quote:PGP-bedenker verlaat VS wegens surveillancewedloop
https://www.security.nl/posting/429834/PGP-bedenker+verlaat+VS+wegens+surveillancewedloop
Philip Zimmermann, de bedenker van Pretty Good Privacy (PGP), heeft de Verenigde Staten verlaten en is naar Zwitserland verhuisd. Aanleiding voor de verhuizing is de surveillancewedloop die op dit moment in de VS plaatsvindt, zo meldt de Guardian. "Elke dystopische samenleving heeft buitensporige surveillance, maar nu zien wel zelfs dat democratieën zoals de VS en Engeland die kant op gaan", zo waarschuwt Zimmermann.
"We moeten dit terugdraaien. Van mensen die niet van misdrijven worden verdacht moet er geen informatie worden verzameld en in databases worden opgeslagen. We willen geen Noord-Korea worden." Volgens de PGP-bedenker is de Britse samenleving, waar hij dit weekend was, te accepterend als het om surveillance gaat. "Mensen hebben hier een gemakkelijke relatie met hun eigen regering en misschien dat ze daarom geen bezwaar maken. Toekomstige overheden zijn mogelijk niet zo aardig, en kunnen een surveillance-infrastructuur erven die ze kunnen gebruiken voor het creëren van een overheid die niet kan worden veranderd."
Zimmermann waarschuwt voor "point en click vervolgingen", met verkeerscamera's en gezichtsherkenning die kunnen herkennen wanneer journalisten met klokkenluiders lunchen, politici met maîtresses afspreken of burgers die achter het stuur kruipen met teveel alcohol op. De PGP-bedenker is op dit moment actief met zijn bedrijf Silent Circle, waarvan het hoofdkantoor ook al naar Zwitserland is verhuisd, mede vanwege de "robuuste privacywetgeving" daar. Later dit jaar zal Silent Circle de Blackphone 2 presenteren, een op privacygerichte telefoon waarmee versleuteld kan worden gecommuniceerd.
quote:UK intelligence agencies should keep mass surveillance powers, report says | World news | The Guardian
Report by official reviewer of counter-terrorism laws also says ministers should be stripped of power to authorise surveillance warrants
UK intelligence agencies should be allowed to retain controversial intrusive powers to gather bulk communications data but ministers should be stripped of their powers to authorise surveillance warrants, according to a major report on British data law.
The 373-page report published on Thursday – A Question of Trust, by David Anderson QC – calls for government to adopt “a clean-slate” approach in legislating later this year on surveillance and interception by GCHQ and other intelligence agencies.
However, Downing Street hinted that David Cameron was unlikely to accept one of his key recommendations: shifting the power to agree to warrants from home and foreign secretaries to a proposed new judicial commissioner.
The prime minister’s spokeswoman said the authorities needed to be able “to respond quickly and effectively to threats of national security or serious crime”, which appears to suggest ministers are better positioned to do this than judges.
Related: A question of trust? Anderson report lays out tests for surveillance laws
Anderson’s report, commissioned by Cameron last year, comes in response to revelations two years ago by the US whistleblower Edward Snowden about the scale of government surveillance.
Anderson, introducing his report, said: “Modern communications networks can be used by the unscrupulous for purposes ranging from cyber-attack, terrorism and espionage to fraud, kidnap and child sexual exploitation. A successful response to these threats depends on entrusting public bodies with the powers they need to identify and follow suspects in a borderless online world.
“But trust requires verification. Each intrusive power must be shown to be necessary, clearly spelled out in law, limited in accordance with human rights standards and subject to demanding and visible safeguards.”
Related: House rejects NSA collection of phone records with vote to reform spy agency
GCHQ and other intelligence agencies are likely to be satisfied with the recommendations. GCHQ successfully fought to retain its bulk collection powers and Anderson agreed. In contrast with the UK, the US Congress last month placed curbs on bulk collection of phone records by the intelligence agencies.
Privacy campaigners also largely welcomed Anderson’s recommendation to scrap existing surveillance legislation – the Regulation of Investigatory Powers Act (Ripa), the proposed new judicial commissioner and other proposals.
Anderson said that the existing legislation had reached the end of its useful life. “Ripa, obscure since its inception, has been patched up so many times as to make it incomprehensible to all but a tiny band of initiates. A multitude of alternative powers, some of them without statutory safeguards, confuse the picture further. This state of affairs is undemocratic, unnecessary and – in the long run – intolerable.”
The new judicial body, the Independent Surveillance and Intelligence Commission, would be responsible for all surveillance warrants, according to the report.
There would be some new curbs on warrants, including “a tighter definition of the purposes for which it is sought, defined by operations or mission purposes”.
Anderson also proposed safeguards against snooping on journalists, lawyers and other groups. The report says that when communication data is sought from people handling privileged or confidential information, including doctors, lawyers, journalists, MPs or ministers, “special consideration and arrangements should be in place”.
As well as approving individual warrants, the judicial commissioner would also be responsible for a new bulk data collection warrant in limited circumstances. Anderson gives an example of bulk data collection under the heading of “attack planning by ISIL [Islamic State] in Iraq/Syria against the UK”. Anderson also makes clear that this would not affect existing programmes of communications data surveillance.
But the removal of the power to approve warrants from ministers may never fly. Ministers will argue that democratically elected politicians are better placed to make these decisions rather than judges who do not have access to up-to-date information on terrorist threats.
The home secretary, Theresa May, speaking in the Commons after the report was published, said she would publish a draft surveillance bill in the autumn and legislate before the end of 2016. She promised there would be a proper overhaul of investigatory powers legislation and not “simply rebranding existing law”.
She described the threats facing the UK as considerable. “In the face of such threats, we have a duty to ensure that the agencies whose job it is to keep us safe have the powers they need to do the job,” she said.
May was immediately questioned by David Davis, one of the leading Conservatives on civil liberties issues, who praised the report and the prospect of judicial control over warrants, saying that, with the exception of Zimbabwe, the UK has the world’s worst record in allowing politicians to authorise surveillance.
May said the government would consider the idea of transferring responsibility to judges. “I am not in a position to say whether the government will do one thing or another,” she said.
Related: No 10 hints it will reject key proposal in David Anderson's surveillance report - Politics live
The intelligence agencies, including GCHQ, have been expressing concern about the increasing use of encryption to protect privacy, with internet providers beginning to offer this as standard.
Anderson, in his report, does not propose legislating on the issue. He said few propose a master key to all communications be held by the state. “Far preferable, on any view, is a law-based system in which encryption keys are handed over [by service providers or by the users themselves] only after properly authorised requests.”
Anderson said he could not condone Snowden’s disclosure. National security had suffered, he added, but there had also been benefits from the disclosure of some of the intelligence agency capabilities.
“The opening up of the debate has, however, come at a cost to national security: the effect of the Snowden documents on the behaviour of some service providers and terrorists alike has, for the authorities, accentuated the problem of reduced coverage and rendered more acute the need for a remedy,” the report says.
Jo Glanville, director of English PEN, welcomed the report. “While we would have liked to see the recommendations go even further in relation to GCHQ’s bulk collection of data, we welcome the recommendations for judicial authorisation and the call for a rigorous assessment before any further powers are given to the intelligence services in a revived snooper’s charter.”
Eric King, the deputy director of Privacy International, said: “This is the final nail in the coffin for Ripa … David Anderson’s strong recommendations for improvement are the first step towards reform, and now the burden is on the government, parliament and civil society to ensure that reforms go further and ensure that once and for all, our police and intelligence agencies are brought under the rule of law.”
Bron: www.theguardian.com
http://www.welt.de/politi(...)ere-eingestellt.htmlquote:Ermittlungen in der Merkel-Handy-Affäre eingestellt
Nach dem Verdacht auf NSA-Spionage: Die Bundesanwaltschaft hat die Ermittlungen wegen des mutmaßlichen US-Lauschangriffs auf das Mobiltelefon von Bundeskanzlerin Angela Merkel (CDU) eingestellt. Der Vorwurf lasse sich nicht gerichtsfest beweisen, teilte die Behörde am Freitag in Karlsruhe zur Begründung mit.
quote:
quote:Accused of publishing government propaganda against NSA whistleblower Edward Snowden, the Sunday Times is using copyright to hit back at its strongest critic.
In a paywalled feature published Sunday, titled “British spies betrayed to Russians and Chinese,” three authors, citing anonymous government sources, claim that “Russia and China have cracked the top-secret cache of files stolen by the fugitive U.S. whistleblower Edward Snowden.” In turn, the Times’s sources say, the U.K. had to relocate special agents around the world who were allegedly in harm’s way.
In an extremely critical takedown post, The Intercept’s Glenn Greenwald, the journalist Snowden first met with after fleeing the U.S., denied many of the details in the Times story. In particular, the Times claimed that Greenwald’s partner, David Miranda, met with Snowden in Moscow to receive more documents—a claim that’s since been deleted from the Times article.
Greenwald’s post also includes a screengrab of the Times’s layout—and that’s what the Times used to pounce on their high-profile critic. In a legal notice sent Monday, the paper cites the Digital Millennium Copyright Act (DMCA) and claims the Intercept is violating the Times’s copyright of “the typographical arrangement of the front page.”
“If Greenwald were selling a book of Great Covers of the Sunday Times, they'd have a case,” Parker Higgins, an activist at the Electronic Frontier Foundation who specializes in intellectual property, told the Daily Dot. “But this is grasping at straws and attempting to use the strictest takedown law available—copyright—just to silence criticism.”
There’s a long history of people accused of using online copyright law to censor critics; a recent smattering includes California mayors, lawyers, Drake’s label, and Ecuador. The Times didn’t respond to the Daily Dot’s question of just how frequently it issues those claims to other news outlets.
It’s not likely to have much effect on the Intercept’s story, though. When the Daily Dot asked Greenwald if he would abide the DMCA takedown, he simply responded “No.”
quote:
quote:This Google legal disclosure is 306 pages long. Holy cow.
Fri, Jun 19 2015 00:56:33
quote:Ten pages into this legal document and I'm convinced that I'm never going to return to my home country. What the actual fuck.
Fri, Jun 19 2015 01:04:49
quote:GCHQ's surveillance of two human rights groups ruled illegal by tribunal | UK news | The Guardian
Initial interceptions lawful but retention and examination of communications illegal, rules IPT in case brought following Edward Snowden revelations
GCHQ’s covert surveillance of two international human rights groups was illegal, the judicial tribunal responsible for handling complaints against the intelligence services has ruled.
The UK government monitoring agency retained emails for longer than it should have and violated its own internal procedures, according to a judgment by the investigatory powers tribunal (IPT). But it ruled that the initial interception was lawful in both cases.
The IPT upheld complaints by the Egyptian Initiative for Personal Rights and the South African non-profit Legal Resources Centre that their communications had been illegally retained and examined. The tribunal made “no determination” on claims brought other NGOs – including Amnesty International, Liberty and Privacy International – implying that either their emails and phone calls were not intercepted or that they were intercepted but by legal means.
