to parliament’s intelligence and security committee. The committee is reviewing the need for new legislation to regulate the UK’s electronic espionage agency, GCHQ, in light of revelations on bulk data collection by Edward Snowden, a former contractor for US intelligence.

The accusation follows a judgment on Friday that ruled the Tempora programme, for which Hammond signed the warrants, was legal, despite widespread concern from human rights groups.

“It is clear that he [Hammond] is unfortunately confused about the effect of the warrants he is signing into force, how they deal with British communications and the difference between so-called internal communications and external communications,” said King. “This is one of the huge problems with having ministers sign warrants.”

Campaigners say that in testimony to the intelligence and security committee in October, Hammond appeared not to understand the details of how the warrants he was signing worked – including whether or not they allowed the interception of communications of UK residents.

During the session, Hammond – who oversees the work of GCHQ and the foreign intelligence agency MI6 – initially appeared to say that any email exchange in which either the sender or recipient was based in the UK was treated as an internal communication and therefore any government agency wanting to access it was subject to stricter controls under the Regulation of Investigatory Powers Act (Ripa).

Later he said that if either sender or recipient were outside the UK it was an external communication and therefore subject to a different warrant, which allows the foreign secretary to authorise much broader examination by the intelligence agencies than is the case with UK-based communications.

King queried the detail of Hammond’s evidence: “If you listened to him on what Ripa does, it seems the article 8, section 4 warrants don’t ever collect UK communications and instead are exclusively for foreign to foreign communications. However, that is false on two grounds: article 8, section 4 warrants, while targeting external communications, expressly include UK to foreign, or foreign to UK and as such UK communications routinely get swept up as part of them,” he said.

“Secondly, the idea you need a more targeted article 8, section 1 warrant to intercept information about someone in the UK has not been true for a long time, and plainly wrong in the face of GCHQ programs like Tempora that are automatically intercepting, filtering and analysing a huge number of our communications on a daily basis.”

The issue of what can be intercepted under such “one-end foreign” warrants is a complicated one in the online era. If, for example, two people living in the UK send each other an email using Gmail, that may clearly seem to be a domestic communication which would need an individual warrant. However, if the intelligence services define it as each person communicating with Google’s servers in Ireland, the communication can be defined as one-end foreign, and mass-intercepted.

Privacy and civil rights groups have argued that, in light of the Snowden revelations, all electronic surveillance warrants should go before a judge to ensure the huge power available to government as a result of modern surveillance technology should be subject to some form of judicial constraint.

King said: “Hammond’s clear confusion is the predictable outcome of a legal framework that depends upon secret interpretations and that obscures the reality of the powers it grants. The fact that those signing the Ripa warrants do not understand how it works underlines the need for a new law governing surveillance powers, a law which provides for a judicial process to ensure these warrants are being issued lawfully, with proper consideration and due understanding.”

During the session, Hammond said judges would assess surveillance warrant requests primarily from a legal standpoint and that only an elected official could properly apply political judgment on the necessity and proportionality of an eavesdropping operation.

A spokesman for the Foreign Office said: “The UK has one of the strongest legal and regulatory frameworks in the world for intelligence. Legislation around the use of warrants is naturally a technical area. That is why the foreign secretary went to great lengths to explain their use to the committee.”
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 13 december 2014 @ 20:17:45 #160
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147550307


[ Bericht 100% gewijzigd door Papierversnipperaar op 13-12-2014 20:26:54 ]
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 13 december 2014 @ 20:29:49 #161
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147550626
quote:
Operation Socialist

The Inside Story of How British Spies Hacked Belgium’s Largest Telco
quote:
When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies.

It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data.

Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”

The full story about GCHQ’s infiltration of Belgacom, however, has never been told. Key details about the attack have remained shrouded in mystery—and the scope of the attack unclear.

Now, in partnership with Dutch and Belgian newspapers NRC Handelsblad and De Standaard, The Intercept has pieced together the first full reconstruction of events that took place before, during, and after the secret GCHQ hacking operation.

Based on new documents from the Snowden archive and interviews with sources familiar with the malware investigation at Belgacom’s networks, The Intercept and its partners have established that the attack on Belgacom was more aggressive and far-reaching than previously thought. It occurred in stages between 2010 and 2011, each time penetrating deeper into Belgacom’s systems, eventually compromising the very core of the company’s networks.
quote:
Sophia in ‘t Veld, a Dutch politician who chaired the European Parliament’s recent inquiry into mass surveillance exposed by Snowden, told The Intercept that she believes the British government should face sanctions if the latest disclosures are proven.

“Compensating Belgacom should be the very least it should do,” int’ Veld said. “But I am more concerned about accountability for breaking the law, violating fundamental rights, and eroding our democratic systems.”
quote:
Last month, The Intercept confirmed Regin as the malware found on Belgacom’s systems during the clean-up operation.

The spy bug was described by security researchers as one of the most sophisticated pieces of malware ever discovered, and was found to have been targeting a host of telecommunications networks, governments, and research organizations, in countries such as Germany, Iran, Brazil, Russia, and Syria, as well as Belgium.

GCHQ has refused to comment on Regin, as has the NSA, and Belgacom. But Snowden documents contain strong evidence, which has not been reported before, that directly links British spies to the malware.

Aside from showing extensive details about how the British spies infiltrated the company and planted malware to successfully steal data, GCHQ documents in the Snowden archive contain codenames that also appear in samples of the Regin malware found on Belgacom’s systems, such as “Legspin” and “Hopscotch.”

One GCHQ document about the use of hacking methods references the use of “Legspin” to exploit computers. Another document describes “Hopscotch” as part of a system GCHQ uses to analyze data collected through surveillance.

Ronald Prins, director of the computer security company Fox-IT, has studied the malware, and played a key role in the analysis of Belgacom’s infected networks.

“Documents from Snowden and what I’ve seen from the malware can only lead to one conclusion,” Prins told The Intercept. “This was used by GCHQ.”
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 16 december 2014 @ 16:54:38 #162
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147641771
quote:
A Journalist-Agitator Facing Prison Over a Link

Barrett Brown makes for a pretty complicated victim. A Dallas-based journalist obsessed with the government’s ties to private security firms, Mr. Brown has been in jail for a year, facing charges that carry a combined penalty of more than 100 years in prison.

Professionally, his career embodies many of the conflicts and contradictions of journalism in the digital era. He has written for The Guardian, Vanity Fair and The Huffington Post, but as with so many of his peers, the line between his journalism and his activism is nonexistent. He has served in the past as a spokesman of sorts for Anonymous, the hacker collective, although some members of the group did not always appreciate his work on its behalf.

In 2007, he co-wrote a well-received book, “Flock of Dodos: Behind Modern Creationism, Intelligent Design and the Easter Bunny,” and over time, he has developed an expertise in the growing alliance between large security firms and the government, arguing that the relationship came at a high cost to privacy.

From all accounts, including his own, Mr. Brown, now 32, is a real piece of work. He was known to call some of his subjects on the phone and harass them. He has been public about his struggles with heroin and tends to see conspiracies everywhere he turns. Oh, and he also threatened an F.B.I. agent and his family by name, on a video, and put it on YouTube, so there’s that.

But that’s not the primary reason Mr. Brown is facing the rest of his life in prison. In 2010, he formed an online collective named Project PM with a mission of investigating documents unearthed by Anonymous and others. If Anonymous and groups like it were the wrecking crew, Mr. Brown and his allies were the people who assembled the pieces of the rubble into meaningful insights.

Project PM first looked at the documents spilled by the hack of HBGary Federal, a security firm, in February 2011 and uncovered a remarkable campaign of coordinated disinformation against advocacy groups, which Mr. Brown wrote about in The Guardian, among other places.

Peter Ludlow, a professor of philosophy at Northwestern and a fan of Mr. Brown’s work, wrote in The Huffington Post that, “Project PM under Brown’s leadership began to slowly untangle the web of connections between the U.S. government, corporations, lobbyists and a shadowy group of private military and infosecurity consultants.”

In December 2011, approximately five million e-mails from Stratfor Global Intelligence, an intelligence contractor, were hacked by Anonymous and posted on WikiLeaks. The files contained revelations about close and perhaps inappropriate ties between government security agencies and private contractors. In a chat room for Project PM, Mr. Brown posted a link to it.

Among the millions of Stratfor files were data containing credit cards and security codes, part of the vast trove of internal company documents. The credit card data was of no interest or use to Mr. Brown, but it was of great interest to the government. In December 2012 he was charged with 12 counts related to identity theft. Over all he faces 17 charges — including three related to the purported threat of the F.B.I. officer and two obstruction of justice counts — that carry a possible sentence of 105 years, and he awaits trial in a jail in Mansfield, Tex.

According to one of the indictments, by linking to the files, Mr. Brown “provided access to data stolen from company Stratfor Global Intelligence to include in excess of 5,000 credit card account numbers, the card holders’ identification information, and the authentication features for the credit cards.”

Because Mr. Brown has been closely aligned with Anonymous and various other online groups, some of whom view sowing mayhem as very much a part of their work, his version of journalism is tougher to pin down and, sometimes, tougher to defend.

But keep in mind that no one has accused Mr. Brown of playing a role in the actual stealing of the data, only of posting a link to the trove of documents.

Journalists from other news organizations link to stolen information frequently. Just last week, The New York Times, The Guardian and ProPublica collaborated on a significant article about the National Security Agency’s effort to defeat encryption technologies. The article was based on, and linked to, documents that were stolen by Edward J. Snowden, a private contractor working for the government who this summer leaked millions of pages of documents to the reporter Glenn Greenwald and The Guardian along with Barton Gellman of The Washington Post.

By trying to criminalize linking, the federal authorities in the Northern District of Texas — Mr. Brown lives in Dallas — are suggesting that to share information online is the same as possessing it or even stealing it. In the news release announcing the indictment, the United States attorney’s office explained, “By transferring and posting the hyperlink, Brown caused the data to be made available to other persons online, without the knowledge and authorization of Stratfor and the card holders.”

And the magnitude of the charges is confounding. Jeremy Hammond, a Chicago man who pleaded guilty to participating in the actual hacking of Stratfor in the first place, is facing a sentence of 10 years.

Last week, Mr. Brown and his lawyers agreed to an order that allows him to continue to work on articles, but not say anything about his case that is not in the public record.

Speaking by phone on Thursday, Charles Swift, one of his lawyers, spoke carefully.

“Mr. Brown is presumed innocent of the charges against him and in support of the presumption, the defense anticipates challenging both the legal assumptions and the facts that underlie the charges against him,” he said.

Others who are not subject to the order say the aggressive set of charges suggests the government is trying to send a message beyond the specifics of the case.

“The big reason this matters is that he transferred a link, something all of us do every single day, and ended up being charged for it,” said Jennifer Lynch, a staff lawyer at the Electronic Frontier Foundation, an advocacy group that presses for Internet freedom and privacy. “I think that this administration is trying to prosecute the release of information in any way it can.”

There are other wrinkles in the case. When the F.B.I. tried to serve a warrant on Mr. Brown in March 2012, he was at his mother’s house. The F.B.I. said that his mother tried to conceal his laptop and it charged her with obstruction of justice. (She pleaded guilty in March of this year and is awaiting sentencing.)

The action against his mother enraged Mr. Brown and in September 2012 he made a rambling series of posts to YouTube in which he said he was in withdrawal from heroin addiction. He proceeded to threaten an F.B.I. agent involved in the arrest, saying, “I don’t say I’m going to kill him, but I am going to ruin his life and look into his (expletive) kids ... How do you like them apples?”

The feds did not like them apples. After he was arrested, a judge ruled he was “a danger to the safety of the community and a risk of flight.” In the video, Mr. Brown looks more like a strung-out heroin addict than a threat to anyone, but threats are threats, especially when made against the F.B.I.

“The YouTube video was a mistake, a big one,” said Gregg Housh, a friend of Mr. Brown’s who first introduced him to the activities of Anonymous. “But it is important to remember that the majority of the 105 years he faces are the result of linking to a file. He did not and has not hacked anything, and the link he posted has been posted by many, many other news organizations.”

At a time of high government secrecy with increasing amounts of information deemed classified, other routes to the truth have emerged, many of them digital. News organizations in receipt of leaked documents are increasingly confronting tough decisions about what to publish, and are defending their practices in court and in the court of public opinion, not to mention before an administration determined to aggressively prosecute leakers.

In public statements since his arrest, Mr. Brown has acknowledged that he made some bad choices. But punishment needs to fit the crime and in this instance, much of what has Mr. Brown staring at a century behind bars seems on the right side of the law, beginning with the First Amendment of the Constitution.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 16 december 2014 @ 21:28:06 #163
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147651595
quote:
Techbedrijven sluiten monsterverbond in privacyrechtszaak VS

De Amerikaanse softwaregigant Microsoft eist met machtige bondgenoten als Apple, Amazon en Cisco dat de Amerikaanse overheid geen toegang krijgt tot e-mails van Europese klanten van het bedrijf. De technologiebedrijven hebben het gerechtshof in New York verzocht om de gegevens uit de handen van de Amerikaanse regering te houden.

Ook bekende nieuwsaanbieders als Fox News, CNN en de The Washington Post hebben hun steun voor Microsoft uitgesproken. De softwaregigant heeft inmiddels meer dan twintig grote bedrijven aan zijn zijde, bericht persbureau Reuters.

De rechtszaak in New York gaat over de vraag of Microsoft de Amerikaanse overheid toegang moet verlenen tot e-mails van een aantal Europese klanten, die op servers in Ierland zijn opgeslagen. De regering eist toegang tot de e-mails omdat ze informatie zouden opleveren voor een drugszaak. Microsoft weigert dit. In Ierland opgeslagen gegevens vallen onder Europese wetgeving, aldus het bedrijf, en die data kunnen alleen worden bemachtigd met tussenkomst van de lokale autoriteiten.

De Amerikaanse overheid vindt een dergelijke tussenkomst niet nodig, omdat Microsoft-werknemers in Amerika de gegevens zo kunnen opvragen zonder daarvoor naar Ierland te hoeven. Een lagere rechtbank heeft de regering eerder dit jaar in het gelijk gesteld, waarna Microsoft bij het hof in beroep is gegaan.

Weglopende klanten

Voor Microsoft en andere techbedrijven is hun winstgevendheid in het geding. Sinds de onthullingen van klokkenluider Edward Snowden maken meer mensen zich zorgen over de bescherming van hun gegevens. Zowel private als zakelijke klanten van Microsoft en Apple zouden weleens kunnen weglopen als ze weten dat de Amerikaanse overheid hun bestanden zomaar kan inzien.

Grote ict-bedrijven bieden steeds meer clouddiensten aan waarbij niet alleen e-mails maar ook foto's en andere bestanden op bedrijfsservers worden opgeslagen. Ook tot deze gegevens kan de Amerikaanse regering toegang eisen.

De mediabedrijven die Microsoft steunen zijn vooral bang dat de nieuwsgierigheid van de regering de nieuwsgaring in gevaar brengt. Bronnen zullen zich wel twee keer achter de oren krabben voordat ze informatie door durven te spelen, zo is de gedachte, als ze weten dat de overheid bij alle e-mails van de journalisten kan.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 17 december 2014 @ 01:36:21 #164
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147660442
quote:
quote:
De Amerikaanse klokkenluider Edward Snowden heeft vanuit Moskou een gloedvol pleidooi gehouden tegen de uitbreiding van surveillancebevoegdheden van de Nederlandse veiligheidsdiensten. Hij deed dat middels een videoverbinding tijdens de uitreiking van de Big Brother Awards in de Amsterdamse Stadsschouwburg.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 26 december 2014 @ 21:41:24 #165
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147985706
quote:
ACLU accuses NSA of using holiday lull to ‘minimise impact’ of documents

Released on Christmas Eve, the documents are heavily redacted versions of reports by the NSA to the President’s Intelligence Oversight Board

The National Security Agency used the holiday lull to “minimise the impact” of a tranche of documents by releasing them on Christmas Eve, the American Civil Liberties Union (ACLU) said on Friday.

The documents, which were released in response to a legal challenge by the ACLU under the Freedom of Information Act, are heavily – in some places totally –redacted versions of reports by the NSA to the President’s Intelligence Oversight Board dating back to 2007.

A court ordered the documents released this past summer, and a 22 December deadline for that release was agreed upon, according to Patrick Toomey, a staff attorney at the ACLU’s national security project, because the NSA said it needed “six or seven months” to complete its review and redaction process.

A spokesperson for the NSA said that the 22 December deadline, “which was agreed to by all parties,” was met.

But according to Toomey, the ACLU didn’t receive the documents until “late in the day on the 23rd” – the NSA sent them by FedEx late on the 22nd – and the NSA didn’t publicly release them until Christmas Eve. “I certainly think the NSA would prefer to have the documents released right ahead of the holidays in order to have less public attention on what they contain,” Toomey said.

The redactions on the document are extreme, and their omissions tantalising. One entry, from the 4th quarter of 2008, reads: “On [redacted] [redacted] used the US SIGINT System (USSS) to locate [redacted] believed to be kidnapped [redacted] The selectors were tasked before authorization was obtained from NSA. After the NSA Office of General Counsel (OGC) denied the authorization request, [redacted] was found. He had not been kidnapped.”

Another reads: “On [redacted] during an experimental collection and processing effort, NSA analysts collected [several lines of text redacted.] The messages were deleted [redacted] when the error was identified.”

Many entries are erased entirely, which means the documents reveal very little about how individuals who misuse the data were disciplined by the NSA, or how quickly errors were resolved.

But, according to Toomey, they speak to a total picture of a “large number of different compliance violations. We don’t know how many.”

He said the documents deepen the picture of the nature and extent of compliance violations by analysts working for the NSA.

“There are certain portions of the documents that really vindicate some of the things [Edward] Snowden said when he first described the NSA surveillance in terms of the ability of analysts to conduct queries – without authorisation – of raw internet traffic,” Toomey said.

Among the items redacted are sections detailing the total number of violations reported, with many ending up like this entry from 2013 “On [redacted] occasions during the fourth quarter, selectors were incorrectly tasked because of typographical errors.”

This makes the scale of the problem difficult to gauge. Toomey said the ACLU would continue to sue for the release of those numbers.

“More generally,” Toomey said, “just the range of different compliance violations makes it clear that at every step of the NSA’s collection of information there are vulnerabilities that leave the privacy of Americans at risk.”

A spokesperson for the NSA declined to answer the question of why Christmas Eve was chosen as a release date. A statement on the agency’s website which accompanied the documents’ release said: “These materials show, over a sustained period of time, the depth and rigor of NSA’s commitment to compliance.”

“By emphasizing accountability across all levels of the enterprise, and transparently reporting errors and violations to outside oversight authorities,” the statement concluded, “NSA protects privacy and civil liberties while safeguarding the nation and our allies.”
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 26 december 2014 @ 21:53:07 #166
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_147986109
quote:
quote:
The online anonymity network Tor is a high-priority target for the National Security Agency. The work of attacking Tor is done by the NSA's application vulnerabilities branch, which is part of the systems intelligence directorate, or SID. The majority of NSA employees work in SID, which is tasked with collecting data from communications systems around the world.

According to a top-secret NSA presentation provided by the whistleblower Edward Snowden, one successful technique the NSA has developed involves exploiting the Tor browser bundle, a collection of programs designed to make it easy for people to install and use the software. The trick identifies Tor users on the Internet and then executes an attack against their Firefox web browser.

The NSA refers to these capabilities as CNE, or computer network exploitation.

The first step of this process is finding Tor users. To accomplish this, the NSA relies on its vast capability to monitor large parts of the Internet. This is done via the agency's partnership with US telecoms firms under programs codenamed Stormbrew, Fairview, Oakstar and Blarney.

The NSA creates "fingerprints" that detect HTTP requests from the Tor network to particular servers. These fingerprints are loaded into NSA database systems like XKeyscore, a bespoke collection and analysis tool that NSA boasts allows its analysts to see "almost everything" a target does on the Internet.

Using powerful data analysis tools with codenames such as Turbulence, Turmoil and Tumult, the NSA automatically sifts through the enormous amount of Internet traffic that it sees, looking for Tor connections.

Last month, Brazilian TV news show Fantastico showed screenshots of an NSA tool that had the ability to identify Tor users by monitoring Internet traffic.

The very feature that makes Tor a powerful anonymity service, and the fact that all Tor users look alike on the Internet, makes it easy to differentiate Tor users from other web users. On the other hand, the anonymity provided by Tor makes it impossible for the NSA to know who the user is, or whether or not the user is in the US.

After identifying an individual Tor user on the Internet, the NSA uses its network of secret Internet servers to redirect those users to another set of secret Internet servers, with the codename FoxAcid, to infect the user's computer. FoxAcid is an NSA system designed to act as a matchmaker between potential targets and attacks developed by the NSA, giving the agency opportunity to launch prepared attacks against their systems.

Once the computer is successfully attacked, it secretly calls back to a FoxAcid server, which then performs additional attacks on the target computer to ensure that it remains compromised long-term, and continues to provide eavesdropping information back to the NSA.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
pi_148253860
quote:
7s.gif Op dinsdag 16 december 2014 21:28 schreef Papierversnipperaar het volgende:

Voor Microsoft en andere techbedrijven is hun winstgevendheid in het geding.

Dat is werkelijk ook het enige waar die hele poppenkast om draait van Microsoft en die andere bedrijven: hun image. Het zijn ook allemaal makers van proprietary software. Van Microsoft en Cisco weten we dat het vol zit met backdoors. Het boeit ze helemaal niets dat onze privacy in het geding is.
  donderdag 15 januari 2015 @ 15:55:21 #168
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_148713935
quote:
quote:
David Cameron is to urge Barack Obama to pressure internet firms such as Twitter and Facebook to do more to cooperate with Britain’s intelligence agencies as they seek to track the online activities of Islamist extremists.

As he becomes the first European leader to meet the president after the multiple shootings in Paris last week, the prime minister will seek to win Obama’s support for his plans to secure a new legal framework to deny terrorists a “safe space”.

The prime minister arrives after he proposed earlier this week that British intelligence agencies have the power to break the encrypted communications of suspected terrorists and insisting that the likes of Twitter and Facebook do more to cooperate with Britain’s GCHQ eavesdropping centre.

Cameron will demand that US internet companies store – and then be prepared to hand over – data and content needed by the intelligence agencies “to keep us safe” when he meets the president for talks in the Oval Office on Friday morning.

A government source said: “The prime minister’s objective here is to get the US companies to cooperate with us more, to make sure that our intelligence agencies get the information they need to keep us safe. That will be his approach in the discussion with President Obama – how can we work together to get them to cooperate more, what is the best approach to encourage them to do more.”
quote:
quote:
Theresa May says UK police and intelligence agencies should have greater access to communications data in order to locate terror suspects. The home secretary criticises her coalition colleagues for blocking the communications data bill in 2012. She says the counter-terrorist investigation in Paris following the massacre at Charlie Hebdo likely involved the use of communications data
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 15 januari 2015 @ 22:30:02 #169
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_148730972
quote:
Secret US cybersecurity report: encryption vital to protect private data

Newly uncovered Snowden document contrasts with British PM’s vow to crack down on encrypted messaging after Paris attacks

A secret US cybersecurity report warned that government and private computers were being left vulnerable to online attacks from Russia, China and criminal gangs because encryption technologies were not being implemented fast enough.

The advice, in a newly uncovered five-year forecast written in 2009, contrasts with the pledge made by David Cameron this week to crack down on encryption use by technology companies.

In the wake of the Paris terror attacks, the prime minister said on Monday there should be “no means of communication” that British authorities could not access. Cameron will use his visit to the US, which started on Thursday , to urge Barack Obama to apply more pressure to tech giants, such as Apple, Google and Facebook, who have been expanding encrypted messaging for their millions of users since the revelations of mass NSA surveillance by the whistleblower Edward Snowden.

The document from the US National Intelligence Council, which reports directly to the US director of national intelligence, made clear that encryption was the “best defence” for computer users to protect private data.

Part of the cache given to the Guardian by Snowden, the paper was published in 2009 and gives a five-year forecast on the “global cyber threat to the US information infrastructure”. It covers communications, commercial and financial networks, and government and critical infrastructure systems. It was shared with GCHQ and made available to the agency’s staff through its intranet.

One of the biggest issues in protecting businesses and citizens from espionage, sabotage and crime – hacking attacks are estimated to cost the global economy up to $400bn a year – was a clear imbalance between the development of offensive versus defensive capabilities, “due to the slower than expected adoption … of encryption and other technologies”, it said.

An unclassified table accompanying the report states that encryption is the “[b]est defense to protect data”, especially if made particularly strong through “multi-factor authentication” – similar to two-step verification used by Google and others for email – or biometrics. These measures remain all but impossible to crack, even for GCHQ and the NSA.

The report warned: “Almost all current and potential adversaries – nations, criminal groups, terrorists, and individual hackers – now have the capability to exploit, and in some cases attack, unclassified access-controlled US and allied information systems.”

It further noted that the “scale of detected compromises indicates organisations should assume that any controlled but unclassified networks of intelligence, operational or commercial value directly accessible from the internet are already potentially compromised by foreign adversaries”.

The primary adversaries included Russia, whose “robust” operations teams had “proven access and tradecraft”, it said. By 2009, China was “the most active foreign sponsor of computer network intrusion activity discovered against US networks”, but lacked the sophistication or range of capabilities of Russia. “Cyber criminals” were another of the major threats, having “capabilities significantly beyond those of all but a few nation states”.

The report had some cause for optimism, especially in the light of Google and other US tech giants having in the months prior greatly increased their use of encryption efforts. “We assess with high confidence that security best practices applied to target networks would prevent the vast majority of intrusions,” it concluded.

Official UK government security advice still recommends encryption among a range of other tools for effective network and information defence. However, end-to-end encryption – which means only the two people communicating with each other, and not the company carrying the message, can decode it – is problematic for intelligence agencies as it makes even warranted collection considerably more difficult.

The latest versions of Apple and Google’s mobile operating systems are encrypted by default, while other popular messaging services, such as WhatsApp and Snapchat, also use encryption. This has prompted calls for action against such strong encryption from ministers and officials.

Speaking on Monday, Cameron asked: “In our country, do we want to allow a means of communication between people which we cannot read?”

The previous week, a day after the attack on the Charlie Hebdo office in Paris, the MI5 chief, Andrew Parker, called for new powers and warned that new technologies were making it harder to track extremists.

In November, the head of GCHQ, Robert Hannigan, said US social media giants had become the “networks of choice” for terrorists.

Chris Soghoian, principal senior policy analyst at the American Civil Liberties Union, said attempts by the British government to force US companies to weaken encryption faced many hurdles.

“The trouble is these services are already being used by hundreds of millions of people. I guess you could try to force tech companies to be less secure but then they would be less secure against attacks for anyone,” he said. “I guess they could ban the iPhone or say you can’t use Google’s services in the UK but that wouldn’t go down well.”

GCHQ and the NSA are responsible for cybersecurity in the UK and US respectively. This includes working with technology companies to audit software and hardware for use by governments and critical infrastructure sectors.

Such audits uncover numerous vulnerabilities which are then shared privately with technology companies to fix issues that could otherwise have caused serious damage to users and networks. However, both agencies also have intelligence-gathering responsibilities under which they exploit vulnerabilities in technology to monitor targets. As a result of these dual missions, they are faced with weighing up whether to exploit or fix a vulnerability when a product is used both by targets and innocent users.

The Guardian, New York Times and ProPublica have previously reported the intelligence agencies’ broad efforts to undermine encryption and exploit rather than reveal vulnerabilities. This prompted Obama’s NSA review panel to warn that the agency’s conflicting missions caused problems, and so recommend that its cyber-security responsibilities be removed to prevent future issues.

Another newly discovered document shows GCHQ acting in a similarly conflicted manner, despite the agencies’ private acknowledgement that encryption is an essential part of protecting citizens against cyber-attacks.

The 2008 memo was addressed to the then foreign secretary, David Miliband, and classified with one of the UK’s very highest restrictive markings: “TOP SECRET STRAP 2 EYES ONLY”. It is unclear why such a document was posted to the agency’s intranet, which is available to all agency staff, NSA workers, and even outside contractors.

The memo requested a renewal of the legal warrant allowing GCHQ to “modify” commercial software in violation of licensing agreements. The document cites examples of software the agency had hacked, including commonly used software to run web forums, and website administration tools. Such software are widely used by companies and individuals around the world.

The document also said the agency had developed “capability against Cisco routers”, which would “allow us to re-route selected traffic across international links towards GCHQ’s passive collection systems”.

GCHQ had also been working to “exploit” the anti-virus software Kaspersky, the document said. The report contained no information on the nature of the vulnerabilities found by the agency.

Security experts regularly say that keeping software up to date and being aware of vulnerabilities is vital for businesses to protect themselves and their customers from being hacked. Failing to fix vulnerabilities leaves open the risk that other governments or criminal hackers will find the same security gaps and exploit them to damage systems or steal data, raising questions about whether GCHQ and the NSA neglected their duty to protect internet systems in their quest for more intelligence.

A GCHQ spokesman said: “It is long-standing policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework, which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the secretary of state, the interception and intelligence services commissioners and the parliamentary intelligence and security committee.

“All our operational processes rigorously support this position. In addition, the UK’s interception regime is entirely compatible with the European convention on human rights.”
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 19 januari 2015 @ 16:58:49 #170
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_148845773
quote:
'Britse inlichtingendienst onderschept e-mails journalisten'

De Britse inlichtingendienst GCHQ heeft e-mails van journalisten bij belangrijke internationale media onderschept, bewaard en gepubliceerd.

Dat meldt The Guardian op basis van nieuwe documenten van klokkenluider Edward Snowden. De e-mails werden onderschept als onderdeel van een "testoefening" en op het intranet van de GCHQ geplaatst.

De GCHQ onderschepte e-mails van journalisten van onder andere de BBC, Reuters, The Guardian, The New York Times, Le Monde, The Sun, NBC en de Washington Post. De e-mails variëren van persberichten aan media tot onderlinge communicatie tussen journalisten over potentiële verhalen.

Volgens de documenten onderschepte de Britse geheime dienst op een dag in november van 2008 binnen 10 minuten zo'n 70.000 e-mails van journalisten. Dit lukte de GCHQ door het aftappen van de de onderzeese glasvezelkabels.

Ook worden onderzoeksjournalisten als "een bedreiging" voor de geheime diensten gezien, samen met terroristen en hackers, zo blijkt uit de documenten.

Cameron

Meer dan honderd journalisten, waaronder velen van de internationale media die door de GCHQ zijn afgetapt, hebben een open brief aan de Britse premier David Cameron gestuurd. In deze brief protesteren journalisten tegen het afluisteren van hun communicatie.

Na de aanslagen in Parijs wil Cameron het bij wet mogelijk maken om communicatie die niet door de Britse inlichtingendiensten kan worden uitgelezen aan banden te leggen. Volgens de journalisten gaat dit tegen de persvrijheid in.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 21 januari 2015 @ 16:36:14 #171
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_148912888
quote:
Edward Snowden: AIVD en MIVD lopen aan de leiband NSA

Nederlandse inlichtingendiensten AIVD en MIVD lopen aan de leiband van de Amerikaanse NSA. Ze zijn 'uitermate volgzaam' en worden als 'ondergeschikten' gezien. Dat vertelt Edward Snowden, die voor zowel de Amerikaanse inlichtingendienst NSA als voor de CIA werkte, in een interview met de Volkskrant en Nieuwsuur.

Snowden: 'De Nederlanders werken voor de Amerikanen. Ze doen wat wij ze vertellen wat ze moeten doen. Ze worden niet gewaardeerd vanwege hun capaciteiten, maar vanwege de vrije doorgang die ze bieden. Daarvoor gebruikt de NSA ze.'

Morgen verschijnt in de Volkskrant en op Volkskrant.nl een uitgebreid interview met Edward Snowden, die in 2013 tienduizenden staatsgeheimen openbaarde van de Amerikaanse inlichtingendienst NSA en momenteel in Moskou verblijft.

Nieuwsuur zal vanavond de beelden uitzenden. Edward Snowden spreekt onder meer over de nieuwe Nederlandse inlichtingenwet, de roep om nieuwe afluisterbevoegdheden na de aanslagen in Parijs en zijn persoonlijke situatie in Moskou.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
pi_148912911
quote:
7s.gif Op woensdag 21 januari 2015 16:36 schreef Papierversnipperaar het volgende:

[..]

Het artikel gaat verder.
Goh, je verwacht het niet. :')
  woensdag 21 januari 2015 @ 17:05:29 #173
379282 Woods
Ich Bin Ein Berliner
pi_148913743
Geil ^O^
woensdag 6 mei 2015 17:54 schreef Libertarisch het volgende:
Helaas pindakaas dan, het leven is hard. Je kunt niet iedereen blijven begeleiden alsof het kinderen zijn, je zult het zelf moeten doen.
  donderdag 22 januari 2015 @ 21:15:59 #174
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_148957546
quote:
UN needs agency for data protection, European commissioner tells Davos

Edward Snowden’s revelations about digital monitoring have pushed data security high up the agenda at Davos this year

A new UN agency for data protection and data security is needed to protect the confidential and personal information of citizens around the world, the European commissioner for digital economy told delegates at the World Economic Forum on Thursday.

Günther Oettinger said the recent Sony hack, which exposed swaths of confidential and personal information, had shown Europe the need to radically reshape the way data is used.