The IPT ruling said: “[We are] concerned that steps should be taken to ensure that neither of the breaches of procedure referred to in this determination occurs again. For the avoidance of doubt, the tribunal makes it clear that it will be making a closed report to the prime minister.”
It is the first time that a court has revealed that British intelligence agencies have spied on foreign human rights groups.
Related: IPT ruling on GCHQ matters more for what it permits than what it rebukes
The case against the monitoring agency follows revelations by the US whistleblower Edward Snowden. It was brought by Privacy International, Liberty, Amnesty International, the American Civil Liberties Union and a number of other international human rights groups.
Welcoming the ruling, Eric King, deputy director of Privacy International, said: “If spying on human rights NGOs isn’t off limits for GCHQ, then what is? Clearly our spy agencies have lost their way. For too long they’ve been trusted with too much power, and too few rules for them to protect against abuse. How many more problems with GCHQ’s secret procedures have to be revealed for them to be brought under control?”
He added: “Trying to pass off such failings as technical, or significant changes in law as mere clarifications, has become a tiring defence for those who know the jig is up. The courts are begrudgingly helping to ensure that the sun is slowly setting on GCHQ’s wild west ways. Now we need parliament to step in to fix what should have been fixed a long time ago.”
In relation to the Egyptian Initiative for Personal Rights, the IPT found that “email communications ... were lawfully and proportionately intercepted and accessed ... However, the time limit for retention permitted under the internal policies of GCHQ, the intercepting agency, was overlooked in regard to the product of that interception, such that it was retained for materially longer than permitted under those policies.”
In respect of the Legal Resources Centre, the IPT said: “Communications from an [associated] email address ... were intercepted and selected for examination ... The tribunal is satisfied that the interception was lawful and proportionate and that the selection for examination was proportionate, but that the procedure laid down by GCHQ’s internal policies for selection of the communications for examination was in error not followed in this case.”
Janet Love, national director of the Legal Resources Centre, said it was “deeply concerned to learn that communications of our organisation have been subject to unlawful interception by GCHQ. As a public interest law firm, our communications are self-evidently confidential, and we consider this to be a serious breach of the rights of our organisation and the individuals concerned.
“We can no longer accept the conduct of the intelligence services acting under such a pernicious veil of secrecy, and we will be taking immediate action to try to establish more information. We urge the South African and British governments to cooperate with us in this regard. We are particularly grateful for Liberty’s efforts in spearheading this litigation and making it possible for this information to be brought to light.”
James Welch, legal director for Liberty, said: “Last year it was revealed that GCHQ were eavesdropping on sacrosanct lawyer-client conversations. Now we learn they’ve been spying on human rights groups. What kind of signal are British authorities sending to despotic regimes and those who risk their lives to challenge them all over the world? Who is being casual with human life now?”
Rachel Logan, UK legal programme director for Amnesty International, said: “[This] raises the wider question as to why the UK intelligence services were intercepting the communications of these two highly regarded human rights NGOs at all.
“Knowing that your mail has been read, or your calls have been listened to can stifle people into silence, leading to self-censorship. It is a clear interference with basic rights such as free expression and right to privacy.
“Today’s ruling in relation to Amnesty tells us nothing. We still don’t know if we’ve been spied on at all, if we have been the subject of any targeted spying, if the tribunal thought any spying – if it did happen – was necessary and proportionate, or even if they had an entirely different reason for telling us nothing.”
The legal challenge was the first of many GCHQ-related claims to be examined in detail by the IPT, which hears complaints against British intelligence agencies and government bodies that carry out surveillance under the Regulation of Investigatory Powers Act (Ripa).
The civil liberties organisations are concerned that their private communications may have been monitored under GCHQ’s electronic surveillance programme, Tempora, the existence of which was revealed by Snowden. They also complain that information obtained through the US National Security Agency’s Prism and Upstream programmes may have been shared with British intelligence services, sidestepping protections provided by the UK legal system.
During the hearing last summer, Matthew Ryder QC alleged that the intelligence services are constructing “vast databases” out of accumulated interceptions of emails.
“If two out of 10 organisations who applied to the IPT found their emails were being illegally monitored, human rights fear, how many others are being targeted? Unless people or organisations submit claims to the IPT, it is argued, how will they know whether their communications are being unlawfully monitored.”
A government spokesperson said: “We welcome the IPT’s confirmation that any interception by GCHQ in these cases was undertaken lawfully and proportionately, and that where breaches of policies occurred they were not sufficiently serious to warrant any compensation to be paid to the bodies involved.
“GCHQ takes procedure very seriously. It is working to rectify the technical errors identified by this case and constantly reviews its processes to identify and make improvements.”
Bron: www.theguardian.com
Het artikel gaat verder.quote:Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research
The spy unit responsible for some of the United Kingdom’s most controversial tactics of surveillance, online propaganda and deceit focuses extensively on traditional law enforcement and domestic activities — even though officials typically justify its activities by emphasizing foreign intelligence and counterterrorism operations.
Documents published today by The Intercept demonstrate how the Joint Threat Research Intelligence Group (JTRIG), a unit of the signals intelligence agency Government Communications Headquarters (GCHQ), is involved in efforts against political groups it considers “extremist,” Islamist activity in schools, the drug trade, online fraud and financial scams.
Though its existence was secret until last year, JTRIG quickly developed a distinctive profile in the public understanding, after documents from NSA whistleblower Edward Snowden revealed that the unit had engaged in “dirty tricks” like deploying sexual “honey traps” designed to discredit targets, launching denial-of-service attacks to shut down Internet chat rooms, pushing veiled propaganda onto social networks and generally warping discourse online.
Early official claims attempted to create the impression that JTRIG’s activities focused on international targets in places like Iran, Afghanistan and Argentina. The closest the group seemed to get to home was in its targeting of transnational “hacktivist” group Anonymous.
While some of the unit’s activities are focused on the claimed areas, JTRIG also appears to be intimately involved in traditional law enforcement areas and U.K.-specific activity, as previously unpublished documents demonstrate. An August 2009 JTRIG memo entitled “Operational Highlights” boasts of “GCHQ’s first serious crime effects operation” to shut down internet forums and to remove websites identifying police informants and members of a witness protection program. Another was “used to facilitate and execute online fraud.” The document also describes GCHQ advice provided “to assist the UK negotiating team on climate change.”
Particularly revealing is a fascinating 42-page document from 2011 detailing JTRIG’s activities. It provides the most comprehensive and sweeping insight to date into the scope of this unit’s extreme methods. Entitled “Behavioral Science Support for JTRIG’s Effects and Online HUMINT [Human Intelligence] Operations,” it describes the types of targets on which the unit focuses, the psychological and behavioral research it commissions and exploits, and its future organizational aspirations. It is authored by a psychologist, Mandeep K. Dhami.
Among other things, the document lays out the tactics the agency uses to manipulate public opinion, its scientific and psychological research into how human thinking and behavior can be influenced, and the broad range of targets that are traditionally the province of law enforcement rather than intelligence agencies.
JTRIG’s domestic and law enforcement operations are made clear. The report states that the controversial unit “currently collaborates with other agencies” including the Metropolitan police, Security Service (MI5), Serious Organised Crime Agency (SOCA), Border Agency, Revenue and Customs (HMRC), and National Public Order and Intelligence Unit (NPOIU). The document highlights that key JTRIG objectives include “providing intelligence for judicial outcomes”; monitoring “domestic extremist groups such as the English Defence League by conducting online HUMINT”; “denying, deterring or dissuading” criminals and “hacktivists”; and “deterring, disrupting or degrading online consumerism of stolen data or child porn.”
It touts the fact that the unit “may cover all areas of the globe.” Specifically, “operations are currently targeted at” numerous countries and regions including Argentina, Eastern Europe and the U.K.
JTRIG’s domestic operations fit into a larger pattern of U.K.-focused and traditional law enforcement activities within GCHQ.
Many GCHQ documents describing the “missions” of the “customers” for which it works make clear that the agency has a wide mandate far beyond national security, including providing help on intelligence to the Bank of England, to the Department for Children, Schools and Families on reporting of “radicalization,” to various departments on agriculture and whaling activities, to government financial divisions to enable good investment decisions, to police agencies to track suspected “boiler room fraud,” and to law enforcement agencies to improve “civil and family justice.”
Previous reporting on the spy agency established its focus on what it regards as political radicalism. Beyond JTRIG’s targeting of Anonymous, other parts of GCHQ targeted political activists deemed to be “radical,” even monitoring the visits of people to the WikiLeaks website. GCHQ also stated in one internal memo that it studied and hacked popular software programs to “enable police operations” and gave two examples of cracking decryption software on behalf of the National Technical Assistance Centre, one “a high profile police case” and the other a child abuse investigation.
Bron: firstlook.org
Het artikel gaat verder.quote:Popular Security Software Came Under Relentless NSA and GCHQ Attacks
The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden.
The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than 270,000 corporate clients, and says it protects more than 400 million people with its products.
British spies aimed to thwart Kaspersky software in part through a technique known as software reverse engineering, or SRE, according to a top-secret warrant renewal request. The NSA has also studied Kaspersky Lab’s software for weaknesses, obtaining sensitive customer information by monitoring communications between the software and Kaspersky servers, according to a draft top-secret report. The U.S. spy agency also appears to have examined emails inbound to security software companies flagging new viruses and vulnerabilities.
The efforts to compromise security software were of particular importance because such software is relied upon to defend against an array of digital threats and is typically more trusted by the operating system than other applications, running with elevated privileges that allow more vectors for surveillance and attack. Spy agencies seem to be engaged in a digital game of cat and mouse with anti-virus software companies; the U.S. and U.K. have aggressively probed for weaknesses in software deployed by the companies, which have themselves exposed sophisticated state-sponsored malware.
Anti-virus software is an ideal target for a would-be attacker, according to Joxean Koret, a researcher with Coseinc, a Singapore-based information security consultancy. “If you write an exploit for an anti-virus product you’re likely going to get the highest privileges (root, system or even kernel) with just one shot,” Koret told The Intercept in an email. “Anti-virus products, with only a few exceptions, are years behind security-conscious client-side applications like browsers or document readers. It means that Acrobat Reader, Microsoft Word or Google Chrome are harder to exploit than 90 percent of the anti-virus products out there.”
(Disclosure: One of the authors of this report, Morgan Marquis-Boire, spoke at a Kaspersky Lab event in Puerto Rico in 2013 and at another in London in 2014. He was not paid for either event, but the cost of his travel and accommodation were covered by the company.)
Bron: firstlook.org
quote:Frankrijk roept ambassadeur VS op het matje om spionage
Frankrijk heeft de ambassadeur van de Verenigde Staten ontboden nadat gisteren bekend werd dat de NSA drie Franse presidenten heeft afgeluisterd. Dat melden Reuters en AFP op basis van Franse diplomatieke bronnen. President Hollande noemde de spionagepraktijken vandaag in een reactie “onacceptabel”.
Hollande had vanochtend zijn kabinet bijeengeroepen voor een spoedvergadering nadat documenten naar buiten kwamen op WikiLeaks waarin stond dat hijzelf en zijn voorgangers Sarkozy en Chirac tussen 2006 en 2012 door de Amerikaanse inlichtingendienst waren afgeluisterd. “Frankrijk tolereert geen handelingen die de veiligheid van ons land of van de beveiliging van onze belangen in gevaar brengt”, zei Hollande na afloop.
De president maakte tevens bekend dat Amerikaanse spionage van Franse belangen al wel eerder bekend waren bij de Franse autoriteiten. Uit de documenten zou blijken dat het afluisteren een maand na Hollande’s aantreden is gestopt. Volgens de Franse krant Libération - die het nieuws gisteren als eerste bracht - staan er geen staatsgeheimen in de gelekte documenten.
De VS kwamen gisteren naar buiten met een verklaring dat ze “zich niet richten en ook niet zullen richten op de communicatie van president Hollande”.
Het is niet voor het eerst dat bekend wordt dat de VS bondgenoten afluistert of heeft afgeluisterd. Eerder kwam naar buiten dat het mobieltje van bondskanselier Merkel werd afgetapt. In totaal zouden 122 regeringsleiders over de hele wereld zijn afgeluisterd.
Wat een klont boter op zijn hoofd. Geen maatregelen nemen om al zijn burgers te beschermen die hetzelfde lot ondergaan, maar huilen als hem hetzelfde overkomt.quote:
quote:Assange: Wikileaks heeft meer documenten over NSA-spionage
Klokkenluidersite Wikileaks heeft documenten in bezit die van groter politiek belang zijn dan de onthullingen, gisteren, over spionage van Franse presidenten door de Amerikaanse inlichtingendienst NSA. De economische en politieke belangen van Frankrijk alsook zijn soevereiniteit staan op het spel, zo waarschuwde Wikileaks-oprichter Julian Assange vanavond in een interview met de Franse tv-zender TF1.
Assange roept de Franse regering op nu in te grijpen. De “tijd is gekomen” voor Frankrijk om een parlementaire enquête in te stellen om de spionagepraktijken te onderzoeken en de schuldigen te vervolgen, zei hij. Uit de documenten zou onder meer blijken dat er sprake is geweest van economische spionage.
Volgens de documenten die via Mediapart en Libération werden gepubliceerd, werden Jacques Chirac (1995-2007), Nicolas Sarkozy (2007-2012) en François Hollande (2012-heden) gedurende zes jaar bespioneerd. Dit gebeurde tussen 2006 en mei 2012. Voor zover bekend stopte het afluisteren na de eerste maand dat Hollande als president was ingezworen. Welke informatie de NSA precies heeft verkregen is onduidelijk, maar het betrof in ieder geval geen staatsgeheimen.
Assange, die sinds 2012 schuilt in de Ecuadoraanse ambassade in Londen om uitlevering aan Zweden te vermijden, gaf zijn interview met TF1 vanuit de ambassade. Afgelopen vrijdag publiceerde Wikileaks al een reeks van tienduizenden vertrouwelijke Saoedische documenten. Daaruit bleek onder meer dat Nederland tevergeefs op het hoogste niveau heeft geprobeerd de immuniteit te laten opheffen van een Saoedische ex-ambassadeur die werd verdacht van mensenhandel.
Bron: NRC
quote:
quote:De Amerikaanse inlichtingendienst NSA mag tijdelijk weer telefoongesprekken afluisteren. Het programma, onthuld door klokkenluider Edward Snowden, lag sinds 1 juni stil. Toen verliep de wet die het afluisteren mogelijk maakte. Een speciale spionagerechtbank heeft nu besloten dat de dienst zes maanden lang weer gegevens mag verzamelen.
quote:GCHQ spied on Amnesty International, tribunal tells group in email | UK news | The Guardian
Human rights group denounces revelation as outrageous as after Investigatory Powers Tribunal says its communications have been illegally retained
The government’s electronic eavesdropping agency GCHQ spied illegally on Amnesty International, according to the tribunal responsible for handling complaints against the intelligence services.
Confirmation that surveillance took place emerged late on Wednesday, when the human rights group revealed that the Investigatory Powers Tribunal (IPT) sent it an email correcting an earlier judgment.
The extraordinary revision of a key detail in the ruling given on 22 June may alarm many supporters of Amnesty, who will want to know why it has been targeted.
In the original judgment, the IPT said that communications by the Egyptian Initiative for Personal Rights and the South African non-profit Legal Resources Centre had been illegally retained and examined.
In the email sent on Wednesday, the tribunal made it clear that it was Amnesty and not the Egyptian organisation that had been spied on – as well as the Legal Resources Centre in South Africa.
The breach of surveillance powers, under the Regulation of Investigatory Powers Act, related to retaining databases for longer than was permitted. Amnesty had been one of the claimants in the case, but in the original judgment the IPT made “no determination” on the organisation’s complaint – implying that either their emails and phone calls were not intercepted or that they were intercepted but by legal means.
Responding to the revelation, Salil Shetty, Amnesty International’s secretary general, said: “It’s outrageous that what has been often presented as being the domain of despotic rulers has been done on British soil, by the British government.
“How can we be expected to carry out our crucial work around the world if human rights defenders and victims of abuse can now credibly believe their confidential correspondence with us is likely to end up in the hands of governments?
“After 18 months of litigation and all the denials and subterfuge that entailed, we now have confirmation that we were in fact subjected to UK government mass surveillance. The revelation that the UK government has been spying on Amnesty International highlights the gross inadequacies in the UK’s surveillance legislation.
“If they hadn’t stored our communications for longer than they were allowed to, we would never even have known. What’s worse, this would have been considered perfectly lawful.”
The IPT email made no mention of when or why Amnesty International was spied on, or what was done with the information obtained. The organisation is calling for an independent inquiry into how and why a UK intelligence agency has been spying on human rights organisations.
Eric King, deputy director of Privacy International, which also took a similar case to the IPT, said: “Our system of oversight and remedy has fundamentally failed. The communications of one of the world’s leading human rights organisations – Amnesty International – were targeted by British spies, unlawfully, and our commissioners and courts failed to admit it, depriving individuals around the world of the validation and condemnation of, and redress for, unlawful government practices that is so desperately needed.
“Without Edward Snowden, without an 18-month legal battle, without an honest reckoning by whichever upstanding individual spotted and admitted this grave error, the unlawful conduct of the British intelligence agencies would never have been exposed by the very court charged with exposing it.
“Today’s farcical developments places into sharp relief the obvious problems with secret tribunals where only one side gets to see, and challenge, the evidence. Five experienced judges inspected the secret evidence, seemingly didn’t understand it, and wrote a judgement that turned out to be untrue. We need to know why and how this happened.
“Any confidence that our current oversight could keep GCHQ in check has evaporated. Only radical reforms will ensure this never happens again.”
Bron: www.theguardian.com
quote:Duitse pers bespioneerd door Amerikaanse NSA | NU - Het laatste nieuws het eerst op NU.nl
Een journalist van het Duitse weekblad Der Spiegel is bespioneerd door de Amerikaanse NSA.
Dat heeft de Duitse veiligheidschef Günter Heiss gezegd tegen de parlementaire commissie die de activiteiten van de Amerikaanse veiligheidsdiensten in Duitsland onderzoekt, meldt Der Spiegel.
In 2011 waarschuwde de NSA Heiss dat een lid van zijn staf contacten onderhield met de journalist. Zij verdachten de plaatsvervanger van Heiss, Hans Josef Vorbeck, die later dat jaar werd overgeplaatst naar een andere functie.
Afluisteren
Der Spiegel was het eerste Duitse medium dat in 2013 berichtte over het afluisteren van de mobiele telefoon van bondskanselier Angela Merkel door de Amerikanen. Later werd bekend dat ook andere Duitse ministers werden afgeluisterd.
"Het voelt bitter dat de Amerikaanse geheime diensten journalisten in andere landen bespioneerden en hun bronnen verraadden aan de overheid", zei een Duitse journalist, die anoniem wenst te blijven, tegen CNN. "Dit is iets wat je kan verwachten in dictaturen zoals Rusland en China, maar niet in een democratie."
Der Spiegel heeft vrijdag aangifte gedaan wegens schending van de telecommunicatiegeheimhouding en vermoedens van spionageactiviteiten.
Bron: www.nu.nl
quote:
Het artikel gaat verder.quote:On Sunday evening, someone hijacked the Hacking Team account on Twitter and used it to announce that the company known for developing hacking tools was itself a victim of a devastating hack.
. Note: This story is a follow-up to the previous Hacking Team story. You should read both if you want to see things from the beginning. Also, a curated slideshow of contracts and other visuals is also available.
The hackers released a 400GB Torrent file with internal documents, source code, and email communications to the public at large. As researchers started to examine the leaked documents, the story developed and the public got its first real look into the inner workings of an exploit development firm.
Hacking Team is an Italian company that sells intrusion and surveillance tools to governments and law enforcement agencies. However, their business has earned them a black mark from privacy and human rights organizations, as the company has been accused of selling tools and services to nations known for violent oppression.
Reporters Without Borders has listed the company on its Enemies of the Internet index due largely to Hacking Teams' business practices and their primary surveillance tool Da Vinci.
Sunday evening, documents circulating online, and documents shared by @SynAckPwn with Salted Hash, have linked Hacking Team to Egypt, Lebanon, Ethiopia, and Sudan.
The link to Sudan is especially newsworthy as the company previously stated they've never done business with the nation. There is a UN arms embargo on the Sudan, which is covered by EU and UK law. If they were doing business with the Sudanese government, Hacking Team could be in hot water.
In 2014, a Citizen Lab report revealed evidence that Hacking Team's RCS (Remote Control System) was being used by the Sudanese government, something the Italian company flat-out denied.
However, on Sunday a contract with Sudan, valued at 480,000 Euro, and dated July 2, 2012, was published as part of the 400GB cache. In addition, a maintenance list named Sudan as a customer, but one that was "not officially supported." Interestingly, Russia has the same designation.
Along with Russia and Sudan, there were other customers exposed by the breach including:
Egypt, Ethiopia, Morocco, Nigeria, Chile, Colombia
Ecuador, Honduras, Mexico, Panama, United States
Azerbaijan, Kazakhstan, Malaysia, Mongolia, Singapore, South Korea
Thailand, Uzbekistan, Vietnam, Australia, Cyprus, Czech Republic
Germany, Hungary, Italy, Luxemburg, Poland, Spain
Switzerland, Bahrain, Oman, Saudi Arabia, UAE
quote:
quote:Maar de Italianen werven ook klanten onder overheidsdiensten in Europa, de Verenigde Staten én in Nederland. Volgens journalist Brenno de Winter stond er voor afgelopen maandag een ontmoeting gepland met vertegenwoordigers van de Nationale Politie. Dat wil het bericht bevestigen noch ontkennen.
quote:Hacking Team maakte woensdag bekend dat zijn software in handen kan zijn gevallen van criminelen en terroristen, omdat het bedrijf 'niet langer kan beheren wie er van de technologie gebruik kan maken'. Het spreekt van een 'extreem gevaarlijke situatie'.
quote:
quote:Late Sunday, hackers dumped online a massive trove of emails and other documents obtained from the systems of Italian surveillance firm Hacking Team. The company’s controversial technology is sold to governments around the world, enabling them to infect smartphones and computers with malware to covertly record conversations and steal data.