“We are in a digital revolution, and we need a data revolution in parallel,” Oettinger said in a panel alongside Sir Tim Berners Lee, the inventor of the world wide web, and Yahoo’s boss, Marissa Mayer. He said the stream of revelations following Sony’s data breach had shown that Brussels must take a lead in restoring trust in tech companies.

Edward Snowden’s revelations about the extent to which government agencies have been intercepting their citizens’ digital communications have pushed data security high up the agenda at Davos this year.

Mayer told Davos that Yahoo had immediately changed the way it handled and encrypted data when the Snowden revelations came to light. Asked how Yahoo would handle a request for data access from an oppressive regime, she replied: “What we have seen from the Snowden allegations is that whether they’re coming through the official channels or not to access the data, they’re accessing the data.”

Berners-Lee said that the battle between privacy and security should not be a pendulum, swinging between giving agencies yet more or less access to data. At the moment, he warned, there is no way of testing what someone does with data if granted permission to obtain it through the courts.

“I want to break out of that pendulum,” he said. “So let’s go down the way of accountability, so we can say yes, you can have the data, but I’m going to talk to the people who are overseeing you about how you use it.”

Berners-Lee told delegates that the tech industry needed to pay more attention to whether its actions were actually good for users. He cited the example of applications that sprung up to let iPhone users turn on the flashlight. Many would then immediately request access to other applications to access data.

“Their whole model is to steal data, and build models, and not help you at all,” Berners-Lee said. But the man who created the first protocols that underpin the web more than 25 years ago warned that a new architecture would be needed to guarantee privacy.

Oettinger said the first priority was to ensure that companies and organisations in Europe were properly transparent, before then pushing on for a credible global common understanding on the issue. “We need a UN agency for data protection and data security,” he declared.

Oettinger outlined a two-pronged approach, where governments implement clear, pragmatic regulation, and the technology industry designs products that actually guarantee users’ privacy.

Michael Fries, the president and CEO of cable giant Liberty Global, questioned Oettinger’s vision for a new global deal on data.

“It is not possible in the near term. I think it’s going to take several years,” Fries warned.

Bosses of technology companies also asserted that there was a social good for technology. Sheryl Sandberg, the boss of Facebook, said technology “gives voice to someone who has traditionally not had that”. She said giving women access to technology in developing countries was more beneficial than men as they passed the knowledge on to their children.

“Women will not have the same opportunity to participate as men, it takes an active and different role than we’ve had before,” she said to applause. But, she said the only way to make access available was to make it cheaper. “Sixty percent of the internet today is not in English,” she said, which showed that it lacked diversity.

Eric Schmidt, the chief executive of Google, said improving broadband, and making it more accessible, would solve “almost all of the problems we face”.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 23 januari 2015 @ 18:55:15 #175
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_148986898
Victim-blaming:

quote:
'Encryptie dwingt spionnen tot moreel onethisch gedrag'

Wanneer meer mensen hun berichten gaan versleutelen om afluisteraars en meelezers te dwarsbomen dwingt dat inlichtingendiensten in een 'moreel slechtere positie', zo zei een voormalig topman van de Britse spionagedienst GCHQ deze week.

Het is een opmerkelijk argument om het gebruik van encryptie terug te dringen. De redenering is vergelijkbaar met de waarschuwing dat inbrekers meer schade aanrichten als je de deur op slot doet.

En met de formulering dat spionnen zich straks wellicht slechter gaan gedragen erkende Sir David Omand, baas van de GCHQ in de jaren negentig, impliciet dat spionnen zich nu ook al slecht gedragen.

Encryptie

Encryptie is het belangrijkste middel om veilig berichten te versturen of veilig gesprekken te voeren. Letters en geluiden worden digitaal verhaspeld tot een onbegrijpelijke brij van tekens, die alleen met een speciale sleutel door de ontvanger te ontcijferen is. Vroeger was deze geheimtaal vooral iets voor militairen, maar sinds de onthullingen van Edward Snowden hebben ook bedrijven en burgers er veel belangstelling voor.

Whatsapp werkt ermee, Google en Apple werken ermee (zelf kunnen ze wel gewoon blijven meekijken), en er zijn handige programmaatjes waarmee iedereen zijn e-mail kan versleutelen. Ook nieuwe mobieltjes zoals de Blackphone gebruiken standaard encryptie.

Last

Eind vorig jaar bleek uit documenten van Edward Snowden dat de NSA en GCHQ veel last hebben van encryptie. Het populaire PGP (pretty good privacy), dat bijvoorbeeld gebruikt wordt om e-mail te versleutelen, hadden ze in elk geval twee jaar geleden nog niet gekraakt.

De 'oplossing' voor geheime diensten is om dan niet meer de communicatie te onderscheppen, maar de 'endpoints', de computers en telefoons te hacken van waaruit de berichten worden verstuurd.

Ouderwetse surveillance

'De inlichtingendiensten zullen het niet opgeven', zei Omand tijdens een debat bij de London School of Economics. 'Nu zullen ze dichter bij de slechteriken moeten zien te komen.'

Dat betekent enerzijds meer ouderwetse surveillance, zoals het schaduwen en afluisteren van huiskamers. Anderzijds betekent het ook meer zogeheten computer network exploitation: het binnendringen in de apparaten van de doelwitten. De NSA heeft al toegang tot zeker 50 duizend netwerken, bleek eind 2013 uit documenten van Snowden.

'Je kunt zeggen dat we dan gerichter zullen gaan werken, maar in termen van privacy - we zullen meer nevenschade aanrichten - zullen we waarschijnlijk in een moreel slechtere positie eindigen dan eerst.'
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 26 januari 2015 @ 19:05:33 #176
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_149081617
quote:
Mass surveillance is fundamental threat to human rights, says European report

Europe’s top rights body says scale of NSA spying is ‘stunning’ and suggests UK powers may be at odds with rights convention

Europe’s top rights body has said mass surveillance practices are a fundamental threat to human rights and violate the right to privacy enshrined in European law.

The parliamentary assembly of the Council of Europe says in a report that it is “deeply concerned” by the “far-reaching, technologically advanced systems” used by the US and UK to collect, store and analyse the data of private citizens. It describes the scale of spying by the US National Security Agency, revealed by Edward Snowden, as “stunning”.

The report also suggests that British laws that give the monitoring agency GCHQ wide-ranging powers are incompatible with the European convention on human rights. It argues that British surveillance may be at odds with article 8, the right to privacy, as well as article 10, which guarantees freedom of expression, and article 6, the right to a fair trial.

“These rights are cornerstones of democracy. Their infringement without adequate judicial control jeopardises the rule of law,” it says.

There is compelling evidence that US intelligence agencies and their allies are hoovering up data “on a massive scale”, the report says. US-UK operations encompass “numerous persons against whom there is no ground for suspicion of any wrongdoing,” it adds.

The assembly is made up of delegates from 47 member states, including European Union and former Soviet countries. It is due to debate the report’s recommendations on Tuesday.

Though the recommendations are not binding on governments, the European court of human rights looks to the assembly for broad inspiration, and occasionally cites it in its rulings.

Several British surveillance cases are currently before the Strasbourg court. Amnesty International, the American Civil Liberties Union, Privacy International and Liberty all argue that GCHQ’s mass collection of data infringes European law. In December the UK’s investigatory powers tribunal (IPT) dismissed their complaint.

The 35-page assembly report, written by a Dutch MP, Pieter Omtzigt, begins with a quote from the Russian novelist Alexander Solzhenitysn: “Our freedom is built on what others do not know of our existences”. It says the knowledge that states do engage in mass surveillance has a “chilling effect” on the exercise of basic freedoms.

It says the assembly is deeply worried by the fact that intelligence agencies have deliberately weakened internet security by creating back doors and systematically exploiting weakness in security standards and implementation. Back doors can easily be exploited by “terrorists and cyber-terrorists or other criminals”, it says, calling for a greater use of encryption.

Another concern is the use of “secret laws, secret courts and secret interpretations of such laws” to justify mass surveillance. Typically, these laws “are very poorly scrutinised”.

The assembly acknowledges there is a need for “effective targeted surveillance of suspected terrorists and organised criminals”. But citing independent reviews carried out in the US, it says there is little evidence that mass surveillance has stopped terrorist attacks. It notes: “Instead, resources that might prevent attacks are diverted to mass surveillance, leaving potentially dangerous persons free to act.”

There is no mention of the recent attacks in Paris by three jihadist terrorists who shot dead 17 people. All three were known to the French authorities, who had them under surveillance but discontinued eavesdropping last summer. David Cameron has argued that the Paris attacks show that British spies need further surveillance powers. The report implicitly rejects this conclusion.

The assembly has been taking evidence on mass surveillance since last year. In April Snowden spoke to delegates via a video link from Moscow. He revealed that the NSA had specifically targeted non-governmental organisations and other civil groups, both in the US and internationally.

Snowden’s decision to leak documents to the Guardian and other media organisations in June 2013, was courageous, Omtzigt said, and had “triggered public debate on the protection of privacy”. American officials, meanwhile, turned down an invitation to address the assembly, the MP said.

The draft report will be debated in committee and by the full assembly later this year.

It calls for:

• Collection of personal data without consent only if court-ordered on the basis of reasonable suspicion.

• Stronger parliamentary/judicial control of the intelligence services.

• Credible protection for whistleblowers (like Snowden) who expose wrongdoing by spy agencies.

• An international “codex” of rules governing intelligence sharing that national agencies could opt into.

Governments are free to implement or ignore the recommendations. However, if they reject them they have to explain why. They usually reply within six months.

The report says that Europe’s intelligence services work closely with their American counterparts. It says the Netherlands, for example, intercepted vast amounts of Somali telephone traffic in order to combat piracy, and shared it with the NSA. Denmark has collaborated with the US on surveillance since the late 1990s.

The relationship between the NSA and the BND, Germany’s foreign intelligence agency, has been “intimate” for the past 13 years. Revelations that the NSA spied on Angela Merkel’s mobile phone may have strained relations, but Germany still hosts several major NSA sites, including the NSA’s European headquarters in Stuttgart.

According to Omtzigt, surveillance powers have grown, and political oversight has diminished. Political leaders have lost control over their own intelligence agencies. The result is a “runaway surveillance machine”. Moreover, most politicians can no longer understand the immensely technical programmes involved, the report says.

The MP cites the case of James Clapper, the US director of national intelligence, who in April 2013 told the Senate that the NSA didn’t “wittingly” collect data on millions of Americans. Clapper later apologised for giving an untrue answer. “I still do not want to believe that he lied,” Omtzigt writes, adding that much intelligence work has been outsourced to private companies.

The assembly sent a letter to the German, British and US authorities asking whether they colluded with each other – in other words, got round laws preventing domestic spying by getting a third party to do it for them. The Germans and British denied this; the US failed to reply.

The report concludes that the UK response was probably true, given extensive British laws that already allow practically unlimited spying. The new Data Retention and Investigatory Powers Act – Drip, for short – passed in July, allows the wide-ranging collection of personal data, in particular metadata, the report says. “There seems to be little need for circumvention any more,” it concludes.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 27 januari 2015 @ 12:25:45 #177
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_149101053
quote:
quote:
British and Canadian spy agencies accumulated sensitive data on smartphone users, including location, app preferences, and unique device identifiers, by piggybacking on ubiquitous software from advertising and analytics companies, according to a document obtained by NSA whistleblower Edward Snowden.

The document, included in a trove of Snowden material released by Der Spiegel on January 17, outlines a secret program run by the intelligence agencies called BADASS. The German newsweekly did not write about the BADASS document, attaching it to a broader article on cyberwarfare. According to The Intercept‘s analysis of the document, intelligence agents applied BADASS software filters to streams of intercepted internet traffic, plucking from that traffic unencrypted uploads from smartphones to servers run by advertising and analytics companies.

Programmers frequently embed code from a handful of such companies into their smartphone apps because it helps them answer a variety of questions: How often does a particular user open the app, and at what time of day? Where does the user live? Where does the user work? Where is the user right now? What’s the phone’s unique identifier? What version of Android or iOS is the device running? What’s the user’s IP address? Answers to those questions guide app upgrades and help target advertisements, benefits that help explain why tracking users is not only routine in the tech industry but also considered a best practice.

For users, however, the smartphone data routinely provided to ad and analytics companies represents a major privacy threat. When combined together, the information fragments can be used to identify specific users, and when concentrated in the hands of a small number of companies, they have proven to be irresistibly convenient targets for those engaged in mass surveillance. Although the BADASS presentation appears to be roughly four years old, at least one player in the mobile advertising and analytics space, Google, acknowledges that its servers still routinely receive unencrypted uploads from Google code embedded in apps.

For spy agencies, this smartphone monitoring data represented a new, convenient way of learning more about surveillance targets, including information about their physical movements and digital activities. It also would have made it possible to design more focused cyberattacks against those people, for example by exploiting a weakness in a particular app known to be used by a particular person. Such scenarios are strongly hinted at in a 2010 NSA presentation, provided by agency whistleblower Edward Snowden and published last year in The New York Times, Pro Publica, and The Guardian. That presentation stated that smartphone monitoring would be useful because it could lead to “additional exploitation” and the unearthing of “target knowledge/leads, location, [and] target technology.”

The 2010 presentation, along with additional documents from Britain’s intelligence service Government Communications Headquarters, or GCHQ, showed that the intelligence agencies were aggressively ramping up their efforts to see into the world of mobile apps. But the specifics of how they might distill useful information from the torrent of internet packets to and from smartphones remained unclear.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 27 januari 2015 @ 21:41:52 #178
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_149119220
quote:
Researchers Link Regin to Malware Disclosed in Recent Snowden Documents

Researchers at Kaspersky Lab have discovered shared code and functionality between the Regin malware platform and a similar platform described in a newly disclosed set of Edward Snowden documents 10 days ago by Germany’s Der Spiegel.

The link, found in a keylogger called QWERTY allegedly used by the so-called Five Eyes, leads them to conclude that the developers of each platform are either the same, or work closely together.

“Considering the extreme complexity of the Regin platform and little chance that it can be duplicated by somebody without having access to its source codes, we conclude the QWERTY malware developers and the Regin developers are the same or working together,” wrote Kaspersky Lab researchers Costin Raiu and Igor Soumenkov today in a published report on the Securelist blog.

The Der Spiegel article describes how the U.S National Security Agency, the U.K.’s GCHQ and the rest of the Five Eyes are allegedly developing offensive Internet-based capabilities to attack computer networks managing the critical infrastructure of its adversaries.

The new Snowden documents, disclosed by Laura Poitras and a collection of eight security and privacy technologists and experts, also include an overview of a malware platform called WARRIORPRIDE. Within WARRIORPRIDE is QWERTY, a module that logs keystrokes from compromised Windows machines; Der Spiegel said the malware is likely several years old and has likely already been replaced.

The magazine released QWERTY to the public upon publication of its article. It describes QWERTY’s structure as “simple” and said there is a core driver called QWERTYKM that interacts with the Windows keyboard manager, and a QWERTYLP library which logs and stores keystrokes for analysis. Der Spiegel said after its examination of binary files, various components and libraries it’s likely there’s a connection between WARRIORPRIDE and the Australian Signals Directorate, an Aussie government intelligence agency.

Kaspersky researchers Raiu and Soumenkov said after analysis that the QWERTY malware is identical in functionality to a particular Regin plugin.

Raiu and Soumenkov said researchers took apart the QWERTY module and found three binaries and configuration files. One binary called 20123.sys is a kernel mode component of the QWERTY keylogger that was built from source code also found in a Regin module, a plug-in called 50251.

In a report published today, side-by-side comparisons of the respective source code shows they are close to identical, sharing large chunks of code. The researchers said that one piece of code in particular references plug-ins from the Regin platform and is used in QWERTY and its Regin counterpart. It addresses a Regin plug-in, called 50225, that is responsible for kernel-mode hooking, the Kaspersky researchers said.

“This is solid proof that the QWERTY plugin can only operate as part of the Regin platform, leveraging the kernel hooking functions from plugin 50225,” Raiu and Soumenkov wrote.

“As an additional proof that both modules use the same software platform, we can take a look at functions exported by ordinal 1 of both modules,” they also wrote. “They contain the startup code that can be found in any other plugin of Regin, and include the actual plugin number that is registered within the platform to allow further addressing of the module. This only makes sense if the modules are used with the Regin platform orchestrator.”

The Regin malware platform was disclosed in late November by Kaspersky Lab and it was quickly labeled one of the most advanced espionage malware platforms ever studied, surpassing even Stuxnet and Flame in complexity. The platform is used to steal secrets from government agencies, research institutions, banks and can even be tweaked to attack GSM telecom network operators.

Last week, Kaspersky researchers published another Regin report, this one describing two standalone modules used for lateral movement and to establish a backdoor in order to move data off compromised machines. The modules, named Hopscotch and Legspin, have also likely been retired given they were developed perhaps more than a decade ago.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 28 januari 2015 @ 16:19:35 #179
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_149141775
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 29 januari 2015 @ 16:30:37 #180
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_149174327
quote:
Snowden Files Show Canada Spy Agency Runs Global Internet Watch: CBC

OTTAWA — Canada's electronic spy agency has been intercepting and analyzing data on up to 15 million file downloads daily as part of a global surveillance program, according to a report published on Wednesday.

Critics said the revelations, made in 2012 documents obtained by former U.S. spy agency contractor Edward Snowden and leaked to journalists, showed much more oversight was needed over Canada's Communications Security Establishment (CSE).

The documents are the first indication from the Snowden files showing Canada had its own globe-spanning Internet surveillance in a bid to counter extremists.

The covert dragnet, nicknamed Levitation, has covered allied countries and trading partners such as the United States, Britain, Brazil, Germany, Spain and Portugal, the report by CBC News and news website The Intercept said. The Intercept, which includes journalist Glenn Greenwald, obtained the documents from Snowden.

Brazil’s government, which fell out with Washington in 2013 over revelations that the U.S. National Security Agency, Snowden's former employer, had eavesdropped on President Dilma Roussef, criticized the reported Canadian spying.

“Brazil regrets and repudiates all unauthorized espionage on foreign officials by intelligence agencies,” the Foreign Ministry said in a statement emailed to Reuters on Wednesday. It said Brazil has sought to enhance Internet privacy and security through international governance agreements.

A U.S. intelligence official declined to comment.

The Canadian Broadcasting Corporation News (CBC) report said the CSE nets what it said the agency calls 350 "interesting download events" each month.

CSE is a secretive body, which like the NSA, monitors electronic communication and helps protect national computer networks. It is not allowed to target Canadians or Canadian corporations.

In the past, CSE has faced allegations that it has improperly intercepted Canadians' phone conversations and emails. CSE says it has safeguards in place to protect any information about Canadians it might inadvertently collect.

An independent watchdog monitors CSE, but the watchdog's powers are limited. A spokesman said it is reviewing CSE's use of metadata but declined to say if it would include the latest reports in the process.

Opposition parties moved in Parliament last October to give the CSE watchdog a more robust role but were defeated by the governing Conservatives.

Among CSE's hauls, the eavesdropping program has discovered a German hostage video and an uploaded document that revealed the hostage strategy of an al-Qaeda wing in North Africa, the CBC said.

The agency did not confirm the report, saying in a statement that "CSE's foreign signals intelligence has played a vital role in uncovering foreign-based extremists' efforts to attract, radicalize, and train individuals to carry out attacks".

The Snowden documents show the agency has sifted through 10 million to 15 million uploads a day of videos, music documents and other files hosted by 102 file-sharing websites.

Canada is part of the Five Eyes intelligence sharing network, along with the United States, Britain, Australia and New Zealand.

In 2013, Brazil's Rousseff demanded an explanation from Canada after a media report, also based on Snowden documents, said CSE spied on the South American country's mines and energy ministry.

Canadian security expert Wesley Wark said Levitation might well be covered by CSE's foreign intelligence mandate, but questioned its effectiveness.

"Does this massive trawling of free download sites aimed at detecting terrorist communications or identities really deliver useful intelligence?" asked Wark, a University of Ottawa professor, noting CSE had talked of only two successes.

In 2013, the CBC cited other Snowden documents that it said showed Canada had allowed the NSA to conduct widespread surveillance during the 2010 Group of 20 summit in Toronto.

Last August, the government watchdog said CSE should tighten its procedures for handling the private calls and emails it intercepts.

"These are powerful capabilities in the hands of the state that in effect monitor all of our digital actions," said Ron Deibert, director of the Canada Centre for Global Security Studies. "They collect it all; are we confident that they are not going to abuse it?"
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 2 februari 2015 @ 20:21:17 #181
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_149307286
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 2 februari 2015 @ 20:23:06 #182
236046 NotYou
tigerblood
pi_149307351
quote:
Snowden bevindt zich dus in goed gezelschap. :')
Je suis Charlie Sheen
  donderdag 5 februari 2015 @ 13:39:46 #183
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_149386410
quote:
quote:
The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents.

In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . . get access to the emails themselves,” reads one top secret 2010 National Security Agency document.

These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 6 februari 2015 @ 14:08:54 #184
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_149419521
quote:
Britse inlichtingendienst mocht Amerikaanse data NSA niet gebruiken

De Britse inlichtingendienst GCHQ heeft mensenrechtenwetgeving geschonden door gegevens te verwerken die werden verzameld door de Amerikaanse NSA.

Dat heeft het Investigatory Powers Tribunal (IPT), een rechtbank die toezicht houdt op de Britse geheime diensten, vrijdag geoordeeld (pdf).

Het is voor het eerst in het vijftienjarige bestaan van het IPT dat ten nadele van een inlichtingendienst wordt geoordeeld, zo stelt Privacy International, een van de aanklagers in de zaak.

Vóór december 2014 was het gebruik van NSA-gegevens illegaal, omdat de regels rond de Britse toegang tot onder meer het Prism-programma van de VS geheim waren. Pas na onthullingen van klokkenluider Edward Snowden kwam dit in de openbaarheid.

Openbaar

Sinds december 2014 is het gebruik van NSA-gegevens door GCHQ wel toegestaan, oordeelde de rechtbank eerder. Sindsdien zijn de regels rond deze gegevensuitwisseling openbaar gemaakt.

De zaak draaide om gebruik van gegevens die worden verzameld via Prism en het spionageprogramma Upstream. Via Prism verzamelt de NSA gegevens van grote internetbedrijven als Google, Microsoft en Apple. Upstream verzamelt gegevens via internationale glasvezelkabels.

Door de geheimhouding rond deze spionageprogramma's werd een deel van de zaak in besloten sessies gehoord, zonder dat de betrokken privacyorganisaties hierbij aanwezig mochten zijn.

Privacy International zegt de rechtbank te zullen vragen om bevestiging dat communicatie voor december 2014 illegaal is verzameld, en te vragen om verwijdering van de gegevens.

Massasurveillance

"Het oordeel van vandaag bevestigt wat velen al lange tijd zeggen: in het afgelopen decennium hebben GCHQ en de NSA met een illegaal massasurveillanceprogramma een effect gehad op miljoenen mensen over de hele wereld", zegt Eric King, vice-directeur van Privacy International, in een verklaring.

"Maar er moet meer worden gedaan. De enige reden dat de deelrelatie tussen de NSA en GCHQ vandaag nog legaal is, is omdat de overheid zich op het laatste moment inzette om voorheen geheime 'regelingen' te openbaren. Dat is duidelijk niet genoeg om een blijvende, gigantische maas in de wet te repareren. We hopen dat het Europees Hof besluit om in het voordeel van privacy te oordelen, in plaats van voor ongecontroleerde staatsmacht."

Het Europees Hof heeft al aangekondigd GCHQ-zaken te willen behandelen die eerder door het IPT zijn afgehandeld.

Waarborgen

"Het IPT-oordeel van vandaag bevestigt opnieuw dat de processen en waarborgen rond het delen van inlichtingen volledig adequaat waren" stelt GCHQ in een reactie. "Het gaat enkel om de hoeveelheid details over die processen en waarborgen die in het publieke domein moeten zijn."

"Van nature moet veel van het werk van GCHQ geheim blijven. Maar we werken samen met de rest van de overheid om het publieke begrip over ons werk te verbeteren, evenals het sterke wettelijke en beleidsraamwerk dat ons werk onderbouwt."
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 6 februari 2015 @ 15:00:40 #185
45206 Pietverdriet
Ik wou dat ik een ijsbeer was.
pi_149420981
Volgens mij interesseert het de meeste mensen echt geen fuck dat de NSA en gchq dit allemaal doen.
In Baden-Badener Badeseen kann man Baden-Badener baden sehen.
  vrijdag 6 februari 2015 @ 21:38:45 #186
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_149433026
quote:
quote:
Het kabinet wil inlichtingendiensten AIVD en MIVD de mogelijkheid geven om ongericht informatie te verzamelen via internetkabels. Meer dan negentig procent van de telecommunicatie gaat inmiddels via kabels. Komende week debatteert de Tweede Kamer erover. Goslings: 'Dit voorstel is heel schadelijk voor de belangrijke internationale positie van AMS-IX en de Nederlandse digitale infrastructuur. Een positie waar de Nederlandse regering zelf op wil voortborduren: dit is tenslotte de sector waar de groei vandaan komt, ook in termen van hoogwaardige werkgelegenheid.'
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 10 februari 2015 @ 14:16:43 #187
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_149538336
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 14 februari 2015 @ 18:18:06 #188
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_149669488
quote:
quote:
We already wrote about the information sharing efforts coming out of the White House cybersecurity summit at Stanford today. That's supposedly the focus of the event. However, there's a much bigger issue happening as well: and it's the growing distrust between the tech industry and the intelligence community. As Bloomberg notes, the CEOs of Google, Yahoo and Facebook were all invited to join President Obama at the summit and all three declined. Apple's CEO Tim Cook will be there, but he appears to be delivering a message to the intelligence and law enforcement communities, if they think they're going to get him to drop the plan to encrypt iOS devices by default:
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 16 februari 2015 @ 18:13:13 #189
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_149732839
quote:
quote:
Het College Bescherming Persoonsgegevens is zeer kritisch over een wetswijziging waarmee het kabinet wil blijven doorgaan met het bewaren van telecomgegevens. Volgens een vandaag uitgebracht advies zou minister Opstelten van Veiligheid en Justitie het wetsvoorstel niet moeten indienen.
quote:
'De opsporingsautoriteiten hebben jaren ervaring opgedaan, maar het is kennelijk niet mogelijk gebleken een systematische onderbouwing te leveren van de noodzaak van deze bewaarplicht.'
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 19 februari 2015 @ 20:50:47 #190
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_149839504
quote:
quote:
Voor het eerst is er bewijs dat de Amerikaanse inlichtingendienst NSA een in Nederland gevestigd bedrijf heeft gehackt. Met de buitgemaakte gegevens kunnen de Amerikanen buitenlands telefoonverkeer zonder medeweten van het betreffende land of de provider ontcijferen en afluisteren.
quote:
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
pi_149841638
quote:
7s.gif Op donderdag 19 februari 2015 20:50 schreef Papierversnipperaar het volgende:

[..]

[..]

[..]

Peanuts vergeleken met de NSA Hack van Belgacom
🕰️₿🕰️₿🕰️₿🕰️₿🕰️₿🕰️ TikTok next Block
  zaterdag 21 februari 2015 @ 15:12:31 #192
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_149888256
quote:
quote:
MIA may be the airport code for Miami International Airport, but it’s also the state of luggage for hundreds -- if not thousands -- of passengers flying on American Airlines out of Miami on Friday: missing in action.

An apparent “technical issue” with its baggage conveyor belts at Miami International Airport prevented American Airlines from loading any planes with checked luggage on Friday. For eight hours, the airline let its flights depart sans bags, but did not notify passengers of the issue. Instead, most passengers discovered when they reached their destinations that their luggage hadn’t.

Even then, American Airlines did not explicitly alert customers of the glitch, according to accounts from several passengers contacted by International Business Times. Travelers waited at luggage carousels in airports around the world, only to be greeted by empty belts where their bags should have been.

“The conveyor belt system in Miami had some kind of breakdown this morning,” American Airlines spokesman Joshua Freed told International Business Times. “It meant the passenger bags couldn’t move through the system for several hours.” Freed would not specify how many flights were affected.

In a later statement emailed to IBTimes, Freed wrote, “The system was back online this afternoon and we are working to reunite those bags with our passengers. Should a customer have a question about their delayed bag, they can work with the baggage service office at their destination or call 1-800-535-5225.”

When asked why American Airlines let flights depart from Miami without passengers’ checked luggage, Freed said, “What would you expect them to do? We had to get passengers to where they were going.”

But many passengers were frustrated with the lack of communication from American Airlines. Pulitzer-winning journalist Glenn Greenwald, who helped break the Edward Snowden story, was on a flight from Miami to Los Angeles that was affected by the baggage snafu. On Friday afternoon, he tweeted the news to his 471,000 followers.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 23 februari 2015 @ 15:37:29 #193
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_149956461
PiracyParty twitterde op maandag 23-02-2015 om 06:13:27 The #Oscars2015 winner Citizen Four full length movie. Thank you #Snowden <3 #PiracyParty http://t.co/Ig36YkgpB3 reageer retweet
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 23 februari 2015 @ 15:39:58 #194
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_149956524
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 24 februari 2015 @ 14:52:26 #195
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_149990710
quote:
quote:
'Voor Nederland is het niet acceptabel als buitenlandse diensten hier de wet overtreden. Als we dat aantreffen, nemen we maatregelen', zei minister Plasterk vandaag in de Kamer. D66-Kamerlid Gerard Schouw stelde vragen naar aanleiding van berichtgeving in de Volkskrant over een inbraak bij simkaartbedrijf Gemalto, dat ook Nederlandse simkaarten produceert. De Amerikaanse en Britse inlichtingendiensten NSA en GCHQ zouden via toegang tot die simkaarten Nederlandse telefoongesprekken kunnen afluisteren.

Plasterk kon het bericht 'bevestigen noch ontkennen'. Hij stelde dat reeds over deze zaak met de bevriende inlichtingendiensten contact is geweest, maar dat hij daar niet publiekelijk over kan spreken. Wel wil hij de Tweede Kamer daarover in vertrouwen informeren in de zogeheten 'commissie-stiekem'.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 26 februari 2015 @ 21:56:17 #196
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_150089467
quote:
quote:
Did Edward Snowden actually damage national security? There's no way in hell to tell from official documents released to the press—they've been thoroughly redacted to the point of uselessness.

Well, that's not true: They're useful in showing that the government isn't exactly eager to reveal concrete proof that the revelations about its surveillance abuses have harmed America.

The idea that Snowden has jeopardized national security and the lives of troops is the linchpin for arguments that the ex-NSA contractor is a treasonous villain, not a whistleblower. That's why Vice sought out proof of this jeopardy in government documents:
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 1 maart 2015 @ 14:44:21 #197
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_150177249
quote:
quote:
For a second year in a row, the Conservative Action Political Conference hosted a debate on the National Security Agency’s surveillance programs.

This morning, in a stinging rebuke similar to audience jeering of former Gov. Jim Gilmore’s seething criticism of Ed Snowden at last year’s CPAC, former NSA director Michael Hayden received an earful when he awkwardly declared that he is a libertarian.

Referring to his co-panelist Fox News’ Andrew Napolitano as an “an unrelenting libertarian,” Hayden continued, “So am I.”

As Mediaite pointed out, Hayden was quickly mocked by the audience with sustained booing and at least two people yelling, “no, you’re not!”

One person’s laughter was so loud that it is audible on C-SPAN’s video of the event.

Though Hayden went on to cast his defense of domestic spying as a his duty in the pursuit of liberty and homeland security, he also has a direct stake in the debate over surveillance — and it doesn’t make him any more disposed to the libertarian side of that debate.

Hayden is a principal with the Chertoff Group, a consulting firm for the multi-billion dollar cyber security and intelligence industry. He is also on the board of Alion Science and Technology, a military contractor that does intelligence and techical work. For that part-time gig he has been paid approximately $336,500 over the last four years, according to reports filed with the Securities and Exchange Commission.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 3 maart 2015 @ 20:32:48 #198
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_150260987
quote:
British refusal to cooperate with spy inquiry causes row in Germany

Committee under pressure to censor disclosures about UK activity after Downing Street threatens to break off intelligence-sharing with Berlin

Downing Street and the German chancellery are embroiled in a worsening dispute over intelligence-sharing and the covert counter-terrorism campaign because of conflicts arising from the surveillance scandals surrounding the US National Security Agency and Britain’s GCHQ.

According to German newspaper reports citing government and intelligence officials in Berlin, the Bundestag’s inquiry into the NSA controversy is being jeopardised by Britain’s refusal to cooperate and its threats to break off all intelligence-sharing with Berlin should the committee reveal any UK secrets.

The weekly magazine Focus reported last month that a national security aide to David Cameron had written to Peter Altmaier, Angela Merkel’s chief of staff, refusing all requests for help in the inquiry and warning that Britain would cease supplying terrorism-related intelligence to the Germans unless Berlin yielded.

It emerged during the NSA revelations that the Americans had hacked into Merkel’s mobile phone, generating outrage in Germany and feeding growing anti-American sentiment.

Internationally, the BND, Germany’s foreign intelligence service, is viewed as less than vigorous. In the secret war on terror, the Germans are said to be dependent on signals intelligence from the British and the Americans.