For years, Hacking Team has been the subject of scrutiny from journalists and activists due to its suspected sales to despotic regimes. But the company has successfully managed to hide most of its dealings behind a wall of secrecy – until now.
For the last few days, I have been reading through the hacked files, which give remarkable insight into Hacking Team, its blasé attitude toward human rights concerns, and the extent of its spyware sales to government agencies on every continent. Adding to the work of my colleagues to analyze the 400 gigabyte trove of hacked data, here’s a selection of the notable details I have found so far:
quote:NSA document: Israeli special forces assassinated top Syrian military official | World news | The Guardian
US intelligence describes how Brig Gen Mahmoud Suleiman, close adviser to Bashar al-Assad, was shot dead near Tartus in 2008 by ‘Israeli naval commandos’
US intelligence describes how Brig Gen Mahmoud Suleiman, close adviser to Bashar al-Assad, was shot dead near Tartus in 2008 by ‘Israeli naval commandos’
Evidence has emerged from leaked US signals intelligence intercepts that Israeli special forces were responsible for assassinating a senior Syrian military official who was a close adviser to President Bashar al-Assad.
Brig Gen Mahmoud Suleiman was shot dead on a beach near the northern Syrian port of Tartus in August 2008. The Guardian reported at the time that the seaside murder was perpetrated by a sniper firing from a yacht moored offshore.
Israel has never commented publicly on suspicions that it was involved. But newly revealed secret US intelligence documents state as a fact that Israeli special forces killed the general.
Related: Middle East: Top Assad aide assassinated at Syrian resort
The revelation comes from an internal National Security Agency document provided by the former NSA contractor Edward Snowden, and cited by the Intercept, edited by Glenn Greenwald. It said that a top-secret entry in the NSA’s internal version of Wikipedia, called Intellipedia, described the assassination by “Israeli naval commandos” near Tartus as the “first known instance of Israel targeting a legitimate (Syrian) government official”.
The details of the assassination were included in a “manhunting timeline” within the NSA’s intelligence repository, the Intercept said on Wednesday.
The US embassy in Damascus reported at the time that Israel was the most likely suspect, according to a secret cable released by WikiLeaks in 2010. Iranian media went public with that accusation from the start.
Suleiman was described by Syrian officials as dealing with defence and security issues in Assad’s private office in Damascus. Israeli and Syrian opposition sources claimed he worked as “liaison” with the Iranian-backed Lebanese group Hezbollah, Israel’s sworn enemy.
But a secret US government document several months earlier gave his precise job description: “Syrian special presidential adviser for arms procurement and strategic weapons.” It was also suggested that he was responsible for security at a Syrian nuclear facility bombed by Israel 11 months earlier.
The Intercept said that, according to three former US intelligence officers with extensive experience in the Middle East, the document’s classification markings indicate that the NSA learned of the assassination through surveillance. The information in the document was labelled “SI,” which means the intelligence was collected by monitoring communications signals.
It added that knowledge within the NSA about surveillance of Israeli military units is especially sensitive because the NSA has Israeli intelligence officers working jointly with its officers at NSA headquarters in Fort Meade, Maryland.
Syria’s tightly controlled official media did not report on the killing at the time. But Syrian sources confirmed that Suleiman was shot by a silenced weapon in the head and neck on a beach at al-Rimal al-Zahabiyeh resort near Tartus, where, like other privileged Syrians, he owned a chalet.
In September 2007, Israeli planes attacked and destroyed a suspected nuclear site at al-Kibar on the Euphrates river, apparently one of the special projects Suleiman managed “which may have have been unknown to the broader Syrian military leadership”, as the US embassy put it.
The Israeli assassination of Suleiman came less than six months after a joint Mossad-CIA team assassinated a senior Hezbollah operative in the heart of Damascus. US and Israeli involvement in that attack, which targeted the Hezbollah military commander Imad Mughniyeh, was first reported in detail by the Washington Post. The CIA had long sought Mughniyeh for his role in terrorist attacks against Americans, including the 1983 Marine barracks bombing in Beirut, which killed 241 American servicemen.
Neither the NSA nor a spokesperson for the Israeli prime minister Binyamin Netanyahu responded to requests for comment, the Intercept said.
Bron: www.theguardian.com
quote:Pakistan tried to tap international web traffic via underwater cables, report says | World news | The Guardian
ISI spy agency sought access to data from ‘landing sites’ passing through Karachi, privacy group claims, in push to acquire digital espionage capacity to rival US
Pakistani intelligence sought to tap worldwide internet traffic via underwater cables that would have given the country a digital espionage capacity to rival the US, according to a report by Privacy International.
The report says the country’s Inter-Services Intelligence (ISI) agency hired intermediary companies to acquire spying toolkits from western and Chinese firms for domestic surveillance.
It also claims the ISI sought access to tap data from three of the four “landing sites” that pass through the country’s port city of Karachi, effectively giving it access to internet traffic worldwide.
Pakistan was in talks with a European company in 2013 to acquire the technology, but it is not clear whether the deal went through – a fact the rights organisation said was troubling.
“These cables are going to route data through various countries and regions,” Matthew Rice, an advocacy officer for Privacy International, said.
“Some will go from Europe to Africa and all the way to south-east Asia. From my reading that’s an explicit attempt to look at what’s going on.”
Traffic from North America and regional rival India would also be routed via the cables, he said.
Related: Boundless Informant: the NSA's secret tool to track global surveillance data
The report, based on what it called previously unpublished confidential documents, said the data collection sought in the ISI’s proposal “would rival some of the world’s most powerful surveillance programmes” including those of the US and Britain.
A spokesman for Pakistan’s military said he was not able to comment on the issue at the present time.
Last month Pakistani rights campaigners and opposition lawmakers urged Islamabad to protect the privacy of its citizens after leaked top-secret documents appeared to show British intelligence had gained access to almost all of the country’s internet users.
Pakistan is in the process of debating its own cybercrime bill, which rights campaigners say threatens to curtail freedom of expression and privacy in its current form.
Rights groups also expressed concern over a provision that allows the government to share intelligence with foreign spy agencies, such as the American National Security Agency, and a plan to force service providers to retain telephone and email records for up to a year.
Bron: www.theguardian.com
http://www.theguardian.co(...)-surveillance-powersquote:France approves 'Big Brother' surveillance powers despite UN concern
France’s highest authority on constitutional matters has approved a controversial bill that gives the state sweeping new powers to spy on citizens.
The constitutional council made only minor tweaks to the legislation, which human rights and privacy campaigners, as well as the United Nations, have described as paving the way for “very intrusive” surveillance and state-approved eavesdropping and computer-hacking.
In a report published on Friday, the 18-strong United Nations committee for human rights warned that the surveillance powers granted to French intelligence agencies were “excessively broad”.
It said the the bill “grants overly broad powers for very intrusive surveillance on the basis of vast and badly defined objectives” and called on France to “guarantee that any interference in private life must conform to principles of legality, proportionality and necessity”.
Other critics have labelled it the French “Big Brother” act, likening it to the tyrannical and sinister government surveillance in George Orwell’s novel 1984, calling it as a “historic decline in fundamental rights” and an attack on democracy.
Amnesty International warned that the French state was giving itself “extremely large and intrusive powers” with no judicial control.
The French president, François Hollande, had taken the unusual step of referring the legislation to the constitutional council to ensure it would not be challenged as unlawful.
The Socialist government justified the bill, which allows intelligence agencies to tap phones and emails, and hack computers without permission from a judge, in the wake of terrorist attacks in Paris in January, including at the satirical newspaper Charlie Hebdo and a Jewish shop, which left 17 people dead.
“From now on, France has a security framework against terrorism that respects liberties. It’s decisive progress,” the French prime minister, Manuel Valls, wrote in a tweet.
The bill was passed in June by an overwhelming number of French MPs, despite opposition from green and far-left parliamentarians and human rights activists.
It gives the country’s secret services the right to eavesdrop on the digital and mobile phone communications of anyone linked to a “terrorist” inquiry and install secret cameras and recording devices in private homes without requesting prior permission from a judge.
Intelligence agencies can also place “keylogger” devices on computers that record keystrokes in real time. Internet and phone service providers will be forced to install “black boxes” – complex algorithms – that will alert the authorities to suspicious behaviour online. The same companies will be forced to hand over information if asked.
[..]
quote:German government accuses news website of treason over leaks | World news | The Guardian
For the first time in more than 50 years journalists are facing treason charges, which is being denounced as an attack on the freedom of the press
Germany has opened a treason investigation into a news website a broadcaster said had reported on plans to increase state surveillance of online communications.
Related: Germany fights Facebook over real names policy
German media said it was the first time in more than 50 years journalists had faced treason charges, and some denounced the move as an attack on the freedom of the press.
“The federal prosecutor has started an investigation on suspicion of treason into the articles ... published on the internet blog Netzpolitik.org,” a spokeswoman for the prosecutor’s office said.
She added the move followed a criminal complaint by Germany’s domestic intelligence agency, the Office for the Protection of the Constitution (BfV), over articles about the BfV that appeared on the website on 25 February and 15 April. It said the articles had been based on leaked documents.
The public broadcaster ARD reported Netzpolitik.org had published an article on how the BfV was seeking extra funding to increase its online surveillance, and another about plans to set up a special unit to monitor social media, both based on leaked confidential documents.
The website specialises in internet politics, data protection, freedom of information and digital rights issues.
“This is an attack on the freedom of the press,” Netzpolitik.org journalist Andre Meister, targeted by the investigation along with editor-in-chief Markus Beckedahl, said in a statement. “We’re not going to be intimidated by this.”
Related: Germans greet influx of refugees with free food and firebombings
Michael Konken, head of the German press association, echoed the sentiment and called the probe “an unacceptable attempt to muzzle two critical journalists”.
In 1962 the defence minister, Franz Josef Strauss, was forced to resign after treason charges were brought against the news weekly Der Spiegel for a cover story alleging West Germany’s armed forces were unprepared to defend it against the communist threat in the cold war.
Beckedahl told the TV network N24: “I’m torn between feeling like this is an accolade and the thought that it could end up leading to jail.”
Bron: www.theguardian.com
quote:Duitse minister van Justitie ontslaat hoofd Federaal Openbaar Ministerie
De Duitse minister van Justitie Heiko Maas (SPD) heeft het hoofd van het Federaal Openbaar Ministerie Harald Range (67) ontslagen in een hoog oplopende politieke affaire over persvrijheid.