Gerhard Schindler, head of the BND, was recalled from holiday and has briefed senior government officials and parliamentary leaders on what Munich’s Süddeutsche Zeitung termed on Tuesday a burgeoning crisis.

“The British possibly want to cover up that they are spying on Germany, not only on countering terror,” the newspaper said. “[Merkel’s] chancellery is baffled as to why the British are being so stubborn … Why are the British so set on escalation?

“It’s particularly hot for the British because often it’s about straightforward spying, as well as terrorism hunting. This would definitely be against the European spirit on the continent, perhaps a breach of the European treaties.”

The letter from Downing Street to Berlin was sent at the end of January and triggered a row in Germany when it was leaked to the press. Schindler and aides to Merkel tried to talk MPs on the committee into censoring disclosures about UK activity. That displeased committee members even from the government ranks, and two Greens MPs are threatening to take the issue to Germany’s supreme court in Karlsruhe.

Information already available to the committee from German sources is said to reveal operational details of UK activities, encryption methods, codes and decoding techniques.

“The British are horrified that these things could become public via the committee,” a source, said to be a senior German government official, told Focus. An intelligence official was quoted as saying: “We would be blind without the signals intelligence from the Americans and the British. Virtually all important tips on countering terror in this country have come from the Anglo-American services.”

The Americans are said to be deciding on a case-by-case basis whether to collaborate with the German inquiry and whether to supply requested materials, while the British simply say no to all requests, the Süddeutsche reported, citing committee sources.

“We can’t just exclude Great Britain,” Patrick Sensburg, the Christian Democrat MP chairing the committee, told the newspaper. “Then the Americans will write a similar letter tomorrow and we will have to give up.”

Drawing on government sources, the newspaper said: “The federal government sees the cable from London as an unconcealed threat. Since the threatening letter arrived, it’s been one crisis meeting after another in the chancellery.”
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 4 maart 2015 @ 12:14:21 #199
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_150278321
quote:
China verdedigt 'NSA-achtige' plannen

China is woensdag in de verdediging geschoten na flinke kritiek op onderdelen van een nieuwe anti-terreurwet. Door die wet zouden buitenlandse techbedrijven hun encryptiesleutels moeten overhandigen aan de Chinese overheid.

China kondigde de nieuwe regels in januari al aan. Volgens het land zijn de nieuwe regels belangrijk om staats- en bedrijfsgeheimen te beveiligen.

Een Chinese overheidswoordvoerster stelt dat veel westerse landen, waaronder de VS, vergelijkbare zaken eisen van bedrijven. Dus ook van Chinese bedrijven die in die landen actief zijn.

De plannen zijn volgens het Chinese staatspersbureau Xinhua bovendien "anders dan wat de VS heeft gedaan: de geheime diensten geen strobreed in de weg leggen en terrorismebestrijding laten verworden tot paranoïde spionage".

De plannen konden eerder deze week rekenen op felle kritiek. De Amerikaanse president Barack Obama zei eerder deze week dat de nieuwe regels moeten buitenlandse bedrijven dwingen al hun gevoelige data moeten overhandigen, zodat de Chinese overheid de gebruikers van de diensten in de gaten kan houden.

Ook de Duitse ambassadeur in Peking waarschuwde dat bedrijven zich minder snel geneigd zouden voelen zich te vestigen in China.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 5 maart 2015 @ 15:17:02 #200
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_150315973
quote:
New Zealand spying on Pacific allies for 'Five Eyes' and NSA, Snowden files show

Secret papers show NZ spy agency GCSB is collecting calls and internet traffic in bulk and sending it to the US National Security Agency

New Zealand is spying indiscriminately on its allies in the Pacific region and sharing the information with the US and the other “Five Eyes” alliance states, according to documents from the whistleblower Edward Snowden.

The secret papers, published by the New Zealand Herald, show that the New Zealand Government Communications Security Bureau (GCSB) collects phone calls and internet communications in bulk in the region at its Waihopai Station intercept facility in the South Island.

Since a 2009 upgrade, Waihopai has been capable of “full take” collection of both content and metadata intercepted by satellite, the documents showed. The data is then channelled into the XKeyscore database run by the US National Security Agency, where it also becomes available to agencies in each of the “Five Eyes” countries: the US, Britain, Canada, Australia and New Zealand.

A leaked NSA memo credits the GCSB with providing “valuable access not otherwise available to satisfy US intelligence requirement”.

The papers – published by the Herald as part of a joint reporting operation with New Zealand investigative journalist Nicky Hager and the Intercept website co-edited by Glenn Greenwald – echo similar revelations from the earlier Snowden documents showing that Britain and the US had been spying on friendly neighbours in countries in the European Union and Latin America.

The regional surveillance conducted from the base covers Tuvalu, Nauru, Kiribati, Vanuatu and the Solomon Islands. New Caledonia and French Polynesia, both French overseas territories, are also among the listed countries. Although Samoa, Fiji, Tonga and Vanuatu are named, much of their data is now transmitted via undersea cable links that are not susceptible to Waihopai’s intercept satellites.

The revelations are particularly likely to test relations between New Zealand and Fiji, the island nation headed by Frank Bainimarama, the army chief-turned-prime minister. Following elections in Fiji in 2014, the countries have moved towards resuming full diplomatic links for the first time since the military coup led by Bainimarama in 2006.

Andrew Little, the leader of the NZ opposition Labour party, said that while he accepted the need for security agencies to protect national interests, he was “stunned at the breadth of the information that’s been collected”.

In an interview with Radio New Zealand, Little said: “It doesn’t seem to be targeted around particular threats, whether there just seems to be a hoovering of all this information and supplying it to the United States. I can’t see that that’s within the security mandate of the GCSB.”

The NZ prime minister, John Key, refused to comment on the specific revelations, saying via a spokesperson: “The Snowden documents were taken some time ago and many are old, out of date, and we can’t discount that some of what is being put forward may even be fabricated.”

Key later told reporters: “Some of the information is incorrect, some of it is out of date, and some of the assumptions are just plain wrong.

“We do have the GCSB and it is a foreign intelligence service, it does gather foreign intelligence that’s in the best interests of New Zealand and the protection of New Zealanders.”

He said successive governments had used the GCSB to gather foreign intelligence.

“Where we gather intelligence, particularly if a friend is involved, it isn’t to harm that country,” he said.

“It’s often to support or assist them.”

On Wednesday, before the publication of the documents, Key said it was a “bizarre time to be coming out making the case that New Zealand either gathers and shares information or gets information from other intelligence agencies”, adding: “Well, of course we do, and we do that to keep New Zealanders safe. We’re in the situation where we’ve got Isil reaching out to cause harm to New Zealanders, I think New Zealanders would expect me to share information.”

A GCSB spokesperson refused to comment on “speculation”, telling the Herald: “Everything we do is explicitly authorised and subject to independent oversight.”

The Samoan prime minister, Tuilaepa Sailele Malielegaoi, said he was not worried about the information in the documents.

“I don’t have any strong feelings about the allegations of spying,” he said.

Hager told the Guardian the first stories contained “by no means the most dramatic revelations” from the New Zealand-related Snowden documents.

“We spent months digging into the Snowden archive, writing lots of stories from them … We’re going to be spacing out stories over the next while based on some really interesting information,” he said.

The first New-Zealand-specific documents from the Snowden files were revealed by Greenwald in September 2014, when the journalist visited New Zealand at the invitation of Kim Dotcom, the internet tycoon sought for extradition by the US over alleged copyright-related offences. Greenwald then said the documents proved New Zealand had embarked on a mass surveillance programme called Speargun, which centred on a tap into the undersea Southern Cross cable, New Zealand’s primary internet link with the rest of the world.

Key responded by declassifying documents that he said showed the government had considered a programme for “mass protection”, but rejected the proposal. Greenwald’s allegations were “simply wrong” and “based on incomplete information”.

“There is not, and never has been, mass surveillance of New Zealanders undertaken by the GCSB,” he said.

Key branded Greenwald “Dotcom’s little henchman” and “a loser”. Greenwald in turn called Key’s attacks “adolescent” and “reckless”.

Key later acknowledged, however, that Snowden’s claim that internet data from New Zealand was easily accessible via XKeyScore “may well be right”, saying: “I don’t run the NSA any more than I run any other foreign intelligence agency or any other country”.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 7 maart 2015 @ 15:03:24 #201
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_150385651
quote:
Complaint laid over GCSB spy claims

The Green Party has laid a complaint with the Inspector-General of Intelligence and Security, saying the Government's electronic spy agency may have broken the law.

Investigative journalist Nicky Hager says the Government is spying on Pacific nations, and passing that information on to the United States.

His claims are based on information from the American whistle blower Edward Snowden.

Mr Hager said the Government Communications Security Bureau (GCSB) intercepted communications from countries such as Fiji, Tonga, Vanuatu and Samoa, and even nations as small as Tuvalu, Nauru and Kiribati,

Greens' co-leader Russel Norman said it was illegal for the GCSB to spy on New Zealand citizens and permanent residents, but many New Zealanders who live, holiday or work in Pacific Islands may have had their data intercepted by the spy agency.

He said if that was the case then the law may have been broken.

Prime Minister John Key insists the Government's spy agency has acted within the law though will not say how or explain any further.

"We do gather information and we do use our foreign intelligence services, but only within the law and the law forbids us other than in very minor circumstances, from gathering information about New Zealanders."

Mr Key said the GCSB had given him a 100 percent categorical assurance that New Zealanders' information was not gathered other than in circumstances where the law would specifically allow it.

He said he would absolutely not be talking at all about the agency's operational matters.

Mr Key said the Government could talk to Pacific leaders if they wished about actions that may or may not have occurred, but it would not be talking to the media or the public about it.

The Prime Minister of Samoa, Tuilaepa Sa'ilele, was not too bothered about the allegations.

"All our transactions with overseas Governments or organisations are transparent, and we have nothing to hide, so if [anything is] picked up by anybody that will increase the transparency of what we do here."

The Prime Minister of Tonga, Akilisi Pohiva said it would be a pity if trust had been breached between his country and New Zealand.

"But if New Zealand has good reason to believe that it is important for New Zealand Government to share such information with other partners, with other countries, it is entirely a matter for New Zealand to decide. Now remember Tonga is small, and we have nothing to hide - it may be a serious matter for superpowers."
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 9 maart 2015 @ 19:02:30 #202
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_150468059
quote:
Key says he won't quit if mass collection of Kiwis' communications proved

Prime Minister John Key says he would not resign if it is proved that the GCSB carries out mass collection of New Zealanders' communications.

Mr Key has always insisted he would quit if it was proved that New Zealanders were subject to mass surveillance.

He insists the GCSB has told him that it is not capable of doing mass surveillance and is not legally allowed to do it.

Late last week former GCSB boss Sir Bruce Ferguson told Radio New Zealand that there was mass collection of New Zealanders' data as part of spying operations in the Pacific.

Sir Bruce also maintained however that it was legal as it was collected inadvertently and that the information on Kiwis was not used.

When asked today about whether there was a difference between the terms "collection" and "surveillance", Mr Key responded by saying he was "sure the lawyers would tell you there is a difference".

When pressed further, he refused to comment, saying he wasn't going to go into the GCSB's operational details.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 9 maart 2015 @ 21:01:16 #203
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_150473898
quote:
quote:
Let me be clear: any statement that mass surveillance is not performed in New Zealand, or that the internet communications are not comprehensively intercepted and monitored, or that this is not intentionally and actively abetted by the GCSB, is categorically false. . . . The prime minister’s claim to the public, that “there is no and there never has been any mass surveillance” is false. The GCSB, whose operations he is responsible for, is directly involved in the untargeted, bulk interception and algorithmic analysis of private communications sent via internet, satellite, radio, and phone networks.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 10 maart 2015 @ 17:52:31 #204
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_150501867
quote:
The NSA Has Taken Over the Internet Backbone. We're Suing to Get it Back.

Every time you email someone overseas, the NSA copies and searches your message. It makes no difference if you or the person you're communicating with has done anything wrong. If the NSA believes your message could contain information relating to the foreign affairs of the United States – because of whom you're talking to, or whom you're talking about – it may hold on to it for as long as three years and sometimes much longer.

A new ACLU lawsuit filed today challenges this dragnet spying, called "upstream" surveillance, on behalf of Wikimedia and a broad coalition of educational, human rights, legal, and media organizations whose work depends on the privacy of their communications. The plaintiffs include Amnesty International USA, the National Association of Criminal Defense Lawyers, and The Nation magazine, and many other organizations whose work is critical to the functioning of our democracy.

But the effect of the surveillance we're challenging goes far beyond these organizations. The surveillance affects virtually every American who uses the Internet to connect with people overseas – and many who do little more than email their friends or family or browse the web. And it should be disturbing to all of us, because free expression and intellectual inquiry will wither away if the NSA is looking over our shoulders while we're online.

The world first learned of the existence of upstream surveillance from whistleblower Edward Snowden's spying revelations in June 2013. Since then, official disclosures and media reports have shown that the NSA is routinely seizing and copying the communications of millions of ordinary Americans while they are traveling over the Internet. The NSA conducts this surveillance by tapping directly into the Internet backbone inside the United States – the network of high-capacity cables and switches that carry vast numbers of Americans' communications with each other and with the rest of the world. Once the NSA copies the communications, it searches the contents of almost all international text-based communications – and many domestic ones as well – for search terms relating to its "targets."

In short, the NSA has cast a massive dragnet over Americans' international communications.

Inside the United States, upstream surveillance is conducted under a controversial spying law called the FISA Amendments Act, which allows the NSA to target the communications of foreigners abroad and to intercept Americans' communications with those foreign targets. The main problem with the law is that it doesn't limit which foreigners can be targeted. The NSA's targets may include journalists, academics, government officials, tech workers, scientists, and other innocent people who are not connected even remotely with terrorism or suspected of any wrongdoing. The agency sweeps up Americans' communications with all of those targets.

And, as our lawsuit explains, the NSA is exceeding even the authority granted by the FISA Amendments Act. Rather than limit itself to monitoring Americans' communications with the foreign targets, the NSA is spying on everyone, trying to find out who might be talking or reading about those targets.

As a result, countless innocent people will be caught up in the NSA's massive net. For instance, a high school student in the U.S. working on a term paper might visit a foreign website to read a news story or download research materials. If those documents happen to contain an email address targeted by the NSA – like this news report does – chances are the communications will be intercepted and stored for further scrutiny. The same would be true if an overseas friend, colleague, or contact sent the student a copy of that news story in an email message.

As former NSA Director Michael Hayden recently put it, "[L]et me be really clear. NSA doesn't just listen to bad people. NSA listens to interesting people. People who are communicating information."

That doesn't sound like much of a limitation on the NSA's spying – and it's not. Like many Americans, the plaintiffs in our lawsuit communicate with scores of people overseas who the NSA likely finds "interesting." For instance, researchers at Human Rights Watch depend on foreign journalists, lawyers, political dissidents, and witnesses to human rights abuses for information crucial to their advocacy and reporting back home. Wikimedia communicates with millions of people abroad, many of whom read or contribute to Wikipedia, one of the largest repositories of human knowledge on earth. We know, thanks to Edward Snowden, that the NSA is interested in what some of those users are reading.

The fact that upstream surveillance is supposedly focused on international communications is hardly a saving grace. Americans spend more and more of their lives communicating over the Internet – and more and more of those communications are global in nature, whether we realize it or not. An email from a woman in Philadelphia to her mother in Phoenix might be routed through Canada without either one knowing it. Similarly, companies like Microsoft and Google often store backup copies of their U.S. customers' emails on servers overseas, again with hardly anyone the wiser. The NSA is peeking inside virtually all of these.

Our plaintiffs have had to go out of their way to take measures, sometimes at a high cost, to protect their communications from their own government. Despite these precautions, the chilling effect is palpable. NSA surveillance makes it harder for the plaintiffs to gather information from sources who believe that by sharing information over the Internet, they are also sharing it with the U.S. government and the intelligence agencies it partners with. The work of human rights and free-knowledge organizations is profoundly undermined by this unconstitutional surveillance, and we're all worse off.

Upstream surveillance flips the Constitution on its head. It allows the government to search everything first and ask questions later, making us all less free in the process. Our suit aims to stop this kind of surveillance. Please join our effort to reform the NSA.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 10 maart 2015 @ 22:12:43 #205
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_150512419
quote:
quote:
RESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept.

The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released.

By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both “physical” and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption.

The CIA declined to comment for this story.

The security researchers also claimed they had created a modified version of Apple’s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. Xcode, which is distributed by Apple to hundreds of thousands of developers, is used to create apps that are sold through Apple’s App Store.

The modified version of Xcode, the researchers claimed, could enable spies to steal passwords and grab messages on infected devices. Researchers also claimed the modified Xcode could “force all iOS applications to send embedded data to a listening post.” It remains unclear how intelligence agencies would get developers to use the poisoned version of Xcode.

Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a “keylogger.”

Other presentations at the CIA conference have focused on the products of Apple’s competitors, including Microsoft’s BitLocker encryption system, which is used widely on laptop and desktop computers running premium editions of Windows.

The revelations that the CIA has waged a secret campaign to defeat the security mechanisms built into Apple’s devices come as Apple and other tech giants are loudly resisting pressure from senior U.S. and U.K. government officials to weaken the security of their products. Law enforcement agencies want the companies to maintain the government’s ability to bypass security tools built into wireless devices. Perhaps more than any other corporate leader, Apple’s CEO, Tim Cook, has taken a stand for privacy as a core value, while sharply criticizing the actions of U.S. law enforcement and intelligence agencies.

“If U.S. products are OK to target, that’s news to me,” says Matthew Green, a cryptography expert at Johns Hopkins University’s Information Security Institute. “Tearing apart the products of U.S. manufacturers and potentially putting backdoors in software distributed by unknowing developers all seems to be going a bit beyond ‘targeting bad guys.’ It may be a means to an end, but it’s a hell of a means.”

Apple declined to comment for this story, instead pointing to previous comments Cook and the company have made defending Apple’s privacy record.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 12 maart 2015 @ 19:45:16 #206
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_150574270
quote:
quote:
Minister Plasterk (PvdA) van Binnenlandse Zaken wijst een zogenaamd 'anti-spionageverdrag' tussen Europese landen af. Hij heeft 'ernstige aarzelingen' bij een voorstel van de Raad van Europa dat voorziet in regels voor het bespioneren van Europese burgers en bevriende overheden. Dat blijkt uit een brief die Plasterk naar de Tweede Kamer heeft gestuurd.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 12 maart 2015 @ 20:27:14 #207
441090 crystal_meth
has new fav drug
pi_150576232
quote:
7s.gif Op donderdag 12 maart 2015 19:45 schreef Papierversnipperaar het volgende:

[..]

[..]

typisch...
are we infinite or am I alone
  zondag 15 maart 2015 @ 12:20:55 #208
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_150658351
quote:
New Zealand Used NSA System to Target Officials, Anti-Corruption Campaigner

New Zealand’s eavesdropping agency used an Internet mass surveillance system to target government officials and an anti-corruption campaigner on a neighboring Pacific island, according to a top-secret document.

Analysts from Government Communications Security Bureau, or GCSB, programmed the Internet spy system XKEYSCORE to intercept documents authored by the closest aides and confidants of the prime minister on the tiny Solomon Islands. The agency also entered keywords into the system so that it would intercept documents containing references to the Solomons’ leading anti-corruption activist, who is known for publishing government leaks on his website.

XKEYSCORE is run by the National Security Agency, and is used to analyze billions of emails, Internet browsing sessions and online chats that are collected from some 150 different locations worldwide. GCSB has gained access to XKEYSCORE because New Zealand is a member of the Five Eyes surveillance alliance alongside the United States, the United Kingdom, Canada, and Australia.

A number of GCSB’s XKEYSCORE targets are disclosed in a top-secret document that was obtained by The Intercept and New Zealand newspaper the Herald on Sunday. The document raises questions about the scope of the surveillance and offers an unprecedented insight into specific people monitored by New Zealand’s most secretive agency.

The targets list, dated from January 2013, was authored by a GCSB analyst. It is contained in a so-called “fingerprint,” a combination of keywords used to extract particular information from the vast quantities of intercepted data swept up by XKEYSCORE. None of the individuals named on the list appear to have any association with terrorism.

Most of the targets, in fact, had a prominent role in the Solomon Islands government. Their roles around the time of January 2013 suggest GCSB was interested in collecting information sent among the prime minister’s inner circle. The targets included: Barnabas Anga, the permanent secretary of the Ministry of Foreign Affairs and External Trade; Robert Iroga, chief of staff to the prime minister; Dr Philip Tagini, special secretary to the prime minister; Fiona Indu, senior foreign affairs official; James Remobatu, cabinet secretary; and Rose Qurusu, a Solomon Islands public servant.

The seventh person caught up in the GCSB’s surveillance sweep is the leading anti-corruption campaigner in the Solomon Islands, Benjamin Afuga. For several years he has run a popular Facebook group that exposes corruption, often publishing leaked information and documents from government whistleblowers. His organization, Forum Solomon Islands International, has an office next door to Transparency International in Honiara, the capital city of the Solomon Islands. GCSB analysts programmed XKEYSCORE so that it would intercept documents sent over the Internet containing the words “Forum Solomon Islands,” “FSII,” and “Benjamin Afuga.”

Each of the named targets was contacted by the Herald on Sunday prior to publication. Several were not reachable or did respond to a request for comment. Robert Iroga, who was the prime minister’s chief of staff at the time his name appeared on the list, criticized the surveillance and said it would paint a “pretty bad image” for New Zealand.

“I’m shocked to hear about the intrusion of the New Zealand government into the sovereign affairs of a country like ours,” Iroga said. “Any intervention in this way to get information from the Solomon Islands is highly condemned.”

Benjamin Afuga, the anti-corruption campaigner, said he was concerned the surveillance may have exposed some of the sources of the leaks he publishes online.

“I’m an open person – just like an open book,” Afuga said. “I don’t have anything else other than what I’m doing as a whistleblower and someone who exposes corruption. I don’t really understand what they are looking for. I have nothing to hide.”

A spokesman for Manasseh Sogavare, the recently elected prime minister of the Solomon Islands, said the issue would be addressed through “diplomatic channels.”

The Solomon Islands are about 2,300 miles north of New Zealand and have a population of some 550,000 people, according to United Nations figures. In the late 1990s and early 2000s the islands suffered from ethnic violence known as “The Tensions.” This led to the 2003 deployment to the Solomons of New Zealand, Australian and Pacific Island police and military peacekeepers. By January 2013, the date of the target list, both New Zealand and Australia were focused on withdrawing their forces from the island country and by the end of that year they were gone.

The XKEYSCORE list shows New Zealand was carrying out surveillance of several terms associated with militant groups on the island, such as “former tension militants,” and “malaita eagle force.” But with the security situation stabilized by 2013, it is unclear why New Zealand spies appear to have continued an expansive surveillance operation across the government, even tailoring XKEYSCORE to intercept information about an anti-corruption campaigner.

Andrew Little, leader New Zealand’s Labour Party, told the Herald on Sunday the surveillance was at odds with the country’s diplomatic relationship with the Solomons. “You would assume we have relations with government at the highest level and constructive dialogue,” he said.

The surveillance may have been part of a secret attempt to intercept information about The Truth and Reconciliation Commission, an inquiry that was set up by the Solomon Islands in the aftermath of the ethnic violence. The commission was modeled on South Africa’s post-apartheid process and launched by Bishop Desmond Tutu during a 2009 visit to the Solomons. The XKEYSCORE list includes the keywords “Truth and Reconciliation Commission,” “TRC,” and “trc report.” Moreover, Afuga, the targeted anti-corruption campaigner, worked with the commission as a project coordinator.

GCSB declined to comment for this story. In a statement, the agency’s acting director, Una Jagose, said: “The GCSB exists to protect New Zealand and New Zealanders. We have a foreign intelligence mandate. We don’t comment on speculation about matters that may or may not be operational. Everything we do is explicitly authorized and subject to independent oversight.”

A spokesman for New Zealand prime minister John Key also declined to comment. The spokesman said: “New Zealand’s intelligence agencies have been, and continue to be, a significant contributor to our national security and the security of New Zealanders at home and abroad.”

In recent weeks, The Intercept has published a series of stories about the extent of New Zealand’s surveillance in collaboration with the New Zealand Herald, the Herald on Sunday, and The Sunday Star-Times. Earlier disclosures, which were based on documents from NSA whistleblower Edward Snowden, have exposed the country’s broad surveillance across the Asia-Pacific. The revelations have shown how a surveillance base in the Waihopai Valley is funneling bulk data into the XKEYSCORE system and they have also exposed that New Zealand is targeting some its strongest trading partners for surveillance and then sharing the data with the NSA.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 18 maart 2015 @ 14:44:48 #209
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_150774658
quote:
Federal police confirm they have accessed journalists' metadata

AFP reject comments by media union on scale of access, saying requests were ‘rare’, as debate over data retention bill intensifies

The Australian Federal Police have confirmed for the first time they have accessed journalists’ telecommunications metadata in the past 18 months, but said requests were “rare”.

They said they had received 13 referrals relating to alleged unauthorised disclosures by commonwealth officials, but in the “overwhelming majority” of those cases there was no need to access journalists’ metadata. Not all the referrals related to disclosures through the media.

The comments were made as part of a statement that rejected comments by Media, Entertainment and Arts Alliance chief executive Paul Murphy about how many times the AFP had accessed journalists’ metadata.

On Monday Murphy said that in a meeting with the AFP and other government officers the AFP “had been repeatedly asked to hunt down journalists’ sources by accessing journalists’ metadata and [AFP commissioner Andrew Colvin] confirmed that it is doing so”.

“The data retention bill will simply formalise these activities with no regard to the press freedom implications and presumably encourage at least 20 government agencies to go trawling through journalists’ metadata,” Murphy said.

The AFP said the statement was inaccurate and distorted the comments. But they also confirmed a small number of authorisations for access to journalists’ metadata had been made.

The release said: “Commissioner Colvin said that over the past 18 months, the AFP has received 13 referrals relating to the alleged unauthorised disclosure of commonwealth information in breach of section 70 of the Crimes Act.

“This offence specifically criminalises the activity of commonwealth officials who have released commonwealth information in contravention of their obligations, not journalists.”

“In the overwhelming majority of these investigations, no need was identified to conduct a metadata telecommunications inquiry on a journalist. AFP requests for accessing a journalist’s metadata are rare.”

Guardian Australia has previously reported that eight of these referrals related to stories about asylum seekers.

The AFP have confirmed that at least one of these referrals resulted in an investigation – into a story about the customs vessel Ocean Protector’s incursions into Indonesian waters – that is still under way.

The AFP did not disclose as part of the release of documents under freedom of information laws any information about whether journalists’ phone or web records had been accessed.

Journalists and politicians have tried in the past – unsuccessfully – to gain more information from the AFP on metadata requests issued relating to leak investigations.

Guardian Australia has lodged freedom of information requests and requests under the Privacy Act 1988 to determine whether authorisations have been made for reporters’ phone and web data.

The AFP has refused to confirm or deny the existence of any authorisations, citing the secrecy provisions of the Telecommunications (Interception and Access) Act 1979.

In February last year the independent senator Nick Xenophon requested in Senate estimates details of the number of metadata authorisations used in commonwealth disclosure investigations.

The AFP said at the time they were not required to provide information about specific authorisations.

They said: “This system is configured to record and store information contained in the authorisation and to produce reports on the total number of authorisations. Whilst the information is stored in the system, the system is not designed to report on particular crime types which are being investigated.”

The prime minister, Tony Abbott, agreed on Monday to amend the government’s data retention bill to provide an additional safeguard for journalists that would require a warrant to be sought for access to their metadata.

The MEAA and Greens senator Scott Ludlam have continued to voice concern about the data retention scheme.

On Tuesday a number of Labor backbenchers also spoke out in opposition to the data retention bill in a caucus meeting.

The government is yet to put forward amendments to the scheme to clarify how the warrant requirement for access to journalists’ metadata would operate.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 21 maart 2015 @ 00:08:44 #210
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_150871265
quote:
Hacking BIOS Chips Isn’t Just the NSA’s Domain Anymore

The ability to hack the BIOS chip at the heart of every computer is no longer reserved for the NSA and other three-letter agencies. Millions of machines contain basic BIOS vulnerabilities that let anyone with moderately sophisticated hacking skills compromise and control a system surreptitiously, according to two researchers.

The revelation comes two years after a catalogue of NSA spy tools leaked to journalists in Germany surprised everyone with its talk about the NSA’s efforts to infect BIOS firmware with malicious implants.

The BIOS boots a computer and helps load the operating system. By infecting this core software, which operates below antivirus and other security products and therefore is not usually scanned by them, spies can plant malware that remains live and undetected even if the computer’s operating system were wiped and re-installed.

BIOS-hacking until now has been largely the domain of advanced hackers like those of the NSA. But researchers Xeno Kovah and Corey Kallenberg presented a proof-of-concept attack today at the CanSecWest conference in Vancouver, showing how they could remotely infect the BIOS of multiple systems using a host of new vulnerabilities that took them just hours to uncover. They also found a way to gain high-level system privileges for their BIOS malware to undermine the security of specialized operating systems like Tails—used by journalists and activists for stealth communications and handling sensitive data.

Although most BIOS have protections to prevent unauthorized modifications, the researchers were able to bypass these to reflash the BIOS and implant their malicious code.

Kovah and Kallenberg recently left MITRE, a government contractor that conducts research for the Defense Department and other federal agencies, to launch LegbaCore, a firmware security consultancy. They note that the recent discovery of a firmware-hacking tool by Kaspersky Lab researchers makes it clear that firmware hacking like their BIOS demo is something the security community should be focusing on.

Because many BIOS share some of the same code, they were able to uncover vulnerabilities in 80 percent of the PCs they examined, including ones from Dell, Lenovo and HP. The vulnerabilities, which they’re calling incursion vulnerabilities, were so easy to find that they wrote a script to automate the process and eventually stopped counting the vulns it uncovered because there were too many.

“There’s one type of vulnerability, which there’s literally dozens of instances of it in every given BIOS,” says Kovah. They disclosed the vulnerabilities to the vendors and patches are in the works but have not yet been released. Kovah says, however, that even when vendors have produced BIOS patches in the past, few people have applied them.

“Because people haven’t been patching their BIOSes, all of the vulnerabilities that have been disclosed over the last couple of years are all open and available to an attacker,” he notes. “We spent the last couple of years at MITRE running around to companies trying to get them to do patches. They think BIOS is out of sight out of mind [because] they don’t hear a lot about it being attacked in the wild.”

An attacker could compromise the BIOS in two ways—through remote exploitation by delivering the attack code via a phishing email or some other method, or through physical interdiction of a system. In that case, the researchers found that if they had physical access to a system they could infect the BIOS on some machines in just two minutes. This highlights just how quickly and easy it would be, for example, for a government agent or law enforcement officer with a moment’s access to a system to compromise it.

Their malware, dubbed LightEater, uses the incursion vulnerabilities to break into and hijack the system management mode to gain escalated privileges on the system. System management mode, or SMM, is an operations mode in Intel processors that firmware uses to do certain functions with high-level system privileges that exceed even administrative and root-level privileges, Kovah notes. Using this mode, they can rewrite the contents of the BIOS chip to install an implant that gives them a persistent and stealth foothold. From there, they can install root kits and steal passwords and other data from the system.

But more significantly, SMM gives their malware the ability to read all data and code that appears in a machine’s memory. This would allow their malware, Kovah points out, to subvert any computer using the Tails operating system—the security and privacy-oriented operating system Edward Snowden and journalist Glenn Greenwald used to handle NSA documents Snowden leaked. By reading data in memory, they could steal the encryption key of a Tails user to unlock encrypted data or swipe files and other content as it appears in memory. Tails is meant to be run from a secure USB flash drive or other removable media—so that conceivably it won’t be affected by viruses or other malware that may have infected the computer. It operates in the computer’s memory and once the operating system is shut down, Tails scrubs the RAM to erase any traces of its activity. But because the LightEater malware uses the system management mode to read the contents of memory, it can grab the data while in memory before it gets scrubbed and store it in a safe place from which it can later be exfiltrated. And it can do this while all the while remaining stealth.

“Our SMM attacker lives in a place nobody checks today to see if there’s an attacker,” Kovah says. “System management mode can read everyone’s RAM, but nobody can read System Management Mode’s RAM.”

Such an attack shows, he says, that the operating system Snowden chose to protect himself can’t actually protect him from the NSA or anyone else who can design an attack like LightEater.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 23 maart 2015 @ 08:35:34 #211
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_150939310
quote:
New Zealand Spied on WTO Director Candidates

New Zealand launched a covert surveillance operation targeting candidates vying to be director general of the World Trade Organization, a top-secret document reveals.

In the period leading up to the May 2013 appointment, the country’s electronic eavesdropping agency programmed an Internet spying system to intercept emails about a list of high-profile candidates from Brazil, Costa Rica, Ghana, Indonesia, Jordan, Kenya, Mexico, and South Korea.

New Zealand’s trade minister Tim Groser was one of nine candidates in contention for the position at the WTO, a powerful international organization based in Geneva, Switzerland that negotiates trade agreements between nations. The surveillance operation, carried out by Government Communications Security Bureau, or GCSB, appears to have been part of a secret effort to help Groser win the job.

Groser ultimately failed to get the position.

A top-secret document obtained by The Intercept and the New Zealand Herald reveals how GCSB used the XKEYSCORE Internet surveillance system to collect communications about the WTO director general candidates.