Range (67) raakte in opspraak omdat hij twee journalisten de nieuwssite Netzpolitik.org beschuldigd heeft van landverraad. De site verspreidde eerder dit jaar op basis van interne documenten van geheime diensten informatie over hoe het internet in toenemende mate zou worden gemonitord door de Binnenlandse Veiligheidsdienst. Eerder had ook de Süddeutsche Zeitung hierover bericht, in samenwerking met de publieke zenders NDR en WDR. Netzpolitik.org publiceerde echter ook de onderliggende stukken van de geheime dienst.
De veiligheidsdienst deed bij Range aangifte van landverraad en van het openbaar maken van staatsgeheimen. Op dat delict staat ten minste een jaar celstraf, maar in het ergste geval levenslang. Volgens minister Maas vallen de documenten echter niet onder de noemer ‘staatsgeheim’ en is de publicatie afgedekt door de persvrijheid die in de grondwet van de Bondsrepubliek is vastgelegd. Hij werd hierin gisteren bijgevallen door de minister van Binnenlandse Zaken en door bondskanselier Angela Merkel (CDU).
Range werd overladen met kritiek van parlementariërs van de sociaaldemocratische regeringspartij SPD, waartoe ook Maas behoort. De linkse oppositiepartij Die Linke eiste zijn aftreden. Verschillende parlementariërs van regeringspartij CDU/CSU daarentegen spraken hun steun uit voor Range en het handelen van het OM.
Range koos vanochtend voor een frontale aanval op Maas. Hij verweet de minister van Justitie politieke invloed uit te oefenen en de onafhankelijkheid van de rechtspraak in gevaar te brengen. De opvolger van Range, die sowieso binnen enkele maanden met pensioen zou gaan, is de Beierse procureur-generaal Justitie Peter Frank.
Met het vertrek van Range is de affaire waarschijnlijk nog niet ten einde. De Berlijnse politicoloog Hajo Funke zei in een reactie op de actualiteitenzender Phoenix dat er nog meer politieke verwikkelingen te verwachten zijn.
Bron: NRC
quote:AT&T's 'extraordinary, decades-long' relationship with NSA – report | US news | The Guardian
New York Times and ProPublica cite newly released NSA documents
Telecoms giant assisted with 'wiretapping United Nations headquarters'
The telecoms giant AT&T has had an “extraordinary, decades-long” relationship with the National Security Agency, it was reported on Saturday.
Citing newly disclosed NSA documents dating from 2003 to 2013, the New York Times said in a story published with ProPublica that AT&T was described as “highly collaborative” with an “extreme willingness to help” with government internet surveillance.
In June 2013, the former NSA contractor Edward Snowden leaked thousands of documents to media outlets including the Guardian. The following April, the Guardian and the Washington Post were awarded a Pulitzer prize for reporting on the story.
The new documents show that AT&T gave the NSA access to “billions of emails as they have flowed across its domestic networks”, the Times and ProPublica said. The reports also said AT&T provided “technical assistance” in “wiretapping all internet communications at the United Nations headquarters” in New York City.
The documents also show that the NSA’s budget for its relationship with AT&T was twice as large as that of the next-largest such programme, and that the company placed surveillance equipment in 17 of its US internet hubs.
Related: NSA collected Americans' email records in bulk for two years under Obama
The Times said the new documents did not name AT&T, but said analysis by its reporters and ProPublica revealed “a constellation of evidence” that pointed to the company.
The Times also pointed to the publication by the Guardian in June 2013 of a draft NSA inspector general report on email and internet data collection, under the codename Stellar Wind, which did not name AT&T or MCI, a company purchased by Verizon. The Times said the report “describes their market share in numbers that correspond to those two businesses, according to Federal Communications Commission reports”.
The Times quoted an AT&T spokesman, Brad Burns, as saying: “We do not voluntarily provide information to any investigating authorities other than if a person’s life is in danger and time is of the essence.”
Bron: www.theguardian.com
Ik wist wel dat ze dik waren met de CIA, en dat de Chileens belangen van AT&T een belangrijke reden waarom om de democratisch verkozen Allende te laten vermoorden samen met nog een paar duizend linksen en een wrede militaire dictatuur te installeren.quote:Op maandag 17 augustus 2015 15:58 schreef Papierversnipperaar het volgende:
AT&T's 'extraordinary, decades-long' relationship with NSA – report | US news | The Guardian
The telecoms giant AT&T has had an “extraordinary, decades-long” relationship with the National Security Agency, it was reported on Saturday.
quote:
quote:Nederland dreigt uit de bocht te vliegen met het massaal bespioneren van zijn burgers. Slecht plan.
Door: Menso Heus, 'technology officer' en expert internetveiligheid bij Free Press Unlimited
quote:Met toestemming van de minister mogen de diensten voortaan al onze communicatie bespieden en analyseren: telefoonverkeer, e-mail, websites die we bezoeken, enzovoort. Dit alles, zonder dat we ook maar ergens van worden verdacht. De gegevens worden tot wel drie jaar bewaard en kunnen worden uitgewisseld met buitenlandse geheime diensten.
De wetgever vermijdt het woord angstvallig, maar het gaat hier klip en klaar om 'massa surveillance' van het type zoals Edward Snowden dat onthulde. In plaats van ons hiertegen te beschermen, wil de Nederlandse overheid er nu zelf gebruik van kunnen maken.
Het ongericht aftappen van de communicatie van onschuldige en onverdachte burgers is echter in strijd met de Grondwet, het Europees Verdrag voor de Rechten van de Mens, het Internationaal Verdrag inzake Burgerrechten en Politieke Rechten en jurisprudentie van het Europees Hof voor de Rechten van de Mens. Ook staat het haaks op de Universele Verklaring van de Rechten van de Mens van de VN.
Is iemand hier verrast? Zo ja, denk er eens wat dieper over na. Hoe zouden ze kunnen aftappen zonder de hulp van die bedrijven?quote:
Hoog tijd dan dat gewone burgers met duizenden/tienduizenden/honderdduizenden/miljoenen memnsen een paar hele goede advocaten inhuren en procederen tot aan het Europees Hof. Ik verwacht dat Bits of Freedom hier het initiatief toe gaat nemen, ik hoop dat veel mensen zich erbij gaan aansluiten. Alle Nederlanders zijn een partij in deze zaak dus wij kunnen met zijn allen tegen onze overheid procederen bij het Europees Hof. Helaas moeten we beginnen met pro forma in Nederland te procederen met het voorspelbare resultaat dat de ene hand van de overheid de andere hand dekt maar uiteindelijk komt het voor onfhankelijke (of minder afhankelijke) rechters van andere EU-landen.quote:
Het ging niet alleen om AT&T maar inderdaad, ze (CIA, USA overheid) hadden in Chili die CIA-spion president laten worden en hem vervolgens vermoord en laten opvolgen door iemand die ze wel in de hand hadden - omdat hij toch kloten bleek te hebben en deed wat goed was voor het volk - omwille van de belangen van bedrijven. Een van de vele voorbeelden hoe de USA achter bijna alle grote conflicten zit die we na WOII hebben gehad in de wereld.quote:Op maandag 17 augustus 2015 16:03 schreef Weltschmerz het volgende:
[..]
Ik wist wel dat ze dik waren met de CIA, en dat de Chileens belangen van AT&T een belangrijke reden waarom om de democratisch verkozen Allende te laten vermoorden samen met nog een paar duizend linksen en een wrede militaire dictatuur te installeren.
Dat is niet waar: zie dit artikel.quote:Op vrijdag 31 juli 2015 10:51 schreef Papierversnipperaar het volgende:
For the first time in more than 50 years journalists are facing treason charges...
quote:
quote:Labour leadership contender Yvette Cooper has issued a mea culpa over the last Labour government’s attitude towards civil liberties, saying it did not do enough to keep the state’s surveillance powers in check. In the latest sign of candidates trying to draw a line under the past, the shadow home secretary criticised the governments of Tony Blair and Gordon Brown for being “too reluctant to introduce checks and balances as strong as new terrorism powers”.
Both the Labour and Conservative parties also ignored the inadequacy of laws governing interception of communications – the Regulation of Investigatory Powers Act (Ripa) – for too long, she added.
Cooper told the Guardian that better protection of civil liberties would become a policy if she is elected as Labour’s leader next month. She said she would make it a priority to “break up concentrations of power” and launch a review of privacy in relation to private sector companies that hold a huge amount of personal data.
quote:
quote:Het duurde precies 15 dagen, 1 uur en 25 minuten voordat Tim den Besten en Nicolaas Veul het beu waren hun leven live te streamen. De jongens droegen dag en nacht een camera bij zich en deelden hun leven met de rest van de wereld. Op de site van Super Stream Me zag je hun hartslag, exacte locatie en gemoedstoestand. We konden alles over ze te weten komen: hun telefoonnummer, bankgegevens en of ze masturbeerden.
quote:Veul zag het als zijn werk om als televisiemaker de vraag te stellen waar hij oprecht nieuwsgierig naar was. “Dan moet je niet schromen om zelf met de billen bloot te gaan.” En dat deden ze. Letterlijk en figuurlijk. Nu is de koek op, de mannen zijn uitgeput, willen niet meer en kappen ermee.
quote:Vooral het niet alleen kunnen zijn en daardoor geen rust hebben brak Den Besten op. “Dat heb ik nodig. Ik heb geleerd dat het heel belangrijk is om niet altijd gezien te worden. Gewoon in je raam te kunnen zitten en naar buiten te kijken.” Veul heeft een groot besef van privacy uit dit experiment gehaald. “Er is een quote van Snowden die zegt: ‘privacy gaat niet om wat je te verbergen hebt, maar om wat je te beschermen hebt’. Dat weet ik nu heel goed.”
quote:
quote:Nationale toezichthouders zijn niet gebonden aan een beschikking van de Europese Commissie dat gegevens van Europeanen naar de VS gestuurd mogen worden omdat ze daar voldoende beschermd worden. Ze mogen die verzending opschorten, luidt een advies aan het Hof van Justitie van de Europese Unie (HvJEU).
Het artikel gaat verder.quote:De advocaat-generaal van het Europees Hof van Justitie schrijft in zijn advies zelfs dat de desbetreffende beschikking ongeldig is. Het HvjEU neemt het advies van de advocaat-generaal vrijwel altijd over. De zaak is aanhangig gemaakt door een Oostenrijker die er bezwaar tegen maakte dat de Ierse dochteronderneming van Facebook zijn gegevens doorspeelde aan servers in de Verenigde Staten. Hij betoogde dat de Snowden-onthullingen hadden aangetoond dat zijn data daar niet in veilige handen waren.
De Ierse toezichthouder wees het bezwaar van de hand met een verwijzing naar de beschikking van de Europese Commissie van 2002 over de Safe Harbour-afspraken, die zouden waarborgen dat de VS een voldoende niveau van bescherming van persoonsgegevens biedt. De zaak ging naar het High Court of Ireland, dat vervolgens van het HvJEU wilde weten of nationale autoriteiten zelf de mate van bescherming nog mogen onderzoeken en zo nodig de gegevensverstrekking mogen opschorten.
quote:“Snowden Treaty” Calls for End to Mass Surveillance, Protections for Whistleblowers
Inspired by the disclosures of NSA whistleblower Edward Snowden, a campaign for a new global treaty against government mass surveillance was launched today in New York City.
Entitled the “The International Treaty on the Right to Privacy, Protection Against Improper Surveillance and Protection of Whistleblowers,” or, colloquially, the “Snowden Treaty,” an executive summary of the forthcoming treaty calls on signatories “to enact concrete changes to outlaw mass surveillance,” increase efforts to provide “oversight of state surveillance,” and “develop international protections for whistleblowers.”
At the event launching the treaty, Snowden spoke via a video link to say that the treaty was “the beginning of work that will continue for many years,” aimed at building popular pressure to convince governments to recognize privacy as a fundamental human right, and to provide internationally-guaranteed protections to whistleblowers who come forward to expose government corruption. Snowden also cited the threat of pervasive surveillance in the United States, stating that “the same tactics that the NSA and the CIA collaborated on in places like Yemen are migrating home to be used in the United States against common criminals and people who pose no threat to national security.”
The treaty is the brainchild of David Miranda, who was detained by British authorities at Heathrow airport in 2013, an experience that he described as galvanizing him towards greater political activism on this issue. Miranda is the partner of Glenn Greenwald, a founding editor of The Intercept who received NSA documents from Snowden. Authorities at Heathrow seized files and storage devices that Miranda was transporting for Greenwald. (The Press Freedom Litigation Fund of First Look Media, the publisher of the Intercept, is supporting Miranda’s lawsuit challenging his detention.)
Along with the activist organization Avaaz, Miranda began working on the treaty project last year. “We sat down with legal, privacy and technology experts from around the world and are working to create a document that will demand the right to privacy for people around the world,” Miranda said. Citing ongoing efforts by private corporations to protect themselves from spying and espionage, Miranda added that “we see changes happening, corporations are taking steps to protect themselves, and we need to take steps to protect ourselves too.”
The full text of the treaty has yet to be released, but it is envisioned as being the first international treaty that recognizes privacy as an inalienable human right, and creates legally-mandated international protections for individuals who are facing legal persecution for exposing corruption in their home countries. Its proponents hope to build momentum and convince both governments and multi-national organizations to adopt its tenets. Since the Snowden revelations there has been increasing public recognition of the threat to global privacy, with the United Nations announcing the appointment of its first Special Rapporteur on this issue in March, followed by calls for the creation of a new Geneva Convention on internet privacy.
Greenwald also spoke at the event, saying, “This campaign offers the opportunity to put pressure on governments to adopt a treaty that pushes back against mass surveillance, and also makes clear that individuals who expose corruption should not be subject to the retribution of political leaders.” Adding that many governments that make a show of supporting the dissidents of other countries tend to persecute their own whistleblowers, Greenwald added, “We need a lot of public pressure to say that mass surveillance should end, and that people who expose corruption should be entitled to international protections.”
Bron: theintercept.com
quote:
quote:Een gebouw van de geheime dienst loop je niet zomaar binnen. Toch wilden privacy-activisten het personeel in zo'n ondoordringbaar fort heel graag iets zeggen. Hun oplossing was een drone, die maandag duizenden flyers uitstrooide boven het Dagger Complex in het Duitse Darmstadt, een Amerikaanse militaire basis met een Europese vestiging van de NSA. Erop stond één simpele vraag: 'Klaar om je baan op te zeggen?'
quote:
quote:De rechtszaak werd in augustus vorig jaar aangespannen tegen Facebook door de Oostenrijkse student en activist Max Schrems. Hij heeft sinds 2008 een account op Facebook en stapte naar de rechter na de onthullingen van Edward Snowden. Hieruit bleek dat Amerikaanse geheime diensten op grote schaal het internet 'afluisteren'.
De Spiegel Affaire is ook al weer uit "62quote:Op zondag 23 augustus 2015 18:18 schreef Bram_van_Loon het volgende:
[..]
Dat is niet waar: zie dit artikel.
http://www.theregister.co(...)can_campbell/?page=3
Misschien is het de eerste keeri n 50 jaar dat dit in Duitsland gebeurt maar dat geldt zeker niet voor Europa, ze hadden het niet specifiek over Duitsland.
quote:NSA can break into encrypted Web and VPN connections due to a commonplace cryptographic mistake
Two researchers have found that the National Security Agency (NSA) of USA could have the technology to break into the 1024 bit Diffie-Hellman cryptographic key exchange due to a commonplace weakness. This means that NSA could be able to peer into a large amount of encrypted communications.
The researchers noted that one single prime is used to encrypt two-thirds of all virtual private networks (VPNs) and a quarter of secure shell (SSH) servers globally, two major security protocols used by a number of businesses. A second prime is used to encrypt “nearly 20 [percent]of the top million HTTPS websites.” This is a commonly used way of keeping data indecipherable for anyone except its intended recipient – almost anyone, that is.
“Since a handful of primes are so widely reused, the payoff, in terms of connections they could decrypt, would be enormous,” researchers Alex Halderman and Nadia Heninger wrote in a blog post published Wednesday. “Breaking a single, common 1024-bit prime would allow NSA to passively decrypt connections to two-thirds of VPNs and a quarter of all SSH servers globally. Breaking a second 1024-bit prime would allow passive eavesdropping on connections to nearly 20% of the top million HTTPS websites. In other words, a one-time investment in massive computation would make it possible to eavesdrop on trillions of encrypted connections.”
The problem is that many of these 1024-bit prime numbers are reused because of how (previously) inconceivably expensive it would be to break them. As noted above, the researchers found that one single prime number is used to encrypt two-thirds of all VPNs and a quarter of all SSH servers, two security measures used by businesses globally. Another is used to encrypt 18 percent of the “top million HTTPS websites.” That means that a single instance of the aforementioned year-long cracking effort could give the NSA access to all of this information.
“This isn’t a flaw in a particular protocol, it’s a property of the math [that]underlies Diffie-Hellman, which is part of the foundation of almost every important cryptographic protocol we use,” Halderman said. “It’s certainly not an overnight [fix]. One of the problems is that the standards behind any important protocols like the IPsec VPN protocol specify that everyone will use these particular primes that by virtue of being so lightly used are made weaker. I think it’s going to be years unfortunately before standards and implementations are widely updated to account for this threat.”
Bron: www.techworm.net
quote:Facebook will warn you if the government is hacking your profile
A hacker or spammer can do some serious damage to your Facebook account — but what about the watchful eye of the government over your private messages?
Facebook said it will begin warning users if it detects a user's account is being targeted or compromised by a nation-state or a state-sponsored actor.
See also: What the massive government breach means for your personal data
"While we have always taken steps to secure accounts that we believe to have been compromised, we decided to show this additional warning if we have a strong suspicion that an attack could be government-sponsored," Facebook's Chief Security Officer Alex Stamos wrote in a blog post on Saturday. "We do this because these types of attacks tend to be more advanced and dangerous than others, and we strongly encourage affected people to take the actions necessary to secure all of their online accounts."
When Facebook has strong evidence that a government is intruding on a user's Facebook account, the company will send this warning:
Stamos added that Facebook likely won't be able to provide any additional explanation as to why it suspects a users's account has been targeted, but the message doesn't mean Facebook as a whole has been compromised. He also doesn't single out any particular state or government in the blog post.
If you receive the message above, you should enable two-factor authentication, which is under Login Approvals on Facebook. Stamos further suggests that users should "rebuild or replace" their computer system, as it's likely to be infected by malware.
In Facebook's last transparency report from November 2014, the company revealed that government requests for Facebook user data in the first half of 2014 increased 24% from the second half of 2013. However, those are formal requests, so they do not include attempts by governments or government-sponsored agents to obtain users' information without permission. It's difficult to estimate how often those incidents occur, though the mere fact that Facebook is now warning users about such attempts suggests they are not uncommon.
Bron: mashable.com
quote:Investigatory powers bill: snooper's charter to remain firmly in place | World news | The Guardian
Legislation will enshrine security services’ licence to hack, bug and burgle their way across the web – with judicial oversight still to be determined
The key elements of the snooper’s charter, including the bulk collection and storage for 12 months of everyone’s personal data, tracking their use of the web, phones and social media, will remain firmly in place when the government publishes its new investigatory powers bill on Wednesday.
The legislation, to be introduced by the home secretary, Theresa May, will provide the security services with an explicit licence to “snoop on the web” for the first time.
Until the disclosures of the whistleblower Edward Snowden, these powers and mass surveillance programmes remained hidden in the complex undergrowth of the pre-digital age Regulation of Investigatory Powers Act 2000 (Ripa) and other arcane surveillance laws.
The new, comprehensive, surveillance legislation will provide the security services and police with access to personal web and phone data using bulk-collection powers and will also put on a fresh legal footing spies’ mass computer hacking, known as “computer network exploitation”.
Related: Lord Carlile criticises proposals for judges to approve spying warrants
In the runup to the bill’s publication May has made much of having removed some of the more contentious elements from her previous attempt to introduce the snooper’s charter in parliament, which was blocked by her Liberal Democrat coalition partners. So is this week’s new surveillance law a climbdown or is it still a snooper’s charter?
Internet and phone companies are expected to be required to keep the communications data of all their customers’ use of the web, their phones and social media for 12 months. This is not the content, which has to be authorised by a ministerial intercept warrant, but the who, what, where and when of everyone’s use of the web.
It is often the case that the “who sent what to whom from where” can be more useful to the security services and police than the actual content of messages because it can tell them a lot about an individual’s life, and represents hard evidence.
It is easy to lie in the writing of an instant message but far harder to lie over when and to whom it was sent. This is reflected in the fact that communications data can be used as evidence in court while information obtained via interception is not admissible and can only be used for intelligence.
The Home Office will pay the internet and phone companies an as-yet unspecified (but no doubt large) sum to store this data and to provide access to the security services and the police according to specified regimes.
The security and intelligence services will use the bulk collection of personal internet data by the web and phone companies as the basis of GCHQ’s powerful data-mining programs to generate intelligence data.
Related: Don’t be fooled by spook propaganda: the state still wants more licence to pry | Henry Porter
It is the activity of the hundreds of such programs that campaigners say amounts to the snooper’s charter invasion of privacy.
The police, who make the bulk of the 500,000 external requests for communications data each year, have a separate regime with approval at inspector or superintendent level depending on the kind of data being requested for use in crime investigations. This includes terrorism investigations but also stalking and missing persons cases.
The bill is expected to add a category of internet connection records that will allow the police to trace which websites a suspect has visited, but not the content of pages. This is expected to require judicial authorisation, which is likely to be in the form of a panel of specially trained retired judges and requests will have to be targeted and limited.