XKEYSCORE is run by the National Security Agency and is used to analyze billions of emails, Internet browsing sessions and online chats that are vacuumed up from about 150 different locations worldwide. GCSB has gained access to XKEYSCORE because New Zealand is a member of the Five Eyes surveillance alliance alongside the United States, the United Kingdom, Canada and Australia.

The WTO spying document shows how the New Zealand agency created an XKEYSCORE targeting “fingerprint,” a combination of names and keywords used to extract particular information from the vast quantities of emails and other communications accessible through the system. The document reveals that a fingerprint was specially tailored to monitor the WTO candidates and was “used to sort traffic by priority,” looking for “keywords [as they] appear in the email_body.” It is stamped with a “last modified” date of 6 May 2013, about a week before the new director general was to be announced.

Two different intelligence searches were carried out by the GCSB staff as part of what they termed the “WTO Project.” First, they looked for emails referring to Groser, the WTO, the director general candidacy, and the surnames of the other candidates: Alan John Kwadwo Kyerematen (Ghana); Amina Mohamed (Kenya); Anabel González (Costa Rica); Herminio Blanco (Mexico); Mari Elka Pangestu (Indonesia); Taeho Bark (South Korea); Ahmad Thougan Hindawi (Jordan); and Roberto Carvalho de Azevêdo (Brazil).

Second, they zeroed in on the Indonesian candidate, Pangestu, that country’s former minister of trade and a professional economist. A separate XKEYSCORE fingerprint was created, headed “WTO DG Candidacy issues – focus on Indonesian candidate.” This was presumably because the New Zealand government was particularly concerned that the job might go to another Pacific candidate ahead of Groser.

The surveillance of Pangestu appears to have targeted all Internet communications (not just email) containing the name “Pangestu,” the words “Indonesia,” “WTO” and “candidacy,” and the other candidates’ names.

The searches had keyword instructions in English, French and Spanish – for instance “zealand”, “zelande” and “zelandia” – in order to catch communications from more countries. The intercepted messages were to be passed to the GCSB’s “trade team,” which would likely have had the job of collating intelligence for people in government involved in Groser’s bid for the WTO role.

The Intercept and the New Zealand Herald attempted to contact each of the named targets prior to publication. Several were not reachable or did not respond to a request for comment. A spokesman for the WTO had not responded to multiple requests for comment at time of publication (update below).

Bark, the South Korean candidate, said he had no inkling that he was the focus of surveillance during his bid for the director general role. He told the New Zealand Herald he had received no intelligence agency support as part of his own campaign. “It’s a different world for very advanced countries,” he said.

Bark, now an academic at Seoul National University and South Korea’s ambassador-at-large for international economy and trade, added that he was not “offended” by the spying because he didn’t think it had any impact on the outcome of his effort to get the WTO job. But he predicted others would be stung by the eavesdropping revelations. “The Indonesian candidate would be very upset,” he said.

International economic law expert Meredith Kolsky Lewis, who specializes in the WTO, said she was “a bit shocked” at the allegation New Zealand had spied on emails about the director general candidates.

“I’m a little surprised that New Zealand used the surveillance power available to it for this purpose,” Lewis said. “It’s possible those who ordered the surveillance wanted to know who other countries in the region supported.”

Andrew Little, leader of New Zealand’s Labour Party, criticized the surveillance and described it as “completely out of order.”

“It just seems outrageous,” Little said. “I would have thought that [to be] a misuse of our security and intelligence agencies. It seems to me right outside the mandate of the GCSB. It’s nothing to do with security threats.”

It was in late 2012 that Groser was nominated for the position at the WTO.

The New Zealand trade minister launched a lobbying campaign as part of his candidacy bid, traveling to Europe, the United States, Africa, the Caribbean and around the Pacific Islands in an effort to win support from members of the WTO’s general council, which includes representatives from 160 countries.

However, his campaign was unsuccessful. Brazil’s Azevêdo (pictured above) was appointed the WTO’s new director general on 14 May 2013.

Three weeks earlier, when it had become clear that Groser was not going to make the final shortlist, New Zealand’s prime minister, John Key, expressed his disappointment. “At the end of the day it was always going to be a long shot – so he gave it his best go with the support of the government,” Key said.

What the public didn’t know was that this support had included deploying the GCSB to spy on communications about the competitors.

At the time of the surveillance, prime minister Key was the minister in charge of the GCSB, raising the question of whether he knew about and personally sanctioned the electronic eavesdropping to help Groser.

A spokesman for Key declined to answer any questions about the WTO spying and instead issued a boilerplate response. “New Zealand’s intelligence agencies have been, and continue to be, a significant contributor to our national security and the security of New Zealanders at home and abroad,” the spokesman said.

Groser, reached by New Zealand Herald reporters late Saturday, said the government wouldn’t discuss “such leaks” because he claimed they were “often wrong, [and] they are deliberately timed to try and create political damage.” Asked if he knew the GCSB was conducting surveillance for him, he said: “I’ve got no comment to make whatsoever.”

GCSB also declined to comment on any of the specific revelations. In a statement, the agency’s acting director, Una Jagose, said: “The GCSB exists to protect New Zealand and New Zealanders. We have a foreign intelligence mandate. We don’t comment on speculation about matters that may or may not be operational. Everything we do is explicitly authorized and subject to independent oversight.”

Last week, The Intercept revealed that GCSB used XKEYSCORE to target top government officials and an anti-corruption campaigner in the Solomon Islands.

Earlier disclosures, which were based on documents from NSA whistleblower Edward Snowden, have exposed how New Zealand is funneling data into XKEYSCORE from a surveillance base in the Waihopai Valley and is spying on about 20 countries across the world, predominantly in the Asia-Pacific region, among them small Pacific islands and major trading partners including Japan, Vietnam, and China.

The Intercept is reporting details about New Zealand’s surveillance operations in collaboration with the New Zealand Herald, the Herald on Sunday, and the Sunday Star-Times.

Update, March 22, 2015 at 17:30 ET: Reached by phone Sunday, WTO spokesman Keith Rockwell told The Intercept he was “learning about this for the very first time” and said he would not comment on the New Zealand spying until he had looked closer at the details. “Tomorrow morning I’ll go into the office and we’ll discuss it and we’ll try to figure out what’s going on,” he said.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 23 maart 2015 @ 11:52:37 #212
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_150943415
quote:
Britain’s Surveillance State

Edward Snowden exposed the extent of mass surveillance conducted not just by the United States but also by allies like Britain. Now, a committee of the British Parliament has proposed legal reforms to Britain’s intelligence agencies that are mostly cosmetic and would do little to protect individual privacy.

In a report published on March 12, the Intelligence and Security Committee acknowledged that agencies like MI5 collect, sift through and examine millions of communications. Most of this is legal, the committee said, and justified by national security. It proposed a new law that would tell people more about the kind of information the government collects about them but would not meaningfully limit mass surveillance. That is hardly sufficient for a system that needs strong new checks and balances.

Separately, a legal filing by the British government made public on Wednesday showed that its intelligence agencies maintain the right to hack into the computers, phones and other devices owned not just by suspected terrorists and criminals but also people who “are not intelligence targets in their own right.” The filing was published by Privacy International, one of several advocacy groups that have challenged government surveillance in court.

As things stand now, intelligence agencies can monitor vast amounts of communications and do so with only a warrant from a government minister to begin intercepting them. Lawmakers should limit the amount of data officials can sweep up and require them to obtain warrants from judges, who are more likely to push back against overly broad requests.

The parliamentary committee, however, did not see the need to limit data collection and concluded that ministers should continue to approve warrants because they are better than judges at evaluating diplomatic, political and public interests. That rationale ignores the fact that ministers are also less likely to deny requests from officials who directly report to them.

The committee’s acceptance of the status quo partly reflects the fact that Britons have generally been more accepting of intrusive government surveillance than Americans; security cameras, for instance, are ubiquitous in Britain. But the committee itself was far from impartial. Its nine members were all nominated by Prime Minister David Cameron, who has pushed for even greater surveillance powers.

After the attack against the French newspaper Charlie Hebdo in January, Mr. Cameron asked technology companies to help his government monitor encrypted communications and warned that those who refused to do so could be banned from doing business in Britain.

Parliament is unlikely to act on the committee’s report in its current form before the upcoming national election scheduled for May. In the meantime, legal cases challenging British surveillance practices filed by groups like Privacy International and Liberty are expected to end up at the European Court of Human Rights. In the past, that court has taken an expansive view of the individual’s right to privacy under the European Convention on Human Rights.

Governments certainly should have the ability to intercept communications to investigate crimes and terrorist plots. But lawmakers should place sensible limits on surveillance and require government officials to meet a high burden of proof before they are allowed to listen in on phone calls, read emails and troll through the web browsing histories of individuals.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 23 maart 2015 @ 11:55:01 #213
300435 Eyjafjallajoekull
Broertje van Katlaah
pi_150943473
ahja, het is allemaal 'legaal' dus dan mag het he. :') En drie keer raden door wie het legaal gemaakt is.

Dat ze steeds terugvallen op het argument dat het allemaal binnen de wet is geeft toch juist een veel groter probleem weer dan dat het eigenlijk illegaal zou zijn. Het is hetzelfde als je zelf een wet zou opstellen wat iets legaal maakt, vervolgens dat doet en zegt van 'ja, het is toch legaal?!'
Opgeblazen gevoel of winderigheid? Zo opgelost met Rennie!
  maandag 23 maart 2015 @ 14:17:05 #214
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_150947787
quote:
quote:
Top-secret documents obtained by the CBC show Canada's electronic spy agency has developed a vast arsenal of cyberwarfare tools alongside its U.S. and British counterparts to hack into computers and phones in many parts of the world, including in friendly trade countries like Mexico and hotspots like the Middle East.

The little known Communications Security Establishment wanted to become more aggressive by 2015, the documents also said.

Revelations about the agency's prowess should serve as a "major wakeup call for all Canadians," particularly in the context of the current parliamentary debate over whether to give intelligence officials the power to disrupt national security threats, says Ronald Deibert, director of the Citizen Lab, the respected internet research group at University of Toronto's Munk School of Global Affairs.

"These are awesome powers that should only be granted to the government with enormous trepidation and only with a correspondingly massive investment in equally powerful systems of oversight, review and public accountability," says Deibert.

Details of the CSE’s capabilities are revealed in several top-secret documents analyzed by CBC News in collaboration with The Intercept, a U.S. news website co-founded by Glenn Greenwald, the journalist who obtained the documents from U.S. whistleblower Edward Snowden.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 27 maart 2015 @ 20:55:33 #215
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_151105934
quote:
Leave Facebook if you don't want to be spied on, warns EU

European Commission admits Safe Harbour framework cannot ensure privacy of EU citizens’ data when sent to the US by American internet firms

The European Commission has warned EU citizens that they should close their Facebook accounts if they want to keep information private from US security services, finding that current Safe Harbour legislation does not protect citizen’s data.

The comments were made by EC attorney Bernhard Schima in a case brought by privacy campaigner Maximilian Schrems, looking at whether the data of EU citizens should be considered safe if sent to the US in a post-Snowden revelation landscape.

“You might consider closing your Facebook account, if you have one,” Schima told attorney general Yves Bot in a hearing of the case at the European court of justice in Luxembourg.

When asked directly, the commission could not confirm to the court that the Safe Harbour rules provide adequate protection of EU citizens’ data as it currently stands.

The US no longer qualifies

The case, dubbed “the Facebook data privacy case”, concerns the current Safe Harbour framework, which covers the transmission of EU citizens’ data across the Atlantic to the US. Without the framework, it is against EU law to transmit private data outside of the EU. The case collects complaints lodged against Apple, Facebook, Microsoft, Microsoft-owned Skype and Yahoo.

Schrems maintains that companies operating inside the EU should not be allowed to transfer data to the US under Safe Harbour protections – which state that US data protection rules are adequate if information is passed by companies on a “self-certify” basis – because the US no longer qualifies for such a status.

The case argues that the US government’s Prism data collection programme, revealed by Edward Snowden in the NSA files, which sees EU citizens’ data held by US companies passed on to US intelligence agencies, breaches the EU’s Data Protection Directive “adequacy” standard for privacy protection, meaning that the Safe Harbour framework no longer applies.

Poland and a few other member states as well as advocacy group Digital Rights Ireland joined Schrems in arguing that the Safe Harbour framework cannot ensure the protection of EU citizens’ data and therefore is in violation of the two articles of the Data Protection Directive.

The commission, however, argued that Safe Harbour is necessary both politically and economically and that it is still a work in progress. The EC and the Ireland data protection watchdog argue that the EC should be left to reform it with a 13-point plan to ensure the privacy of EU citizens’ data.

“There have been a spate of cases from the ECJ and other courts on data privacy and retention showing the judiciary as being more than willing to be a disrupting influence,” said Paula Barrett, partner and data protection expert at law firm Eversheds. “Bringing down the safe harbour mechanism might seem politically and economically ill-conceived, but as the decision of the ECJ in the so-called ‘right to be forgotten’ case seems to reinforce that isn’t a fetter which the ECJ is restrained by.”

An opinion on the Safe Harbour framework from the ECJ is expected by 24 June.

Facebook declined to comment.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 29 maart 2015 @ 20:27:21 #216
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_151167294
quote:
AP Exclusive: Before leak, NSA mulled ending phone program

WASHINGTON (AP) — The National Security Agency considered abandoning its secret program to collect and store American calling records in the months before leaker Edward Snowden revealed the practice, current and former intelligence officials say, because some officials believed the costs outweighed the meager counterterrorism benefits.

After the leak and the collective surprise around the world, NSA leaders strongly defended the phone records program to Congress and the public, but without disclosing the internal debate.

The proposal to kill the program was circulating among top managers but had not yet reached the desk of Gen. Keith Alexander, then the NSA director, according to current and former intelligence officials who would not be quoted because the details are sensitive. Two former senior NSA officials say they doubt Alexander would have approved it.

Still, the behind-the-scenes NSA concerns, which have not been reported previously, could be relevant as Congress decides whether to renew or modify the phone records collection when the law authorizing it expires in June.

The internal critics pointed out that the already high costs of vacuuming up and storing the “to and from” information from nearly every domestic landline call were rising, the system was not capturing most cellphone calls, and program was not central to unraveling terrorist plots, the officials said. They worried about public outrage if the program ever was revealed.

After the program was disclosed, civil liberties advocates attacked it, saying the records could give a secret intelligence agency a road map to Americans’ private activities. NSA officials presented a forceful rebuttal that helped shaped public opinion.

Responding to widespread criticism, President Barack Obama in January 2014 proposed that the NSA stop collecting the records, but instead request them when needed in terrorism investigations from telephone companies, which tend to keep them for 18 months.

Yet the president has insisted that legislation is required to adopt his proposal, and Congress has not acted. So the NSA continues to collect and store records of private U.S. phone calls for use in terrorism investigations under Section 215 of the Patriot Act. Many lawmakers want the program to continue as is.

Alexander argued that the program was an essential tool because it allows the FBI and the NSA to hunt for domestic plots by searching American calling records against phone numbers associated with international terrorists. He and other NSA officials support Obama’s plan to let the phone companies keep the data, as long as the government quickly can search it.

Civil liberties activists say it was never a good idea to allow a secret intelligence agency to store records of Americans’ private phone calls, and some are not sure the government should search them in bulk. They say government can point to only a single domestic terrorism defendant who was implicated by a phone records search under the program, a San Diego taxi driver who was convicted of raising $15,000 for a Somali terrorist group.

Some fault NSA for failing to disclose the internal debate about the program.

“This is consistent with our experience with the intelligence community,” said Rep. Justin Amash, R-Mich. “Even when we have classified briefings, it’s like a game of 20 questions and we can’t get to the bottom of anything.”

The proposal to halt phone records collection that was circulating in 2013 was separate from a 2009 examination of the program by NSA, sparked by objections from a senior NSA official, reported in November by The Associated Press. In that case, a senior NSA code breaker learned about the program and concluded it was wrong for the agency to collect and store American records. The NSA enlisted the Justice Department in an examination of whether the search function could be preserved with the records stores by the phone companies.

That would not work without a change in the law, the review concluded. Alexander, who retired in March 2014, opted to continue the program as is.

But the internal debate continued, current and former officials say, and critics within the NSA pressed their case against the program. To them, the program had become an expensive insurance policy with an increasing number of loopholes, given the lack of mobile data. They also knew it would be deeply controversial if made public.

By 2013, some NSA officials were ready to stop the bulk collection even though they knew they would lose the ability to search a database of U.S. calling records. As always, the FBI still would be able to obtain the phone records of suspects through a court order.

There was a precedent for ending collection cold turkey. Two years earlier, the NSA cited similar cost-benefit calculations when it stopped another secret program under which it was collecting Americans’ email metadata — information showing who was communicating with whom, but not the content of the messages. That decision was made public via the Snowden leaks.

Alexander believed that the FBI and the NSA were still getting crucial value out of the phone records program, in contrast to the email records program, former NSA officials say.

After the Snowden leaks, independent experts who looked at the program didn’t agree. A presidential task force examined NSA surveillance and recommended ending the phone records collection, saying it posed unacceptable privacy risks while doing little if anything to stop terrorism. The task force included Michael Morell, a former deputy CIA director, and Richard Clarke, a former White House counter terrorism adviser.

“We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking,” the report said. Times, dates and numbers called can provide a window into a person’s activities and connections.

A separate inquiry by the Privacy and Civil Liberties Oversight Board concluded the same thing.

David Medine, chairman of that board, said the concerns raised internally by NSA officials were the same as theirs, yet when NSA officials came before the privacy board, they “put on a pretty strong defense for the program. Except their success stories didn’t pan out,” he said.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 30 maart 2015 @ 17:42:29 #217
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_151195960
quote:
Dode na rampoging bij ingang NSA

Bij de toegangspoort van de Amerikaanse inlichtingendienst NSA is vandaag een dode gevallen nadat een automobilist de entree wilde rammen. Verder zouden er een of twee mensen gewond zijn, meldden Amerikaanse media.

Rond 09.30 uur probeerde de bestuurder de poort van het hoofdkantoor van de NSA in Fort Meade te rammen. Volgens NBC Washington zouden er twee mannen in de auto hebben gezeten, die verkleed waren als vrouwen. Ze wilden naar binnen bij het kantoor. Beide mannen zouden zijn geraakt door kogels van bewakers. Er lagen volgens de zender een geweer en drugs in de auto.

De NSA is bekend vanwege vele schandalen van de afgelopen jaren. Klokkenluider Edward Snowden lekte documenten, waardoor duidelijk werd dat de inlichtingendienst op soms buitensporige en vermoedelijk zelfs illegale wijze informatie vergaarde.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 30 maart 2015 @ 17:47:43 #218
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_151196111
quote:
quote:
It’s been nearly two years since former National Security Agency (NSA) contractor Edward Snowden first leaked to the Guardian that the NSA was spying on American citizens. A new survey from the Pew Research center finds that the revelations of the mass government surveillance programs has definitely impacted the way certain segments of the American population now view their privacy — but that hasn’t yet translated into behavior changes.

The survey found that a vast majority of respondents — 87 percent — had heard of the leaks in some way. Among them about a third, 34 percent, had actually modified their behaviors to protect their privacy from the government more, with 25 percent reporting they had modified the way they use different technologies “a great deal” or “somewhat.” Common reactions included changing their privacy settings on social media (17 percent), using social media less often (15 percent), avoiding certain apps (15 percent) and uninstalling apps (13 percent).

Meanwhile, 14 percent of the 475 respondents said they now speak in person more often than communicating online or over the phone. About 13 percent said they now avoid the use of certain terminology online.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 30 maart 2015 @ 17:50:29 #219
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_151196187
quote:
Who Knows What Evils Lurk in the Shadows?

The story of the powerful spy agency most Canadians still don’t know, and the security bill that would expand its resources and reach
quote:
Charlie Hebdo. Ottawa. Peshawar. Westgate. Mumbai. Acts of terror such as these have become an unfortunate by-product of the hypermedia world in which we now live. Governments worldwide have responded to these incidents with a sense of urgency: new anti-terrorism laws and expanded law enforcement and intelligence capabilities.

Canada’s version is now before us as Bill C-51, an omnibus crime and anti-terrorism bill that introduces two new security laws and amends 15 existing laws, including the Criminal Code and the CSIS Act. C-51 sets out to counter not just “terrorism” but the vast undefined expanse C-51 describes as “threats to the security of Canada.” The Harper government has pushed variations of these laws unsuccessfully over years. But it was the Ottawa attacks, followed quickly by those in Paris, which created a window of political opportunity prior to federal elections to throw together the package. These measures are the most sweeping change of Canadian national security laws since the 2001 terror attacks on the United States (9/11). As the law is being debated, it is important that Canadians understand the full implications.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 7 april 2015 @ 13:59:28 #220
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_151447883
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 7 april 2015 @ 14:29:38 #221
407722 LeonardoFibonacci
0, 1, 1, 2, 3, 5, 8, 13, 21 ..
pi_151448763
quote:
Het belangrijkste en trieste punt wat gemaakt wordt is dat je er iets als 'dickpics' bij moet halen om mensen een beetje geëngageerd te krijgen over dit onderwerp.
  zondag 12 april 2015 @ 20:35:51 #222
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_151623464
quote:
quote:
NSA whistleblower Edward Snowden was a highlight of last year's SXSW, where he gave one of his first public speeches. This year, Snowden was back at SXSW — but only a few people even knew it was happening. Snowden held a streamed question-and-answer session with roughly two dozen people from across the technology and policy world, which participant Sunday Yokubaitis, president of online privacy company Golden Frog, described as a "call to arms" for tech companies to foil spying with better privacy tools.

According to Yokubaitis, Snowden said that as policy reform lagged, companies should adopt more secure technology that could block surveillance altogether or make it too difficult to pursue en masse. A big focus was end-to-end encryption, which would mean no one (including companies) could see the contents of communications except the sender and recipient. "The low-hanging fruit is always [the] transit layer," he reportedly said. "It raises the cost. Every time we raise the cost, we force budgetary constraints." This is especially relevant as tools that are originally built for targeted use overseas slowly grow into broader programs. "We hope that they start with North Korea and by the time they end up in Ohio, they run out of budget."

Snowden described common security systems like SSL, meanwhile, as "critical infrastructure" that didn't receive enough investment and became vulnerable as a result. And if encryption isn't common enough, simply using it can mark a message as suspicious, which is part of the reason companies should be working on better encryption options. "Him saying that validates that companies should try and fill the holes, and not wait for policy," said Yokubaitis after the meeting.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 13 april 2015 @ 10:54:35 #223
407722 LeonardoFibonacci
0, 1, 1, 2, 3, 5, 8, 13, 21 ..
pi_151638941
https://www.security.nl/p(...)or+versleutelde+data

Ik vraag me af of ze encryptie niet snappen, of dat ze het te goed snappen en daarom met dit soort berichten een rookgordijn opwerpen.
  woensdag 15 april 2015 @ 22:09:41 #224
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_151725786
quote:
quote:
The Drug Enforcement Administration has been buying spyware produced by the controversial Italian surveillance tech company Hacking Team since 2012, Motherboard has learned.

The software, known as Remote Control System or “RCS,” is capable of intercepting phone calls, texts, and social media messages, and can surreptitiously turn on a user’s webcam and microphone as well as collect passwords.

The DEA originally placed an order for the software in August of 2012, according to both public records and sources with knowledge of the deal.

The contract, which has not been previously revealed, shows that the FBI is not the only US government agency engaged in hacking tactics, but that the DEA has also been purchasing off-the-shelf malware that could be used to spy on suspected criminals.

This revelation comes just a week after USA Today uncovered a secret program with which the DEA collected the phone records of millions of Americans for more than 20 years, a program that pre-dated and inspired the NSA’s own bulk telephone collection program, suggesting that the drug agency is sort of a pioneer in the use of surveillance.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 19 april 2015 @ 14:35:29 #225
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_151824420
quote:
Security expert used Tor to collect government e-mail passwords

A security expert who exposed the passwords and login information for a number …

Last month, Swedish security specialist Dan Egerstad exposed the passwords and login information for 100 e-mail accounts on embassy and government servers. In a blog entry today, Egerstad disclosed his methodology. He collected the information by running a specialized packet sniffer on five Tor exit nodes operated by his organization, Deranged Security.

Tor is an onion routing service that facilitates anonymous Internet communication. Originally developed by the US Naval Research Laboratory and formerly funded by the Electronic Frontier Foundation, Tor is designed to protect users from traffic analysis and other kinds of network surveillance. It works by relaying connections through a series of distributed network servers. When a Tor user visits a web site, the IP address detected and logged by that site will be the IP address of one of the Tor nodes rather than the actual user. This makes it possible for users to obscure their identity under certain circumstances.

Unfortunately, many Tor users do not realize that all of their network traffic is being exposed to Tor exit nodes. Tor users who do not use encryption are broadly exposing themselves to identity theft. Egerstad was originally doing a study on e-mail encryption, but during the course of the research project, he decided to create the packet sniffer and expose sensitive e-mail login data in order to increase awareness of the fact that Tor exposes sensitive information when not used with encryption.

Egerstad believed that privately disclosing his findings to the organizations whose passwords he obtained would not convince them to change their practices. He also knew that it was only a matter of time before others with malicious intent would perform the same kind of experiment, so he felt that broad public disclosure was the only way he could generate enough attention to force people to think about the problem.

"Experience tells me that even if I would contact everyone on this list most are not going to listen," Egerstad wrote when he released the login information last month. "So f*** it! Here is everything you need to read classified email and f*** up some serious International business. Hopefully this will put light on the security problems that are never talked about and get at least this fixed with a speed that you never seen your government work before. As a Swedish citizen I can't give this information to anyone without getting into trouble, so instead I'm giving it to everyone."

After publicly releasing the information, Egerstad's site was taken down at the request of US law enforcement officials. After it was brought back earlier this week, Egerstad expressed frustration and pointed out that the information was already spreading across the Internet. Taking down Egerstad's site only served to silence his message about security and did not prevent dissemination of the sensitive data. "I've seen people saying that the US would be angry now that we forced foreign countries to tighten their security so NSA or whatever can't read their secrets any longer. To me it sounds like bulls*** taken out of a bad book but after this silly little stunt I'm reconsidering. Is there any reason you DO NOT want people to secure their systems?" asked Egerstad.

According to Egerstad, the information disclosed is only a fraction of what he collected. He continues to argue that the responsibility for exposing the login information rests on the organizations that failed to use encryption and that he simply drew attention to information that was essentially already public. "ToR isn't the problem, just use it for what it's made for," Egerstad notes. "[The system administrators for the organizations whose passwords were exposed] are responsible for giving away their own countries secrets to foreigners. I can't call it a mistake, this is pure stupidity and not forgivable!"

Egerstad also points out that very little is known about the intentions and activity of other Tor exit node operators, some of whom are already known to be associated with malicious hacker groups and foreign governments.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 22 april 2015 @ 20:13:52 #226
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_151936192
quote:
DA says Apple, Google software helps terrorists

Manhattan DA Cyrus Vance Jr. sounded a battle cry Sunday, calling on law-enforcement agencies to battle Apple and Google over software that makes it impossible for authorities to “decrypt” cellphones seized in criminal investigations.

The recently rolled-out “upgrades” haven’t attracted much general attention, which means police must start pressing elected officials to roll back the terrorist-friendly software, he said.
“Apple has created a phone that is dark, that cannot be accessed by law enforcement even when a court has authorized us to look at its contents,” Vance warned on “The Cats Roundtable” show on WNYM/970 AM.

“That’s going to be the terrorists’ communication device of choice.”

Google is also introducing software for its Android phones that police and prosecutors will be unable to trace.

Combined, the tech giants make up about 96 percent of the world cellphone market.

When it was launched Sept. 17, the Apple mobile operating system, iOS 8, drew criticism from several top law-enforcement officials, including US Attorney General Eric Holder and NYPD Commissioner Bill Bratton.

“It does a terrible disservice to the public, ultimately, and to law enforcement, initially,” Bratton said at the time.

“For them to consciously, for profit and gain, to thwart those legal constitutional efforts, shame on them.”

Apple and Google have defended their products, admitting consumer demand was a key consideration.

With older operating systems, the companies could “unlock” cellphone data at the request of law enforcement. With the new ones, only the phone owner can.

“For all devices running iOS 8.0 and later versions, Apple will not perform iOS data extractions in response to government search warrants because the files to be extracted are protected by an encryption key that is tied to the user’s passcode, which Apple does not possess,” the company states on its Web site.

Vance said Apple and Google are playing with people’s safety.

“It’s going to affect our ability to protect New Yorkers,” he told the show’s host, former mayoral candidate John Catsimatidis.

“It’s also going to have national-security implications because a device that cannot be accessed by judicial warrant can be used by homegrown violent extremists and terrorists to communicate with each other.”

Vance urged law-enforcement leaders to lobby politicians.

“We need to get their [elected officials’] support to hold hearings on this issue,” Vance said.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 26 april 2015 @ 09:20:28 #227
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152032823
quote:
White House releases report on NSA surveillance six years later

Basics of programme had been declassified, but report includes new details about the secrecy surrounding the collection of Americans’ emails and calls

With debate gearing up over the coming expiration of the Patriot Act surveillance law, the Obama administration on Saturday unveiled a six-year-old report examining the once-secret programme to collect information on Americans’ calls and emails.

The Office of the Director of National Intelligence (ODNI) publicly released the redacted report following a Freedom of Information Act lawsuit by the New York Times. The basics of the National Security Agency (NSA) programme already had been declassified, but the lengthy report includes some new details about the secrecy surrounding it.

After the programme was disclosed in 2013 by the former NSA contractor Edward Snowden, President Barack Obama and many lawmakers called for legislation to end that collection, but a bill to do so failed last year. Proponents had hoped that the expiration of the Patriot Act provisions would force consideration of such a measure.

A bipartisan group of House members has been working on such legislation, dubbed the USA Freedom Act. White House press secretary Josh Earnest said on Friday that Obama is pleased efforts are restarting in the House.

“Hopefully, the next place where Democrats and Republicans will turn their attention and try to work together is on this issue of putting in place important reforms to the Patriot Act,” Earnest said.

If no legislation is passed, the Patriot Act provisions will expire. That would affect not only the NSA surveillance but other programmes used by the FBI to investigate domestic crimes, which puts considerable pressure on lawmakers to pass some sort of extension.

President George W Bush authorised the “President’s Surveillance Program” (PSP) in the aftermath of the terrorist attacks on 11 September 2001. The review was completed in July 2009 by inspectors general from the Justice Department, Pentagon, CIA, NSA and ODNI.

They found that while many senior intelligence officials believe the programme filled a gap by increasing access to international communications, others, including FBI agents, CIA analysts and managers, “had difficulty evaluating the precise contribution of the PSP to counterterrorism efforts because it was most often viewed as one source among many available analytic and intelligence-gathering tools in these efforts”.

Critics of the phone records programme, which allows the NSA to hunt for communications between terrorists abroad and US residents, argue it has not proven to be an effective counterterrorism tool. They also say an intelligence agency has no business possessing the deeply personal records of Americans. Many favour a system under which the NSA can obtain court orders to query records held by the phone companies.

The Patriot Act expires on 1 June, and Senate Republicans have introduced a bill that would allow continued collection of call records of nearly every American. The legislation would reauthorise sections of the Patriot Act, including the provision under which the NSA requires phone companies to turn over the “to and from” records of most domestic landline calls.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 30 april 2015 @ 14:26:51 #228
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152152132
quote:
Duitsers bespioneerden buurlanden voor Amerikanen, Merkel in verlegenheid

De Duitse geheime dienst heeft jarenlang in opdracht van de Amerikanen Europese buurlanden bespioneerd. Volgens een onderzoek dat is uitgevoerd in opdracht van de Duitse regering werden vanuit het Beierse Bad Aibling data, e-mails en telefoongegevens verzameld van onder meer de Franse wapenindustrie, hoge ambtenaren van het Franse ministerie van Buitenlandse Zaken en het presidentieel paleis en leden van de Europese Commissie.

De Duitse regering is door het onderzoek, dat gisteren uitlekte in de Süddeutsche Zeitung en via de tv-zenders NDR en WDR, ernstig in verlegenheid gebracht. Eind 2013 reageerde Duitsland nog woedend op het bericht dat de Amerikaanse veiligheidsdienst NSA onder andere de telefoon van bondskanselier Angela Merkel afluisterde.

Haar woordvoerder zei destijds dat er “een diep verschil van mening bestaat tussen Duitsland en de VS over de balans tussen veiligheid en inbreuk op burgerrechten”.

Illegale wapentransporten

De Verenigde Staten wilden volgens het uitgelekte onderzoek informatie over illegale wapenexporten. Daarom werden ook bedrijven in de gaten gehouden. Het zou in de meeste gevallen niet zijn gegaan om bedrijfsspionage.

De Frankfurter Allgemeine Zeitung, die de affaire relativeert, wijst op een lijst met e-mail- en IP-adressen die de Duitsers van de Amerikanen kregen, maar weigerden te onderzoeken.

Twee weken geleden zei minister van Binnenlandse Zaken Thomas de Maizière in antwoord op vragen in de Bondsdag dat er geen sprake is geweest van bedrijfsspionage. De oppositiepartij Die Linke concludeert nu dat De Maizière heeft gelogen en eist zijn aftreden.