They may also be required to authorise police requests for the communications data of journalists, lawyers or other legally privileged professions.
A further 40 public bodies also get different levels of access but often will need a magistrate’s authorisation. But the vast majority of the 500,000 requests made each year will continue as now without the need for a judicial or ministerial warrant.
The home secretary has given up trying to force overseas web companies to meet British requests to hand over their customers’ data. She has also dropped her plan to get UK-based companies to keep “third party” data that passes over their networks if the US companies refused to cooperate.
Instead, May has decided to rely on the recommendations of Sir Nigel Sheinwald, the former British ambassador to Washington, who earlier this year told the government that the only way to solve this problem was to negotiate a new treaty with the US to secure a rapid response to requests.
When the prime minister visited Washington earlier this year he gave the impression that he wanted to ban encryption on the web, arguing that there should be no safe space for terrorists or paedophiles. Ministers have ruled out for now any such ban or restriction on encryption, which would have severely undermined Britain as a global business centre.
The bill will enshrine the security services’ licence to hack, bug and burgle their way across the web. Britain’s security services only officially admitted that they had worldwide powers to attack computers this year.
As a result of a court case, an innocuous-sounding “draft equipment interference code of practice” was published by the Home Office. This put into the public domain the rules and safeguards surrounding the use of computer hacking outside the UK by the security services for the first time.
Privacy campaigners said the powers outlined in the draft guidance detailed the powers of intelligence services to sweep up content of a computer or smartphone, listen to their phone calls, track their locations or even switch on the microphones or cameras on mobile phones. The last would allow them to record conversations near the phone or laptop and snap pictures of anyone nearby.
Theresa May faces strong parliamentary opposition to continued ministerial authorisation of the 2,400-a-year intercept warrants she currently signs. She has already offered a two-stage compromise by floating the idea of a judicial veto on her authorisations. She is also expected to announce that the fragmented system of five separate oversight commissioners is replaced with a single investigatory powers commissioner, who would be a senior judge, to hold the security services and police to account.
Bron: www.theguardian.com
quote:My work at GCHQ and the surveillance myths that need busting | Comment is free | The Guardian
In a first for the Guardian, a GCHQ officer writes about its investigatory powers in the wake of the publication of Theresa May’s proposed new measures
Many words about GCHQ have appeared over the last two years – but rarely have they been GCHQ’s own words. We welcome the debate now under way in parliament and among the public about our work. We need public consent for what we do – we wouldn’t want to do our jobs without it. We want the debate to be informed by facts, not half-understood inferences. We do not expect to persuade everyone to support what we do, but GCHQ certainly does bear a responsibility to make sure the discussion about us is based in reality. I want to cover two particular topics frequently misunderstood: bulk interception and encryption.
The draft bill published on Wednesday responds to three independent reviews carried out into investigatory powers. The reviews were unanimous in their agreement that the powers currently available to the intelligence and security services remain essential. And while the courts have recently confirmed that the bulk interception regime was lawful, the reviewers concluded that the legal framework needed updating. We are confident that the draft bill places our powers on a clearer footing and strengthens safeguards and oversight to a world-leading standard.
The draft bill also enables GCHQ and our sister agencies to meet the challenges of technological advances. As the internet grows exponentially, and smartphones create an explosion in information, increasingly tech-savvy criminals and terrorists attempt to hide in the mass of data and the dark recesses of the web.
Our best – often our only – chance to detect them is to search and analyse datasets in which they might be found. All major UK counter-terrorism investigations of the last decade have relied on analysis of data collected at scale to understand and disrupt the threat. This is particularly critical when a threat emanates from overseas, where we and other agencies have fewer options to illuminate it. Many other aspects of our work depend on it too, including child exploitation, cybersecurity and serious crime.
In 2014, GCHQ analysis of bulk data uncovered a previously unknown individual in contact with Isis attack-planners in Syria. Although he tried to hide his activity, we were able to use bulk data to spot that he had travelled to Europe, where he planned to carry out an attack. The data was provided to the authorities in that country, enabling the successful disruption of the plot, including capturing the home-made bombs he had manufactured.
Use of these bulk data powers is not indiscriminate. GCHQ cannot and would not hoover up every piece of information. It would be illegal for us to carry out “mass surveillance”, nor would we want to, even if the law allowed it. And stringent access controls apply before analysts may examine any particular piece of data. We always focus on maximising the probability of identifying people who wish to do us harm. The scale of internet data is staggering compared to 10 years ago, so while the volume we scan may seem large, it is a minute slice of the whole.
Those with unfettered access to our operations have quickly dispelled the mass surveillance myth. David Anderson QC examined examples of cases reliant on bulk interception, interrogated our analysts and looked at our intelligence reports. He wrote: “They leave me in not the slightest doubt that bulk interception, as it is currently practised, has a valuable role to play in protecting national security.” The parliamentary intelligence and security committee stated: “Our inquiry has shown that the agencies do not have the legal authority, the resources, the technical capability, or the desire to intercept the communications of British citizens, or of the internet as a whole. GCHQ is not reading the emails of everyone in the UK.” Sir Anthony May, one of Britain’s most senior judges, conducted an investigation and asked the question whether we engage in random mass intrusion into the private affairs of innocent citizens. His answer was “emphatically no”.
There is another myth that badly needs busting, namely the idea that GCHQ is against encryption and would not disclose vulnerabilities in software. We live more and more of our lives online and it is right that companies which hold the personal data of their customers take the strongest steps to keep it secure. It is also right that people should be able to interact with their bank and other businesses with confidence. As well as being civil servants charged with a unique mission, our own staff live everyday lives where they, their family and their friends depend on the same secure technology as everyone else.
The draft bill essentially repeats what the law currently says about encryption.
We do not seek to ban encryption, we do not want mandatory “back doors” in products and we frequently warn companies about security vulnerabilities we find. On a daily basis we advise companies and public services about how to deal with specific cyber-attacks. No organisation does more to protect UK cybersecurity than GCHQ. In September 2015, Apple publicly credited CESG (the information assurance arm of GCHQ) with the detection of a vulnerability in its iOS operating system for iPhones and iPads which could have been exploited. That vulnerability has now been patched.
Dealing with encryption and analysing data at scale were crucial for GCHQ’s predecessors at Bletchley Park to succeed in their mission. Protecting life and liberty is our heritage, but it’s our current and future duty too. We need legislation and powers fit for the modern world to carry out that duty.
Bron: www.theguardian.com
quote:Only 'tiny handful' of ministers knew of mass surveillance, Clegg reveals | Politics | The Guardian
Former deputy PM says he was astonished to learn how few cabinet members were aware of scale of UK spies’ reach into lives of British citizens
The majority of the UK cabinet were never told the security services had been secretly harvesting data from the phone calls, texts and emails of a huge number of British citizens since 2005, Nick Clegg has disclosed.
Clegg says he was informed of the practice by a senior Whitehall official soon after becoming David Cameron’s deputy in 2010, but that“only a tiny handful” of cabinet ministers were also told – likely to include the home secretary, the foreign secretary and chancellor. He said he was astonished to learn of the capability and asked for its necessity to be reviewed.
Related: The surveillance bill is flawed but at last we have oversight | Nick Clegg
The former deputy prime minister’s revelation in the Guardian again raises concerns about the extent to which the security services felt they were entitled to use broadly drawn legislative powers to carry out intrusive surveillance and keep this information from democratically elected politicians.
Related: Security and liberty: Theresa May’s surveillance plans | Letters from Lord West and others
The government finally admitted on Wednesday that the mass surveillance of British citizens began in 2001 after 9/11 and was stepped up in 2005, using powers under national security directions largely hidden in the 1984 Telecommunications Act.
It is not known if government law officers sanctioned the use of the act in this way, but it appears the intelligence and security committee responsible for parliamentary oversight was not informed, adding to the impression of a so-called deep state operating outside the scrutiny of parliament.
Clegg writes: “When I became deputy prime minister in 2010, I was the leader of a party that had been out of government for 65 years. There were a lot things that we had to re-learn, and a lot that was surprising and new.
“When a senior official took me aside and told me that the previous government had granted MI5 direct access to records of millions of phone calls made in the UK – a capability that only a tiny handful of senior cabinet ministers knew about – I was astonished that such a powerful capability had not been avowed to the public or to parliament and insisted that its necessity should be reviewed.
“That the existence of this previously top secret database was finally revealed in parliament by the home secretary on Wednesday, as part of a comprehensive new investigatory powers bill covering many other previously secret intelligence capabilities, speaks volumes about how far we’ve come in a few short years.”
He also contends that when the revelations of Edward Snowden hit, “the knee-jerk response within government was to play the man and ignore the ball”.
He writes: “Ministers simply didn’t understand – whatever concerns they may have had about Snowden’s own behaviour - the significance of the fact that the world now knew the government’s most closely guarded secrets. They refused to acknowledge that the democratisation of the security state had become inevitable.”
Related: Mass snooping and more – the measures in Theresa May's bill
Clegg claims the draft investigatory powers bill, published on Wednesday, has put the country within touching distance of a comprehensive set of laws covering every surveillance capability of the government. The draft bill, he argues, has been the result of the internal pressure applied by Liberal Democrat ministers inside the coalition government and the external debate generated by the Snowden revelations.
Giving his most detailed assessment of the specifics of the draft bill, he adopts a more sceptical attitude than the initial Labour frontbench reaction on Wednesday, saying many of the proposals are controversial and excessive.
He says the ability of GCHQ “to hack anything from handsets to whole networks is highly intrusive and needs to be much better understood before we can place it within appropriate constraints.
“The new, revised proposals on the storage of web browsing data remain problematic as the bill appears to call for the storage of vast quantities of data that go far beyond the operational requirements set out by the home secretary in the Commons.”
In common with some Tory MPs, he suggests: “The so called ‘double lock’ of judicial oversight appears to be nothing of the sort, as judges will have very little discretion when making decisions about individual warrants. And many will wish to question the access that the intelligence agencies have to our phone records.”
Bron: www.theguardian.com
De standaard strategie van de overheid bij klokkenluiders: de klokkenluider als persoon zo veel mogelijk zwartmaken en zo veel mogelijk hinderen met zaken die niets met het euvel te maken hebben. Vraag het maar aan Oltmans en Spijkers, die hebben het ook meegemaakt.quote:Op vrijdag 6 november 2015 21:51 schreef Papierversnipperaar het volgende:
He also contends that when the revelations of Edward Snowden hit, “the knee-jerk response within government was to play the man and ignore the ball”.
quote:Rechter deelt tik uit aan Amerikaanse veiligheidsdienst NSA | NOS
Een federale rechter in de Verenigde Staten heeft het verzamelen van metadata van telefoongesprekken "hoogstwaarschijnlijk ongrondwettelijk" genoemd. Hij deed dat in de zaak die een advocatenkantoor in Californië had aangespannen tegen de veiligheidsdienst NSA.