De minister, die door boulevardkrant Bild al als Pinocchio met een lange neus wordt afgebeeld, noemde de beschuldigingen “niet waar”, maar kon weinig zeggen omdat het ging om “geheime” dan wel “uiterst geheime” informatie. “Het is daarom voor mij onmogelijk om openlijk op de verwijten en vragen te reageren”, zei De Maizière, die tussen 2005 en 2009 in Merkels Kanzleramt verantwoordelijk was voor de geheime diensten.

De voorzitter van de parlementaire onderzoekscommissie, Patrick Sensburg, een partijgenoot van De Maizière, vindt het veel te vroeg om over “aftreden” te spreken. Wel vraagt hij om inzage in de volledige lijst met zoektermen die de NSA aan zijn Duitse collega’s voorlegde.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 1 mei 2015 @ 16:06:54 #229
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152183187
quote:
quote:
Rob Bertholee, baas van de Nederlandse Inlichtingenen veiligheidsdienst (AIVD), noemt het verwijt van klokkenluider Edward Snowden dat zijn dienst een schoothond van haar Amerikaanse evenknie is “absolute bullshit”. Tevens vindt hij dat de Nederlandse journalistiek teveel achter Snowden aan loopt.

Bertholee gaat vandaag voor het eerst publiekelijk in op de kritiek van Snowden op de AIVD.
quote:
"Ik zie iemand die vastzit in Moskou, geen kant uitkan en door de Amerikanen wordt beschouwd als een vijand van de staat. Dan denk ik: hoe komt zo iemand aan zoveel kennis en een schijnbaar diepgaande analyse over wat er in Nederland gebeurt?"
Hier stopte ik met lezen :')
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 1 mei 2015 @ 16:09:22 #230
441090 crystal_meth
has new fav drug
pi_152183242
quote:
7s.gif Op vrijdag 1 mei 2015 16:06 schreef Papierversnipperaar het volgende:

[..]

[..]

[..]

Hier stopte ik met lezen :')
lol :D
are we infinite or am I alone
  vrijdag 1 mei 2015 @ 18:17:15 #231
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152186210
quote:
quote:
De omstreden Amerikaanse Patriot Act gaat waarschijnlijk aangepast worden. Volgens New York Times is er een meerderheid in de senaat voor het inperken van onbeperkt afluisteren door de inlichtingendienst NSA. Een congrescommissie heeft een voorstel aangenomen om de aanpassing van de Patriot Act mogelijk te maken en een meerderheid van republikeinen en democraten in de senaat zou die aanpassing steunen.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 2 mei 2015 @ 11:58:38 #232
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152204289
quote:
Why the U.S. should but won’t partner with hactivists Anonymous

For a barbaric movement grounded in early Islamic apocalyptic prophecies, what is perhaps most striking about the rapid rise of the Islamic State has been its use of modern technology. Leveraging the open nature and global reach of platforms such as Twitter, Facebook and YouTube, Islamic State has used social media to recruit young would-be jihadis, to build a global network of sympathetic followers, and to intimidate Western audiences with its brutality.

The scale of this digital propaganda network is vast. A recent study by the Brookings Institution found that in late 2014 there were at least 46,000 Twitter accounts used by Islamic State supporters, with an average of 1,000 followers each.

But why has the United States, which has at its disposal vast cyberwar capabilities, an ever-expanding surveillance state and significant leverage over, and goodwill of, the American companies that are hosting this content, proved unable to quiet the online reach of this network of insurgents?

One answer is that the open nature of the Internet, combined with the constraints that democratic states face engaging effectively within it, has limited the capability of the United States to fight back. And this tells us a tremendous amount about the shifting nature of power in the digital age.

In the absence of effective state action against the Islamic State online, Anonymous has taken up the digital war. Already this ad hoc network of hackers and activists has downed scores of Web pages and hacked into dozens of Twitter accounts that allegedly belong to Islamic State members. Much like in the early days of the Arab Spring, where hackers provided online assistance and offered protection to activists, Anonymous is stepping in where the state has limited capacity.

This has recently led to calls for the United States to partner with Anonymous to launch cyberattacks against the Islamic State, and even paying hactivists in bitcoin. This sounds audacious, but plausible. Western governments have long collaborated with unsavory actors with the aim of larger strategic goals — as it is said, the enemy of my enemy is my friend.

In theory, such a partnership could allow the Defense and State departments to overcome the constraints of their slow-moving, hierarchical, command-and-control systems. It could allow them to act more like a nimble startup than a legacy industrial corporation.

And it could be effective — we know that Anonymous hackers have been successful taking on a wide range of both established and emerging powers. In practice, however, there is substantial risk. As the failure of the clandestine USAID program to build a fake version of Twitter in Cuba to foster dissent demonstrates, states often stumble when they step into the murky world of online power.

But I would suggest there are other, more fundamental reasons, why the U.S. will never partner with Anonymous. This is because, at its core, Anonymous is different than the other perceived bad actors that government is more than willing to collaborate with. Anonymous represents a new form of decentralized power that challenges the very foundations of the state system.

First, the power structures that Anonymous embodies represent a fundamental threat to state dominance in the international system. The challenges that the state system were designed to solve — a lack of structure, instability, decentralized governance, loose and evolving ties — are precisely what makes groups like Anonymous powerful.

Legitimizing the type of decentralized, collaborative and anonymous power that Anonymous represents, therefore poses a threat to the hierarchical and state-led international system that the nation state depends on. This new form of power scares governments — so much so that they are willing to exert significant control over the network itself. As was revealed in the Snowden National Security Agency documents, the government wanted to collect it all, process it all, exploit it all, partner it all, sniff it all, know it all.

Second, over the course of modern history, we have placed tremendous power in the state. Whether it be through the justice system, the social welfare state or the military, government has been the primary enabler of collective action in our society. In exchange, we have put in place systems of accountability and laws to hold this power to account. For states seeking to fight new online powers, these norms of behavior make functioning effectively online at best difficult, and at worst counter to the expectations and laws governing their activities.

Third, the state is ultimately faced with a paradox — that the very attributes of the Internet that enable the Islamic State also enable the free enterprise and expression that make it arguably the most liberating technology in human history. The very real risk governments face is that in seeking to stop perceived nefarious actors online, they will also shut down the positive ones. Efforts by the NSA to break encryption, for example, won’t just help it fight illegal crypto-currencies, or Islamic State fighters using secure networking tools, but would also threaten the security of the online commerce sector. These efforts risk breaking the Internet.

For the U.S. government, partnering with Anonymous and legitimizing its structure is simply a bridge too far. And this limitation represents a crisis for state power in the digital age: One that curtails its ability to fight the online propaganda of a barbaric jihadist movement taking to Twitter to build its caliphate.

Taylor Owen is an assistant professor of digital media and global affairs at the University of British Columbia. He is the author of “Disruptive Power: The Crisis of the State in the Digital Age,” Oxford University Press, 2015. To comment, submit your letter to the editor at www.sfgate.com/submissions.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 2 mei 2015 @ 19:58:20 #233
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152215144
Mozilla:

quote:
Deprecating Non-Secure HTTP


Today we are announcing our intent to phase out non-secure HTTP.

There’s pretty broad agreement that HTTPS is the way forward for the web. In recent months, there have been statements from IETF, IAB (even the other IAB), W3C, and the US Government calling for universal use of encryption by Internet applications, which in the case of the web means HTTPS.

After a robust discussion on our community mailing list, Mozilla is committing to focus new development efforts on the secure web, and start removing capabilities from the non-secure web. There are two broad elements of this plan:

Setting a date after which all new features will be available only to secure websites
Gradually phasing out access to browser features for non-secure websites, especially features that pose risks to users’ security and privacy.

For the first of these steps, the community will need to agree on a date, and a definition for what features are considered “new”. For example, one definition of “new” could be “features that cannot be polyfilled”. That would allow things like CSS and other rendering features to still be used by insecure websites, since the page can draw effects on its own (e.g., using <canvas>). But it would still restrict qualitatively new features, such as access to new hardware capabilities.

The second element of the plan will need to be driven by trade-offs between security and web compatibility. Removing features from the non-secure web will likely cause some sites to break. So we will have to monitor the degree of breakage and balance it with the security benefit. We’re also already considering softer limitations that can be placed on features when used by non-secure sites. For example, Firefox already prevents persistent permissions for camera and microphone access when invoked from a non-secure website. There have also been some proposals to limit the scope of non-secure cookies.

It should be noted that this plan still allows for usage of the “http” URI scheme in legacy content. With HSTS and the upgrade-insecure-requests CSP attribute, the “http” scheme can be automatically translated to “https” by the browser, and thus run securely.

Since the goal of this effort is to send a message to the web developer community that they need to be secure, our work here will be most effective if coordinated across the web community. We expect to be making some proposals to the W3C WebAppSec Working Group soon.

Thanks to the many people who participated in the mailing list discussion of this proposal. Let’s get the web secured!

Richard Barnes, Firefox Security Lead

Update (2015-05-01): Since there are some common threads in the comments, we’ve put together a FAQ document with thoughts on free certificates, self-signed certificates, and more.

Bron: blog.mozilla.org
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 5 mei 2015 @ 09:27:50 #234
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152289122
New Zealand:

quote:
No factual basis for suggesting Snowden GCSB docs 'fabricated' - PM office

The Prime Minister's office has said it has no factual basis for suggesting Edward Snowden documents which exposed GCSB secrets were "fabricated".

But it has also said some of those with access to the Snowden documents - apparently including journalist Glenn Greenwald - "have a track record of misrepresenting, misinterpreting and misunderstanding information".

The "fabrication" claim has been part of the Prime Minister's standard response to revelations of activities carried out by New Zealand's electronic eavesdropping agency.

Details of the GCSB's work have included spying on international diplomats in support of Trade Minister Tim Groser's bid to lead the World Trade Organisation, feeding information to Bangaladeshi security forces facing murder and torture allegations and sending "full take" communications data from the Pacific to the National Security Agency.

The stories - in a reporting partnership with journalist Nicky Hager and the Greenwald-founded news site The Intercept - showed New Zealand had a job-sharing role in international intelligence gathering for the Five Eyes group of nations, which also includes Australia, Canada, the United Kingdom and the US.

The Five Eyes intelligence gathering group is led by the US, with the other countries holding "second party" status.

Other nations outside the group are the "third party" or less partners.

The Herald sought any information held by the Prime Minister which informed him or his office over the alleged "fabrication".

The Prime Minister's chief of staff Wayne Eagleson said "no information has been identified". He said the PM's office had to refuse the request because the "information requested does not exist or cannot be found".

Asked for the basis of the claim, a spokeswoman for the Prime Minister said: "Given these documents were stolen and these people have a track record of misrepresenting, misinterpreting and misunderstanding information, as shown in the Moment of Truth, we can't discount that some of what is being put forward may be fabricated."

The high profile Moment of Truth event saw Greenwald make claims Snowden documents showed a cable tapping operation was underway to access all New Zealanders' communications. Documents presented as proof showed the operation was planned but there was nothing proving it went ahead.

The government said there was a plan but it had never gone ahead.

OIA request responses from the PM's office and the GCSB show response to the Snowden stories was scripted from the outset. In only a few circumstances to it deviate regardless of the issue raised.

Large chunks of communications were withheld with officials saying it would place at risk the "security and defence of New Zealand".

The only information released which appeared to shed light on the claims from the Snowden files was a summary of comments by a former GCSB advisor.

In an email from one unnamed official to another, it summarised comments by Dr Damien Rogers on TVNZ's Q&A. According to the summary, Dr Roger's had rejected claims of "mass surveillance" on the Pacific in favour of the terms "widespread, systematic monitoring".

The official commented on the description saying it was "not helpful and untrue".

Overview

What was the issue?
Top secret GCSB and NSA documents detailed the way the agencies operated.

How did the Prime Minister respond?
John Key refused to comment on "stolen" information which could be fabricated.

Was there a basis for the suggestion they were forgeries?
The PM's office has confirmed there was no basis to the claim.

Has any Snowden document been shown to be "fabricated"?
No, not in any of the countries in which there has been extensive reporting.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 6 mei 2015 @ 15:19:08 #235
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152332701
quote:
'Met hulp van NSA verijdelde aanslagen België bestonden niet'

Generaal-majoor Eddy Testelmans van de Belgische militaire inlichtingendienst SGR is de fout ingegaan met een uitspraak over verijdelde aanslagen. Testelmans beweerde in 2013 dat er drie aanslagen in België waren verijdeld dankzij informatie van de Amerikaanse geheime dienst NSA. Dat blijkt niet het geval, meldde de Belgische krant De Tijd vandaag.

'Als de NSA die info niet had doorgespeeld, hadden wij het niet geweten', zei Testelmans in 2013 in een interview met het magazine MO*. 'De details mag ik niet geven. Wel kan ik zeggen dat België waarschijnlijk voor zware incidenten behoed is gebleven.'

Testelmans baseerde zich daarbij op vertrouwelijke nota's die hij had gekregen van de NSA-top. Diezelfde informatie werd destijds ook gebruikt door de NSA om zich voor de Amerikaanse regering te verdedigen na de onthullingen van Snowden. Volgens De Tijd was het ook het doel van Testelmans om het werk van de Amerikaanse inlichtingendienst te verdedigen.

In een vertrouwelijk rapport van de toezichthouder voor de geheime diensten staat er een 'groot vertrouwen' is tussen de NSA en ADIV. Mogelijk heeft de NSA de inlichtingenchef daarom niet tegengesproken.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 7 mei 2015 @ 15:34:06 #236
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152370796
quote:
Angela Merkel under pressure to reveal all about US spying agreement

German chancellor’s reputation could be at stake as scandal grows over intelligence agency’s surveillance of European businesses and officials on behalf of NSA

Angela Merkel’s reputation as an unassailable chancellor is under threat amid mounting pressure for her to reveal how much she knew about a German-supported US spying operation on European companies and officials.

The onus on her government to deliver answers over the spying scandal has only increased with the Austrian government’s announcement that it has filed a legal complaint against an unnamed party over “covert intelligence to the detriment of Austria”.

EADS, now Airbus, one of the companies known to have been spied on by the BND – Germany’s foreign intelligence agency – is also taking legal action, saying it will file a complaint with prosecutors in Germany.

The BND stands accused of spying on behalf of America’s NSA on European companies such as EADS, as well as the French presidency and the EU commission. There are also suspicions that German government workers and journalists were spied on.

The Social Democrats (SPD), Merkel’s government partners, along with Germany’s federal public prosecutor, Harald Range, are demanding the release of a list of “selectors” – 40,000 search terms used in the spying operations – the results of which were passed on to the NSA.

“The list must be published and only then is clarification possible,” said Christine Lambrecht, parliamentary head of the SPD faction. Merkel has so far refused to allow its release. Her spokesman, Steffen Seibert, said she would make a decision on whether or not to do so only “once consultations with the American partners are completed”.

Thomas de Maizière, the interior minister and a close Merkel confidante, is under even more pressure than the chancellor over allegations he lied about what he knew of BND/NSA cooperation. On Wednesday he answered questions on the affair to a parliamentary committee investigating the row, but only in camera and in a bug-proof room. Among other alleged shortcomings over the affair, he stands accused of failing to act when the BND informed him of the espionage activities in 2008 when he was Merkel’s chief of staff. He has repeatedly been portrayed in the tabloid media with a Pinocchio nose.

Responding to journalists during a break in the proceedings, he once again vehemently denied the allegations. “As chief of staff in 2008, I learned nothing about search terms used by the US for the purposes of economic espionage in Germany,” he said. But he acknowledged knowing about American efforts to intensify the intelligence swapping, calling it “problematic cooperation”, and said the requests had been turned down by the BND.

On Wednesday evening the committee is due to question the incumbent chief of staff, Peter Altmaier.

The former BND chief, Gerhard Schindler, is due to speak before the separate NSA parliamentary committee – set up to investigate the activities of the US agency as revealed by Edward Snowden – on Thursday.

While Merkel appeared to have remained relatively unscathed by the scandal until now, an opinion poll showed that most Germans believed the trustworthiness of the three-times chancellor was now seriously at stake. 62% of Germans said her credibility was in doubt, according to the poll, carried out by the Insa institute, while 18% said it was not.

Merkel told Radio Bremen in an interview that she was prepared to speak out over the allegations to a parliamentary committee. “I will testify there and justify myself to them where it is required,” she told the broadcaster.

Sigmar Gabriel, the deputy chancellor and economy minister, who is also the leader of the SPD, upped the ante still further by relaying a conversation he had with Merkel in which he asked her twice if the government had evidence of economic espionage, and she said no. He added that if it emerged Germany had been involved in helping the NSA spy on companies, it would greatly strain relations between business and the government and “put a large burden on the trust the economy has in government behaviour”.

The scandal has already strained relations within Merkel’s grand coalition, with many observers commenting that Gabriel was seeing the affair as a chance to make political gains. Political observers were lining up to remark that the crisis is the single most critical of Merkel’s decade in government and could even lead to her and her government’s downfall.

But the scandal has its roots much further back than Merkel’s own government, harking to a time when Europe was gripped by the cold war. Both the US and the UK, as victors of the second world war who had Germany under close supervision, ran spying networks from Germany, most notably from Bad Aibling in Bavaria, the biggest listening station outside the US and Britain. Officially, the US withdrew its operations in 2004. But unofficially it stayed there under an agreement in which Germany agreed to hand over its intelligence findings in return for the highly sophisticated technology the US was able to provide. The events of 9/11 and the revelations that three of the pilots had lived in Germany undetected only served to increase the pressure the US was able to put on Germany that its presence was necessary.

Bad Aibling, officially now solely a BND listening facility, was the post used by the NSA in the current scandal.

The affair has underlined just how dependent Germany still is on the US and to a lesser extent the UK, on issues of intelligence and defence. Their desire for still-closer cooperation culminated in Operation Monkey Shoulder (named after a blend of three different types of malt whiskys) involving the BND, NSA and MI6, Spiegel recently revealed.

With such a background, the German government has to appear to be criticising the US at the same time as underlining the importance of cooperation.

Merkel, who appeared to be hugely at odds with the US government when it was revealed in 2013 that the NSA’s mass intelligence operation included tapping her mobile phone, has so far responded in a characteristically vague and flat manner. While acknowledging that allies should not spy on each other, she has stressed that spying’s most important role is to prevent terrorist attacks.

“The government will do everything to guarantee the ability of the intelligence services,” she said on Monday. “Taking terrorist threats into account, that ability is only possible in cooperation with other agencies. That very much includes the NSA, as well as others.”

Commenting on the crisis, Spiegel magazine called it the “biggest challenge that the ‘Merkel Regime’ has had to face”, and potentially the “turning point of her chancellorship”.

“She enjoys such trust because many Germans feel she looks after the country’s needs and their own very well. But the scandal … could cause the foundations of her power to crumble,” the magazine said.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 7 mei 2015 @ 15:39:54 #237
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152370976
quote:
Appeals Court Rules NSA Phone Program Not Authorized by Patriot Act

ACLU lawsuit argued the data collection should be stopped because it violates Americans’ privacy rights
quote:
A federal appeals court ruled Thursday the National Security Agency's controversial collection of millions of Americans' phone records isn't authorized by the Patriot Act, as the Bush and Obama administrations have long maintained.
Artikel achter paywall ;(
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 7 mei 2015 @ 15:51:16 #238
407722 LeonardoFibonacci
0, 1, 1, 2, 3, 5, 8, 13, 21 ..
pi_152371312
Zou mooi zijn als die patriot act de prullenbak in ging, maar dat zal dan wel weer niet.
  donderdag 7 mei 2015 @ 17:17:40 #239
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152374052
quote:
quote:
A federal appeals court panel ruled on Thursday that the NSA’s bulk collection of metadata of phone calls to and from Americans is not authorized by Section 215 of the USA Patriot Act, throwing out the government’s legal justification for the surveillance program exposed by NSA whistleblower Edward Snowden nearly two years ago.

Judge Gerard E. Lynch, writing the opinion for the three-judge panel of the Second Circuit Court of Appeals in New York, described as “unprecedented and unwarranted” the government’s argument that the all-encompassing collection of phone records was allowed because it was “relevant” to an authorized investigation.

The case was brought by the American Civil Liberties Union, and ACLU attorney Alex Abdo told The Intercept, “This ruling should make clear, once and for all, that the NSA’s bulk collection of Americans’ phone records is unlawful. And it should cast into doubt the unknown number of other mass surveillance operations of the NSA that rely on a similarly flawed interpretation of the law.”

As Lynch wrote in the court’s opinion: “To obtain a § 215 order, the government must provide the FISC [Foreign Intelligence Surveillance Court] with ‘a statement of facts showing that there are reasonable grounds to believe that the tangible things sought are relevant to an authorized investigation (other than a threat assessment)’. ”
het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 9 mei 2015 @ 11:44:24 #240
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152426928
quote:
Of Snowden and the NSA, only one has acted unlawfully – and it’s not Snowden | World news | The Guardian

With the NSA’s bulk surveillance ruled illegal, the debate on the Patriot Act should be reinvigorated – with Edward Snowden free to join in

With the NSA’s bulk surveillance ruled illegal, the debate on the Patriot Act should be reinvigorated – with Edward Snowden free to join in

On 6 June 2013, the Guardian published a secret US court order against the phone company Verizon, ordering it on an “ongoing, daily basis” to hand over the call records of its millions of US customers to the NSA – just one of numerous orders enabling the government’s highly secret domestic mass surveillance program. Just days later the world learned the identity of the whistleblower who made the order public: Edward Snowden.

Now, almost two years later, a US court has vindicated Snowden’s decision, ruling that the bulk surveillance program went beyond what the law underpinning it allowed: the US government used section 215 of the Patriot Act to justify the program. A US court of appeals has ruled the law does not allow for a program so broad. In short, one of the NSA’s most famous and controversial surveillance programs has no legal basis.

Of Snowden and the NSA, only one has so far been found to have acted unlawfully – and it’s not Snowden. That surely must change the nature of the debate on civil liberties being had in America, and it should do so in a number of ways.

The first is the surprisingly thorny question of what to do with Snowden himself. The whistleblower is in his second year of exile, living in asylum in Russia, as he would surely face criminal prosecution should he return. The nature of the punishment – and pre-trial mistreatment – meted out to Chelsea Manning shows his fears are well founded.

But now the courts have ruled that Snowden’s flagship revelation, the very first and foremost of the programs he disclosed, has no legal basis, who now might challenge his status as a whistleblower?

Certainly not Judge Sack, who in his concurring opinion alongside today’s rulings acknowledged Snowden’s revelations led to this litigation, and likened his disclosures to Daniel Ellsberg’s famous “Pentagon Papers” leak.

If the US government seeks to jail someone who has shown its own security services acting unlawfully, its international reputation will deservedly take a beating. If the US wants moral authority to talk to other governments about whistleblowers and civil liberty, it needs to be brave: it needs to offer Snowden amnesty.

The other actions for the US executive and for Congress are broader. The court of appeals judges very deliberately chose not to consider the constitutionality of NSA bulk surveillance programs, as such questions are currently before Congress with the ongoing debate on how to reform the Patriot Act.

Congress should allow this ruling to reinvigorate that debate, and in a sense the ruling forces it to do so. If Congress want a law that allows phone surveillance on the scale of the NSA’s existing programs, it will have to explicitly create that: gone is the option of trying to push through something near the status quo with a fringe of reform.

For domestic bulk surveillance to continue and be legal, Congress must explicitly vote for it – and then, in time, the judicial branch will consider the constitutional case in earnest.

If Congress sincerely wishes to curb it, it now has substantial backing from the judicial branch to push forward and do that. Reformers finally have the jolt in the arm they needed to prevent the positive impact of Snowden’s revelations dribbling away.

The president could also use this ruling as an opportunity to consider his stance. The line endlessly aired by the administration and its officials is that all surveillance is legal. That line is no longer valid. Rather than just seeking a new script – or as is almost certain, merely appealing against the decision – this could be a great opportunity for some introspection. These surveillance programs are wildly expensive and have very few proven results. Why not look at which ones the US really needs, and whether old-fashioned targeted surveillance might not keep us all as safe (or safer), and freer too?

The final debate is one that is unlikely to happen, but should: the US needs to start considering the privacy and freedom of foreigners as well as its own citizens. The US public is rightly concerned about its government spying on them. But citizens of countries around the world, many of them US allies, are also rightly concerned about the US government spying on them.

Considering Americans and foreigners alike in these conversations would be a great moral stance – but pragmatically, it should also help Americans. If the US doesn’t care about the privacy of other countries, it shouldn’t expect foreign governments to care about US citizens. There’s something in this for everyone.

These are the debates we could be having, and should be having. The judiciary has spoken. The legislature is deliberating. The public is debating. And all of it is enabled thanks to information provided by Edward Snowden.

He should be free to join the conversation, in person.
Bron: www.theguardian.com
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 10 mei 2015 @ 21:06:17 #241
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152470281
quote:
quote:
When Apple and Google unveiled new encryption schemes last month, law enforcement officials complained that they wouldn’t be able to unlock evidence on criminals’ digital devices. What they didn’t say is that there are already methods to bypass encryption, thanks to off-the-shelf digital implants readily available to the smallest national agencies and the largest city police forces — easy-to-use software that takes over and monitors digital devices in real time, according to documents obtained by The Intercept.

We’re publishing in full, for the first time, manuals explaining the prominent commercial implant software “Remote Control System,” manufactured by the Italian company Hacking Team. Despite FBI director James Comey’s dire warnings about the impact of widespread data scrambling — “criminals and terrorists would like nothing more,” he declared — Hacking Team explicitly promises on its website that its software can “defeat encryption.”
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 12 mei 2015 @ 19:08:24 #242
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152533236
quote:
quote:
The FBI breached its own internal rules when it spied on campaigners against the Keystone XL pipeline, failing to get approval before it cultivated informants and opened files on individuals protesting against the construction of the pipeline in Texas, documents reveal.

Internal agency documents show for the first time how FBI agents have been closely monitoring anti-Keystone activists, in violation of guidelines designed to prevent the agency from becoming unduly involved in sensitive political issues.

The hugely contentious Keystone XL pipeline, which is awaiting approval from the Obama administration, would transport tar sands oil from Canada to the Texas Gulf coast.

It has been strongly opposed for years by a coalition of environmental groups, including some involved in nonviolent civil disobedience who have been monitored by federal law enforcement agencies.

The documents reveal that one FBI investigation, run from its Houston field office, amounted to “substantial non-compliance” of Department of Justice rules that govern how the agency should handle sensitive matters.

One FBI memo, which set out the rationale for investigating campaigners in the Houston area, touted the economic advantages of the pipeline while labelling its opponents “environmental extremists”.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 15 mei 2015 @ 15:30:13 #243
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152622998
De AIVD is nog niet klaar.

quote:
AIVD-baas had gelijk: Edward Snowden verdient tegenspel

Onderzoek waarom die ex-NSA’er vanuit Moskou enkel Amerikaanse vrienden tegen elkaar uitspeelt, betoogt ex-AIVD’er Kees Jan Dellebeke.

Geeft de Nederlandse geheime dienst de Amerikaanse inlichtingendiensten onbeperkte toegang tot eigen informatie? „Dat is echt absolute bullshit”, zei Rob Bertholee, directeur AIVD, op 1 mei in NRC. De interviewers hadden hem beweringen voorgelegd van Edward Snowden, de Amerikaan die in 2013 een berg documenten van zijn werkgever NSA openbaarde, de grootste inlichtingendienst van de VS. Bertholee heeft gelijk, maar in de publieke opinie werd het hem niet in dank afgenomen dat hij de naar Moskou gevluchte NSA’er afserveerde. Het leidde zelfs tot Kamervragen. „Deelt u de strategie van de AIVD om klokkenluider Snowden te isoleren en te stigmatiseren?”, vroeg Ronald van Raak (SP) aan de minister van Binnenlandse Zaken.

Als ex-AIVD’er sloeg ik de ophef met verbazing gade. Wonderlijk dat zoveel intelligente mensen blindelings geloven in de ‘goede bedoelingen’ van Snowden. Bertholee spoorde de journalistiek juist aan Snowden kritischer te onderzoeken en tegenspel te bieden. Natuurlijk, de AIVD beschikt over meer bronnen en is daarmee in het voordeel van journalisten en politici. Denk aan analyses van buitenlandse inlichtingendiensten over Snowden. De dienst wordt daarover regelmatig bijgepraat. Bertholees Ruslandspecialisten zullen zich ongetwijfeld verdiept hebben in de mogelijke rol die Poetins geheime dienst FSB in de affaire speelde.

Bertholee staat overigens niet alleen in zijn kritiek op de met Snowden dwepende pers. In universiteitskringen wordt de kritiekloze en hijgerige berichtgeving over Snowdens uitlatingen evenmin gewaardeerd. Zij vragen zich af waarom Snowden als geestelijk leider aanbeden wordt. Hij wordt aangehoord en geloofd: tegengas blijft uit, waarschijnlijk uit angst dat hij een interview zal weigeren.
Dat laatste deel is goud, maar natuurlijk niet waar zonder bron.

De rest achter paywall.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 15 mei 2015 @ 20:50:23 #244
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152632495
quote:
quote:
DⒶʀKᙡiNɢ ಠ_ರೃ , a Swede associated with Anonymous, has claimed a new, and rather relentless, hack of the US National Security Agency’s email server. Nothing so mundane as username/password combinations, the Pastebin of the hack lists the methodology and blow-by-blow of what worked, what didn’t, and what the hacker thinks of the NSA security (hint: not much). Turns out, the NSA doesn’t even maintain its own email server: they’ve outsourced that to Qwest.
quote:
Pirate Party activist and Cryptosphere contributor Raymond Johansen shared the original tweet to Facebook when the Paste had 327 views. The tweet contains a live link to the Pastebin, of course.

Within eight minutes, he reports, the Pastebin had been taken down. “THEN they read me laughing at them for even trying.” Someone posted a link to the Google cache of the missing paste in the comments on Facebook, at which point the paste apparently re-materialized. “Within a minute of that the original paste is back up AGAIN – the NSA realizing I am making them look like class fulz. THAT moment is the single most ROFL inducing PSML unavoidable moment of my life. It is Anonspeak for “we know we fckd lets unfck ourself” – all the while actually doublefcking themselves – royally.”

The paste may have been tampered with in the interim, says Johansen. “The [second] paste we saw, maybe 12 hours old, had strange garbage on the end. IMO it has been tinkered with and I myself will not visit that pastebin – because OpSec.”

“AnonIntelGroup posted ‘Bring the Lulz back!’ a week ago. ‘Mission accompli!’ – I would say.”

Within three hours of that, however, Johansen noticed that the Facebook post itself was missing from his timeline, missing from his Timeline Review, and had been removed from all the groups and pages to which he had shared it. Gone, too, were the comments. He then made a new post, explaining the elision, which was screenshotted and linked above. The Cryptosphere was able to confirm independently via email updates that the original post existed, and was subsequently scrubbed by Facebook.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 18 mei 2015 @ 15:51:18 #245
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152715251
quote:
Angela Merkel under pressure to reveal extent of German help for US spying | World news | The Guardian

German chancellor called on to divulge a list of targets, including the IP addresses of individual computers, tracked on behalf of the NSA

German chancellor called on to divulge a list of targets, including the IP addresses of individual computers, tracked on behalf of the NSA

The German chancellor, Angela Merkel, is coming under increasing pressure to divulge a list of targets, including the IP addresses of individual computers, that German intelligence tracked on behalf of the US National Security Agency (NSA).

Critics have accused Merkel’s staff of giving the BND foreign intelligence agency the green light to help the NSA spy on European firms and officials.

The scandal has strained relations between Merkel’s conservative Christian Democratic Union and its junior coalition partner, the Social Democrats, whose leader, Sigmar Gabriel, has publicly challenged her over the affair.

Gabriel told the German newspaper Bild am Sonntag that parliament needed to see the list, which contains names, search terms and IP addresses. The government has said it must consult the US before revealing the list, whose contents are thought crucial to establishing whether the BND was at fault in helping the NSA.

Gabriel, who is also Germany’s vice-chancellor, said: “Imagine if there were suspicions that the NSA had helped the BND to spy on American firms. Congress wouldn’t hesitate for a second before looking into the documents.”
Bron: www.theguardian.com
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 18 mei 2015 @ 15:59:25 #246
441090 crystal_meth
has new fav drug
pi_152715549
quote:
7s.gif Op maandag 18 mei 2015 15:51 schreef Papierversnipperaar het volgende:

[..]

Angela moet toestemming vragen aan de VS |:( Kolonialisme 2.0
are we infinite or am I alone
pi_152744376
quote:
NSA doorzoekt telefoongesprekken met 'Google voor spraak'
Amerikaanse inlichtingendienst scant telefoongesprekken wereldwijd op zeer grote schaal met een technologie die het intern beschrijft als 'Google voor spraak'.
Dat meldt The Intercept op basis van documenten van klokkenluider Edward Snowden.

Volgens de documenten werkt de NSA al jaren aan een complex systeem voor het omzetten van spraak naar tekst. Dat systeem is inmiddels zo intelligent dat het zelfstandig op grote schaal gesprekken kan afluisteren, op zoek naar verdachte woorden, zinnen of combinaties daarvan.

De techniek van de NSA maakt volgens de documenten van Snowden vergelijkbare vorderingen als commerciële spraak-naar-tekst-software. Zulke software werkt inmiddels als een zogenoemd neuraal netwerk, een zelflerend systeem.

[...]
When the student is ready, the teacher will appear.
When the student is truly ready, the teacher will disappear.
  dinsdag 19 mei 2015 @ 15:53:48 #248
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152751351
quote:
AIVD onderzoekt mogelijke spionage door Duitse inlichtingendienst | De afluisterpraktijken van de NSA

Minister Ronald Plasterk van Binnenlandse Zaken laat de inlichtingen- en veiligheidsdienst AIVD uitzoeken wat er waar is van beschuldigingen dat Duitse en Amerikaanse inlichtingendiensten onder meer internetverkeer richting Nederland hebben afgetapt. Plasterk zei dat vandaag in de marge van het vragenuur in de Tweede Kamer.
[/b]

De Oostenrijkse politicus Peter Pilz meldde de spionage door de Duitse dienst BND en de Amerikaanse NSA maandag aan het Duitse tijdschrift Der Spiegel. Behalve Nederlands internetverkeer zouden die diensten ook gegevens in Oostenrijk en Frankrijk hebben onderschept.

Mocht Pilz meer informatie hebben, dan wil de AIVD die graag inzien, zei Plasterk. Zodra de minister meer weet, zal hij de Tweede Kamer informeren. Hij noemde het 'in algemene zin onacceptabel' dat er in Nederland door buitenlandse diensten wordt gespioneerd.

Bron: Volkskrant
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 22 mei 2015 @ 12:47:33 #249
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_152851270
quote:
[quote]NSA neusde nog veel meer rond in Europa dan gedacht

De interesse van de Amerikaanse inlichtingendienst NSA in Europese bedrijven blijkt veel groter te zijn geweest dan tot nog toe werd aangenomen. Niet alleen bedrijven in de defensiesector zoals EADS en Eurocopter werden bespioneerd, ook andere firma's werden in de gaten gehouden.

Volgens het tijdschrift Der Spiegel is bij de Duitse inlichtingendienst BND, die hand-en-spandiensten verleent aan de NSA, een nieuwe lijst met zoektermen opgedoken waaruit de interesse valt op te maken. Op de lijst staan 459.000 zoektermen die in ieder geval in de periode 2005 - 2008 werden gebruikt.

Door het stof

De baas van de BND, Gerhard Schindler, ging gisteren door het stof. Hij gaf toe dat de door de NSA ingediende zoektermen waarmee door de BND verzamelde informatie wordt doorzocht, onvoldoende door zijn dienst tegen het licht zijn gehouden.

De nieuwe lijst brengt de Duitse inlichtingendienst echter ook op een ander punt in verlegenheid. Het zorgvuldig gecultiveerde beeld dat afluisterstation Bad Aibling zelfstandig opereerde zonder medeweten van het hoofdkantoor is niet langer houdbaar, schrijft Der Spiegel. De lijst komt van het hoofdkantoor in Pullach van de afdeling G10 die er juist op moet toezien dat Duitsers verschoond blijven van onwettige spionagepraktijken.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 27 mei 2015 @ 17:57:10 #250
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_153013455
quote:
Security services' powers to be extended in wide-ranging surveillance bill | UK news | The Guardian


Surprise extension of bill’s scope beyond legislation to modernise law on tracking communications data was agreed only this week

The government is to introduce an investigatory powers bill that is far more wide-ranging than expected, including an extension of the powers of the security services in response to the surveillance disclosures by the NSA whistleblower Edward Snowden.

The legislation will include not only the expected snooper’s charter, enabling the tracking of everyone’s web and social media use, but also moves to strengthen the security services’ warranted powers for the bulk interception of the content of communications.

The surprise extension of the scope of the bill beyond legislation to “modernise the law” on tracking communications data was agreed within government only this week. It appears that David Cameron has decided to take advantage of his unexpected majority in the Commons to respond to Snowden’s disclosures by extending the powers of the security services.

The Home Office says the investigatory powers bill will “better equip law enforcement and intelligence agencies to meet their key operational requirements, and address the gap in these agencies’ ability to build intelligence and evidence where subjects of interest, suspects and vulnerable people have communicated online.”

Ministers promise to provide for “appropriate oversight arrangements and safeguards”, but there is no immediate detail on how the complex web of intelligence and surveillance commissioners and parliamentary oversight might be strengthened.

The government also promises that the legislation will respond to issues raised by David Anderson QC, the official reviewer of counter-terrorism legislation, in his assessment of bulk surveillance powers used by the police and security services under the Regulation of Investigatory Powers Act 2000.

Anderson delivered his report to Downing Street on 6 May, the day before the general election, and it is expected to be published in the next few days. Anderson has said his review considered the safeguards to privacy, issues of transparency and oversight as well as the powers needed to meet the challenge of changing technologies. He has said it was a “substantial piece of work” and included him travelling to Berlin, California, Washington DC, Brussels and Ottawa.

“The report won’t please everyone [indeed it may not please anybody]. But if it succeeds in informing the public and parliamentary debate on the future of the law from an independent perspective, it will have done its job,” he said on his blog.

Jim Killock, executive director of the Open Rights Group, said: “The government is signalling that it wants to press ahead with increased powers of data collection and retention for the police and GCHQ, spying on everyone, whether suspected of a crime or not.

“This is the return of the snooper’s charter, even as the ability to collect and retain data gets less and less workable. We should expect attacks on encryption, which protects all our security. Data collection will create vast and unnecessary expense.”

Renate Samson, chief executive of Big Brother Watch, said: “Whilst the title may have changed from a communications data bill to an investigatory powers bill, it will be interesting to see whether the content has radically changed.

“We have yet to see real evidence that there is a gap in the capability of law enforcement or the agencies’ ability to gain access to our communications data.”

The extended scope of the bill may follow some of the recommendations of the intelligence and security committee (ISC), which suggested in March that the entire existing surveillance legal framework should be replaced by a single new act of parliament.

The MPs and peers suggested that the new legislation should list every intrusive capability available to the security services and specify their purpose, authorisation procedure and what safeguards and oversight procedures exist for their use. This presumably extends to the kind of GCHQ bulk data collection programmes such as Temp0ra and Prism disclosed by Snowden.

The ISC said the introduction of the new communications data legislation was “critical”, but added that a new category of data called “communications data plus” should be established. It said this would acknowledge that some forms of communications data could reveal private information about a person’s habits, preferences or lifestyle choices, such as websites visited. “Such data is more intrusive and therefore should attract greater safeguards.” they recommended.

The other four Home Office bills are largely as trailed. The extremism bill will include powers to “strengthen the role of Ofcom so that tough measures can be taken against channels that broadcast extremist content”. This is despite warnings from Sajid Javid, the business secretary, that the initial proposals threatened free speech.

The bill also includes the introduction of employment checks enabling companies to find out whether an individual is an extremist so they can be barred from working with children. This is alongside already announced proposals for banning orders, extremism disruption orders and closure orders to be used against premises that are used to support extremism.

The immigration bill will create a new enforcement agency to tackle the worst cases of exploitation as well creating an offence of illegal working and enabling wages to be seized as proceeds of crime. Ministers promise to consult on the introduction of a visa levy on businesses that recruit overseas labour to fund extra apprenticeships for British and EU workers.

The five bills mean that the home secretary, Theresa May, will be one of the busiest cabinet ministers in parliament. Her policing and criminal justice bill will implement her mental health reforms, end the use of police bail for months or even years without judicial check, and introduce sanctions on professionals including social workers who fail to report or take action on child abuse.

Ministers have been silent on the sentencing aspects of this bill but the Conservative manifesto promised the introduction of short, sharp custodial sentences for persistent offenders. The new justice secretary, Michael Gove, may be looking again at this proposal.

The psychoactive substances bill or legislation to introduce a blanket ban on legal highs is to be introduced this week. It will criminalise the trade in legal highs with prison sentences of up to seven years but will not make personal possession a criminal offence. The legislation will distinguish between everyday psychoactive substances such as alcohol, tobacco, caffeine and some medicinal products and new designer drugs that imitate more traditional illegal substances.
Bron: www.theguardian.com
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 28 mei 2015 @ 11:26:11 #251
407722 LeonardoFibonacci
0, 1, 1, 2, 3, 5, 8, 13, 21 ..
pi_153034355
quote:
PGP-bedenker verlaat VS wegens surveillancewedloop
https://www.security.nl/posting/429834/PGP-bedenker+verlaat+VS+wegens+surveillancewedloop

Philip Zimmermann, de bedenker van Pretty Good Privacy (PGP), heeft de Verenigde Staten verlaten en is naar Zwitserland verhuisd. Aanleiding voor de verhuizing is de surveillancewedloop die op dit moment in de VS plaatsvindt, zo meldt de Guardian. "Elke dystopische samenleving heeft buitensporige surveillance, maar nu zien wel zelfs dat democratieën zoals de VS en Engeland die kant op gaan", zo waarschuwt Zimmermann.

"We moeten dit terugdraaien. Van mensen die niet van misdrijven worden verdacht moet er geen informatie worden verzameld en in databases worden opgeslagen. We willen geen Noord-Korea worden." Volgens de PGP-bedenker is de Britse samenleving, waar hij dit weekend was, te accepterend als het om surveillance gaat. "Mensen hebben hier een gemakkelijke relatie met hun eigen regering en misschien dat ze daarom geen bezwaar maken. Toekomstige overheden zijn mogelijk niet zo aardig, en kunnen een surveillance-infrastructuur erven die ze kunnen gebruiken voor het creëren van een overheid die niet kan worden veranderd."

Zimmermann waarschuwt voor "point en click vervolgingen", met verkeerscamera's en gezichtsherkenning die kunnen herkennen wanneer journalisten met klokkenluiders lunchen, politici met maîtresses afspreken of burgers die achter het stuur kruipen met teveel alcohol op. De PGP-bedenker is op dit moment actief met zijn bedrijf Silent Circle, waarvan het hoofdkantoor ook al naar Zwitserland is verhuisd, mede vanwege de "robuuste privacywetgeving" daar. Later dit jaar zal Silent Circle de Blackphone 2 presenteren, een op privacygerichte telefoon waarmee versleuteld kan worden gecommuniceerd.
  donderdag 11 juni 2015 @ 18:38:33 #252
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_153446323
quote:
UK intelligence agencies should keep mass surveillance powers, report says | World news | The Guardian

Report by official reviewer of counter-terrorism laws also says ministers should be stripped of power to authorise surveillance warrants

UK intelligence agencies should be allowed to retain controversial intrusive powers to gather bulk communications data but ministers should be stripped of their powers to authorise surveillance warrants, according to a major report on British data law.

The 373-page report published on Thursday – A Question of Trust, by David Anderson QC – calls for government to adopt “a clean-slate” approach in legislating later this year on surveillance and interception by GCHQ and other intelligence agencies.

However, Downing Street hinted that David Cameron was unlikely to accept one of his key recommendations: shifting the power to agree to warrants from home and foreign secretaries to a proposed new judicial commissioner.

The prime minister’s spokeswoman said the authorities needed to be able “to respond quickly and effectively to threats of national security or serious crime”, which appears to suggest ministers are better positioned to do this than judges.

Related: A question of trust? Anderson report lays out tests for surveillance laws

Anderson’s report, commissioned by Cameron last year, comes in response to revelations two years ago by the US whistleblower Edward Snowden about the scale of government surveillance.

Anderson, introducing his report, said: “Modern communications networks can be used by the unscrupulous for purposes ranging from cyber-attack, terrorism and espionage to fraud, kidnap and child sexual exploitation. A successful response to these threats depends on entrusting public bodies with the powers they need to identify and follow suspects in a borderless online world.

“But trust requires verification. Each intrusive power must be shown to be necessary, clearly spelled out in law, limited in accordance with human rights standards and subject to demanding and visible safeguards.”

Related: House rejects NSA collection of phone records with vote to reform spy agency

GCHQ and other intelligence agencies are likely to be satisfied with the recommendations. GCHQ successfully fought to retain its bulk collection powers and Anderson agreed. In contrast with the UK, the US Congress last month placed curbs on bulk collection of phone records by the intelligence agencies.

Privacy campaigners also largely welcomed Anderson’s recommendation to scrap existing surveillance legislation – the Regulation of Investigatory Powers Act (Ripa), the proposed new judicial commissioner and other proposals.

Anderson said that the existing legislation had reached the end of its useful life. “Ripa, obscure since its inception, has been patched up so many times as to make it incomprehensible to all but a tiny band of initiates. A multitude of alternative powers, some of them without statutory safeguards, confuse the picture further. This state of affairs is undemocratic, unnecessary and – in the long run – intolerable.”

The new judicial body, the Independent Surveillance and Intelligence Commission, would be responsible for all surveillance warrants, according to the report.

There would be some new curbs on warrants, including “a tighter definition of the purposes for which it is sought, defined by operations or mission purposes”.

Anderson also proposed safeguards against snooping on journalists, lawyers and other groups. The report says that when communication data is sought from people handling privileged or confidential information, including doctors, lawyers, journalists, MPs or ministers, “special consideration and arrangements should be in place”.

As well as approving individual warrants, the judicial commissioner would also be responsible for a new bulk data collection warrant in limited circumstances. Anderson gives an example of bulk data collection under the heading of “attack planning by ISIL [Islamic State] in Iraq/Syria against the UK”. Anderson also makes clear that this would not affect existing programmes of communications data surveillance.

But the removal of the power to approve warrants from ministers may never fly. Ministers will argue that democratically elected politicians are better placed to make these decisions rather than judges who do not have access to up-to-date information on terrorist threats.

The home secretary, Theresa May, speaking in the Commons after the report was published, said she would publish a draft surveillance bill in the autumn and legislate before the end of 2016. She promised there would be a proper overhaul of investigatory powers legislation and not “simply rebranding existing law”.

She described the threats facing the UK as considerable. “In the face of such threats, we have a duty to ensure that the agencies whose job it is to keep us safe have the powers they need to do the job,” she said.

May was immediately questioned by David Davis, one of the leading Conservatives on civil liberties issues, who praised the report and the prospect of judicial control over warrants, saying that, with the exception of Zimbabwe, the UK has the world’s worst record in allowing politicians to authorise surveillance.

May said the government would consider the idea of transferring responsibility to judges. “I am not in a position to say whether the government will do one thing or another,” she said.

Related: No 10 hints it will reject key proposal in David Anderson's surveillance report - Politics live

The intelligence agencies, including GCHQ, have been expressing concern about the increasing use of encryption to protect privacy, with internet providers beginning to offer this as standard.

Anderson, in his report, does not propose legislating on the issue. He said few propose a master key to all communications be held by the state. “Far preferable, on any view, is a law-based system in which encryption keys are handed over [by service providers or by the users themselves] only after properly authorised requests.”

Anderson said he could not condone Snowden’s disclosure. National security had suffered, he added, but there had also been benefits from the disclosure of some of the intelligence agency capabilities.

“The opening up of the debate has, however, come at a cost to national security: the effect of the Snowden documents on the behaviour of some service providers and terrorists alike has, for the authorities, accentuated the problem of reduced coverage and rendered more acute the need for a remedy,” the report says.

Jo Glanville, director of English PEN, welcomed the report. “While we would have liked to see the recommendations go even further in relation to GCHQ’s bulk collection of data, we welcome the recommendations for judicial authorisation and the call for a rigorous assessment before any further powers are given to the intelligence services in a revived snooper’s charter.”

Eric King, the deputy director of Privacy International, said: “This is the final nail in the coffin for Ripa … David Anderson’s strong recommendations for improvement are the first step towards reform, and now the burden is on the government, parliament and civil society to ensure that reforms go further and ensure that once and for all, our police and intelligence agencies are brought under the rule of law.”
Bron: www.theguardian.com
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 12 juni 2015 @ 15:09:47 #253
441090 crystal_meth
has new fav drug
pi_153471688
Onderzoek naar afluisteren Merkel stopgezet. Voorspelbaar...
quote:
Ermittlungen in der Merkel-Handy-Affäre eingestellt

Nach dem Verdacht auf NSA-Spionage: Die Bundesanwaltschaft hat die Ermittlungen wegen des mutmaßlichen US-Lauschangriffs auf das Mobiltelefon von Bundeskanzlerin Angela Merkel (CDU) eingestellt. Der Vorwurf lasse sich nicht gerichtsfest beweisen, teilte die Behörde am Freitag in Karlsruhe zur Begründung mit.
http://www.welt.de/politi(...)ere-eingestellt.html
are we infinite or am I alone
  dinsdag 16 juni 2015 @ 13:07:37 #254
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_153580388
Fittie! :9 :

quote:
quote:
Accused of publishing government propaganda against NSA whistleblower Edward Snowden, the Sunday Times is using copyright to hit back at its strongest critic.

In a paywalled feature published Sunday, titled “British spies betrayed to Russians and Chinese,” three authors, citing anonymous government sources, claim that “Russia and China have cracked the top-secret cache of files stolen by the fugitive U.S. whistleblower Edward Snowden.” In turn, the Times’s sources say, the U.K. had to relocate special agents around the world who were allegedly in harm’s way.

In an extremely critical takedown post, The Intercept’s Glenn Greenwald, the journalist Snowden first met with after fleeing the U.S., denied many of the details in the Times story. In particular, the Times claimed that Greenwald’s partner, David Miranda, met with Snowden in Moscow to receive more documents—a claim that’s since been deleted from the Times article.

Greenwald’s post also includes a screengrab of the Times’s layout—and that’s what the Times used to pounce on their high-profile critic. In a legal notice sent Monday, the paper cites the Digital Millennium Copyright Act (DMCA) and claims the Intercept is violating the Times’s copyright of “the typographical arrangement of the front page.”

“If Greenwald were selling a book of Great Covers of the Sunday Times, they'd have a case,” Parker Higgins, an activist at the Electronic Frontier Foundation who specializes in intellectual property, told the Daily Dot. “But this is grasping at straws and attempting to use the strictest takedown law available—copyright—just to silence criticism.”

There’s a long history of people accused of using online copyright law to censor critics; a recent smattering includes California mayors, lawyers, Drake’s label, and Ecuador. The Times didn’t respond to the Daily Dot’s question of just how frequently it issues those claims to other news outlets.

It’s not likely to have much effect on the Intercept’s story, though. When the Daily Dot asked Greenwald if he would abide the DMCA takedown, he simply responded “No.”
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 19 juni 2015 @ 15:40:13 #255
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_153668452
quote:
quote:
This Google legal disclosure is 306 pages long. Holy cow.
Fri, Jun 19 2015 00:56:33
quote:
Ten pages into this legal document and I'm convinced that I'm never going to return to my home country. What the actual fuck.
Fri, Jun 19 2015 01:04:49
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 22 juni 2015 @ 20:01:37 #256
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_153754645
quote:
GCHQ's surveillance of two human rights groups ruled illegal by tribunal | UK news | The Guardian

Initial interceptions lawful but retention and examination of communications illegal, rules IPT in case brought following Edward Snowden revelations

GCHQ’s covert surveillance of two international human rights groups was illegal, the judicial tribunal responsible for handling complaints against the intelligence services has ruled.

The UK government monitoring agency retained emails for longer than it should have and violated its own internal procedures, according to a judgment by the investigatory powers tribunal (IPT). But it ruled that the initial interception was lawful in both cases.

The IPT upheld complaints by the Egyptian Initiative for Personal Rights and the South African non-profit Legal Resources Centre that their communications had been illegally retained and examined. The tribunal made “no determination” on claims brought other NGOs – including Amnesty International, Liberty and Privacy International – implying that either their emails and phone calls were not intercepted or that they were intercepted but by legal means.

The IPT ruling said: “[We are] concerned that steps should be taken to ensure that neither of the breaches of procedure referred to in this determination occurs again. For the avoidance of doubt, the tribunal makes it clear that it will be making a closed report to the prime minister.”

It is the first time that a court has revealed that British intelligence agencies have spied on foreign human rights groups.

Related: IPT ruling on GCHQ matters more for what it permits than what it rebukes

The case against the monitoring agency follows revelations by the US whistleblower Edward Snowden. It was brought by Privacy International, Liberty, Amnesty International, the American Civil Liberties Union and a number of other international human rights groups.

Welcoming the ruling, Eric King, deputy director of Privacy International, said: “If spying on human rights NGOs isn’t off limits for GCHQ, then what is? Clearly our spy agencies have lost their way. For too long they’ve been trusted with too much power, and too few rules for them to protect against abuse. How many more problems with GCHQ’s secret procedures have to be revealed for them to be brought under control?”

He added: “Trying to pass off such failings as technical, or significant changes in law as mere clarifications, has become a tiring defence for those who know the jig is up. The courts are begrudgingly helping to ensure that the sun is slowly setting on GCHQ’s wild west ways. Now we need parliament to step in to fix what should have been fixed a long time ago.”

In relation to the Egyptian Initiative for Personal Rights, the IPT found that “email communications ... were lawfully and proportionately intercepted and accessed ... However, the time limit for retention permitted under the internal policies of GCHQ, the intercepting agency, was overlooked in regard to the product of that interception, such that it was retained for materially longer than permitted under those policies.”

In respect of the Legal Resources Centre, the IPT said: “Communications from an [associated] email address ... were intercepted and selected for examination ... The tribunal is satisfied that the interception was lawful and proportionate and that the selection for examination was proportionate, but that the procedure laid down by GCHQ’s internal policies for selection of the communications for examination was in error not followed in this case.”

Janet Love, national director of the Legal Resources Centre, said it was “deeply concerned to learn that communications of our organisation have been subject to unlawful interception by GCHQ. As a public interest law firm, our communications are self-evidently confidential, and we consider this to be a serious breach of the rights of our organisation and the individuals concerned.

“We can no longer accept the conduct of the intelligence services acting under such a pernicious veil of secrecy, and we will be taking immediate action to try to establish more information. We urge the South African and British governments to cooperate with us in this regard. We are particularly grateful for Liberty’s efforts in spearheading this litigation and making it possible for this information to be brought to light.”

James Welch, legal director for Liberty, said: “Last year it was revealed that GCHQ were eavesdropping on sacrosanct lawyer-client conversations. Now we learn they’ve been spying on human rights groups. What kind of signal are British authorities sending to despotic regimes and those who risk their lives to challenge them all over the world? Who is being casual with human life now?”

Rachel Logan, UK legal programme director for Amnesty International, said: “[This] raises the wider question as to why the UK intelligence services were intercepting the communications of these two highly regarded human rights NGOs at all.

“Knowing that your mail has been read, or your calls have been listened to can stifle people into silence, leading to self-censorship. It is a clear interference with basic rights such as free expression and right to privacy.

“Today’s ruling in relation to Amnesty tells us nothing. We still don’t know if we’ve been spied on at all, if we have been the subject of any targeted spying, if the tribunal thought any spying – if it did happen – was necessary and proportionate, or even if they had an entirely different reason for telling us nothing.”

The legal challenge was the first of many GCHQ-related claims to be examined in detail by the IPT, which hears complaints against British intelligence agencies and government bodies that carry out surveillance under the Regulation of Investigatory Powers Act (Ripa).

The civil liberties organisations are concerned that their private communications may have been monitored under GCHQ’s electronic surveillance programme, Tempora, the existence of which was revealed by Snowden. They also complain that information obtained through the US National Security Agency’s Prism and Upstream programmes may have been shared with British intelligence services, sidestepping protections provided by the UK legal system.

During the hearing last summer, Matthew Ryder QC alleged that the intelligence services are constructing “vast databases” out of accumulated interceptions of emails.

“If two out of 10 organisations who applied to the IPT found their emails were being illegally monitored, human rights fear, how many others are being targeted? Unless people or organisations submit claims to the IPT, it is argued, how will they know whether their communications are being unlawfully monitored.”

A government spokesperson said: “We welcome the IPT’s confirmation that any interception by GCHQ in these cases was undertaken lawfully and proportionately, and that where breaches of policies occurred they were not sufficiently serious to warrant any compensation to be paid to the bodies involved.

“GCHQ takes procedure very seriously. It is working to rectify the technical errors identified by this case and constantly reviews its processes to identify and make improvements.”
Bron: www.theguardian.com
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 22 juni 2015 @ 20:14:35 #257
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_153755045
quote:
Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research

The spy unit responsible for some of the United Kingdom’s most controversial tactics of surveillance, online propaganda and deceit focuses extensively on traditional law enforcement and domestic activities — even though officials typically justify its activities by emphasizing foreign intelligence and counterterrorism operations.

Documents published today by The Intercept demonstrate how the Joint Threat Research Intelligence Group (JTRIG), a unit of the signals intelligence agency Government Communications Headquarters (GCHQ), is involved in efforts against political groups it considers “extremist,” Islamist activity in schools, the drug trade, online fraud and financial scams.

Though its existence was secret until last year, JTRIG quickly developed a distinctive profile in the public understanding, after documents from NSA whistleblower Edward Snowden revealed that the unit had engaged in “dirty tricks” like deploying sexual “honey traps” designed to discredit targets, launching denial-of-service attacks to shut down Internet chat rooms, pushing veiled propaganda onto social networks and generally warping discourse online.

Early official claims attempted to create the impression that JTRIG’s activities focused on international targets in places like Iran, Afghanistan and Argentina. The closest the group seemed to get to home was in its targeting of transnational “hacktivist” group Anonymous.

While some of the unit’s activities are focused on the claimed areas, JTRIG also appears to be intimately involved in traditional law enforcement areas and U.K.-specific activity, as previously unpublished documents demonstrate. An August 2009 JTRIG memo entitled “Operational Highlights” boasts of “GCHQ’s first serious crime effects operation” to shut down internet forums and to remove websites identifying police informants and members of a witness protection program. Another was “used to facilitate and execute online fraud.” The document also describes GCHQ advice provided “to assist the UK negotiating team on climate change.”

Particularly revealing is a fascinating 42-page document from 2011 detailing JTRIG’s activities. It provides the most comprehensive and sweeping insight to date into the scope of this unit’s extreme methods. Entitled “Behavioral Science Support for JTRIG’s Effects and Online HUMINT [Human Intelligence] Operations,” it describes the types of targets on which the unit focuses, the psychological and behavioral research it commissions and exploits, and its future organizational aspirations. It is authored by a psychologist, Mandeep K. Dhami.

Among other things, the document lays out the tactics the agency uses to manipulate public opinion, its scientific and psychological research into how human thinking and behavior can be influenced, and the broad range of targets that are traditionally the province of law enforcement rather than intelligence agencies.

JTRIG’s domestic and law enforcement operations are made clear. The report states that the controversial unit “currently collaborates with other agencies” including the Metropolitan police, Security Service (MI5), Serious Organised Crime Agency (SOCA), Border Agency, Revenue and Customs (HMRC), and National Public Order and Intelligence Unit (NPOIU). The document highlights that key JTRIG objectives include “providing intelligence for judicial outcomes”; monitoring “domestic extremist groups such as the English Defence League by conducting online HUMINT”; “denying, deterring or dissuading” criminals and “hacktivists”; and “deterring, disrupting or degrading online consumerism of stolen data or child porn.”

It touts the fact that the unit “may cover all areas of the globe.” Specifically, “operations are currently targeted at” numerous countries and regions including Argentina, Eastern Europe and the U.K.

JTRIG’s domestic operations fit into a larger pattern of U.K.-focused and traditional law enforcement activities within GCHQ.

Many GCHQ documents describing the “missions” of the “customers” for which it works make clear that the agency has a wide mandate far beyond national security, including providing help on intelligence to the Bank of England, to the Department for Children, Schools and Families on reporting of “radicalization,” to various departments on agriculture and whaling activities, to government financial divisions to enable good investment decisions, to police agencies to track suspected “boiler room fraud,” and to law enforcement agencies to improve “civil and family justice.”

Previous reporting on the spy agency established its focus on what it regards as political radicalism. Beyond JTRIG’s targeting of Anonymous, other parts of GCHQ targeted political activists deemed to be “radical,” even monitoring the visits of people to the WikiLeaks website. GCHQ also stated in one internal memo that it studied and hacked popular software programs to “enable police operations” and gave two examples of cracking decryption software on behalf of the National Technical Assistance Centre, one “a high profile police case” and the other a child abuse investigation.

Bron: firstlook.org
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 22 juni 2015 @ 20:19:16 #258
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_153755200
quote:
Popular Security Software Came Under Relentless NSA and GCHQ Attacks

The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden.

The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than 270,000 corporate clients, and says it protects more than 400 million people with its products.

British spies aimed to thwart Kaspersky software in part through a technique known as software reverse engineering, or SRE, according to a top-secret warrant renewal request. The NSA has also studied Kaspersky Lab’s software for weaknesses, obtaining sensitive customer information by monitoring communications between the software and Kaspersky servers, according to a draft top-secret report. The U.S. spy agency also appears to have examined emails inbound to security software companies flagging new viruses and vulnerabilities.

The efforts to compromise security software were of particular importance because such software is relied upon to defend against an array of digital threats and is typically more trusted by the operating system than other applications, running with elevated privileges that allow more vectors for surveillance and attack. Spy agencies seem to be engaged in a digital game of cat and mouse with anti-virus software companies; the U.S. and U.K. have aggressively probed for weaknesses in software deployed by the companies, which have themselves exposed sophisticated state-sponsored malware.

Anti-virus software is an ideal target for a would-be attacker, according to Joxean Koret, a researcher with Coseinc, a Singapore-based information security consultancy. “If you write an exploit for an anti-virus product you’re likely going to get the highest privileges (root, system or even kernel) with just one shot,” Koret told The Intercept in an email. “Anti-virus products, with only a few exceptions, are years behind security-conscious client-side applications like browsers or document readers. It means that Acrobat Reader, Microsoft Word or Google Chrome are harder to exploit than 90 percent of the anti-virus products out there.”

(Disclosure: One of the authors of this report, Morgan Marquis-Boire, spoke at a Kaspersky Lab event in Puerto Rico in 2013 and at another in London in 2014. He was not paid for either event, but the cost of his travel and accommodation were covered by the company.)

Bron: firstlook.org
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 24 juni 2015 @ 12:58:05 #259
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_153801745
quote:
Frankrijk roept ambassadeur VS op het matje om spionage



Frankrijk heeft de ambassadeur van de Verenigde Staten ontboden nadat gisteren bekend werd dat de NSA drie Franse presidenten heeft afgeluisterd. Dat melden Reuters en AFP op basis van Franse diplomatieke bronnen. President Hollande noemde de spionagepraktijken vandaag in een reactie “onacceptabel”.

Hollande had vanochtend zijn kabinet bijeengeroepen voor een spoedvergadering nadat documenten naar buiten kwamen op WikiLeaks waarin stond dat hijzelf en zijn voorgangers Sarkozy en Chirac tussen 2006 en 2012 door de Amerikaanse inlichtingendienst waren afgeluisterd. “Frankrijk tolereert geen handelingen die de veiligheid van ons land of van de beveiliging van onze belangen in gevaar brengt”, zei Hollande na afloop.

De president maakte tevens bekend dat Amerikaanse spionage van Franse belangen al wel eerder bekend waren bij de Franse autoriteiten. Uit de documenten zou blijken dat het afluisteren een maand na Hollande’s aantreden is gestopt. Volgens de Franse krant Libération - die het nieuws gisteren als eerste bracht - staan er geen staatsgeheimen in de gelekte documenten.

De VS kwamen gisteren naar buiten met een verklaring dat ze “zich niet richten en ook niet zullen richten op de communicatie van president Hollande”.

Het is niet voor het eerst dat bekend wordt dat de VS bondgenoten afluistert of heeft afgeluisterd. Eerder kwam naar buiten dat het mobieltje van bondskanselier Merkel werd afgetapt. In totaal zouden 122 regeringsleiders over de hele wereld zijn afgeluisterd.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 25 juni 2015 @ 08:14:47 #260
407722 LeonardoFibonacci
0, 1, 1, 2, 3, 5, 8, 13, 21 ..
pi_153823569
quote:
7s.gif Op woensdag 24 juni 2015 12:58 schreef Papierversnipperaar het volgende:

[..]

Wat een klont boter op zijn hoofd. Geen maatregelen nemen om al zijn burgers te beschermen die hetzelfde lot ondergaan, maar huilen als hem hetzelfde overkomt.
  donderdag 25 juni 2015 @ 09:37:32 #261
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_153824614
quote:
Assange: Wikileaks heeft meer documenten over NSA-spionage



Klokkenluidersite Wikileaks heeft documenten in bezit die van groter politiek belang zijn dan de onthullingen, gisteren, over spionage van Franse presidenten door de Amerikaanse inlichtingendienst NSA. De economische en politieke belangen van Frankrijk alsook zijn soevereiniteit staan op het spel, zo waarschuwde Wikileaks-oprichter Julian Assange vanavond in een interview met de Franse tv-zender TF1.

Assange roept de Franse regering op nu in te grijpen. De “tijd is gekomen” voor Frankrijk om een parlementaire enquête in te stellen om de spionagepraktijken te onderzoeken en de schuldigen te vervolgen, zei hij. Uit de documenten zou onder meer blijken dat er sprake is geweest van economische spionage.

Volgens de documenten die via Mediapart en Libération werden gepubliceerd, werden Jacques Chirac (1995-2007), Nicolas Sarkozy (2007-2012) en François Hollande (2012-heden) gedurende zes jaar bespioneerd. Dit gebeurde tussen 2006 en mei 2012. Voor zover bekend stopte het afluisteren na de eerste maand dat Hollande als president was ingezworen. Welke informatie de NSA precies heeft verkregen is onduidelijk, maar het betrof in ieder geval geen staatsgeheimen.