Twee jaar geleden kwamen de verregaande activiteiten van de NSA via klokkenluider Edward Snowden aan het licht. Er bleek onder meer dat de dienst op grote schaal metadata verzamelt, dus bijvoorbeeld informatie over wie met wie mailt of belt.
De rechter in de hoofdstad Washington heeft het in zijn vonnis over "een verlies aan grondwettelijke vrijheden". De NSA moet van hem onmiddellijk stoppen met het verzamelen van de gegevens van het advocatenkantoor.
De uitspraak is overigens vooral van symbolisch belang: het massasurveillanceprogramma van de NSA in zijn huidige vorm loopt over drie weken af. Op 29 november gaat de dienst over op een systeem waarbij het aftappen doelgerichter zal zijn.
Desondanks zijn privacy-activisten blij met de uitspraak. Edward Snowden spreekt op Twitter van een historisch besluit.
Bron: nos.nl
quote:
quote:In June 2013, Glen Greenwald, then of The Guardian, broke the first of many stories detailing how the NSA gathers and stores information about innocent Americans. Since then, we have learned that U.S. intelligence agencies are gathering massive amounts of data from phone and internet companies, not just on Americans, but foreign leaders as well.
How and under what circumstances are U.S. intelligence agencies allowed to collect your data? Where does Americans' data go once they collect it? In this collection of resources, the Brennan Center sheds a much-needed light on how the government is collecting, sharing, and storing data that is not immediately relevant to counterterrorism efforts.
http://www.nytimes.com/20(...)hting-terrorism.htmlquote:Mass Surveillance Isn’t the Answer to Fighting Terrorism
It’s a wretched yet predictable ritual after each new terrorist attack: Certain politicians and government officials waste no time exploiting the tragedy for their own ends. The remarks on Monday by John Brennan, the director of the Central Intelligence Agency, took that to a new and disgraceful low.
Speaking less than three days after coordinated terrorist attacks in Paris killed 129 and injured hundreds more, Mr. Brennan complained about “a lot of hand-wringing over the government’s role in the effort to try to uncover these terrorists.”
What he calls “hand-wringing” was the sustained national outrage following the 2013 revelations by Edward Snowden, a former National Security Agency contractor, that the agency was using provisions of the Patriot Act to secretly collect information on millions of Americans’ phone records. In June, President Obama signed the USA Freedom Act, which ends bulk collection of domestic phone data by the government (but not the collection of other data, like emails and the content of Americans’ international phone calls) and requires the secretive Foreign Intelligence Surveillance Court to make its most significant rulings available to the public.
These reforms are only a modest improvement on the Patriot Act, but the intelligence community saw them as a grave impediment to antiterror efforts. In his comments Monday, Mr. Brennan called the attacks in Paris a “wake-up call,” and claimed that recent “policy and legal” actions “make our ability collectively, internationally, to find these terrorists much more challenging.”
It is hard to believe anything Mr. Brennan says. Last year, he bluntly denied that the C.I.A. had illegally hacked into the computers of Senate staff members conducting an investigation into the agency’s detention and torture programs when, in fact, it did. In 2011, when he was President Obama’s top counterterrorism adviser, he claimed that American drone strikes had not killed any civilians, despite clear evidence that they had. And his boss, James Clapper Jr., the director of national intelligence, has admitted lying to the Senate on the N.S.A.’s bulk collection of data. Even putting this lack of credibility aside, it’s not clear what extra powers Mr. Brennan is seeking.
Most of the men who carried out the Paris attacks were already on the radar of intelligence officials in France and Belgium, where several of the attackers lived only hundreds of yards from the main police station, in a neighborhood known as a haven for extremists. As one French counterterrorism expert and former defense official said, this shows that “our intelligence is actually pretty good, but our ability to act on it is limited by the sheer numbers.” In other words, the problem in this case was not a lack of data, but a failure to act on information authorities already had.
In fact, indiscriminate bulk data sweeps have not been useful. In the more than two years since the N.S.A.’s data collection programs became known to the public, the intelligence community has failed to show that the phone program has thwarted a terrorist attack. Yet for years intelligence officials and members of Congress repeatedly misled the public by claiming that it was effective.
The intelligence agencies’ inability to tell the truth about surveillance practices is just one part of the problem. The bigger issue is their willingness to circumvent the laws, however they are written. The Snowden revelations laid bare how easy it is to abuse national-security powers, which are vaguely defined and generally exercised in secret.
Listening to Mr. Brennan and other officials, like James Comey, the head of the Federal Bureau of Investigation, one might believe that the government has been rendered helpless to defend Americans against the threat of future terror attacks.
Mr. Comey, for example, has said technology companies like Apple and Google should make it possible for law enforcement to decode encrypted messages the companies’ customers send and receive. But requiring that companies build such back doors into their devices and software could make those systems much more vulnerable to hacking by criminals and spies. Technology experts say that government could just as easily establish links between suspects, without the use of back doors, by examining who they call or message, how often and for how long.
In truth, intelligence authorities are still able to do most of what they did before — only now with a little more oversight by the courts and the public. There is no dispute that they and law enforcement agencies should have the necessary powers to detect and stop attacks before they happen. But that does not mean unquestioning acceptance of ineffective and very likely unconstitutional tactics that reduce civil liberties without making the public safer.
quote:Paris is being used to justify agendas that had nothing to do with the attack | Trevor Timm | Comment is free | The Guardian
The Paris attackers weren’t Syrian, and they didn’t use encryption, but the US government is still using the carnage to justify attempts to ban them both
The aftermath of the Paris terrorist attacks has now devolved into a dark and dishonest debate about how we should respond: let’s ban encryption, even though there’s no evidence the terrorists used it to carry out their crime, and let’s ban Syrian refugees, even though the attackers were neither.
It’s hard to overstate how disgusting it has been to watch, as proven-false rumors continue to be the basis for the entire political response, and technology ignorance and full-on xenophobia now dominate the discussion.
Related: Donald Trump's bigotry against Muslims has safety implications we can't ignore | M Dove Kent
First, there’s the loud “we need to ban encryption” push that immediately spawned hundreds of articles and opinions strongly pushed by current and former intelligence officials the day or two after the attacks, despite the government quietly admitting there was no evidence that the attackers used encryption to communicate. It was a masterful PR coup: current and former intelligence officials got to sit through a series of fawning interviews on television where they were allowed to pin any of their failures on Edward Snowden and encryption – the bedrock of privacy and security for hundreds of millions of innocent people – with virtually no pushback, or any critical questions about their own conduct.
The entire encryption subject became a shiny scapegoat while the truth slowly trickled in: as of Tuesday, it was clear that American and/or French intelligence agencies had seven of the eight identified attackers on their radar prior to the attacks. The attackers used Facebook to communicate. The one phone found on the scene showed the terrorists had coordinated over unencrypted SMS text messages – just about the easiest form of communication to wiretap that exists today. (The supposed ringleader even did an interview in Isis’s English magazine in February bragging that he was already in Europe ready to attack.)
As an unnamed government official quoted by the Washington Post’s Brian Fung said, if surveillance laws are expanded the media will be partly to blame: “It seems like the media was just led around by the nose by law enforcement. [They are] taking advantage of a crisis where encryption hasn’t proven to have a role. It’s leading us in a less safe direction at a time when the world needs systems that are more secure.”
As dishonest as the “debate” over encryption has been, the dark descension of the Republican party into outright racism and cynically playing off the irrational fears of the public over the Syrian refugee crisis has been worse. We now know the attackers weren’t Syrian and weren’t even refugees. It was a cruel rumor or hoax that one was thought to have come through Europe with a Syrian passport system, but that was cleared up days ago. But in the world of Republican primaries, who cares about facts?
Virtually every Republican candidate has disavowed welcoming any refugees to the US, and they are now competing over who is more in favor of banning those who are fleeing the very terrorists that they claim to be so against.
It doesn’t matter that the US has a robust screening system that has seen over 750,000 refugees come to the United States without incident – the Republican-led House has now voted to grind the already intensive screening process to a virtual halt (they were disgracefully joined by many Democrats). Chris Christie said the US should refuse widows and orphans. Rand Paul introduced a law to bar the entire Muslim world from entering the US as refugees. Donald Trump has suggested he would digitally track every Muslim in the county.
As The Intercept’s Lee Fang documented in detail, the rhetoric spewing from the mouths of the Republican Party sounds almost word for word like the racists during World War II that wanted the US to refuse Jews on the basis that they might be secret Nazis.
Even the supposedly establishment Republicans have debased themselves with rhetoric that one can only hope that one day they regret. This video of Jeb Bush struggling to explain why he would create a religious litmus test for refugees and how families are going to “prove” they’re Christian is truly cringeworthy. As Barack Obama said in his admirable condemnation of Bush and others on Tuesday, such talk is “shameful” and “un-American.”
One can say a lot of awful things about Jeb’s brother, George W Bush, including that his disastrous wars that led to the Isis mess we are in now, but he did do one thing right: he was always willing to publicly speak out in favor of the vast majority of Muslims who are peaceful and abhor terrorism just like everyone else. As Chris Hayes noted, not a word of this touching speech Bush gave at an Islamic Center a week after 9/11 would ever be uttered by any of the Republican candidates today. Instead they compete over who can disparage and debase the Muslim community with the broadest brush stroke.
There are plenty of questions to ask in the aftermath of the attacks to learn how terrorism can better be prevented in the future. Instead public discourse has veered so far off-course that it’s hard to see when it will return.
Bron: www.theguardian.com
Het artikel gaat verder.quote:Telegraph Publishes The Dumbest Article On Encryption You'll Ever Read... Written By David Cameron's Former Speechwriter
Over the weekend, the Telegraph (which, really, is probably only the second or third worst UK tabloid), published perhaps the dumbest article ever on encryption, written by Clare Foges, who until recently, was a top speech writer for UK Prime Minister David Cameron (something left unmentioned in the article). The title of the article should give you a sense of its ridiculousness: Why is Silicon Valley helping the tech-savvy jihadists? I imagine her followups will including things like "Why is Detroit helping driving-savvy jihadists?" and "Why are farmers feeding food-savvy jihadists?"
quote:Bron: www.techdirt.com
Het artikel gaat verder.quote:Einde aan telefonisch sleepnet NSA
Vanaf vandaag mag de Amerikaanse inlichtingendienst NSA niet meer ongericht al het telefoonverkeer in de VS in de gaten houden. Vanaf klokslag middernacht, 06.00 uur Nederlandse tijd, worden de bevoegdheden van de dienst flink ingeperkt.
Het is de grootste beperking van een inlichtingendienst sinds de aanslagen van 9/11. Voortaan mag de NSA niet meer willekeurig alle gegevens over telefoontjes verzamelen, maar moet er voor elke persoon of groep specifiek een gerechtelijk bevel worden aangevraagd. Dat is dan maximaal zes maanden geldig.
Bron: nos.nl
Forum Opties | |
---|---|
Forumhop: | |
Hop naar: |