Assange, die sinds 2012 schuilt in de Ecuadoraanse ambassade in Londen om uitlevering aan Zweden te vermijden, gaf zijn interview met TF1 vanuit de ambassade. Afgelopen vrijdag publiceerde Wikileaks al een reeks van tienduizenden vertrouwelijke Saoedische documenten. Daaruit bleek onder meer dat Nederland tevergeefs op het hoogste niveau heeft geprobeerd de immuniteit te laten opheffen van een Saoedische ex-ambassadeur die werd verdacht van mensenhandel.
Bron: NRC
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 30 juni 2015 @ 21:17:22 #262
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_153962074
quote:
quote:
De Amerikaanse inlichtingendienst NSA mag tijdelijk weer telefoongesprekken afluisteren. Het programma, onthuld door klokkenluider Edward Snowden, lag sinds 1 juni stil. Toen verliep de wet die het afluisteren mogelijk maakte. Een speciale spionagerechtbank heeft nu besloten dat de dienst zes maanden lang weer gegevens mag verzamelen.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 2 juli 2015 @ 11:38:59 #263
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_154000404
quote:
GCHQ spied on Amnesty International, tribunal tells group in email | UK news | The Guardian

Human rights group denounces revelation as outrageous as after Investigatory Powers Tribunal says its communications have been illegally retained

The government’s electronic eavesdropping agency GCHQ spied illegally on Amnesty International, according to the tribunal responsible for handling complaints against the intelligence services.

Confirmation that surveillance took place emerged late on Wednesday, when the human rights group revealed that the Investigatory Powers Tribunal (IPT) sent it an email correcting an earlier judgment.

The extraordinary revision of a key detail in the ruling given on 22 June may alarm many supporters of Amnesty, who will want to know why it has been targeted.

In the original judgment, the IPT said that communications by the Egyptian Initiative for Personal Rights and the South African non-profit Legal Resources Centre had been illegally retained and examined.

In the email sent on Wednesday, the tribunal made it clear that it was Amnesty and not the Egyptian organisation that had been spied on – as well as the Legal Resources Centre in South Africa.

The breach of surveillance powers, under the Regulation of Investigatory Powers Act, related to retaining databases for longer than was permitted. Amnesty had been one of the claimants in the case, but in the original judgment the IPT made “no determination” on the organisation’s complaint – implying that either their emails and phone calls were not intercepted or that they were intercepted but by legal means.

Responding to the revelation, Salil Shetty, Amnesty International’s secretary general, said: “It’s outrageous that what has been often presented as being the domain of despotic rulers has been done on British soil, by the British government.

“How can we be expected to carry out our crucial work around the world if human rights defenders and victims of abuse can now credibly believe their confidential correspondence with us is likely to end up in the hands of governments?

“After 18 months of litigation and all the denials and subterfuge that entailed, we now have confirmation that we were in fact subjected to UK government mass surveillance. The revelation that the UK government has been spying on Amnesty International highlights the gross inadequacies in the UK’s surveillance legislation.

“If they hadn’t stored our communications for longer than they were allowed to, we would never even have known. What’s worse, this would have been considered perfectly lawful.”

The IPT email made no mention of when or why Amnesty International was spied on, or what was done with the information obtained. The organisation is calling for an independent inquiry into how and why a UK intelligence agency has been spying on human rights organisations.

Eric King, deputy director of Privacy International, which also took a similar case to the IPT, said: “Our system of oversight and remedy has fundamentally failed. The communications of one of the world’s leading human rights organisations – Amnesty International – were targeted by British spies, unlawfully, and our commissioners and courts failed to admit it, depriving individuals around the world of the validation and condemnation of, and redress for, unlawful government practices that is so desperately needed.

“Without Edward Snowden, without an 18-month legal battle, without an honest reckoning by whichever upstanding individual spotted and admitted this grave error, the unlawful conduct of the British intelligence agencies would never have been exposed by the very court charged with exposing it.

“Today’s farcical developments places into sharp relief the obvious problems with secret tribunals where only one side gets to see, and challenge, the evidence. Five experienced judges inspected the secret evidence, seemingly didn’t understand it, and wrote a judgement that turned out to be untrue. We need to know why and how this happened.

“Any confidence that our current oversight could keep GCHQ in check has evaporated. Only radical reforms will ensure this never happens again.”
Bron: www.theguardian.com
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 3 juli 2015 @ 17:33:21 #264
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_154035866
quote:
Duitse pers bespioneerd door Amerikaanse NSA | NU - Het laatste nieuws het eerst op NU.nl

Een journalist van het Duitse weekblad Der Spiegel is bespioneerd door de Amerikaanse NSA.

Dat heeft de Duitse veiligheidschef Günter Heiss gezegd tegen de parlementaire commissie die de activiteiten van de Amerikaanse veiligheidsdiensten in Duitsland onderzoekt, meldt Der Spiegel.

In 2011 waarschuwde de NSA Heiss dat een lid van zijn staf contacten onderhield met de journalist. Zij verdachten de plaatsvervanger van Heiss, Hans Josef Vorbeck, die later dat jaar werd overgeplaatst naar een andere functie.

Afluisteren

Der Spiegel was het eerste Duitse medium dat in 2013 berichtte over het afluisteren van de mobiele telefoon van bondskanselier Angela Merkel door de Amerikanen. Later werd bekend dat ook andere Duitse ministers werden afgeluisterd.

"Het voelt bitter dat de Amerikaanse geheime diensten journalisten in andere landen bespioneerden en hun bronnen verraadden aan de overheid", zei een Duitse journalist, die anoniem wenst te blijven, tegen CNN. "Dit is iets wat je kan verwachten in dictaturen zoals Rusland en China, maar niet in een democratie."

Der Spiegel heeft vrijdag aangifte gedaan wegens schending van de telecommunicatiegeheimhouding en vermoedens van spionageactiviteiten.

Bron: www.nu.nl
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 7 juli 2015 @ 22:00:27 #265
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_154154995
quote:
quote:
On Sunday evening, someone hijacked the Hacking Team account on Twitter and used it to announce that the company known for developing hacking tools was itself a victim of a devastating hack.

. Note: This story is a follow-up to the previous Hacking Team story. You should read both if you want to see things from the beginning. Also, a curated slideshow of contracts and other visuals is also available.

The hackers released a 400GB Torrent file with internal documents, source code, and email communications to the public at large. As researchers started to examine the leaked documents, the story developed and the public got its first real look into the inner workings of an exploit development firm.

Hacking Team is an Italian company that sells intrusion and surveillance tools to governments and law enforcement agencies. However, their business has earned them a black mark from privacy and human rights organizations, as the company has been accused of selling tools and services to nations known for violent oppression.

Reporters Without Borders has listed the company on its Enemies of the Internet index due largely to Hacking Teams' business practices and their primary surveillance tool Da Vinci.

Sunday evening, documents circulating online, and documents shared by @SynAckPwn with Salted Hash, have linked Hacking Team to Egypt, Lebanon, Ethiopia, and Sudan.

The link to Sudan is especially newsworthy as the company previously stated they've never done business with the nation. There is a UN arms embargo on the Sudan, which is covered by EU and UK law. If they were doing business with the Sudanese government, Hacking Team could be in hot water.

In 2014, a Citizen Lab report revealed evidence that Hacking Team's RCS (Remote Control System) was being used by the Sudanese government, something the Italian company flat-out denied.

However, on Sunday a contract with Sudan, valued at 480,000 Euro, and dated July 2, 2012, was published as part of the 400GB cache. In addition, a maintenance list named Sudan as a customer, but one that was "not officially supported." Interestingly, Russia has the same designation.



Along with Russia and Sudan, there were other customers exposed by the breach including:

Egypt, Ethiopia, Morocco, Nigeria, Chile, Colombia

Ecuador, Honduras, Mexico, Panama, United States

Azerbaijan, Kazakhstan, Malaysia, Mongolia, Singapore, South Korea

Thailand, Uzbekistan, Vietnam, Australia, Cyprus, Czech Republic

Germany, Hungary, Italy, Luxemburg, Poland, Spain

Switzerland, Bahrain, Oman, Saudi Arabia, UAE
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 9 juli 2015 @ 19:55:04 #266
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_154204365
quote:
quote:
Maar de Italianen werven ook klanten onder overheidsdiensten in Europa, de Verenigde Staten én in Nederland. Volgens journalist Brenno de Winter stond er voor afgelopen maandag een ontmoeting gepland met vertegenwoordigers van de Nationale Politie. Dat wil het bericht bevestigen noch ontkennen.
quote:
Hacking Team maakte woensdag bekend dat zijn software in handen kan zijn gevallen van criminelen en terroristen, omdat het bedrijf 'niet langer kan beheren wie er van de technologie gebruik kan maken'. Het spreekt van een 'extreem gevaarlijke situatie'.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 9 juli 2015 @ 19:55:52 #267
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_154204379
quote:
quote:
Late Sunday, hackers dumped online a massive trove of emails and other documents obtained from the systems of Italian surveillance firm Hacking Team. The company’s controversial technology is sold to governments around the world, enabling them to infect smartphones and computers with malware to covertly record conversations and steal data.

For years, Hacking Team has been the subject of scrutiny from journalists and activists due to its suspected sales to despotic regimes. But the company has successfully managed to hide most of its dealings behind a wall of secrecy – until now.

For the last few days, I have been reading through the hacked files, which give remarkable insight into Hacking Team, its blasé attitude toward human rights concerns, and the extent of its spyware sales to government agencies on every continent. Adding to the work of my colleagues to analyze the 400 gigabyte trove of hacked data, here’s a selection of the notable details I have found so far:
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 16 juli 2015 @ 09:53:44 #268
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_154381624
quote:
NSA document: Israeli special forces assassinated top Syrian military official | World news | The Guardian

US intelligence describes how Brig Gen Mahmoud Suleiman, close adviser to Bashar al-Assad, was shot dead near Tartus in 2008 by ‘Israeli naval commandos’

US intelligence describes how Brig Gen Mahmoud Suleiman, close adviser to Bashar al-Assad, was shot dead near Tartus in 2008 by ‘Israeli naval commandos’

Evidence has emerged from leaked US signals intelligence intercepts that Israeli special forces were responsible for assassinating a senior Syrian military official who was a close adviser to President Bashar al-Assad.

Brig Gen Mahmoud Suleiman was shot dead on a beach near the northern Syrian port of Tartus in August 2008. The Guardian reported at the time that the seaside murder was perpetrated by a sniper firing from a yacht moored offshore.

Israel has never commented publicly on suspicions that it was involved. But newly revealed secret US intelligence documents state as a fact that Israeli special forces killed the general.

Related: Middle East: Top Assad aide assassinated at Syrian resort

The revelation comes from an internal National Security Agency document provided by the former NSA contractor Edward Snowden, and cited by the Intercept, edited by Glenn Greenwald. It said that a top-secret entry in the NSA’s internal version of Wikipedia, called Intellipedia, described the assassination by “Israeli naval commandos” near Tartus as the “first known instance of Israel targeting a legitimate (Syrian) government official”.

The details of the assassination were included in a “manhunting timeline” within the NSA’s intelligence repository, the Intercept said on Wednesday.

The US embassy in Damascus reported at the time that Israel was the most likely suspect, according to a secret cable released by WikiLeaks in 2010. Iranian media went public with that accusation from the start.

Suleiman was described by Syrian officials as dealing with defence and security issues in Assad’s private office in Damascus. Israeli and Syrian opposition sources claimed he worked as “liaison” with the Iranian-backed Lebanese group Hezbollah, Israel’s sworn enemy.

But a secret US government document several months earlier gave his precise job description: “Syrian special presidential adviser for arms procurement and strategic weapons.” It was also suggested that he was responsible for security at a Syrian nuclear facility bombed by Israel 11 months earlier.

The Intercept said that, according to three former US intelligence officers with extensive experience in the Middle East, the document’s classification markings indicate that the NSA learned of the assassination through surveillance. The information in the document was labelled “SI,” which means the intelligence was collected by monitoring communications signals.

It added that knowledge within the NSA about surveillance of Israeli military units is especially sensitive because the NSA has Israeli intelligence officers working jointly with its officers at NSA headquarters in Fort Meade, Maryland.

Syria’s tightly controlled official media did not report on the killing at the time. But Syrian sources confirmed that Suleiman was shot by a silenced weapon in the head and neck on a beach at al-Rimal al-Zahabiyeh resort near Tartus, where, like other privileged Syrians, he owned a chalet.

In September 2007, Israeli planes attacked and destroyed a suspected nuclear site at al-Kibar on the Euphrates river, apparently one of the special projects Suleiman managed “which may have have been unknown to the broader Syrian military leadership”, as the US embassy put it.

The Israeli assassination of Suleiman came less than six months after a joint Mossad-CIA team assassinated a senior Hezbollah operative in the heart of Damascus. US and Israeli involvement in that attack, which targeted the Hezbollah military commander Imad Mughniyeh, was first reported in detail by the Washington Post. The CIA had long sought Mughniyeh for his role in terrorist attacks against Americans, including the 1983 Marine barracks bombing in Beirut, which killed 241 American servicemen.

Neither the NSA nor a spokesperson for the Israeli prime minister Binyamin Netanyahu responded to requests for comment, the Intercept said.
Bron: www.theguardian.com
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 23 juli 2015 @ 19:47:40 #269
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_154576316
quote:
Pakistan tried to tap international web traffic via underwater cables, report says | World news | The Guardian

ISI spy agency sought access to data from ‘landing sites’ passing through Karachi, privacy group claims, in push to acquire digital espionage capacity to rival US

Pakistani intelligence sought to tap worldwide internet traffic via underwater cables that would have given the country a digital espionage capacity to rival the US, according to a report by Privacy International.

The report says the country’s Inter-Services Intelligence (ISI) agency hired intermediary companies to acquire spying toolkits from western and Chinese firms for domestic surveillance.

It also claims the ISI sought access to tap data from three of the four “landing sites” that pass through the country’s port city of Karachi, effectively giving it access to internet traffic worldwide.

Pakistan was in talks with a European company in 2013 to acquire the technology, but it is not clear whether the deal went through – a fact the rights organisation said was troubling.

“These cables are going to route data through various countries and regions,” Matthew Rice, an advocacy officer for Privacy International, said.

“Some will go from Europe to Africa and all the way to south-east Asia. From my reading that’s an explicit attempt to look at what’s going on.”

Traffic from North America and regional rival India would also be routed via the cables, he said.

Related: Boundless Informant: the NSA's secret tool to track global surveillance data

The report, based on what it called previously unpublished confidential documents, said the data collection sought in the ISI’s proposal “would rival some of the world’s most powerful surveillance programmes” including those of the US and Britain.

A spokesman for Pakistan’s military said he was not able to comment on the issue at the present time.

Last month Pakistani rights campaigners and opposition lawmakers urged Islamabad to protect the privacy of its citizens after leaked top-secret documents appeared to show British intelligence had gained access to almost all of the country’s internet users.

Pakistan is in the process of debating its own cybercrime bill, which rights campaigners say threatens to curtail freedom of expression and privacy in its current form.

Rights groups also expressed concern over a provision that allows the government to share intelligence with foreign spy agencies, such as the American National Security Agency, and a plan to force service providers to retain telephone and email records for up to a year.
Bron: www.theguardian.com
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zaterdag 25 juli 2015 @ 09:04:22 #270
441090 crystal_meth
has new fav drug
pi_154618431
quote:
France approves 'Big Brother' surveillance powers despite UN concern

France’s highest authority on constitutional matters has approved a controversial bill that gives the state sweeping new powers to spy on citizens.

The constitutional council made only minor tweaks to the legislation, which human rights and privacy campaigners, as well as the United Nations, have described as paving the way for “very intrusive” surveillance and state-approved eavesdropping and computer-hacking.

In a report published on Friday, the 18-strong United Nations committee for human rights warned that the surveillance powers granted to French intelligence agencies were “excessively broad”.

It said the the bill “grants overly broad powers for very intrusive surveillance on the basis of vast and badly defined objectives” and called on France to “guarantee that any interference in private life must conform to principles of legality, proportionality and necessity”.

Other critics have labelled it the French “Big Brother” act, likening it to the tyrannical and sinister government surveillance in George Orwell’s novel 1984, calling it as a “historic decline in fundamental rights” and an attack on democracy.

Amnesty International warned that the French state was giving itself “extremely large and intrusive powers” with no judicial control.

The French president, François Hollande, had taken the unusual step of referring the legislation to the constitutional council to ensure it would not be challenged as unlawful.

The Socialist government justified the bill, which allows intelligence agencies to tap phones and emails, and hack computers without permission from a judge, in the wake of terrorist attacks in Paris in January, including at the satirical newspaper Charlie Hebdo and a Jewish shop, which left 17 people dead.

“From now on, France has a security framework against terrorism that respects liberties. It’s decisive progress,” the French prime minister, Manuel Valls, wrote in a tweet.

The bill was passed in June by an overwhelming number of French MPs, despite opposition from green and far-left parliamentarians and human rights activists.

It gives the country’s secret services the right to eavesdrop on the digital and mobile phone communications of anyone linked to a “terrorist” inquiry and install secret cameras and recording devices in private homes without requesting prior permission from a judge.

Intelligence agencies can also place “keylogger” devices on computers that record keystrokes in real time. Internet and phone service providers will be forced to install “black boxes” – complex algorithms – that will alert the authorities to suspicious behaviour online. The same companies will be forced to hand over information if asked.


[..]
http://www.theguardian.co(...)-surveillance-powers
big brother indeed...
are we infinite or am I alone
  vrijdag 31 juli 2015 @ 10:51:09 #271
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_154786519
quote:
German government accuses news website of treason over leaks | World news | The Guardian

For the first time in more than 50 years journalists are facing treason charges, which is being denounced as an attack on the freedom of the press


Germany has opened a treason investigation into a news website a broadcaster said had reported on plans to increase state surveillance of online communications.

Related: Germany fights Facebook over real names policy

German media said it was the first time in more than 50 years journalists had faced treason charges, and some denounced the move as an attack on the freedom of the press.

“The federal prosecutor has started an investigation on suspicion of treason into the articles ... published on the internet blog Netzpolitik.org,” a spokeswoman for the prosecutor’s office said.

She added the move followed a criminal complaint by Germany’s domestic intelligence agency, the Office for the Protection of the Constitution (BfV), over articles about the BfV that appeared on the website on 25 February and 15 April. It said the articles had been based on leaked documents.

The public broadcaster ARD reported Netzpolitik.org had published an article on how the BfV was seeking extra funding to increase its online surveillance, and another about plans to set up a special unit to monitor social media, both based on leaked confidential documents.

The website specialises in internet politics, data protection, freedom of information and digital rights issues.

“This is an attack on the freedom of the press,” Netzpolitik.org journalist Andre Meister, targeted by the investigation along with editor-in-chief Markus Beckedahl, said in a statement. “We’re not going to be intimidated by this.”

Related: Germans greet influx of refugees with free food and firebombings

Michael Konken, head of the German press association, echoed the sentiment and called the probe “an unacceptable attempt to muzzle two critical journalists”.

In 1962 the defence minister, Franz Josef Strauss, was forced to resign after treason charges were brought against the news weekly Der Spiegel for a cover story alleging West Germany’s armed forces were unprepared to defend it against the communist threat in the cold war.

Beckedahl told the TV network N24: “I’m torn between feeling like this is an accolade and the thought that it could end up leading to jail.”

Bron: www.theguardian.com
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 4 augustus 2015 @ 22:27:27 #272
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_154910269
quote:
Duitse minister van Justitie ontslaat hoofd Federaal Openbaar Ministerie



De Duitse minister van Justitie Heiko Maas (SPD) heeft het hoofd van het Federaal Openbaar Ministerie Harald Range (67) ontslagen in een hoog oplopende politieke affaire over persvrijheid.

Range (67) raakte in opspraak omdat hij twee journalisten de nieuwssite Netzpolitik.org beschuldigd heeft van landverraad. De site verspreidde eerder dit jaar op basis van interne documenten van geheime diensten informatie over hoe het internet in toenemende mate zou worden gemonitord door de Binnenlandse Veiligheidsdienst. Eerder had ook de Süddeutsche Zeitung hierover bericht, in samenwerking met de publieke zenders NDR en WDR. Netzpolitik.org publiceerde echter ook de onderliggende stukken van de geheime dienst.

De veiligheidsdienst deed bij Range aangifte van landverraad en van het openbaar maken van staatsgeheimen. Op dat delict staat ten minste een jaar celstraf, maar in het ergste geval levenslang. Volgens minister Maas vallen de documenten echter niet onder de noemer ‘staatsgeheim’ en is de publicatie afgedekt door de persvrijheid die in de grondwet van de Bondsrepubliek is vastgelegd. Hij werd hierin gisteren bijgevallen door de minister van Binnenlandse Zaken en door bondskanselier Angela Merkel (CDU).

Range werd overladen met kritiek van parlementariërs van de sociaaldemocratische regeringspartij SPD, waartoe ook Maas behoort. De linkse oppositiepartij Die Linke eiste zijn aftreden. Verschillende parlementariërs van regeringspartij CDU/CSU daarentegen spraken hun steun uit voor Range en het handelen van het OM.

Range koos vanochtend voor een frontale aanval op Maas. Hij verweet de minister van Justitie politieke invloed uit te oefenen en de onafhankelijkheid van de rechtspraak in gevaar te brengen. De opvolger van Range, die sowieso binnen enkele maanden met pensioen zou gaan, is de Beierse procureur-generaal Justitie Peter Frank.

Met het vertrek van Range is de affaire waarschijnlijk nog niet ten einde. De Berlijnse politicoloog Hajo Funke zei in een reactie op de actualiteitenzender Phoenix dat er nog meer politieke verwikkelingen te verwachten zijn.

Bron: NRC
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 17 augustus 2015 @ 15:58:13 #273
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_155295291
quote:
AT&T's 'extraordinary, decades-long' relationship with NSA – report | US news | The Guardian

New York Times and ProPublica cite newly released NSA documents
Telecoms giant assisted with 'wiretapping United Nations headquarters'


The telecoms giant AT&T has had an “extraordinary, decades-long” relationship with the National Security Agency, it was reported on Saturday.

Citing newly disclosed NSA documents dating from 2003 to 2013, the New York Times said in a story published with ProPublica that AT&T was described as “highly collaborative” with an “extreme willingness to help” with government internet surveillance.

In June 2013, the former NSA contractor Edward Snowden leaked thousands of documents to media outlets including the Guardian. The following April, the Guardian and the Washington Post were awarded a Pulitzer prize for reporting on the story.

The new documents show that AT&T gave the NSA access to “billions of emails as they have flowed across its domestic networks”, the Times and ProPublica said. The reports also said AT&T provided “technical assistance” in “wiretapping all internet communications at the United Nations headquarters” in New York City.

The documents also show that the NSA’s budget for its relationship with AT&T was twice as large as that of the next-largest such programme, and that the company placed surveillance equipment in 17 of its US internet hubs.

Related: NSA collected Americans' email records in bulk for two years under Obama

The Times said the new documents did not name AT&T, but said analysis by its reporters and ProPublica revealed “a constellation of evidence” that pointed to the company.

The Times also pointed to the publication by the Guardian in June 2013 of a draft NSA inspector general report on email and internet data collection, under the codename Stellar Wind, which did not name AT&T or MCI, a company purchased by Verizon. The Times said the report “describes their market share in numbers that correspond to those two businesses, according to Federal Communications Commission reports”.

The Times quoted an AT&T spokesman, Brad Burns, as saying: “We do not voluntarily provide information to any investigating authorities other than if a person’s life is in danger and time is of the essence.”
Bron: www.theguardian.com
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
pi_155295515
quote:
7s.gif Op maandag 17 augustus 2015 15:58 schreef Papierversnipperaar het volgende:

AT&T's 'extraordinary, decades-long' relationship with NSA – report | US news | The Guardian

The telecoms giant AT&T has had an “extraordinary, decades-long” relationship with the National Security Agency, it was reported on Saturday.

Ik wist wel dat ze dik waren met de CIA, en dat de Chileens belangen van AT&T een belangrijke reden waarom om de democratisch verkozen Allende te laten vermoorden samen met nog een paar duizend linksen en een wrede militaire dictatuur te installeren.
Wees gehoorzaam. Alleen samen krijgen we de vrijheid eronder.
pi_155365882
Liever de Amerikanen dan de Russen als je dat begrijpt.
  zondag 23 augustus 2015 @ 15:39:57 #276
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_155465904
quote:
quote:
Nederland dreigt uit de bocht te vliegen met het massaal bespioneren van zijn burgers. Slecht plan.
Door: Menso Heus, 'technology officer' en expert internetveiligheid bij Free Press Unlimited
quote:
Met toestemming van de minister mogen de diensten voortaan al onze communicatie bespieden en analyseren: telefoonverkeer, e-mail, websites die we bezoeken, enzovoort. Dit alles, zonder dat we ook maar ergens van worden verdacht. De gegevens worden tot wel drie jaar bewaard en kunnen worden uitgewisseld met buitenlandse geheime diensten.

De wetgever vermijdt het woord angstvallig, maar het gaat hier klip en klaar om 'massa surveillance' van het type zoals Edward Snowden dat onthulde. In plaats van ons hiertegen te beschermen, wil de Nederlandse overheid er nu zelf gebruik van kunnen maken.

Het ongericht aftappen van de communicatie van onschuldige en onverdachte burgers is echter in strijd met de Grondwet, het Europees Verdrag voor de Rechten van de Mens, het Internationaal Verdrag inzake Burgerrechten en Politieke Rechten en jurisprudentie van het Europees Hof voor de Rechten van de Mens. Ook staat het haaks op de Universele Verklaring van de Rechten van de Mens van de VN.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
pi_155470638
quote:
Is iemand hier verrast? Zo ja, denk er eens wat dieper over na. Hoe zouden ze kunnen aftappen zonder de hulp van die bedrijven? ;)
Sterker nog, neem er maar vergif op in dat Nederlandse bedrijven ook helpen bij het aftappen op duizendeneen manieren, dat bedrijven zoals Microsoft achterdeurjtes inbouwen voor diensten zoals de NSA etc.
Je wil niet de overheid als vijand krijgen, bedrijven werken dus maar mee.
ING en ABN investeerden honderden miljoenen euro in DAPL.
#NoDAPL
pi_155470728
quote:
7s.gif Op zondag 23 augustus 2015 15:39 schreef Papierversnipperaar het volgende:

[..]

[..]

[..]

Hoog tijd dan dat gewone burgers met duizenden/tienduizenden/honderdduizenden/miljoenen memnsen een paar hele goede advocaten inhuren en procederen tot aan het Europees Hof. Ik verwacht dat Bits of Freedom hier het initiatief toe gaat nemen, ik hoop dat veel mensen zich erbij gaan aansluiten. Alle Nederlanders zijn een partij in deze zaak dus wij kunnen met zijn allen tegen onze overheid procederen bij het Europees Hof. Helaas moeten we beginnen met pro forma in Nederland te procederen met het voorspelbare resultaat dat de ene hand van de overheid de andere hand dekt maar uiteindelijk komt het voor onfhankelijke (of minder afhankelijke) rechters van andere EU-landen.
ING en ABN investeerden honderden miljoenen euro in DAPL.
#NoDAPL
pi_155470859
quote:
0s.gif Op maandag 17 augustus 2015 16:03 schreef Weltschmerz het volgende:

[..]

Ik wist wel dat ze dik waren met de CIA, en dat de Chileens belangen van AT&T een belangrijke reden waarom om de democratisch verkozen Allende te laten vermoorden samen met nog een paar duizend linksen en een wrede militaire dictatuur te installeren.
Het ging niet alleen om AT&T maar inderdaad, ze (CIA, USA overheid) hadden in Chili die CIA-spion president laten worden en hem vervolgens vermoord en laten opvolgen door iemand die ze wel in de hand hadden - omdat hij toch kloten bleek te hebben en deed wat goed was voor het volk - omwille van de belangen van bedrijven. Een van de vele voorbeelden hoe de USA achter bijna alle grote conflicten zit die we na WOII hebben gehad in de wereld.
ING en ABN investeerden honderden miljoenen euro in DAPL.
#NoDAPL
pi_155471100
quote:
7s.gif Op vrijdag 31 juli 2015 10:51 schreef Papierversnipperaar het volgende:

For the first time in more than 50 years journalists are facing treason charges...

Dat is niet waar: zie dit artikel.
http://www.theregister.co(...)can_campbell/?page=3
Misschien is het de eerste keeri n 50 jaar dat dit in Duitsland gebeurt maar dat geldt zeker niet voor Europa, ze hadden het niet specifiek over Duitsland.
ING en ABN investeerden honderden miljoenen euro in DAPL.
#NoDAPL
  zaterdag 29 augustus 2015 @ 13:47:13 #281
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_155651201
quote:
quote:
Labour leadership contender Yvette Cooper has issued a mea culpa over the last Labour government’s attitude towards civil liberties, saying it did not do enough to keep the state’s surveillance powers in check. In the latest sign of candidates trying to draw a line under the past, the shadow home secretary criticised the governments of Tony Blair and Gordon Brown for being “too reluctant to introduce checks and balances as strong as new terrorism powers”.

Both the Labour and Conservative parties also ignored the inadequacy of laws governing interception of communications – the Regulation of Investigatory Powers Act (Ripa) – for too long, she added.

Cooper told the Guardian that better protection of civil liberties would become a policy if she is elected as Labour’s leader next month. She said she would make it a priority to “break up concentrations of power” and launch a review of privacy in relation to private sector companies that hold a huge amount of personal data.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 10 september 2015 @ 17:22:22 #282
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_155977361
quote:
quote:
Het duurde precies 15 dagen, 1 uur en 25 minuten voordat Tim den Besten en Nicolaas Veul het beu waren hun leven live te streamen. De jongens droegen dag en nacht een camera bij zich en deelden hun leven met de rest van de wereld. Op de site van Super Stream Me zag je hun hartslag, exacte locatie en gemoedstoestand. We konden alles over ze te weten komen: hun telefoonnummer, bankgegevens en of ze masturbeerden.
quote:
Veul zag het als zijn werk om als televisiemaker de vraag te stellen waar hij oprecht nieuwsgierig naar was. “Dan moet je niet schromen om zelf met de billen bloot te gaan.” En dat deden ze. Letterlijk en figuurlijk. Nu is de koek op, de mannen zijn uitgeput, willen niet meer en kappen ermee.
quote:
Vooral het niet alleen kunnen zijn en daardoor geen rust hebben brak Den Besten op. “Dat heb ik nodig. Ik heb geleerd dat het heel belangrijk is om niet altijd gezien te worden. Gewoon in je raam te kunnen zitten en naar buiten te kijken.” Veul heeft een groot besef van privacy uit dit experiment gehaald. “Er is een quote van Snowden die zegt: ‘privacy gaat niet om wat je te verbergen hebt, maar om wat je te beschermen hebt’. Dat weet ik nu heel goed.”
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 23 september 2015 @ 17:00:24 #283
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_156325305
quote:
quote:
Nationale toezichthouders zijn niet gebonden aan een beschikking van de Europese Commissie dat gegevens van Europeanen naar de VS gestuurd mogen worden omdat ze daar voldoende beschermd worden. Ze mogen die verzending opschorten, luidt een advies aan het Hof van Justitie van de Europese Unie (HvJEU).
quote:
De advocaat-generaal van het Europees Hof van Justitie schrijft in zijn advies zelfs dat de desbetreffende beschikking ongeldig is. Het HvjEU neemt het advies van de advocaat-generaal vrijwel altijd over. De zaak is aanhangig gemaakt door een Oostenrijker die er bezwaar tegen maakte dat de Ierse dochteronderneming van Facebook zijn gegevens doorspeelde aan servers in de Verenigde Staten. Hij betoogde dat de Snowden-onthullingen hadden aangetoond dat zijn data daar niet in veilige handen waren.

De Ierse toezichthouder wees het bezwaar van de hand met een verwijzing naar de beschikking van de Europese Commissie van 2002 over de Safe Harbour-afspraken, die zouden waarborgen dat de VS een voldoende niveau van bescherming van persoonsgegevens biedt. De zaak ging naar het High Court of Ireland, dat vervolgens van het HvJEU wilde weten of nationale autoriteiten zelf de mate van bescherming nog mogen onderzoeken en zo nodig de gegevensverstrekking mogen opschorten.
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 25 september 2015 @ 16:34:40 #284
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_156375690
quote:
“Snowden Treaty” Calls for End to Mass Surveillance, Protections for Whistleblowers

Inspired by the disclosures of NSA whistleblower Edward Snowden, a campaign for a new global treaty against government mass surveillance was launched today in New York City.

Entitled the “The International Treaty on the Right to Privacy, Protection Against Improper Surveillance and Protection of Whistleblowers,” or, colloquially, the “Snowden Treaty,” an executive summary of the forthcoming treaty calls on signatories “to enact concrete changes to outlaw mass surveillance,” increase efforts to provide “oversight of state surveillance,” and “develop international protections for whistleblowers.”

At the event launching the treaty, Snowden spoke via a video link to say that the treaty was “the beginning of work that will continue for many years,” aimed at building popular pressure to convince governments to recognize privacy as a fundamental human right, and to provide internationally-guaranteed protections to whistleblowers who come forward to expose government corruption. Snowden also cited the threat of pervasive surveillance in the United States, stating that “the same tactics that the NSA and the CIA collaborated on in places like Yemen are migrating home to be used in the United States against common criminals and people who pose no threat to national security.”

The treaty is the brainchild of David Miranda, who was detained by British authorities at Heathrow airport in 2013, an experience that he described as galvanizing him towards greater political activism on this issue. Miranda is the partner of Glenn Greenwald, a founding editor of The Intercept who received NSA documents from Snowden. Authorities at Heathrow seized files and storage devices that Miranda was transporting for Greenwald. (The Press Freedom Litigation Fund of First Look Media, the publisher of the Intercept, is supporting Miranda’s lawsuit challenging his detention.)

Along with the activist organization Avaaz, Miranda began working on the treaty project last year. “We sat down with legal, privacy and technology experts from around the world and are working to create a document that will demand the right to privacy for people around the world,” Miranda said. Citing ongoing efforts by private corporations to protect themselves from spying and espionage, Miranda added that “we see changes happening, corporations are taking steps to protect themselves, and we need to take steps to protect ourselves too.”

The full text of the treaty has yet to be released, but it is envisioned as being the first international treaty that recognizes privacy as an inalienable human right, and creates legally-mandated international protections for individuals who are facing legal persecution for exposing corruption in their home countries. Its proponents hope to build momentum and convince both governments and multi-national organizations to adopt its tenets. Since the Snowden revelations there has been increasing public recognition of the threat to global privacy, with the United Nations announcing the appointment of its first Special Rapporteur on this issue in March, followed by calls for the creation of a new Geneva Convention on internet privacy.

Greenwald also spoke at the event, saying, “This campaign offers the opportunity to put pressure on governments to adopt a treaty that pushes back against mass surveillance, and also makes clear that individuals who expose corruption should not be subject to the retribution of political leaders.” Adding that many governments that make a show of supporting the dissidents of other countries tend to persecute their own whistleblowers, Greenwald added, “We need a lot of public pressure to say that mass surveillance should end, and that people who expose corruption should be entitled to international protections.”

Bron: theintercept.com
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 25 september 2015 @ 16:56:32 #285
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_156376179
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 6 oktober 2015 @ 15:55:23 #286
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_156642211
quote:
quote:
Een gebouw van de geheime dienst loop je niet zomaar binnen. Toch wilden privacy-activisten het personeel in zo'n ondoordringbaar fort heel graag iets zeggen. Hun oplossing was een drone, die maandag duizenden flyers uitstrooide boven het Dagger Complex in het Duitse Darmstadt, een Amerikaanse militaire basis met een Europese vestiging van de NSA. Erop stond één simpele vraag: 'Klaar om je baan op te zeggen?'
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 6 oktober 2015 @ 15:57:25 #287
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_156642272
quote:
quote:
De rechtszaak werd in augustus vorig jaar aangespannen tegen Facebook door de Oostenrijkse student en activist Max Schrems. Hij heeft sinds 2008 een account op Facebook en stapte naar de rechter na de onthullingen van Edward Snowden. Hieruit bleek dat Amerikaanse geheime diensten op grote schaal het internet 'afluisteren'.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 6 oktober 2015 @ 15:58:27 #288
45206 Pietverdriet
Ik wou dat ik een ijsbeer was.
pi_156642293
quote:
0s.gif Op zondag 23 augustus 2015 18:18 schreef Bram_van_Loon het volgende:

[..]

Dat is niet waar: zie dit artikel.
http://www.theregister.co(...)can_campbell/?page=3
Misschien is het de eerste keeri n 50 jaar dat dit in Duitsland gebeurt maar dat geldt zeker niet voor Europa, ze hadden het niet specifiek over Duitsland.
De Spiegel Affaire is ook al weer uit "62
In Baden-Badener Badeseen kann man Baden-Badener baden sehen.
  zondag 18 oktober 2015 @ 00:30:59 #289
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_156912724
quote:
NSA can break into encrypted Web and VPN connections due to a commonplace cryptographic mistake

Two researchers have found that the National Security Agency (NSA) of USA could have the technology to break into the 1024 bit Diffie-Hellman cryptographic key exchange due to a commonplace weakness. This means that NSA could be able to peer into a large amount of encrypted communications.

The researchers noted that one single prime is used to encrypt two-thirds of all virtual private networks (VPNs) and a quarter of secure shell (SSH) servers globally, two major security protocols used by a number of businesses. A second prime is used to encrypt “nearly 20 [percent]of the top million HTTPS websites.” This is a commonly used way of keeping data indecipherable for anyone except its intended recipient – almost anyone, that is.

“Since a handful of primes are so widely reused, the payoff, in terms of connections they could decrypt, would be enormous,” researchers Alex Halderman and Nadia Heninger wrote in a blog post published Wednesday. “Breaking a single, common 1024-bit prime would allow NSA to passively decrypt connections to two-thirds of VPNs and a quarter of all SSH servers globally. Breaking a second 1024-bit prime would allow passive eavesdropping on connections to nearly 20% of the top million HTTPS websites. In other words, a one-time investment in massive computation would make it possible to eavesdrop on trillions of encrypted connections.”

The problem is that many of these 1024-bit prime numbers are reused because of how (previously) inconceivably expensive it would be to break them. As noted above, the researchers found that one single prime number is used to encrypt two-thirds of all VPNs and a quarter of all SSH servers, two security measures used by businesses globally. Another is used to encrypt 18 percent of the “top million HTTPS websites.” That means that a single instance of the aforementioned year-long cracking effort could give the NSA access to all of this information.

“This isn’t a flaw in a particular protocol, it’s a property of the math [that]underlies Diffie-Hellman, which is part of the foundation of almost every important cryptographic protocol we use,” Halderman said. “It’s certainly not an overnight [fix]. One of the problems is that the standards behind any important protocols like the IPsec VPN protocol specify that everyone will use these particular primes that by virtue of being so lightly used are made weaker. I think it’s going to be years unfortunately before standards and implementations are widely updated to account for this threat.”

Bron: www.techworm.net
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 19 oktober 2015 @ 20:52:18 #290
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_156954281
quote:
Facebook will warn you if the government is hacking your profile

A hacker or spammer can do some serious damage to your Facebook account — but what about the watchful eye of the government over your private messages?

Facebook said it will begin warning users if it detects a user's account is being targeted or compromised by a nation-state or a state-sponsored actor.

See also: What the massive government breach means for your personal data

"While we have always taken steps to secure accounts that we believe to have been compromised, we decided to show this additional warning if we have a strong suspicion that an attack could be government-sponsored," Facebook's Chief Security Officer Alex Stamos wrote in a blog post on Saturday. "We do this because these types of attacks tend to be more advanced and dangerous than others, and we strongly encourage affected people to take the actions necessary to secure all of their online accounts."

When Facebook has strong evidence that a government is intruding on a user's Facebook account, the company will send this warning:



Stamos added that Facebook likely won't be able to provide any additional explanation as to why it suspects a users's account has been targeted, but the message doesn't mean Facebook as a whole has been compromised. He also doesn't single out any particular state or government in the blog post.

If you receive the message above, you should enable two-factor authentication, which is under Login Approvals on Facebook. Stamos further suggests that users should "rebuild or replace" their computer system, as it's likely to be infected by malware.

In Facebook's last transparency report from November 2014, the company revealed that government requests for Facebook user data in the first half of 2014 increased 24% from the second half of 2013. However, those are formal requests, so they do not include attempts by governments or government-sponsored agents to obtain users' information without permission. It's difficult to estimate how often those incidents occur, though the mere fact that Facebook is now warning users about such attempts suggests they are not uncommon.
Bron: mashable.com
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 4 november 2015 @ 04:57:35 #291
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_157307257
quote:
Investigatory powers bill: snooper's charter to remain firmly in place | World news | The Guardian

Legislation will enshrine security services’ licence to hack, bug and burgle their way across the web – with judicial oversight still to be determined


The key elements of the snooper’s charter, including the bulk collection and storage for 12 months of everyone’s personal data, tracking their use of the web, phones and social media, will remain firmly in place when the government publishes its new investigatory powers bill on Wednesday.

The legislation, to be introduced by the home secretary, Theresa May, will provide the security services with an explicit licence to “snoop on the web” for the first time.

Until the disclosures of the whistleblower Edward Snowden, these powers and mass surveillance programmes remained hidden in the complex undergrowth of the pre-digital age Regulation of Investigatory Powers Act 2000 (Ripa) and other arcane surveillance laws.

The new, comprehensive, surveillance legislation will provide the security services and police with access to personal web and phone data using bulk-collection powers and will also put on a fresh legal footing spies’ mass computer hacking, known as “computer network exploitation”.

Related: Lord Carlile criticises proposals for judges to approve spying warrants

In the runup to the bill’s publication May has made much of having removed some of the more contentious elements from her previous attempt to introduce the snooper’s charter in parliament, which was blocked by her Liberal Democrat coalition partners. So is this week’s new surveillance law a climbdown or is it still a snooper’s charter?

Internet and phone companies are expected to be required to keep the communications data of all their customers’ use of the web, their phones and social media for 12 months. This is not the content, which has to be authorised by a ministerial intercept warrant, but the who, what, where and when of everyone’s use of the web.

It is often the case that the “who sent what to whom from where” can be more useful to the security services and police than the actual content of messages because it can tell them a lot about an individual’s life, and represents hard evidence.

It is easy to lie in the writing of an instant message but far harder to lie over when and to whom it was sent. This is reflected in the fact that communications data can be used as evidence in court while information obtained via interception is not admissible and can only be used for intelligence.

The Home Office will pay the internet and phone companies an as-yet unspecified (but no doubt large) sum to store this data and to provide access to the security services and the police according to specified regimes.

The security and intelligence services will use the bulk collection of personal internet data by the web and phone companies as the basis of GCHQ’s powerful data-mining programs to generate intelligence data.

Related: Don’t be fooled by spook propaganda: the state still wants more licence to pry | Henry Porter

It is the activity of the hundreds of such programs that campaigners say amounts to the snooper’s charter invasion of privacy.

The police, who make the bulk of the 500,000 external requests for communications data each year, have a separate regime with approval at inspector or superintendent level depending on the kind of data being requested for use in crime investigations. This includes terrorism investigations but also stalking and missing persons cases.

The bill is expected to add a category of internet connection records that will allow the police to trace which websites a suspect has visited, but not the content of pages. This is expected to require judicial authorisation, which is likely to be in the form of a panel of specially trained retired judges and requests will have to be targeted and limited.

They may also be required to authorise police requests for the communications data of journalists, lawyers or other legally privileged professions.

A further 40 public bodies also get different levels of access but often will need a magistrate’s authorisation. But the vast majority of the 500,000 requests made each year will continue as now without the need for a judicial or ministerial warrant.

The home secretary has given up trying to force overseas web companies to meet British requests to hand over their customers’ data. She has also dropped her plan to get UK-based companies to keep “third party” data that passes over their networks if the US companies refused to cooperate.

Instead, May has decided to rely on the recommendations of Sir Nigel Sheinwald, the former British ambassador to Washington, who earlier this year told the government that the only way to solve this problem was to negotiate a new treaty with the US to secure a rapid response to requests.

When the prime minister visited Washington earlier this year he gave the impression that he wanted to ban encryption on the web, arguing that there should be no safe space for terrorists or paedophiles. Ministers have ruled out for now any such ban or restriction on encryption, which would have severely undermined Britain as a global business centre.

The bill will enshrine the security services’ licence to hack, bug and burgle their way across the web. Britain’s security services only officially admitted that they had worldwide powers to attack computers this year.

As a result of a court case, an innocuous-sounding “draft equipment interference code of practice” was published by the Home Office. This put into the public domain the rules and safeguards surrounding the use of computer hacking outside the UK by the security services for the first time.

Privacy campaigners said the powers outlined in the draft guidance detailed the powers of intelligence services to sweep up content of a computer or smartphone, listen to their phone calls, track their locations or even switch on the microphones or cameras on mobile phones. The last would allow them to record conversations near the phone or laptop and snap pictures of anyone nearby.

Theresa May faces strong parliamentary opposition to continued ministerial authorisation of the 2,400-a-year intercept warrants she currently signs. She has already offered a two-stage compromise by floating the idea of a judicial veto on her authorisations. She is also expected to announce that the fragmented system of five separate oversight commissioners is replaced with a single investigatory powers commissioner, who would be a senior judge, to hold the security services and police to account.

Bron: www.theguardian.com
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  donderdag 5 november 2015 @ 15:06:57 #292
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_157336198
quote:
My work at GCHQ and the surveillance myths that need busting | Comment is free | The Guardian

In a first for the Guardian, a GCHQ officer writes about its investigatory powers in the wake of the publication of Theresa May’s proposed new measures


Many words about GCHQ have appeared over the last two years – but rarely have they been GCHQ’s own words. We welcome the debate now under way in parliament and among the public about our work. We need public consent for what we do – we wouldn’t want to do our jobs without it. We want the debate to be informed by facts, not half-understood inferences. We do not expect to persuade everyone to support what we do, but GCHQ certainly does bear a responsibility to make sure the discussion about us is based in reality. I want to cover two particular topics frequently misunderstood: bulk interception and encryption.

The draft bill published on Wednesday responds to three independent reviews carried out into investigatory powers. The reviews were unanimous in their agreement that the powers currently available to the intelligence and security services remain essential. And while the courts have recently confirmed that the bulk interception regime was lawful, the reviewers concluded that the legal framework needed updating. We are confident that the draft bill places our powers on a clearer footing and strengthens safeguards and oversight to a world-leading standard.

The draft bill also enables GCHQ and our sister agencies to meet the challenges of technological advances. As the internet grows exponentially, and smartphones create an explosion in information, increasingly tech-savvy criminals and terrorists attempt to hide in the mass of data and the dark recesses of the web.

Our best – often our only – chance to detect them is to search and analyse datasets in which they might be found. All major UK counter-terrorism investigations of the last decade have relied on analysis of data collected at scale to understand and disrupt the threat. This is particularly critical when a threat emanates from overseas, where we and other agencies have fewer options to illuminate it. Many other aspects of our work depend on it too, including child exploitation, cybersecurity and serious crime.

In 2014, GCHQ analysis of bulk data uncovered a previously unknown individual in contact with Isis attack-planners in Syria. Although he tried to hide his activity, we were able to use bulk data to spot that he had travelled to Europe, where he planned to carry out an attack. The data was provided to the authorities in that country, enabling the successful disruption of the plot, including capturing the home-made bombs he had manufactured.

Use of these bulk data powers is not indiscriminate. GCHQ cannot and would not hoover up every piece of information. It would be illegal for us to carry out “mass surveillance”, nor would we want to, even if the law allowed it. And stringent access controls apply before analysts may examine any particular piece of data. We always focus on maximising the probability of identifying people who wish to do us harm. The scale of internet data is staggering compared to 10 years ago, so while the volume we scan may seem large, it is a minute slice of the whole.

Those with unfettered access to our operations have quickly dispelled the mass surveillance myth. David Anderson QC examined examples of cases reliant on bulk interception, interrogated our analysts and looked at our intelligence reports. He wrote: “They leave me in not the slightest doubt that bulk interception, as it is currently practised, has a valuable role to play in protecting national security.” The parliamentary intelligence and security committee stated: “Our inquiry has shown that the agencies do not have the legal authority, the resources, the technical capability, or the desire to intercept the communications of British citizens, or of the internet as a whole. GCHQ is not reading the emails of everyone in the UK.” Sir Anthony May, one of Britain’s most senior judges, conducted an investigation and asked the question whether we engage in random mass intrusion into the private affairs of innocent citizens. His answer was “emphatically no”.

There is another myth that badly needs busting, namely the idea that GCHQ is against encryption and would not disclose vulnerabilities in software. We live more and more of our lives online and it is right that companies which hold the personal data of their customers take the strongest steps to keep it secure. It is also right that people should be able to interact with their bank and other businesses with confidence. As well as being civil servants charged with a unique mission, our own staff live everyday lives where they, their family and their friends depend on the same secure technology as everyone else.

The draft bill essentially repeats what the law currently says about encryption.

We do not seek to ban encryption, we do not want mandatory “back doors” in products and we frequently warn companies about security vulnerabilities we find. On a daily basis we advise companies and public services about how to deal with specific cyber-attacks. No organisation does more to protect UK cybersecurity than GCHQ. In September 2015, Apple publicly credited CESG (the information assurance arm of GCHQ) with the detection of a vulnerability in its iOS operating system for iPhones and iPads which could have been exploited. That vulnerability has now been patched.

Dealing with encryption and analysing data at scale were crucial for GCHQ’s predecessors at Bletchley Park to succeed in their mission. Protecting life and liberty is our heritage, but it’s our current and future duty too. We need legislation and powers fit for the modern world to carry out that duty.

Bron: www.theguardian.com
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  vrijdag 6 november 2015 @ 21:51:24 #293
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_157370113
quote:
Only 'tiny handful' of ministers knew of mass surveillance, Clegg reveals | Politics | The Guardian

Former deputy PM says he was astonished to learn how few cabinet members were aware of scale of UK spies’ reach into lives of British citizens

The majority of the UK cabinet were never told the security services had been secretly harvesting data from the phone calls, texts and emails of a huge number of British citizens since 2005, Nick Clegg has disclosed.

Clegg says he was informed of the practice by a senior Whitehall official soon after becoming David Cameron’s deputy in 2010, but that“only a tiny handful” of cabinet ministers were also told – likely to include the home secretary, the foreign secretary and chancellor. He said he was astonished to learn of the capability and asked for its necessity to be reviewed.

Related: The surveillance bill is flawed but at last we have oversight | Nick Clegg

The former deputy prime minister’s revelation in the Guardian again raises concerns about the extent to which the security services felt they were entitled to use broadly drawn legislative powers to carry out intrusive surveillance and keep this information from democratically elected politicians.

Related: Security and liberty: Theresa May’s surveillance plans | Letters from Lord West and others

The government finally admitted on Wednesday that the mass surveillance of British citizens began in 2001 after 9/11 and was stepped up in 2005, using powers under national security directions largely hidden in the 1984 Telecommunications Act.

It is not known if government law officers sanctioned the use of the act in this way, but it appears the intelligence and security committee responsible for parliamentary oversight was not informed, adding to the impression of a so-called deep state operating outside the scrutiny of parliament.

Clegg writes: “When I became deputy prime minister in 2010, I was the leader of a party that had been out of government for 65 years. There were a lot things that we had to re-learn, and a lot that was surprising and new.

“When a senior official took me aside and told me that the previous government had granted MI5 direct access to records of millions of phone calls made in the UK – a capability that only a tiny handful of senior cabinet ministers knew about – I was astonished that such a powerful capability had not been avowed to the public or to parliament and insisted that its necessity should be reviewed.

“That the existence of this previously top secret database was finally revealed in parliament by the home secretary on Wednesday, as part of a comprehensive new investigatory powers bill covering many other previously secret intelligence capabilities, speaks volumes about how far we’ve come in a few short years.”

He also contends that when the revelations of Edward Snowden hit, “the knee-jerk response within government was to play the man and ignore the ball”.

He writes: “Ministers simply didn’t understand – whatever concerns they may have had about Snowden’s own behaviour - the significance of the fact that the world now knew the government’s most closely guarded secrets. They refused to acknowledge that the democratisation of the security state had become inevitable.”

Related: Mass snooping and more – the measures in Theresa May's bill

Clegg claims the draft investigatory powers bill, published on Wednesday, has put the country within touching distance of a comprehensive set of laws covering every surveillance capability of the government. The draft bill, he argues, has been the result of the internal pressure applied by Liberal Democrat ministers inside the coalition government and the external debate generated by the Snowden revelations.

Giving his most detailed assessment of the specifics of the draft bill, he adopts a more sceptical attitude than the initial Labour frontbench reaction on Wednesday, saying many of the proposals are controversial and excessive.

He says the ability of GCHQ “to hack anything from handsets to whole networks is highly intrusive and needs to be much better understood before we can place it within appropriate constraints.

“The new, revised proposals on the storage of web browsing data remain problematic as the bill appears to call for the storage of vast quantities of data that go far beyond the operational requirements set out by the home secretary in the Commons.”

In common with some Tory MPs, he suggests: “The so called ‘double lock’ of judicial oversight appears to be nothing of the sort, as judges will have very little discretion when making decisions about individual warrants. And many will wish to question the access that the intelligence agencies have to our phone records.”

Bron: www.theguardian.com
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
pi_157399574
quote:
7s.gif Op vrijdag 6 november 2015 21:51 schreef Papierversnipperaar het volgende:

He also contends that when the revelations of Edward Snowden hit, “the knee-jerk response within government was to play the man and ignore the ball”.
De standaard strategie van de overheid bij klokkenluiders: de klokkenluider als persoon zo veel mogelijk zwartmaken en zo veel mogelijk hinderen met zaken die niets met het euvel te maken hebben. Vraag het maar aan Oltmans en Spijkers, die hebben het ook meegemaakt. ;)

Ik ben benieuwd of dat onze Commissie Stiekem wel alles te horen krijgt van de AIVD.
ING en ABN investeerden honderden miljoenen euro in DAPL.
#NoDAPL
  dinsdag 10 november 2015 @ 04:42:29 #295
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_157441693
quote:
Rechter deelt tik uit aan Amerikaanse veiligheidsdienst NSA | NOS

Een federale rechter in de Verenigde Staten heeft het verzamelen van metadata van telefoongesprekken "hoogstwaarschijnlijk ongrondwettelijk" genoemd. Hij deed dat in de zaak die een advocatenkantoor in Californië had aangespannen tegen de veiligheidsdienst NSA.

Twee jaar geleden kwamen de verregaande activiteiten van de NSA via klokkenluider Edward Snowden aan het licht. Er bleek onder meer dat de dienst op grote schaal metadata verzamelt, dus bijvoorbeeld informatie over wie met wie mailt of belt.

De rechter in de hoofdstad Washington heeft het in zijn vonnis over "een verlies aan grondwettelijke vrijheden". De NSA moet van hem onmiddellijk stoppen met het verzamelen van de gegevens van het advocatenkantoor.

De uitspraak is overigens vooral van symbolisch belang: het massasurveillanceprogramma van de NSA in zijn huidige vorm loopt over drie weken af. Op 29 november gaat de dienst over op een systeem waarbij het aftappen doelgerichter zal zijn.

Desondanks zijn privacy-activisten blij met de uitspraak. Edward Snowden spreekt op Twitter van een historisch besluit.

Bron: nos.nl
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 16 november 2015 @ 19:29:57 #296
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_157606218
quote:
quote:
In June 2013, Glen Greenwald, then of The Guardian, broke the first of many stories detailing how the NSA gathers and stores information about innocent Americans. Since then, we have learned that U.S. intelligence agencies are gathering massive amounts of data from phone and internet companies, not just on Americans, but foreign leaders as well.

How and under what circumstances are U.S. intelligence agencies allowed to collect your data? Where does Americans' data go once they collect it? In this collection of resources, the Brennan Center sheds a much-needed light on how the government is collecting, sharing, and storing data that is not immediately relevant to counterterrorism efforts.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  woensdag 18 november 2015 @ 14:16:40 #297
132191 -jos-
Money=Power
pi_157647467
quote:
Mass Surveillance Isn’t the Answer to Fighting Terrorism

It’s a wretched yet predictable ritual after each new terrorist attack: Certain politicians and government officials waste no time exploiting the tragedy for their own ends. The remarks on Monday by John Brennan, the director of the Central Intelligence Agency, took that to a new and disgraceful low.

Speaking less than three days after coordinated terrorist attacks in Paris killed 129 and injured hundreds more, Mr. Brennan complained about “a lot of hand-wringing over the government’s role in the effort to try to uncover these terrorists.”

What he calls “hand-wringing” was the sustained national outrage following the 2013 revelations by Edward Snowden, a former National Security Agency contractor, that the agency was using provisions of the Patriot Act to secretly collect information on millions of Americans’ phone records. In June, President Obama signed the USA Freedom Act, which ends bulk collection of domestic phone data by the government (but not the collection of other data, like emails and the content of Americans’ international phone calls) and requires the secretive Foreign Intelligence Surveillance Court to make its most significant rulings available to the public.

These reforms are only a modest improvement on the Patriot Act, but the intelligence community saw them as a grave impediment to antiterror efforts. In his comments Monday, Mr. Brennan called the attacks in Paris a “wake-up call,” and claimed that recent “policy and legal” actions “make our ability collectively, internationally, to find these terrorists much more challenging.”

It is hard to believe anything Mr. Brennan says. Last year, he bluntly denied that the C.I.A. had illegally hacked into the computers of Senate staff members conducting an investigation into the agency’s detention and torture programs when, in fact, it did. In 2011, when he was President Obama’s top counterterrorism adviser, he claimed that American drone strikes had not killed any civilians, despite clear evidence that they had. And his boss, James Clapper Jr., the director of national intelligence, has admitted lying to the Senate on the N.S.A.’s bulk collection of data. Even putting this lack of credibility aside, it’s not clear what extra powers Mr. Brennan is seeking.

Most of the men who carried out the Paris attacks were already on the radar of intelligence officials in France and Belgium, where several of the attackers lived only hundreds of yards from the main police station, in a neighborhood known as a haven for extremists. As one French counterterrorism expert and former defense official said, this shows that “our intelligence is actually pretty good, but our ability to act on it is limited by the sheer numbers.” In other words, the problem in this case was not a lack of data, but a failure to act on information authorities already had.

In fact, indiscriminate bulk data sweeps have not been useful. In the more than two years since the N.S.A.’s data collection programs became known to the public, the intelligence community has failed to show that the phone program has thwarted a terrorist attack. Yet for years intelligence officials and members of Congress repeatedly misled the public by claiming that it was effective.

The intelligence agencies’ inability to tell the truth about surveillance practices is just one part of the problem. The bigger issue is their willingness to circumvent the laws, however they are written. The Snowden revelations laid bare how easy it is to abuse national-security powers, which are vaguely defined and generally exercised in secret.

Listening to Mr. Brennan and other officials, like James Comey, the head of the Federal Bureau of Investigation, one might believe that the government has been rendered helpless to defend Americans against the threat of future terror attacks.

Mr. Comey, for example, has said technology companies like Apple and Google should make it possible for law enforcement to decode encrypted messages the companies’ customers send and receive. But requiring that companies build such back doors into their devices and software could make those systems much more vulnerable to hacking by criminals and spies. Technology experts say that government could just as easily establish links between suspects, without the use of back doors, by examining who they call or message, how often and for how long.

In truth, intelligence authorities are still able to do most of what they did before — only now with a little more oversight by the courts and the public. There is no dispute that they and law enforcement agencies should have the necessary powers to detect and stop attacks before they happen. But that does not mean unquestioning acceptance of ineffective and very likely unconstitutional tactics that reduce civil liberties without making the public safer.
http://www.nytimes.com/20(...)hting-terrorism.html
WEB / [HaxBall #64] Jos is God
Arguing on the Internet is like running in the Special Olympics.
  zaterdag 21 november 2015 @ 20:48:57 #298
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_157724786
quote:
Paris is being used to justify agendas that had nothing to do with the attack | Trevor Timm | Comment is free | The Guardian

The Paris attackers weren’t Syrian, and they didn’t use encryption, but the US government is still using the carnage to justify attempts to ban them both

The aftermath of the Paris terrorist attacks has now devolved into a dark and dishonest debate about how we should respond: let’s ban encryption, even though there’s no evidence the terrorists used it to carry out their crime, and let’s ban Syrian refugees, even though the attackers were neither.

It’s hard to overstate how disgusting it has been to watch, as proven-false rumors continue to be the basis for the entire political response, and technology ignorance and full-on xenophobia now dominate the discussion.

Related: Donald Trump's bigotry against Muslims has safety implications we can't ignore | M Dove Kent

First, there’s the loud “we need to ban encryption” push that immediately spawned hundreds of articles and opinions strongly pushed by current and former intelligence officials the day or two after the attacks, despite the government quietly admitting there was no evidence that the attackers used encryption to communicate. It was a masterful PR coup: current and former intelligence officials got to sit through a series of fawning interviews on television where they were allowed to pin any of their failures on Edward Snowden and encryption – the bedrock of privacy and security for hundreds of millions of innocent people – with virtually no pushback, or any critical questions about their own conduct.

The entire encryption subject became a shiny scapegoat while the truth slowly trickled in: as of Tuesday, it was clear that American and/or French intelligence agencies had seven of the eight identified attackers on their radar prior to the attacks. The attackers used Facebook to communicate. The one phone found on the scene showed the terrorists had coordinated over unencrypted SMS text messages – just about the easiest form of communication to wiretap that exists today. (The supposed ringleader even did an interview in Isis’s English magazine in February bragging that he was already in Europe ready to attack.)

As an unnamed government official quoted by the Washington Post’s Brian Fung said, if surveillance laws are expanded the media will be partly to blame: “It seems like the media was just led around by the nose by law enforcement. [They are] taking advantage of a crisis where encryption hasn’t proven to have a role. It’s leading us in a less safe direction at a time when the world needs systems that are more secure.”

As dishonest as the “debate” over encryption has been, the dark descension of the Republican party into outright racism and cynically playing off the irrational fears of the public over the Syrian refugee crisis has been worse. We now know the attackers weren’t Syrian and weren’t even refugees. It was a cruel rumor or hoax that one was thought to have come through Europe with a Syrian passport system, but that was cleared up days ago. But in the world of Republican primaries, who cares about facts?

Virtually every Republican candidate has disavowed welcoming any refugees to the US, and they are now competing over who is more in favor of banning those who are fleeing the very terrorists that they claim to be so against.

It doesn’t matter that the US has a robust screening system that has seen over 750,000 refugees come to the United States without incident – the Republican-led House has now voted to grind the already intensive screening process to a virtual halt (they were disgracefully joined by many Democrats). Chris Christie said the US should refuse widows and orphans. Rand Paul introduced a law to bar the entire Muslim world from entering the US as refugees. Donald Trump has suggested he would digitally track every Muslim in the county.

As The Intercept’s Lee Fang documented in detail, the rhetoric spewing from the mouths of the Republican Party sounds almost word for word like the racists during World War II that wanted the US to refuse Jews on the basis that they might be secret Nazis.

Even the supposedly establishment Republicans have debased themselves with rhetoric that one can only hope that one day they regret. This video of Jeb Bush struggling to explain why he would create a religious litmus test for refugees and how families are going to “prove” they’re Christian is truly cringeworthy. As Barack Obama said in his admirable condemnation of Bush and others on Tuesday, such talk is “shameful” and “un-American.”

One can say a lot of awful things about Jeb’s brother, George W Bush, including that his disastrous wars that led to the Isis mess we are in now, but he did do one thing right: he was always willing to publicly speak out in favor of the vast majority of Muslims who are peaceful and abhor terrorism just like everyone else. As Chris Hayes noted, not a word of this touching speech Bush gave at an Islamic Center a week after 9/11 would ever be uttered by any of the Republican candidates today. Instead they compete over who can disparage and debase the Muslim community with the broadest brush stroke.

There are plenty of questions to ask in the aftermath of the attacks to learn how terrorism can better be prevented in the future. Instead public discourse has veered so far off-course that it’s hard to see when it will return.

Bron: www.theguardian.com
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  dinsdag 24 november 2015 @ 21:44:54 #299
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_157798460
quote:
Telegraph Publishes The Dumbest Article On Encryption You'll Ever Read... Written By David Cameron's Former Speechwriter

Over the weekend, the Telegraph (which, really, is probably only the second or third worst UK tabloid), published perhaps the dumbest article ever on encryption, written by Clare Foges, who until recently, was a top speech writer for UK Prime Minister David Cameron (something left unmentioned in the article). The title of the article should give you a sense of its ridiculousness: Why is Silicon Valley helping the tech-savvy jihadists? I imagine her followups will including things like "Why is Detroit helping driving-savvy jihadists?" and "Why are farmers feeding food-savvy jihadists?"
Het artikel gaat verder.
quote:


[ Bericht 5% gewijzigd door Papierversnipperaar op 24-11-2015 21:50:23 ]
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  zondag 29 november 2015 @ 09:37:00 #300
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_157894956
quote:
Einde aan telefonisch sleepnet NSA

Vanaf vandaag mag de Amerikaanse inlichtingendienst NSA niet meer ongericht al het telefoonverkeer in de VS in de gaten houden. Vanaf klokslag middernacht, 06.00 uur Nederlandse tijd, worden de bevoegdheden van de dienst flink ingeperkt.

Het is de grootste beperking van een inlichtingendienst sinds de aanslagen van 9/11. Voortaan mag de NSA niet meer willekeurig alle gegevens over telefoontjes verzamelen, maar moet er voor elke persoon of groep specifiek een gerechtelijk bevel worden aangevraagd. Dat is dan maximaal zes maanden geldig.

Bron: nos.nl
Het artikel gaat verder.
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
  maandag 30 november 2015 @ 09:32:33 #301
172669 Papierversnipperaar
Cafeïne is ook maar een drug.
pi_157916287
Vol
Free Assange! Hack the Planet
[b]Op dinsdag 6 januari 2009 19:59 schreef Papierversnipperaar het volgende:[/b]
De gevolgen van de argumenten van de anti-rook maffia
abonnement Unibet Coolblue Bitvavo
Forum Opties
Forumhop:
Hop naar:
(afkorting, bv 'KLB')